Instructional Videos

Installing with the Software AG Installer

This video provides a walk-through of the steps and options available when installing Terracotta using the automated Software AG Installer.

Please note that trial versions are provided as compressed tar files. Specific instructions for unpacking and installing can be found here.

Understanding the Terracotta Config File

This video provides a detailed look at the structure and contents of Terracotta’s TCConfig file.

TCConfig is the XML configuration file that defines the topology and properties for all the members of a Terracotta Server Array (TSA).


Setting Up a Cluster using Cluster Tool

A short tutorial on using Cluster Tool to create and configure a simple cluster.

By the end of this video, you will see how easy it is to set up a 2 node cluster with each node having 2 stripes, giving both high performance and high availability.

Deploy Terracotta to an AWS Kubernetes cluster, using Kops

From version 10.2, Terracotta is available on Docker Store and supports orchestration using Kubernetes.

This video will show you how you can leverage Terracotta’s operational storage (TCStore) and caching (Ehcache) to power your applications, on Kubernetes.

Failover Tuning in Terracotta

This video describes the new failover tuning features in Terracotta and how to prevent ‘Split Brain’ scenarios.

Failover conditions are described with examples and best practice strategies are provided for assuring high availability.

Configuring Secure Connections to Terracotta

This video will teach you how to configure SSL using certificates and set up a trust-store in Terracotta. The walkthrough covers key security concepts and shows how to deploy certificates and use SSL/TLS for secure connections.

The keytool example commands referenced in this video can be downloaded here: Keytool-Example.docx

Authentication, authorization and audit in Terracotta

A tutorial on configuring authentication for connections to a cluster or for logins to the management console as well as controlling admin access. It also covers enabling audit logging for security relevant events.

In particular, LDAP-based security and file-based security are explained.