Lighthouse BN
Download Lighthouse
Download the latest version of Lighthouse and run the checksum verification process to ensure that the downloaded file has not been tampered with.
cd
curl -LO https://github.com/sigp/lighthouse/releases/download/v5.3.0/lighthouse-v5.3.0-x86_64-unknown-linux-gnu.tar.gz
curl -LO https://github.com/sigp/lighthouse/releases/download/v5.3.0/lighthouse-v5.3.0-x86_64-unknown-linux-gnu.tar.gz.asc
Run the checksum verification process.
gpg --keyserver keyserver.ubuntu.com --recv-keys 15E66D941F697E28F49381F426416DC3F30674B0
gpg --verify lighthouse-v5.3.0-x86_64-unknown-linux-gnu.tar.gz.asc lighthouse-v5.3.0-x86_64-unknown-linux-gnu.tar.gz
Verify the release signing key (--recv-keys
) in the first command above in the releases page here.
Expected output: Verify output of the checksum verification.
gpg: Signature made Thu Mar 28 07:30:45 2024 UTC
gpg: using RSA key 15E66D941F697E28F49381F426416DC3F30674B0
gpg: Good signature from "Sigma Prime <security@sigmaprime.io>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 15E6 6D94 1F69 7E28 F493 81F4 2641 6DC3 F306 74B0
If checksum is verified, extract the files and move them into the (/usr/local/bin)
directory for neatness and best practice. Then, clean up the duplicated copies.
tar xvf lighthouse-v5.3.0-x86_64-unknown-linux-gnu.tar.gz
sudo cp lighthouse /usr/local/bin
rm -r lighthouse*
Configure the Lighthouse Consensus Client
Create an account (lighthouse
) without server access for the Lighthouse Consensus Client & Validator Client to run as a background service. This type of user account will not have root access so it restricts potential attackers to only the Lighthouse Consensus Client & Validator Client services in the unlikely event that they manage to infiltrate via a compromised client update.
sudo useradd --no-create-home --shell /bin/false lighthousebeacon
Create a directory for Lighthouse to store the blockchain and validator data of the Consensus layer. Move the validator_keys
directory into this folder. Then set the owner of this directory to the lighthouse
so that this user can read and write to the directory.
sudo mkdir -p /var/lib/lighthouse_beacon
sudo chown -R lighthousebeacon:lighthousebeacon /var/lib/lighthouse_beacon
sudo chmod 700 /var/lib/lighthouse_beacon
If there are no errors, create a systemd configuration file for the Lighthouse Consensus Client service to run in the background.
sudo nano /etc/systemd/system/lighthousebeacon.service
Paste the configuration parameters below into the file:
[Unit]
Description=Lighthouse Beacon Node (Holesky)
Wants=network-online.target
After=network-online.target
[Service]
User=lighthousebeacon
Group=lighthousebeacon
Type=simple
Restart=always
RestartSec=5
ExecStart=/usr/local/bin/lighthouse bn \
--network holesky \
--datadir /var/lib/lighthouse_beacon \
--execution-endpoint http://127.0.0.1:8551 \
--execution-jwt /var/lib/jwtsecret/jwt.hex \
--checkpoint-sync-url=https://holesky.beaconstate.ethstaker.cc/ \
--metrics \
--metrics-port 8008 \
--validator-monitor-auto \
--port 9000 \
--http \
--http-port 5052 \
--http-address <Internal_IP_address> \
--builder http://127.0.0.1:18550
[Install]
WantedBy=multi-user.target
Once you're done, save with Ctrl+O
and Enter
, then exit with Ctrl+X
. Understand and review your configuration summary below, and amend if needed.
Lighthouse Consensus Client configuration summary:
--network
: Run the Consensus Client service on the ETH Holesky testnet--datadir
: Specify the directory for Lighthouse to store data related to the consensus client--execution-endpoint
: URL to connect to the execution layer client--execution-jwt
: File path to locate the JWT secret we generated earlier--checkpoint-sync-url
: Enables nearly instant syncing of the Consensus Client by pointing to one of the checkpoint sync URLs here - https://eth-clients.github.io/checkpoint-sync-endpoints/--metrics
: Enable monitoring of Consensus Client metrics--metrics-port
: Port to connect to the metrics server. Used by Prometheus & Grafana for monitoring.--validator-monitor-auto
: Provides additional logging and metrics for locally controlled validators--port:
Sets the port for peer-to-peer communication. Defaults to 9000.--http
: Allows the validator client to connect to this consensus client. Also allows monitoring endpoints to pull metrics from this service--http-port
: Sets the port to connect to the consensus client--http-address
: Sets the IP address to connect to the REST API of the consensus client that will be used by the DVT clients. Use the internal IP address of your device here (check by runningip a
) - e.g.192.168.x.x
. Defaults to127.0.0.1
otherwise--builder
: URL to connect to external builders (e.g. MEV relays)
Start the Lighthouse Consensus Client
Reload systemd to register the changes made, start the Lighthouse Consensus Client service, and check its status to make sure its running.
sudo systemctl daemon-reload
sudo systemctl start lighthousebeacon.service
sudo systemctl status lighthousebeacon.service
Expected output: The output should say Lighthouse Consensus Client is “active (running)”. Press CTRL-C
to exit and Lighthouse Consensus Client will continue to run. It should take just a few minutes for Lighthouse to sync on Holesky.
Use the following command to check the logs of Lighthouse Consensus Client’s syncing process. Watch out for any warnings or errors.
sudo journalctl -fu lighthousebeacon -o cat | ccze -A
Expected output:
Press Ctrl+C
to exit monitoring.
If the Lighthouse Consensus Client service is running smoothly, we can now enable it to fire up automatically when rebooting the system.
sudo systemctl enable lighthousebeacon.service
Verify the Initial State roots (Checkpoint Sync)
Go to https://holesky.beaconcha.in/ on your browser and search for the slot number (
slot
).Verify the
Block Root
andState Roo
t with yourjournalctl
outputjournalctl
output
Resources
Documentation: https://lighthouse-book.sigmaprime.io/intro.html
Last updated