BigMemory Max delivers ultrafast access to hundreds of terabytes of in-memory data. BigMemory snaps into enterprise applications to deliver unmatched performance at any scale.

BigMemory Max supports a distributed in-memory data-storage topology, which enables the sharing of data among multiple caches and in-memory data stores in multiple JVMs. It uses a Terracotta Server Array to manage data that is shared by multiple application nodes in a cluster.

The Ehcache 2.x API can be used with BigMemory Max 4.x as a general-purpose cache/in-memory data store or a second-level cache for Hibernate. You can additionally integrate it with third-party products such as ColdFusion, Google App Engine, and Spring.



Document Contents


Current Release


BigMemory Max 4.4.0 (October 2022) is the latest release. It includes Ehcache 2.11.

Fixes are cumulative from version to version.

Deprecation Notice: As previously announced in February 2020, as of October 2021, the BigMemory WAN Replication module and Web Sessions products have been deprecated and are no longer distributed or updated as part of BigMemory products (any/all versions).


Feature Highlights


BigMemory Max 4.4.0 introduced the following new capabilities:

  • Support for Java 11
  • Support for RedHat EL9 (server)
  • Support for Windows Server 2022
  • Provide logs in JSON format for better searchability and performance
  • Docker images with Logging as a service (LaaS) support
  • Voter process now available with Docker image
  • Various bug fixes and security fixes
  • Contains all features and functionality included in BigMemory Max 4.3.x


Summary of Changes 4.4


4.4.0.1

  • Release Date: 2022/11/04
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-8200] Reflected Cross-Site Scripting
    • [TAB-8202] Improper Error Handling
    • [TAB-8203] Banner Grabbing
    • [TAB-8204] Server-side request forgery
    • [TAB-8241] Vulnerable 3rd Party Component Shiro used
    • [TAB-8226] Vulnerable 3rd Party Component Jackson Databind used

4.4.0.2

  • Release Date: 2022/12/30
  • Resolved
    • [TAB-8263]TMC shows blank page after installing Terracotta upgrade
    • [TAB-8261] Ascending function not working in terracotta query while fetching data.
  • Security Updates to Third Party Libraries
    • none

4.4.0.3

  • Release Date: 2023/02/10
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-8280] Vulnerable 3rd Party Component shiro-core and jackson-databind updated

4.4.0.4

  • Release Date: 2023/07/12
  • Resolved
    • Update file containing docker image 3rd party components
  • Security Updates to Third Party Libraries
    • [TAB-8393] CVE updates of json-smart
    • [TAB-8384] Vulnerable 3rd party component Guava updated
    • [TAB-8363] Vulnerable 3rd party component Eclipse-Jetty updated
    • Multiple 3rd party library updates
      • jetty 10.0.15
      • jackson-databind 2.15.2
      • jersey 2.39.1
      • guava 32.0.1-jre
      • csrfguard 4.3.0
      • logback 1.2.12
      • hamcrest 2.2
      • commons-io 2.13.0
      • jaxb-runtime 2.3.8

4.4.0.5

  • Release Date: 2023/08/11
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-8435][TAB-8436] Vulnerable 3rd party component Shiro updated
    • Other 3rd party library updates
      • guava
      • commons-codec
      • commons-lang3
      • jersey

4.4.0.6

  • Release Date: 2023/10/04
  • Resolved
    • [TAB-8276] Fix ConcurrentModificationException at org.terracotta.offheapstore.disk.storage.FileBackedStorageEngine.getOccupiedMemory
  • Security Updates to Third Party Libraries
    • [TAB-8485] Vulnerable 3rd party component Eclipse Jetty updated to 10.0.16

4.4.0.7

  • Release Date: 2023/10/24
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • Third-party library upgrades:
      • jetty to 10.0.17
      • jackson to 2.15.3
      • guava to 32.1.3-jre
      • commons-io to 2.14.0
      • rest-assured to 5.3.2

4.4.0.8

  • Release Date: 2023/12/22
    • [TAB-8521] Secure Setting on cookies from TMS
    • [TAB-8522] Disable additional set of ciphers in TMS that are now considered weak
    • [TAB-8523] Enforce more strict password policy for strong passwords
    • [TAB-8288] Disallow HTTP v 1.0 protocol to TMS

