TIBCO Graph DB has a command line based administrative console for various interactions to be performed with the Graph DB server.
To run the admin, look for the binary named tgdb-admin. The following are the the possible flags for the executable.
Runs in interactive mode.
<url_spec> : Graph DB URL to connect to.
<username> : Username to login as.
|4||--pwd <cleartext pwd>||***** (admin)||
<cleartext pwd>: cleartext password to login as.
|5||--log <path of log file>||local working path||
The path to store a log file that contains admin log outputs. User may specify full path including log file name.
|6||--file <script file>||
Runs script file line by line and exits.
|1||connect [<dburl> [<username> [<password>]]]||
Make connection to Graph DB server.
Exit from admin.
|3||create user <username> [passwd= <password>]||
Create a new user in the graph DB.
List all users accessing the DB.
Graph Metadata Modeling commands
|1||create [array] attrdesc <name> type = <type>||
Create an attribute descriptor (attrdesc) with name, type and optionally as a multivalued using array qualifier. <type> strings are restricted to primitive types.
|2||create [unique] index <indexname> attributes ([<name>]+)
[on types ([<name>]+)]
Create new index in the Graph DB server with a subset of attributes and types in the global set.
|3||create nodetype <nodetypename> attributes ([<name>]+) [pagesize = <bytes>] [pkeys ([<name>]+)]||
Create a new nodetype which uses a subset of the attributes and optionally specifies a pagesize (in bytes) for the server to reserve space. Default pagesize is 512.
Show all attrdesc created in the DB.
Show all indexes created in the DB.
Show all nodetypes created in the DB.
Shows command description and usage. When no command is specified, all possible <command>'s that can be specified are shown on screen.
Clears terminal screen.
1) The following privileges must be granted to the running user to properly utilize TIBCO Graph Database. Please use the security policy tool by running "secpol.msc" with the Windows Run tool. Navigate to "Security Settings > Local Policies > User Rights Assignment" to grant the following privilege tokens.
"Adjust memory quotas for a process"
"Increase a process working set"
"Lock pages in memory"
"Perform volume maintenance tasks"
Shown below is a screenshot of the tokens, boxed in red.
(click to see full image)
2) Furthermore, UAC (User account control) should be disabled. To do this, go to Run and launch "uac". Change the UAC option to "Never notify" and press "OK" to confirm.
Monitoring and Management
Performance and Tuning
sysctl -w net.core.rmem_max=8388608
sysctl -w net.core.wmem_max=8388608
sysctl -w net.core.rmem_default=65536
sysctl -w net.core.wmem_default=65536
sysctl -w net.ipv4.tcp_rmem='4096 87380 8388608'
sysctl -w net.ipv4.tcp_wmem='4096 65536 8388608'
sysctl -w net.ipv4.tcp_mem='8388608 8388608 8388608'
sysctl -w net.ipv4.route.flush=1
Also Refer to the following websites http://fasterdata.es.net/host-tuning/