Financial

Financial

Financial

Financial

Transactions

Transactions

Transactions

Transactions

Database

Database

Database

Database

To power the next 30 years of Online Transaction Processing.

To power the next 30 years of Online Transaction Processing.

Installation

Linux

macOS

Windows

curl -Lo tigerbeetle.zip https://linux.tigerbeetle.com && unzip tigerbeetle.zip && ./tigerbeetle version

Weekly Release: 0.16.58  | Sep 15, 2025

Apache 2.0 Open Source (No CLAs)

Linux

macOS

Windows

curl -Lo tigerbeetle.zip https://linux.tigerbeetle.com && unzip tigerbeetle.zip && ./tigerbeetle version

Weekly Release: 0.16.58  | Sep 15, 2025

Apache 2.0 Open Source (No CLAs)

Linux

macOS

Windows

curl -Lo tigerbeetle.zip https://linux.tigerbeetle.com && unzip tigerbeetle.zip && ./tigerbeetle version

Weekly Release: 0.16.58  | Sep 15, 2025

Apache 2.0 Open Source (No CLAs)

TigerBeetle is production-ready on Linux and seamlessly integrated with Python, Java, Node.js, .Net, Go.

Linux

macOS

Windows

curl -Lo tigerbeetle.zip https://linux.tigerbeetle.com && unzip tigerbeetle.zip && ./tigerbeetle version

Weekly Release: 0.16.58  | Sep 15, 2025

Apache 2.0 Open Source (No CLAs)

Linux

macOS

Windows

curl -Lo tigerbeetle.zip https://linux.tigerbeetle.com && unzip tigerbeetle.zip && ./tigerbeetle version

Weekly Release: 0.16.58  | Sep 15, 2025

Apache 2.0 Open Source (No CLAs)

1000x Faster
OLTP Performance

TigerBeetle delivers. High throughput, predictable low latency, and cost-efficiency at scale through first-principles design and relentless optimization. Move more transactions, faster, on less hardware.

100K-400K

100K-400K

TPS

TPS

100ms

100ms

P99 Latency

P99 Latency

90%

90%

Contention

Contention

100B+

100B+

Transactions

Transactions

1B+

1B+

Accounts

Accounts

20+

20+

Indexes

Indexes

6

6

Replicas

Replicas

The World is Becoming
More Transactional

In the past 10 years, transaction volumes surged 100x–1,000x across cloud, energy, and gaming — and up to 10,000x in real-time payments. Mainframe or not, legacy systems are at a breaking point.

2025

2025

2015

2015

100x

In-Game Economies

1,000x

Energy, Ride-Sharing

10,000x

Real-Time Payments

100x

In-Game Economies

1,000x

Energy, Ride-Sharing

10,000x

Real-Time Payments

General-Purpose Databases
Have an OLTP Limit

General-Purpose Databases Have an OLTP Limit

Traditional SQL databases hold locks across the network; under Amdahl's Law, even modest contention caps write throughput at ≈100–1,000 TPS — a hard asymptote that no amount of horizontal scaling can overcome.

Network Round Trip Time

1

ms

Contention

10

%

TPS

TPS

Postgres

Postgres

|

Amdahl's Law

Amdahl's Law

|

TigerBeetle

TigerBeetle

SQL Queries

SQL Queries

Row Locks

Row Locks

0.0

0.0

ms

ms

0.5

0.5

ms

ms

1

1

ms

ms

2

2

ms

ms

1.5

1.5

ms

ms

Amdahl’s Law

Amdahl’s Law

1,000 ms

1,000 ms

1

1

ms

ms

×

×

1

1

10

10

%

%

=

=

10,000

10,000

TPS

TPS

Network Round Trip Time

Network Round Trip Time

1

1

ms

ms

Contention

Contention

10

10

%

%

A New Era for
Database Design

Hardware has leapt ahead. I/O is faster than ever and CPU is the new bottleneck. The future of transaction processing optimizes for cache locality and looks nothing like the HDD-bound past.

Purpose-Built
for Transaction Processing

TigerBeetle co-designs the global consensus protocol and local storage engine from first principles, as a single system to extract every last transaction per CPU cycle — even under extreme write contention.

Purpose-Built
for Transaction Processing

TigerBeetle co-designs the global consensus protocol and local storage engine from first principles, as a single system to extract every last transaction per CPU cycle — even under extreme write contention.

Thousands of Transactions in a Single Query

Where a general-purpose database executes 1 transaction per 2+ queries, TigerBeetle executes up to 8,190 transactions per query — zero locks, zero contention collapse. Maximum throughput.

Thousands of Transactions in a Single Query

Where a general-purpose database executes 1 transaction per 2+ queries, TigerBeetle executes up to 8,190 transactions per query — zero locks, zero contention collapse. Maximum throughput.