4.4.0.9

  • Release Date: 2024/02/03
  • Resolved
    • [TAB-8544] The behavior of server-stat has changed after installing 4.4.0 Fix7
  • Security Updates to Third Party Libraries
    • [TAB-8524] Http Security headers missing
    • [TAB-8529] High severity vulnerablity in logback found in terracotta-toolkit-runtime-ee-4.4.0.7.7.jar
    • [TAB-8537] Vulnerable 3rd party component logback used
    • [TAB-8550] Vulnerable 3rd party component shiro used
    • [TAB-8556] Vulnerable 3rd party component logback-core used
    • Third-party library upgrades:
      • bytebuddy 1.14.11
      • byteman 4.0.22
      • commons-cli 1.6.0
      • commons-logging 1.3.0
      • guava 33.0.0-jre
      • jackson 2.16.1
      • jaxb-runtime 2.3.9
      • jersey 2.41
      • jetty 10.0.19
      • logback 1.2.13
      • rest-assured 5.4.0
      • shiro 1.13.0

4.4.0.10

  • Release Date: 2024/02/23
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-8673] Vulnerable 3rd party component json-path used
    • Third-party library upgrades:
      • json-path updated to 2.9.0

4.4.0.11

  • Release Date: 2024/03/23
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-8727] Vulnerable 3rd party component eclipse-jetty used
    • Third-party library upgrades:
      • eclipse-jetty updated to 10.0.20

4.4.0.12

  • Release Date: 2024/05/09
  • Resolved
    • Update to generation of install instructions
  • Security Updates to Third Party Libraries
    • none

4.4.0.13

  • Release Date: 2024/06/07
  • Resolved
    • Updates to manifest for java 17
  • Security Updates to Third Party Libraries
    • none

4.4.0.14

  • Release Date: 2024/07/11
  • Resolved
    • none
  • Security Updates to Third Party Libraries
    • [TAB-9448] Allow user to configure secure cookie attribute
    • Don’t set cookies secure in an INI setup, Jetty handles that when SSL is enabled


Notes


  • Terracotta BigMemory 4.x and Terracotta 10.x clients may be used simultaneously in the same application by ensuring ClassLoader isolation when initializing at least one of the clients.

Important Upgrade Information


The following information is contained in the readme.txt file included with each fix release and should be reviewed prior to applying any fix.

8.0 Installation

8.1 Shut down the server array. A safe shutdown procedure is as follows.

    a. Shut down the mirror servers using the stop-tc-server script. 
       If you are using a wrapper solution to manage the mirror servers, execute the wrapper shut
       down command to shut down the mirror servers instead of using the stop-tc-server script.

    b. Shut down the clients. A terracotta client will shut down when you shut down your application.

    c. Shut down the active servers using the stop-tc-server script.
       If you are using a wrapper solution to manage the servers, execute the wrapper shut down
       command to shut down the servers instead of using the stop-tc-server script.

8.2 This fix overwrites server scripts,wrapper configuration files and default tc-config.xml. If
    you have any custom settings defined on those files (ex:MaxDirectMemorySize), then you need to
    restore those settings back after applying the fix.

8.3 Install using Update Manager. For instructions, see the documentation at
    https://docs.webmethods.io/.

8.4 The upgrade of the 3rd party library Shiro may create an issue for some users that will require
    a manual configuration change to the "shiro.ini" found in the ".tc/mgmt" directory of the
    user's home folder (the user that the TMS/TMC process runs as ~/.tc/mgmt/shiro.ini). Edit this
    file and restart the TMS/TMC.
     
    a. Blank browser page or a message from the browser indicating too many redirects, or similar.
       In [urls] section of file ~/.tc/mgmt/shiro.ini, locate the line in the that reads
       "/login.jsp = authc". Immediately above that line add the three following lines:

       /401.jsp = anon
       /403.jsp = anon
       /404.html = anon
      
       In the [main] section of file ~/.tc/mgmt/shiro.ini, add the following line:
      
       [main]
       shiro.filterOncePerRequest=true
   
    b. URLs containing semi-colon are blocked and 400 client error is thrown. 
       In the [main] section of file ~/.tc/mgmt/shiro.ini, add the following two lines to the top
       of the section:

       [main]
       invalidRequest = org.apache.shiro.web.filter.InvalidRequestFilter
       invalidRequest.blockSemicolon = false

9.0 Uninstallation

9.1 Shut down the server array. A safe shutdown procedure is as follows.

    a. Shut down the mirror servers using the stop-tc-server script. 
       If you are using a wrapper solution to manage the mirror servers, execute the wrapper shut
       down command to shut down the mirror servers instead of using the stop-tc-server script.

    b. Shut down the clients. A Terracotta client will shut down when you shut down your application.

    c. Shut down the active servers using the stop-tc-server script.
       If you are using a wrapper solution to manage the servers, execute the wrapper shut down
       command to shut down the servers instead of using the stop-tc-server script.

9.2 Uninstall using Update Manager. For instructions, see the documentation at
    https://docs.webmethods.io/.