Help Center/ Graph Engine Service/ User Guide/ Creating Graphs/ Creating a Graph Without Using a Template
Updated on 2024-11-04 GMT+08:00

Creating a Graph Without Using a Template

  1. Log in to the GES console and click Create Graph in the upper right corner of the Overview page.
  2. Select the Region where the cluster works from the drop-down list in the upper left corner of the page.
  3. On the Create Graph page, click the Customize Graph tab and set the following parameters:
    1. In the Configure step, set the graph name and software version.
      Figure 1 Graph name and software version

      Parameter

      Description

      Graph Name

      You can set a name or use the default name. After a graph is created, its name cannot be changed.

      The graph name must:

      • Contain 4 to 50 characters and start with a letter.
      • Be case-insensitive.
      • Contain only letters, digits, and underscores (_).

      GES Software Version

      The system uses the latest version by default, and only the default version is available.

    2. Set network parameters, including VPC, Subnet, Security Group, Enterprise Project, and Public Network Access.
      Figure 2 Network information

      Parameter

      Description

      VPC

      A VPC is a secure, isolated, and logical network environment.

      Select the VPC for which you want to create the graph and click View VPC to view the name and ID of the VPC.

      NOTE:

      If your account has VPCs, a VPC will be automatically selected. You can change it as needed. If no VPC is available, you need to create a VPC. After the VPC is created, it will be automatically selected.

      Subnet

      A subnet provides dedicated network resources that are logically isolated from other networks for network security.

      Select the subnet for which you want to create the graph to enter the VPC and view the name and ID of the subnet.

      Security Group

      A security group implements access control for ECSs that have the same security protection requirements in a VPC.
      • Click Learn how to configure a security group. to get instructions.
      • Click View Security Group to learn security group details.

      Public Network Access

      The public network access to the graph. Set this parameter as you need.

      Do not use: A graph instance without an elastic IP (EIP) cannot be accessed over the Internet. However, the graph instance can be accessed through ECSs deployed on a private network.

      Buy now: GES automatically allocates an EIP with exclusive bandwidth to the graph instance so that the graph instance can be accessed over the Internet using the EIP. In addition, GES uses the tenant permission to automatically create an agency with the prefix of ges_agency_default in the project to support EIP binding.

      Specify: Select an EIP to allow the graph instance to be accessed over the Internet.

      Click Create EIP to access the VPC management console and create an EIP.

      Enterprise Project

      Centrally manages cloud resources and members by project.

      Click Create Enterprise Project to go to the Enterprise Project Management page.

      Tag

      Tags for a resource. Enter a tag key and value, and click Add to add the tag.

      You can view the added tag in the graph details and search for graphs by tag on the Graph Management page.

      NOTE:

      It is recommended that you use TMS's predefined tag function to add the same tag to different cloud resources.

      Security Mode

      If you enable the security mode, communications will be encrypted when you access a graph instance, and only HTTPS can be used when you call APIs. This function affects GES performance.

      Cryptographic Algorithm

      Available values are as follows:
      • General cryptographic algorithms (SM series cryptographic algorithms not supported) are used by all components to store and transmit sensitive data. These algorithms that do not have special requirements.
      • SM series commercial encryption algorithm (compatible with the international general algorithm) is supported. Sensitive data of all components is stored using this algorithm. The SM series commercial encryption algorithm and international algorithm can be used for data transmission.
    3. Set graph parameters.
      Figure 3 Graph parameters

      Parameter

      Description

      Cross-AZ HA

      Whether to support cross-AZ cluster.

      If this function is enabled, graph instances are distributed in different AZs to enhance reliability.

      Purpose

      Purpose of the graph to be created.

      Enterprise production: High reliability and concurrency are supported, suitable for production and large-scale applications.

      Developer learning: A complete function experience is offered, suitable for developer learning.

      Versions

      GES editions.

      • Memory edition: The capacity is limited and a maximum of 10 billion edges are supported. Storage and compute based on memory storage. This edition is preset with a variety of algorithms, and Gremlin and Cypher query languages are supported.
      • Database edition: The storage capacity is unlimited. Storage and compute based on distributed key-value databases. This edition has higher performance and has unlimited capacity, but it supports only the Cypher queries.

