diff --git a/arb/nitro/alephzero-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/alephzero-mainnet-nitro-archive-leveldb-hash.yml index d00c4e9a..13edebb8 100644 --- a/arb/nitro/alephzero-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/alephzero-mainnet-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10301:10301 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-mainnet-archive`)} - traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.middlewares=alephzero-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: alephzero-mainnet-nitro-archive-leveldb-hash: diff --git a/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml index 4a4154bd..35d1c825 100644 --- a/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/alephzero-mainnet-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10301:10301 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet`)} - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-mainnet`)} - traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: alephzero-mainnet-nitro-pruned-pebble-path: diff --git a/arb/nitro/alephzero-sepolia-nitro-archive-leveldb-hash.yml b/arb/nitro/alephzero-sepolia-nitro-archive-leveldb-hash.yml index 16760232..08465f4e 100644 --- a/arb/nitro/alephzero-sepolia-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/alephzero-sepolia-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10083:10083 @@ -76,8 +78,6 @@ services: - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-sepolia-archive`)} - traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.middlewares=alephzero-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: alephzero-sepolia-nitro-archive-leveldb-hash: diff --git a/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml index 27bf39f1..a6b0c389 100644 --- a/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/alephzero-sepolia-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10083:10083 @@ -75,8 +77,6 @@ services: - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia`)} - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-sepolia`)} - traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: alephzero-sepolia-nitro-pruned-pebble-path: diff --git a/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml b/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml index 6a924738..5220cd8d 100644 --- a/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/arbitrum-nova-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10468:10468 @@ -69,8 +71,6 @@ services: - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova-archive`)} - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-nova-archive`)} - traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: arbitrum-nova-nitro-archive-leveldb-hash: diff --git a/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml b/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml index 2a9cf30c..1d63b154 100644 --- a/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml +++ b/arb/nitro/arbitrum-nova-nitro-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10468:10468 @@ -69,8 +71,6 @@ services: - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova`)} - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-nova`)} - traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: arbitrum-nova-nitro-pruned-pebble-hash: diff --git a/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml b/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml index 59fa228e..0f264660 100644 --- a/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/arbitrum-one-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10317:10317 @@ -69,8 +71,6 @@ services: - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one-archive`)} - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-one-archive`)} - traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: arbitrum-one-nitro-archive-leveldb-hash: diff --git a/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml b/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml index fad398db..3095aa43 100644 --- a/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml +++ b/arb/nitro/arbitrum-one-nitro-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10317:10317 @@ -69,8 +71,6 @@ services: - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one`)} - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-one`)} - traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: arbitrum-one-nitro-pruned-pebble-hash: diff --git a/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml b/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml index aa7eefd0..a42b0c74 100644 --- a/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml +++ b/arb/nitro/arbitrum-sepolia-nitro-archive-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10360:10360 @@ -69,8 +71,6 @@ services: - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathPrefix(`/arbitrum-sepolia-archive`)} - traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: arbitrum-sepolia-nitro-archive-pebble-hash: diff --git a/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml b/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml index 152c2d57..6a27dad9 100644 --- a/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/connext-sepolia-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10111:10111 @@ -76,8 +78,6 @@ services: - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/connext-sepolia-archive`)} - traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: connext-sepolia-nitro-archive-leveldb-hash: diff --git a/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml index 80079cd3..4d31b9e8 100644 --- a/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/connext-sepolia-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10111:10111 @@ -75,8 +77,6 @@ services: - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia`)} - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/connext-sepolia`)} - traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: connext-sepolia-nitro-pruned-pebble-path: diff --git a/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml index 2b4a6e39..12334a28 100644 --- a/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/everclear-mainnet-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10870:10870 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/everclear-mainnet-archive`)} - traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: everclear-mainnet-nitro-archive-leveldb-hash: diff --git a/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml index 2742ae6d..8b6835ef 100644 --- a/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/everclear-mainnet-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10870:10870 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet`)} - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/everclear-mainnet`)} - traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: everclear-mainnet-nitro-pruned-pebble-path: diff --git a/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml b/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml index 215733f9..355d03d4 100644 --- a/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/opencampuscodex-sepolia-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10953:10953 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/opencampuscodex-sepolia-archive`)} - traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: opencampuscodex-sepolia-nitro-archive-leveldb-hash: diff --git a/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml b/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml index a44dc371..f1f91e84 100644 --- a/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml +++ b/arb/nitro/opencampuscodex-sepolia-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10953:10953 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia`)} - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/opencampuscodex-sepolia`)} - traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: opencampuscodex-sepolia-nitro-pruned-pebble-path: diff --git a/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml index 34f35842..496a9a53 100644 --- a/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/playblock-mainnet-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10728:10728 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/playblock-mainnet-archive`)} - traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: playblock-mainnet-nitro-archive-leveldb-hash: diff --git a/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml index 28c8a257..f72f04f6 100644 --- a/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/playblock-mainnet-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10728:10728 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet`)} - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/playblock-mainnet`)} - traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: playblock-mainnet-nitro-pruned-pebble-path: diff --git a/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml b/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml index 937974bf..9111debd 100644 --- a/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml +++ b/arb/nitro/real-mainnet-nitro-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10354:10354 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/real-mainnet-archive`)} - traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: real-mainnet-nitro-archive-leveldb-hash: diff --git a/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml b/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml index 4bcd2d10..8235bcbc 100644 --- a/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml +++ b/arb/nitro/real-mainnet-nitro-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10354:10354 @@ -74,8 +76,6 @@ services: - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet`)} - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/real-mainnet`)} - traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: real-mainnet-nitro-pruned-pebble-path: diff --git a/avalanche/go/avalanche-fuji-go-archive-leveldb.yml b/avalanche/go/avalanche-fuji-go-archive-leveldb.yml index f0ec57ee..009745d9 100644 --- a/avalanche/go/avalanche-fuji-go-archive-leveldb.yml +++ b/avalanche/go/avalanche-fuji-go-archive-leveldb.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10350:10350 @@ -38,8 +40,6 @@ services: - ${AVALANCHE_FUJI_GO_ARCHIVE_LEVELDB_DATA:-avalanche-fuji-go-archive-leveldb}:/root/.avalanchego - ./avalanche/fuji:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) avalanche-fuji-archive: image: nginx diff --git a/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml b/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml index 2c2dd453..b9731f47 100644 --- a/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml +++ b/avalanche/go/avalanche-fuji-go-pruned-pebbledb.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10350:10350 @@ -38,8 +40,6 @@ services: - ${AVALANCHE_FUJI_GO_PRUNED_PEBBLEDB_DATA:-avalanche-fuji-go-pruned-pebbledb}:/root/.avalanchego - ./avalanche/fuji:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) avalanche-fuji: image: nginx diff --git a/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml b/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml index f96e9faa..5555af53 100644 --- a/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml +++ b/avalanche/go/avalanche-mainnet-go-archive-leveldb.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10929:10929 @@ -38,8 +40,6 @@ services: - ${AVALANCHE_MAINNET_GO_ARCHIVE_LEVELDB_DATA:-avalanche-mainnet-go-archive-leveldb}:/root/.avalanchego - ./avalanche/mainnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) avalanche-mainnet-archive: image: nginx diff --git a/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml b/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml index 5a5adc2d..a0455bf2 100644 --- a/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml +++ b/avalanche/go/avalanche-mainnet-go-pruned-pebbledb.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10929:10929 @@ -38,8 +40,6 @@ services: - ${AVALANCHE_MAINNET_GO_PRUNED_PEBBLEDB_DATA:-avalanche-mainnet-go-pruned-pebbledb}:/root/.avalanchego - ./avalanche/mainnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) avalanche-mainnet: image: nginx diff --git a/berachain/reth/berachain-bartio-reth-archive-trace.yml b/berachain/reth/berachain-bartio-reth-archive-trace.yml index 8aae2e6e..29d8cd4c 100644 --- a/berachain/reth/berachain-bartio-reth-archive-trace.yml +++ b/berachain/reth/berachain-bartio-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10527:10527 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bartio-archive`)} - ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathPrefix(`/berachain-bartio-archive`)} - traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) berachain-bartio-archive-node: image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BARTIO_BEACON_KIT_VERSION:-v1.1.3} diff --git a/berachain/reth/berachain-bepolia-reth-archive-trace.yml b/berachain/reth/berachain-bepolia-reth-archive-trace.yml index bdc31371..0d5afa8c 