Prysm VC

The Prysm validator client only works with a Prysm Consensus Client.

Download Prysm

Download the latest version of the Prysm validator client.

cd
curl -LO https://github.com/prysmaticlabs/prysm/releases/download/v5.0.3/validator-v5.0.3-linux-amd64
curl -LO https://github.com/prysmaticlabs/prysm/releases/download/v5.0.3/validator-v5.0.3-linux-amd64.sha256

Run the checksum verification process.

sha256sum --check validator-v5.0.3-linux-amd64.sha256

Each downloadable file comes with it's own checksum. Replace the actual checksum and URL of the download link in the code block above.

Make sure to choose the amd64 version. Right click on the linked text and select "copy link address" to get the URL of the download link to curl.

Expected output: Verify output of the checksum verification.

validator-v5.0.3-linux-amd64: OK

If checksum is verified, extract the files and move them into the (/usr/local/bin) directory for neatness and best practice. Then, clean up the duplicated copies.

mv validator-v5.0.3-linux-amd64 prysmvalidator #rename the binary file for easy reference
chmod +x prysmvalidator
sudo cp prysmvalidator /usr/local/bin
rm -r prysmvalidator validator-v5.0.3-linux-amd64.sha256

Create a new user account

sudo useradd --no-create-home --shell /bin/false prysmvalidator

Prepare the validator data directory

1) Create a new folders to store the validator client data, validator keystore, and the validator keystore password

sudo mkdir -p /var/lib/prysm_validator

2) Run the validator key import process.

sudo /usr/local/bin/prysmvalidator accounts import --keys-dir=$HOME/validator_keys --wallet-dir=/var/lib/prysm_validator --holesky

Note: You will be prompted to accept the terms of use, create a new password for the Prysm wallet, and enter the password of your validator keystore.

Expected output:

3) Create a plain text password file for the Prysm wallet

sudo nano /var/lib/prysm_validator/password.txt

Enter the password you set during the validator keystore import process. Then, save + exit with CTRL+O, ENTER, CTRL+C.

4) Change the owner of this new folder to the prysmvalidator user

5) Restrict permissions on this new folder such that only the owner is able to read, write, and execute files in this folder

sudo chown -R prysmvalidator:prysmvalidator /var/lib/prysm_validator
sudo chmod 700 /var/lib/prysm_validator

Configure the validator client service

Create a systemd configuration file for the Lighthouse Validator Client service to run in the background.

sudo nano /etc/systemd/system/prysmvalidator.service

Paste the configuration parameters below into the file:

[Unit]
Description=Prysm Validator Client (Holesky)
Wants=network-online.target
After=network-online.target

[Service]
User=prysmvalidator
Group=prysmvalidator
Type=simple
Restart=always
RestartSec=5
ExecStart=/usr/local/bin/prysmvalidator \
  --accept-terms-of-use \
  --holesky \
  --datadir=/var/lib/prysm_validator \
  --enable-builder \
  --beacon-rpc-provider=<Internal_IP_address>:4000 \
  --beacon-rpc-gateway-provider=<Internal_IP_address>:5051 \
  --wallet-dir=/var/lib/prysm_validator \
  --wallet-password-file=/var/lib/prysm_validator/password.txt \
  --monitoring-port=8108 \
  --suggested-fee-recipient=<your_designated_ETH_wallet address> \
  --graffiti="<your_graffiti>" \
  --enable-doppelganger

[Install]
WantedBy=multi-user.target

Once you're done, save with Ctrl+O and Enter, then exit with Ctrl+X. Understand and review your configuration summary below, and amend if needed.

Lighthouse Validator Client configuration summary:

  1. --accept-terms-of-use: Accept the terms and conditions.

  2. --holesky: Run the validator client on the Holesky testnet

  3. --datadir: Specify the directory for Lighthouse to store the validator info

  4. --enable-builder: Required when using external builders to build blocks (e.g. MEV relays)

  5. --beacon-rpc-provider/beacon-rpc-gateway-provider: URLs to connect to the main and backup Prysm consensus clients if any. This needs to be the same IP address set in your Prysm consensus client. Refer back here if you don't remember it. Use multiple comma-separated endpoints here to configure fallback beacon nodes for your validator.

  6. --wallet-dir: Path to a wallet directory on-disk for Prysm validator accounts

  7. --wallet-password-file: Path to a plain-text, .txt file containing your wallet password

  8. --monitoring-port: Set the port for retrieving metrics

  9. --suggested-fee-recipient: ETH wallet address to receive rewards from block proposals and MEV bribes

  10. --graffiti: Optional text to display on-chain when your validator proposes a block

  11. --enable-doppelganger: Helps prevents slashing due to double signing by checking if your validator keys are already active on the network. Not a fool-proof solution.

Start the Prysm Validator Client service

Reload the systemd daemon to register the changes made, start the Prysm Validator Client, and check its status to make sure its running.

sudo systemctl daemon-reload
sudo systemctl start prysmvalidator.service
sudo systemctl status prysmvalidator.service

The output should say the Prysm Validator Client is “active (running)”. Press CTRL-C to exit and the Prysm Validator Client will continue to run.

Use the following command to check the logs for any warnings or errors:

sudo journalctl -fu prysmvalidator -o cat | ccze -A

Expected output:

You will see some warnings if your beacon node (consensus client) is not yet synced.

Press CTRL-C to exit.

If the Prysm Validator Client service is running smoothly, we can now enable it to fire up automatically when rebooting the system.

sudo systemctl enable prysmvalidator

Expected output:

Created symlink /etc/systemd/system/multi-user.target.wants/prysmvalidator.service → /etc/systemd/system/prysmvalidator.service.

Remove duplicates of validator keystores

To prevent configuration mistakes leading to double signing in the future, remove duplicate copies of the validator signing keystores once everything is running smoothly.

sudo rm -r ~/validator_keys

Resources

Last updated