Predictable Low P100 Latencies

Built for soft real-time performance: static memory allocation, zero copy, zero deserialization, Direct I/O, io_uring. Tight tail latencies at peak load.

Predictable Low P100 Latencies

Built for soft real-time performance: static memory allocation, zero copy, zero deserialization, Direct I/O, io_uring. Tight tail latencies at peak load.

One Cluster.
Store Billions of Transactions

TigerBeetle’s tiered storage engine spans every level of the storage hierarchy (L1/L2/L3 CPU caches, RAM, and NVMe). Automatic speed. Long-term capacity.

One Cluster.
Store Billions of Transactions

TigerBeetle’s tiered storage engine spans every level of the storage hierarchy (L1/L2/L3 CPU caches, RAM, and NVMe). Automatic speed. Long-term capacity.

Scalability:
Do More With Less

Even at low contention, scaling out multiplies locks. TigerBeetle scales up on 6 machines — replicated, never partitioned. Maximum performance per dollar.

Scalability:
Do More With Less

Even at low contention, scaling out multiplies locks. TigerBeetle scales up on 6 machines — replicated, never partitioned. Maximum performance per dollar.

The Power of Zero

O

u

t

-

o

f

-

M

e

m

o

r

y

(

O

O

M

)

C

r

a

s

h

e

s

O

u

t

-

o

f

-

M

e

m

o

r

y

(

O

O

M

)

C

r

a

s

h

e

s

The Power of Zero

O

u

t

-

o

f

-

M

e

m

o

r

y

(

O

O

M

)

C

r

a

s

h

e

s

The Power of Zero

O

u

t

-

o

f

-

M

e

m

o

r

y

(

O

O

M

)

C

r

a

s

h

e

s

Debit/Credit
Strict Consistency

TigerBeetle advances debit/credit — the standard for transaction processing — to guarantee correctness by design with a universal schema and strict serializability. Eliminate errors, enforce integrity, and accelerate development.

Rider

Debit

Credit

$18.00

Driver

Debit

Credit

$18.00

Rider

Debit

Credit

$18.00

Driver

Debit

Credit

$18.00

Rider

Debit

Credit

$18.00

Driver

Debit

Credit

$18.00

Rider

Debit

Credit

$18.00

Driver

Debit

Credit

$18.00

The Standard Measure of Transaction Processing

Forty years ago, Jim Gray — Turing Award-winner and pioneer of SQL, ACID, and OLTP — defined debit/credit as the standard measure of transaction processing.

Transaction Processing Complements General-Purpose / Analytics

SQL is a query language for general-purpose (OLGP) or analytical (OLAP) workloads: reading variable-length strings (e.g. users, products). OLTP is complementary: writing fixed-size integers (e.g. orders, payments).

Reinventing OLTP on SQL Risks Correctness

SQL databases shift OLTP invariants — idempotency, isolation, even two-phase commit (2PC) — onto developers, leading to double-spends, negative balances, and costly reconciliation failures.

Strict Serializability by Default

TigerBeetle achieves what few databases dare: the strongest isolation level in theory — rare in practice. Transactions execute atomically, in real time. No anomalies. No caveats. No clock bets. Only correctness — at scale.

Immutability Changes Everything

Even the strongest durability doesn't prevent logical data loss. Where SQL allows destructive UPDATE and DELETE, TigerBeetle enforces append-only immutability — ensuring effortless reconciliation and audit success.

OLTP Correctness by Design

TigerBeetle enforces invariants in the DBMS — guaranteeing correctness and accelerating development — with the standard measure of transaction processing: debit/credit.

Debit/Credit:
The Universal Schema

Debit/Credit: The Universal Schema

Debit/credit is minimal and complete: two entities (accounts, transfers) and one invariant (every debit has an equal and opposite credit) model any exchange of value, in any domain.

Powerful OLTP Primitives

Accounts

Enforce double-entry integrity like Newton’s Third Law. For every transfer from one account, an equal transfer to another. Query accounts as of any point in time, not just at hourly or daily intervals.

Accounts

Enforce double-entry integrity like Newton’s Third Law. For every transfer from one account, an equal transfer to another. Query accounts as of any point in time, not just at hourly or daily intervals.

Transfers

Capture the who, what, when, where, why and how much of every transaction, with a standardized schema for all your products.

Transfers

Capture the who, what, when, where, why and how much of every transaction, with a standardized schema for all your products.

Transactions of Transactions

Link thousands of transfers across multiple accounts to succeed or fail atomically. Express complex contracts declaratively, with ease.

Transactions of Transactions

Link thousands of transfers across multiple accounts to succeed or fail atomically. Express complex contracts declaratively, with ease.

