arrow-left

All pages
gitbookPowered by GitBook
1 of 2

Loading...

Loading...

Volta Test Network: Validator Node Installation

This page describes the steps to install a validator node on the Volta test network.

  1. Choose a hosting provider (on-premise or qualified cloud provider) and favored operating system.

  2. Install operating system and prepare host according to the OS Installation Guide (see previous lesson)

  3. Find the Client installation script matching the installed OS on the energyweb github: and copy it from the volta-affiliate/openethereum or volta-affiliate/nethermind directory to the host

  4. Make sure the latest system updates are installed by running apt-get update

    (debian/ubuntu) or

    (centos)

  5. Make the script executable with

  6. Run the script (please do not use the

    parameter which can be used to take default for node-name and generate a random key)

    • First review any to see if there is a known issue.

  7. If the installation was successful, it should generate a .txt file (named install-summary.txt) that lists the node address, IP address, , influxDB username/password. You will need to provide these details via a form in the next step to successfully add your validator node to the .

    • If you encounter issues with the installation or the install-summary.txt file is not generated:

  8. Submit the Volta node installation details .

    1. After submitting the installation details, you will receive another email with instructions for proceeding to the main EW Chain.

If the issue is not already known, email
to troubleshoot.

  1. First review any open issues on Githubarrow-up-right to see if there is a known issue.

  2. If the issue is not already known, submit a question in the #validators or #technical_questions channels in the EWF Member Slack spacearrow-up-right to troubleshoot.

https://github.com/energywebfoundation/ewc-validator-node-install-scripts/tree/master/volta-affiliatearrow-up-right
open issues on Githubarrow-up-right
validator system contractarrow-up-right
herearrow-up-right
[email protected]envelope
 && apt-get dist-upgrade
yum update
chmod +x ./install-*.sh
--auto

Validator Node Installation Specifications

This page provides specifications for host environments for Volta and EWC validator nodes.

hashtag
Host Machine Requirements

Validator nodes for Volta and the Energy Web Chain must run on a dedicated server or Virtual Machine only for the purpose of running the client; do not use hosts that already perform other tasks.

You can choose to run your validator node either On-Premise on your own hardware or on a virtual machine / cloud computing instance of your choosing. If you have any questions please contact the EWF NetOps team: [email protected]envelope

The following specifications are strongly recommended, but validators are free to configure their host machine at their discretion in accordance with relevant internal policies or requirements. Please note that hosting a node on a machine with insufficient CPU, storage, RAM, and/or networking capacity may result in node failure (e.g. unable to connect to peers, unable to synchronize, unable to seal blocks) and require extra labor to reconfigure the host machine.

hashtag
On-Premise Hardware

A on-premise node should have these specs or higher. For security reasons these resources must be reserved for the validator node and not shared with other workloads.

  1. Modern Multi-core x64 CPU (at least 4 threads, preferably Xeon-class)

  2. 8GB RAM (preferably ECC)

  3. Local SSD storage, 300 GB free capacity for blockchain, redundant in RAID-1

hashtag
Cloud Environments

The following specifications are strongly recommended based on the most common cloud environments used by existing EW Chain validators. You may select any cloud provider of your choosing

Amazon AWS

The following EC2 instance sizes are appropriate to run validators. These resources should be reserved for the validator node and not shared with other workloads.

  • m5.xlarge

  • m5.2xlarge

  • m5a.xlarge

The default EBS storage assigned (normally 8GB) is not large enough to run the node. Make sure to run the node with following EBS storage settings:

  • General Purpose SSD (gp2)

  • at least 300GB size

Microsoft Azure

The following Azure VirtualMachine sizes are suitable to run a validator. These resources should be reserved for the validator node and not shared with other workloads.

  • D4s_v3

  • DS3_v2

  • B4ms

Use Premium SSD as attached storage with a size of at least 300GB.

Google Cloud

The following Google Cloud Virtual Machine sizes are suitable to run a validator node. These resources should be reserved for the validator node and not shared with other workloads.

  • n2-standard-4 and above: https://cloud.google.com/compute/docs/general-purpose-machines#n2_machines

Digital Ocean

The following Digital Ocean Virtual Machine sizes are suitable to run a validator. These resources should be reserved for the validator node and not shared with other workloads.

  • General Purpose Droplet: 16 GB memory, 4vCPU

  • CPU-Optimized Droplet: 8 GB memory, 4vCPU

Use Block Storage as attached SSD storage with a size of at least 300 GB.

hashtag
Connectivity Requirements

The following requirements should be met to ensure proper operation:

  • Wired connection with 100 MBit/s symmetric link to the internet

  • Low latency connection to next internet hop (<5ms)

  • No data volume limitations

Even though we recommend a 100MBit/s connection, that connection will likely not be saturated by the node. You can expect 10-30MBit/s when the chain is under load. Traffic will mainly flow on port 30303 (udp/tcp).

hashtag
Operating System Requirements

The following Linux-based Operating Systems are supported for running a validator node:

  • Ubuntu Server 18.04 LTS or later

  • Debian 9.8 or later

  • CentOS 7 or later

Validators can elect other operating systems at their discretion, but may need to customize the installation scripts. Contact for questions and support.

