Skip to main content

Run a Validator

This comprehensive guide is intended for technical users who wish to run a Validator node within the Peerz network. Validators play a crucial role in maintaining the integrity and trust of the Peerz ecosystem by verifying the network state. This document covers the setup process, including the use of command-line options and the essential step of securely managing your validator credentials.

System and Software Prerequisites

To set up a Peerz Validator, ensure your environment meets these requirements:

  • Operating System: Support for Linux (Ubuntu 18.04+, CentOS 7+) and macOS (Mojave 10.14+).
  • Python Installation: Python 3.8 or newer is necessary to align with Peerz's software dependencies.
  • Security Measures: Adequate security practices should be in place to safeguard the validator's private keys and sensitive information.
  • Network Configuration: Knowledge of your network setup for correct port configuration, especially important for validators operating behind a NAT.

Important: Understanding the operational framework and responsibilities of a Validator within the Peerz network is crucial. If you're new or need a refresher, visit the Core Concepts section of the Peerz documentation.

Installation

Assuming Peerz is installed on your system (refer to the Installation Guide for details), you can start a Validator using the peerz command-line interface. For detailed installation instructions, please visit the Installation Guide.

Launching the Validator

With Peerz installed, you can start a Validator by utilizing the peerz validator command followed by necessary parameters to secure and customize your node:

peerz validator --address <VALIDATOR_ADDRESS> --private_key <PRIVATE_KEY> --initial_peers <PEER_ADDRESS_1> <PEER_ADDRESS_2> ...

Command-Line Options Explained

When initiating a Validator node, these options are key to its configuration:

  • --address: The blockchain address of the validator. This address is used to identify the validator within the network and for any potential reward distributions.
  • --private_key: A sensitive piece of information that proves the ownership of the validator's address. It's crucial to keep the private key secure and private.
  • --initial_peers: Addresses of existing nodes in the DHT (Distributed Hash Table) network. These peers help the Validator node find its peers and integrate into the network.

For detailed explanations of all available command-line options:

peerz validator -h

Connection to Initial Peers

The --initial_peers option is vital for connecting your Validator to the Peerz network. It ensures your node can communicate with existing nodes, verifying transactions and participating in the network's consensus mechanisms.

Example usage:

peerz validator --initial_peers /ip4/203.0.113.1/tcp/31337/p2p/XXXX /ip4/203.0.113.2/tcp/7777/p2p/YYYY
Peer AddressDescription
/ip4/.../p2p/...Addresses of known peers for initial connectivity.

This establishes initial connectivity, facilitating your Validator's active participation in network validation.

Validator Registration and Security

Upon launching your Validator, it's paramount to manage your credentials securely, especially the private key associated with your Validator address. Unlike compute nodes, Validators must be especially cautious with their blockchain identity due to their critical role in network integrity and the potential for incentive distribution.

Security Best Practices:

  1. Private Key Storage: Employ secure storage solutions for your private key, such as hardware security modules (HSM) or encrypted storage, to prevent unauthorized access.

  2. Network Security: Ensure your Validator node operates in a secure network environment, utilizing firewalls and VPNs to safeguard against external attacks.

  3. Regular Audits: Conduct periodic security audits of your Validator setup to identify and mitigate potential vulnerabilities.

Conclusion

Setting up a Validator within the Peerz network is a significant contribution to the ecosystem's security and integrity. By following this guide, you'll be well-equipped to configure your Validator node securely and effectively. Remember, the security of your credentials is paramount to maintaining the trust and smooth operation of the Peerz network.

For further information, troubleshooting advice, or to explore more advanced Validator configurations, refer to the Peerz Documentation. Your participation as a Validator is invaluable in upholding the decentralized principles and robustness of the Peerz network.