Hybrid Logical Clock (HLC) Timestamps

Assign nanosecond resolution timestamps, with strict monotonicity, to your accounts/transfers. Enjoy total order and accuracy for auditing.

Hybrid Logical Clock (HLC) Timestamps

Assign nanosecond resolution timestamps, with strict monotonicity, to your accounts/transfers. Enjoy total order and accuracy for auditing.

User-Data Identifiers

Attach 128/64/32-bit user-defined identifiers to accounts/transfers. Connect your OLTP system of record to any OLGP system of reference.

User-Data Identifiers

Attach 128/64/32-bit user-defined identifiers to accounts/transfers. Connect your OLTP system of record to any OLGP system of reference.

Separation of Concerns

Write to OLTP last, after any data dependencies. Read from OLTP first, before OLGP. Preserve strict consistency and separation of concerns in your architecture.

Separation of Concerns

Write to OLTP last, after any data dependencies. Read from OLTP first, before OLGP. Preserve strict consistency and separation of concerns in your architecture.

Net Balance Limits

Guarantee real-time balance limits (hard or dynamic) in the database, on a per-account basis. Ensure debits never exceed credits or vice-versa.

Net Balance Limits

Guarantee real-time balance limits (hard or dynamic) in the database, on a per-account basis. Ensure debits never exceed credits or vice-versa.

Pending Transfers

Authorize pending amounts in the 1st phase, and post/void these in the 2nd phase, with timeouts managed by the database. Perfect two-phase commit (2PC) across third-party systems.

Pending Transfers

Authorize pending amounts in the 1st phase, and post/void these in the 2nd phase, with timeouts managed by the database. Perfect two-phase commit (2PC) across third-party systems.

Multi-Currency / Multi-Tenancy

Partition accounts/transfers for multi-currency or multi-tenancy. Execute back-to-back transfers with atomicity in one physical database, with strong logical isolation.

Multi-Currency / Multi-Tenancy

Partition accounts/transfers for multi-currency or multi-tenancy. Execute back-to-back transfers with atomicity in one physical database, with strong logical isolation.

Multi-Cloud
High Availability

TigerBeetle runs across AWS, GCP, and Azure simultaneously: eliminating lock-in, meeting regulatory requirements, and protecting availability — even through provider slowdowns and disruptions.

VSR: Pioneering Consensus

TigerBeetle implements MIT’s Viewstamped Replication (VSR) with deterministic view changes, multipath message passing, and no risk of dueling leaders — reducing latency and increasing availability through automated failover for uninterrupted transaction processing.

Explicit Fault Models

While most consensus proofs emphasize only process crashes and network partitions, TigerBeetle explicitly models process, network, clock, and storage faults — delivering resilience where it matters most: production.

From Physical to Logical Availability

CAP defines availability physically: “requests to a non-failing node receive a response”. TigerBeetle ensures logical availability: as long as clients can reach a majority, requests complete with strict serializability, preserving safety and liveness under partitions.

Slow Fault Tolerance

The Achilles’ heel of cloud-scale systems is not node or network failure, but gray failure — hardware that slows without crashing. TigerBeetle’s Adaptive Replication Routing (ARR) automatically routes around degraded replicas, reducing latency and sustaining availability.

Flexible Quorums

Traditional systems require rigid majorities for both replication and election. TigerBeetle applies 2016 research: 3/6 replication, 4/6 election — preserving consistency, reducing latency, and increasing availability across zones, regions, and clouds.

Easy to Deploy, Hard to Destroy

Run anywhere — cloud-native or on-premises, bare-metal or virtualized — with a single static binary, zero dependencies, minimal tuning, automated rolling upgrades and pager-free failover.

Indestructible
Durability

TigerBeetle is designed, engineered, and tested to deliver unbreakable durability — even under the most extreme failure scenarios.

Durability: The Foundation of ACID

Without Durability, the guarantees of Atomicity, Consistency, and Isolation collapse — the only letter in ACID whose loss undoes the others. TigerBeetle rebuilds the DBMS foundation to make durability absolute.

Replicated Write-Ahead Log

TigerBeetle synchronously commits every operation to a write-ahead log, replicated across a 3/6 quorum. Disks fail, machines crash, datacenters burn — TigerBeetle transactions endure.

End-to-End Checksums by Default

TigerBeetle protects every byte with 128-bit checksums stored out of band, detecting and repairing near-byzantine corruption and misdirected I/O, before storage faults can endanger durability.

Strict Storage Fault Model

Traditional databases assume disks fail cleanly. They lose data to fsyncgate, misdirected I/O, or WAL corruption — forcing costly local RAID. TigerBeetle is different: engineered on a strict storage fault model, resilient against corruption, misdirection, even tampering.

Protocol-Aware Recovery

TigerBeetle applies 2018 research, using global consensus redundancy to recover from local storage faults — disentangling corruption from power loss and repairing the Write-Ahead Log (WAL) automatically to guarantee correctness and efficiency.

