Skip to main content
Version: 2.5.1

Reference guide overview

The Memgraph reference guide contains the details of implemented features.

Built-in graph algorithms

Memgraph comes with custom-built algorithms that are implemented using C++: Depth-first search, Breadth-first search, Weighted shortest path, All shortest paths.

Configuration settings

Memgraph can be configured by editing the Memgraph configuration file or by including another configuration file.

Data durability and backup

Memgraph uses snapshots and WAL to ensure the durability of the stored data and it comes with a couple of queries that allow you to safely make a backup of these files.

Data types

Check what data types are supported by Memgraph.


Deploy your application with Memgraph as a part of your Docker Compose file or use a Helm Chart to make Memgraph part of your Kubernetes cluster.


An index stores additional information on certain types of data, so that retrieving said data becomes more efficient.

Inspecting and optimizing queries

Inspect the plan for executing a query, a pipeline of operations which will be performed on the database in order to yield the results for a given query, to gain insight into the execution of a query or get a detailed report on how the query's plan behaved.


Bolt protocol specifies additional data (metadata) that can be sent along with the requested results. Find out how to access it.

Monitoring server

Receive logs and runtime information from Memgraph in real-time via WebSocket connection.

Query modules

Memgraph supports extending the query language with user-written procedures. These procedures are grouped into modules, which can then be loaded either on startup or later on. To learn more about query modules take a look at the following guides:


Memgraph comes with a couple of queries that allow you to safely make a backup of the files containing its data. Memgraph supports replication and allows you to create a cluster of nodes running Memgraph instances.

Server stats

Get information about the running instance.


Memgraph can connect to existing Kafka, Pulsar and Redpanda streams. The streams are using user-defined transformations to produce Cypher queries based on the received messages. To learn more about streams and transformations take a look at the following pages:


All Cypher queries are run within transactions. Check how to create explicit transaction to run multiple queries within one transaction, and isolation levels available in Memgraph.


Memgraph enables running openCypher statements after a certain event happens during transaction execution, i.e., triggers.

Enterprise features

Features available for the Enterprise edition of Memgraph.

Audit log

Memgraph supports all query audit logging. When enabled, the audit log contains records of all queries executed on the database.

Authentication and authorization

Memgraph supports authentication and (optional) authorization using a custom-built external auth module. To learn more, visit:

Runtime settings

Check the settings that can be modified during runtime.

Security - user privileges

Memgraph comes with the option of granting, denying, or revoking a certain set of privileges to users or groups of users.