The following section provide a comprehensive guide for installation of one the supported operating systems. All further deployment procedures are based on the installation results.

hashtag
Ubuntu Server 18.04 LTS

On-Premise

Procedure based on version 18.04.2.

  • Download the ISO from .

  • Boot the ISO

  • Select English as language

Amazon AWS

Ubuntu AMI's are listed at . Search for "ebs 18.04 amd64" to get the right version.

Microsoft Azure

The URN for the image is Canonical:UbuntuServer:18.04-LTS:latest

hashtag
Debian 9.8

On-Premise

  • Download the NetInst ISO from

  • Boot the ISO

  • Select Install from the boot screen

Amazon AWS

The AMI Id's can be found at

Microsoft Azure

The URN for the image is credativ:Debian:9:latest

hashtag
CentOS 7

On-Premise

  • Download the minimal ISO from

  • Boot the ISO

  • Confirm the automatic boot option Test this media & install CentOS 7

Amazon AWS

The AMI Id's can be found at

Microsoft Azure

The URN for the image is OpenLogic:CentOS:7.5:latest

hashtag
Recommended Security Settings

Running a validator node requires raised awareness of host and node security as authorities are a main attack surface to disturb operation of the blockchain. The following security rules are strongly recommended:

  • No services are permitted to run on the same host that are not part of the validator node package

  • All incoming connections on all ports except SSH (22/tcp) and the P2P (30303/tcp+udp) port have to be firewalled on the host with DROP rules. To guarantee proper network etiquette, incoming ICMP has to be accepted.

  • SSH access is only allowed for non-root users

1 GBit NIC
m5a.2xlarge
  • c5.xlarge

  • c5.2xlarge

  • RedHat Enterprise Linux 7.4 or later
    Choose a convenient keyboard layout
  • Choose Install Ubuntu

  • Let the network auto-configure -or- configure manually if needed. The system needs an internet connection.

  • Select no proxy and keep the mirror address.

  • Select Use an entire disk and confirm

  • Choose user name and host name in next screen. Choose a strong password.

  • Select Install OpenSSH Server but don’t import keys

  • Don’t select any snaps and continue

  • Finish installation and let it boot to the prompt

  • Login as the created user and run a full system update using 'sudo apt update && sudo apt dist- upgrade -y'

  • Select English as language
  • Select Location based on actual location of the host

  • Chose a convenient keyboard layout

  • Let the network auto-configure -or- configure manually if needed. The system needs an internet connection.

  • Name your host. Change it from debian to something else

  • Choose a strong root password

  • Create the user account and choose a strong password

  • Select the proper timezone

  • For the partitions use Guided - use entire disk

  • Select All files in one partition

  • Finish partitioning and write changes to disk

  • Select No when ask to scan more disks

  • Choose a mirror close to the host

  • Opt-out of the package survey

  • on the Software Selection select only SSH Server and standard system utilities

  • Install the grub bootloader to MBR and use the primary disk for that

  • Finish installation and let it boot to the prompt

  • Login as root and run a full system update using 'apt update && apt dist-upgrade -y'

  • Reboot

  • Choose English as language

  • On the installation summary choose Installation destination and confirm automatic partinioning

  • Back on the installation summary screen click on Network & Hostname

  • Change the hostname

  • Enable the network interface and make sure it is configured properly

  • Click Done to get back to the summary and click Begin Installation

  • During installation set a root password

  • Finish installation and let it boot to the prompt

  • Login as root and run a system update with 'yum update'

  • SSH access is only allowed through RSA keys

  • OpenEthereum or Nethermind client RPC endpoints (HTTP, WebSocket) have to be disabled

  • System updates have to applied regularly and in a timely manner

  • Regular (monthly) run of rootkit detectors

  • If you are using AWS please also check out the additional .

  • [email protected]envelope
    https://www.ubuntu.com/download/serverarrow-up-right
    https://cloud-images.ubuntu.com/locator/ec2/arrow-up-right
    https://www.debian.org/distrib/netinstarrow-up-right
    https://wiki.debian.org/Cloud/AmazonEC2Image/Stretcharrow-up-right
    https://www.centos.org/download/arrow-up-right
    https://wiki.centos.org/Cloud/AWS#head-78d1e3a4e6ba5c5a3847750d88266916ffe69648arrow-up-right
    AWS Security guidearrow-up-right