Understanding SSD Failures at Scale

Understanding SSD Failures at Scale

0.031%
of SSDs per year exhibit latent sector errors.

0.031%
of SSDs per year exhibit latent sector errors.

0.023%
of SSDs per year corrupt or misdirect I/O.

0.023%
of SSDs per year corrupt or misdirect I/O.

Jepsen Report:
Surviving Helical Disk Faults

Jepsen Report: Surviving Helical Disk Faults

Jepsen Report:
Surviving Helical Disk Faults

TigerBeetle is the first database to withstand helical fault injection. Jepsen introduced a file corruption nemesis — to flip random bits like cosmic rays — across all machines. Unprecedented resilience, proven under the harshest failures.

“TigerBeetle offers exceptional resilience to disk faults. In our tests, it recovered from bitflips and other kinds of file corruption in almost every part of a node’s data file, so long as corruption was limited to a minority of nodes. In some file zones, like the grid, TigerBeetle tolerated the loss or corruption of all but one copy. In the superblock, client replies, and grid zones of the data file, TigerBeetle could recover our “helical” faults, in which every node experienced data corruption spread across disjoint regions of the file.” 

“TigerBeetle offers exceptional resilience to disk faults. In our tests, it recovered from bitflips and other kinds of file corruption in almost every part of a node’s data file, so long as corruption was limited to a minority of nodes. In some file zones, like the grid, TigerBeetle tolerated the loss or corruption of all but one copy. In the superblock, client replies, and grid zones of the data file, TigerBeetle could recover our “helical” faults, in which every node experienced data corruption spread across disjoint regions of the file.” — Kyle Kingsbury



Kyle Kingsbury, Jepsen

Extreme
Engineering

Extreme Engineering

TigerStyle, TigerBeetle’s engineering methodology, applies NASA’s Power of 10 Rules for Safety-Critical Code, with static allocation and 6,000+ assertion tripwires hardwired for safety. Featured on Lex Fridman and The Primeagen, and adopted by leading infrastructure companies. TigerStyle establishes rigorous DBMS engineering discipline.

TigerStyle, TigerBeetle’s engineering methodology, applies NASA’s Power of 10 Rules for Safety-Critical Code, with static allocation and 6,000+ assertion tripwires hardwired for safety. Featured on Lex Fridman and The Primeagen, and adopted by leading infrastructure companies.
TigerStyle establishes rigorous DBMS engineering discipline.

00:00:10

Real Time

1 sec

00:00:10

Real Time

1 sec

00:00:10

Real Time

1 sec

00:00:10

Real Time

1 sec

01:56:40

Simulated Time

700 sec

01:56:40

Simulated Time

700 sec

01:56:40

Simulated Time

700 sec

01:56:40

Simulated Time

700 sec

Deterministic Simulation Testing (DST)

TigerBeetle is built to be tested in a deterministic “flight” simulator — applying model checking techniques on production code to expose the rarest, most dangerous bugs before production.

Pushed To the Limit

Fault injectors unleash partitions, packet loss, crashes, skewed clocks, latency shifts, disk corruption, and misdirection. Relentless verifiers push correctness and availability to breaking point.

2000 Years, Every 24 Hours

With time accelerated 700x, a fleet of 1024 dedicated CPU cores simulate TigerBeetle clusters through two millennia of faults and recoveries — every day. This is the power of autonomous testing.

Jepsen Report: Discussion

Jepsen Report: Discussion

“TigerBeetle exhibits a refreshing dedication to correctness. The architecture appears sound: Viewstamped Replication is a well-established consensus protocol, and TigerBeetle’s integration of Flexible Quorums and Protocol-Aware Recovery seem to have allowed improved availability and extreme resilience to data file corruption.” — Kyle Kingsbury



Enterprise Solutions

For enterprises committed to excellence, TigerBeetle's world-class team provides fully managed cross-cloud deployments with automated disaster recovery, and 24/7 responsiveness with proactive monitoring. Comprehensive on-site expertise from senior engineers ensures success at every step. Reserved for select partners.

Copyright © 2025 TigerBeetle, Inc.
All Rights Reserved.

newsletter

Get monthly highlights and carefully crafted updates.

Correct and Fast

Copyright © 2025 TigerBeetle, Inc.
All Rights Reserved.

newsletter

Get monthly highlights and carefully crafted updates.

Correct and Fast

newsletter

Get monthly highlights and carefully crafted updates.

Correct and Fast

Copyright © 2025 TigerBeetle, Inc.
All Rights Reserved.

Copyright © 2025 TigerBeetle, Inc.
All Rights Reserved.

newsletter

Get monthly highlights and carefully crafted updates.

Correct and Fast