Reference guide overview
The Memgraph reference guide contains the details of implemented features.
Built-in graph algorithms
Memgraph comes with custom-built algorithms that are implemented using C++: Depth-first search, Breadth-first search, Weighted shortest path, All shortest paths.
Memgraph can be configured by editing the Memgraph configuration file or by including another configuration file.
Data durability and backup
Memgraph uses snapshots and WAL to ensure the durability of the stored data and it comes with a couple of queries that allow you to safely make a backup of these files.
Check what data types are supported by Memgraph.
Deploy your application with Memgraph as a part of your Docker Compose file or use a Helm Chart to make Memgraph part of your Kubernetes cluster.
An index stores additional information on certain types of data, so that retrieving said data becomes more efficient.
Inspecting and optimizing queries
Inspect the plan for executing a query, a pipeline of operations which will be performed on the database in order to yield the results for a given query, to gain insight into the execution of a query or get a detailed report on how the query's plan behaved.
Bolt protocol specifies additional data (metadata) that can be sent along with the requested results. Find out how to access it.
Receive logs and runtime information from Memgraph in real-time via WebSocket connection.
Memgraph supports extending the query language with user-written procedures. These procedures are grouped into modules, which can then be loaded either on startup or later on. To learn more about query modules take a look at the following guides:
- Available query modules
- Implement custom query modules
- Load and call query modules
- Utility query module
Memgraph comes with a couple of queries that allow you to safely make a backup of the files containing its data. Memgraph supports replication and allows you to create a cluster of nodes running Memgraph instances.
Get information about the running instance.
Memgraph can connect to existing Kafka, Pulsar and Redpanda streams. The streams are using user-defined transformations to produce Cypher queries based on the received messages. To learn more about streams and transformations take a look at the following pages:
All Cypher queries are run within transactions. Check how to create explicit transaction to run multiple queries within one transaction, and isolation levels available in Memgraph.
Memgraph enables running openCypher statements after a certain event happens during transaction execution, i.e., triggers.
Features available for the Enterprise edition of Memgraph.
Memgraph supports all query audit logging. When enabled, the audit log contains records of all queries executed on the database.
Authentication and authorization
Memgraph supports authentication and (optional) authorization using a custom-built external auth module. To learn more, visit:
Check the settings that can be modified during runtime.
Security - user privileges
Memgraph comes with the option of granting, denying, or revoking a certain set of privileges to users or groups of users.