Database management

Database management

Learn how to configure, manage and monitor your Memgraph instance.

Authentication and authorization

Memgraph supports managing users and roles as well as role-based and fine-grained access control. It supports integration with third-party authentication systems such as LDAP, SAML, and OIDC.

Backup and restore

Memgraph uses snapshots and WAL to ensure the durability of the stored data. Learn how to safely backup and restore your data.

Clustering

Memgraph uses replication to distribute data across several instances. Memgraph Enterprise offers the high availability feature to ease the management of Memgraph cluster.

Configuration

Memgraph has a set of configuration options that can be fine-tuned for specific needs.

Enabling Memgraph Enterprise

Check how to enable Memgraph Enterprise to get access to advanced features.

Experimental features

Experimental features in Memgraph represent the forefront of our innovation, offering cutting-edge functionality as we continuously enhance our product. Learn how to try them out.

Logs

Check how to access logs and change log tracking level. Learn about query audit logging in Memgraph Enterprise.

Monitoring

Receive logs and runtime information from Memgraph in real-time using a WebSocket or HTTP server.

Multi-tenancy

Multi-tenant support in Memgraph Enterprise enables users to manage multiple isolated databases within a single instance. The primary objective is to facilitate efficient resource isolation, maintain data integrity, and manage access for different clients.

Query metadata

Bolt protocol specifies additional data (metadata) that can be sent along with the requested results. Find out how to access it.

Server stats

Get the version, storage and build information about the running instance.

SSL encryption

Memgraph uses SSL (Secure Sockets Layer) protocol for establishing an authenticated and encrypted connection to a database instance.

System configuration

Improving Memgraph's efficiency may occasionally require fine-tuning settings at the operating system level. Such modifications are directly related to the rules that control resource distribution and the management of processes.