      Vertex ID Type (This parameter is available only when you choose the database edition.)

      The options include String (fixed length), String (variable length), and Hash.

      • String (fixed length): Vertex IDs are used for internal storage and compute. Specify the length limit. If the IDs are too long, the query performance can be reduced. Specify the length limit based on your dataset vertex IDs. If you cannot determine the maximum length, set the ID type to hash.
      • String (variable length): The length of the vertex IDs written by the user is not limited. However, if the IDs are too long, the read and write performance is affected. It is recommended that the length be within 1,000 bytes, with a maximum of 4,000 bytes.
      • Hash: Vertex IDs are converted into hash code for storage and compute. There is no limit on the ID length. However, there is an extremely low probability, approximately 10^(-43), that the vertex IDs will conflict.
      NOTE:

      If you cannot determine the maximum length of a vertex ID, set this parameter to Hash.

      SortKey Type (This parameter is available only when you choose the database edition.)

      Different SortKey values are configured to distinguish duplicate edges (edges with the same source vertex, end vertex, and label). The options include:

      • Integer: The value is an integer, which saves space.
      • String (byte length less than or equal to 40)
      • String (variable length): The length is not limited. However, if the IDs are too long, the read and write performance is affected. It is recommended that the length be within 1,000 bytes, with a maximum of 2,000 bytes.

      Compute Resource

      Type of compute resources.

      An elastic cloud server (ECS) is a computer system that has complete hardware, an operating system (OS), and network functions and runs in a secure, isolated environment.

      CPU Architecture

      Currently, GES supports X86 and Kunpeng.

      Graph Size (Edges)

      Available options based on your resource quota.

      Different graph specifications are displayed for Enterprise production and Developer learning.

      • Development learning: Currently, there is only 10-thousand-edge graphs are available for this purpose, regardless of the edition.
      • Enterprise production: The specifications vary depending on the edition.
        • Memory edition: Available options are million-edge, 10-million-edge, 100-million-edge, billion-edge, billion-edge-pro, and 10-billion-edge.
        • Database edition: Available options are billion-edge, 10-billion-edge, and 100-billion-edge.
      NOTE:

      Graph size, which is based on the number of edges. The value is not accurate. If there are a large number of vertices and properties, you are advised to apply for graphs with a larger size.

    4. Advanced Settings: Set this parameter to Default or Custom.
      • Default: Use the default values.
      • Custom:
        • When you set Versions to Memory edition, you need to set the following custom parameters: Encrypt Instance, Fine-Grained Permission, , Multiple labels, and Multigraph.
          Figure 4 Advanced settings for the memory edition

        Parameter

        Description

        Encrypt Instance

        Whether to encrypt a graph instance. Key Source is default to KMS. KMS Key: Select the key as needed.

        NOTE:

        Some functions will be affected if you disable or delete a KMS key.

        Fine-Grained Permission

        Whether to enable fine-grained permission management. If this function is enabled, the traverse, read, and write permissions can be set for specific properties of a label.

        Multiple labels

        After this option is enabled, multiple labels can be set for the same vertex in the graph.

        NOTE:
        1. Only the memory edition supports this function.
        2. Each label corresponds to a unique property. When the API for querying vertex details is called, information about all labels and corresponding properties on the vertex is returned. Property filtering queries filter different labels on the vertex.

        Multigraph

        Once this option is enabled, multigraph clusters are supported by default. Such a cluster can have multiple graph instances, each allocated with different data. This allows you to analyze multiple graphs simultaneously.

        • If you choose the database edition, you can enable or disable HyG computing engine and Fine-Grained Permission.
          Figure 5 Advanced settings for the database edition

          Parameter

          Description

          HyG computing engine

          HyG is a high-performance distributed graph computing framework that supports many graph analysis algorithms. HyG engine is suitable for complex graph analysis.

          Fine-Grained Permission

          Whether to enable fine-grained permission management. If this function is enabled, the traverse, read, and write permissions can be set for specific properties of a label.

  4. Click Next. The Confirm page is displayed.
  5. Confirm the information and click Submit to create the graph.
  6. After the submission is successful, the Finish tab page is displayed. You can click Back to Task Center to view the status and running result of the created graph.