100644 --- a/berachain/reth/berachain-bepolia-reth-archive-trace.yml +++ b/berachain/reth/berachain-bepolia-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10347:10347 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bepolia-archive`)} - ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathPrefix(`/berachain-bepolia-archive`)} - traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) berachain-bepolia-archive-node: image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BEPOLIA_BEACON_KIT_VERSION:-v1.1.3} diff --git a/berachain/reth/berachain-mainnet-reth-archive-trace.yml b/berachain/reth/berachain-mainnet-reth-archive-trace.yml index 3d9173b8..e0efa10b 100644 --- a/berachain/reth/berachain-mainnet-reth-archive-trace.yml +++ b/berachain/reth/berachain-mainnet-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10881:10881 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathPrefix(`/berachain-mainnet-archive`)} - traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) berachain-mainnet-archive-node: image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_MAINNET_BEACON_KIT_VERSION:-v1.1.3} diff --git a/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml b/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml index c6e71cc6..6e4614b2 100644 --- a/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml +++ b/bsc/bsc/bsc-chapel-bsc-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10759:10759 @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-chapel`)} - ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-chapel`)} - traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: bsc-chapel-bsc-pruned-pebble-path: diff --git a/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml b/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml index 492aff40..4046f846 100644 --- a/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml +++ b/bsc/bsc/bsc-mainnet-bsc-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10037:10037 @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-mainnet`)} - ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-mainnet`)} - traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: bsc-mainnet-bsc-pruned-pebble-path: diff --git a/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml b/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml index 6f41fc96..5d5bcf93 100644 --- a/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml +++ b/celo/geth/celo-alfajores-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10386:10386 @@ -59,8 +61,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-alfajores-archive`)} - ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-alfajores-archive`)} - traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: celo-alfajores-geth-archive-leveldb-hash: diff --git a/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml b/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml index 9429ddf0..7aa2c561 100644 --- a/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml +++ b/celo/geth/celo-mainnet-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10164:10164 @@ -59,8 +61,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-mainnet-archive`)} - traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: celo-mainnet-geth-archive-leveldb-hash: diff --git a/core/core/core-buffalo-core-pruned-pebble-path.yml b/core/core/core-buffalo-core-pruned-pebble-path.yml index 00160901..5f6f2270 100644 --- a/core/core/core-buffalo-core-pruned-pebble-path.yml +++ b/core/core/core-buffalo-core-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10384:10384 @@ -56,8 +58,6 @@ services: - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-buffalo`)} - ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathPrefix(`/core-buffalo`)} - traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: core-buffalo-core-pruned-pebble-path: diff --git a/core/core/core-mainnet-core-archive-leveldb-hash.yml b/core/core/core-mainnet-core-archive-leveldb-hash.yml index 7effe61d..7a056518 100644 --- a/core/core/core-mainnet-core-archive-leveldb-hash.yml +++ b/core/core/core-mainnet-core-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10169:10169 @@ -56,8 +58,6 @@ services: - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathPrefix(`/core-mainnet-archive`)} - traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: core-mainnet-core-archive-leveldb-hash: diff --git a/core/core/core-mainnet-core-pruned-leveldb-hash.yml b/core/core/core-mainnet-core-pruned-leveldb-hash.yml index 3755ddaf..2e09b7df 100644 --- a/core/core/core-mainnet-core-pruned-leveldb-hash.yml +++ b/core/core/core-mainnet-core-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10169:10169 @@ -56,8 +58,6 @@ services: - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet`)} - ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathPrefix(`/core-mainnet`)} - traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: core-mainnet-core-pruned-leveldb-hash: diff --git a/core/core/core-pigeon-core-pruned-pebble-path.yml b/core/core/core-pigeon-core-pruned-pebble-path.yml index 8522eabc..51caadc5 100644 --- a/core/core/core-pigeon-core-pruned-pebble-path.yml +++ b/core/core/core-pigeon-core-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10478:10478 @@ -56,8 +58,6 @@ services: - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-pigeon`)} - ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathPrefix(`/core-pigeon`)} - traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: core-pigeon-core-pruned-pebble-path: diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml index 911619e7..fce2cbe2 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10947:10947 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)} - traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-holesky-erigon3-archive-trace: diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml index 808dbd73..848751bb 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10947:10947 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)} - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-holesky-erigon3-minimal-trace: diff --git a/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml index b693667b..0bc0504e 100644 --- a/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-holesky-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10947:10947 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)} - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-holesky-erigon3-pruned-trace: diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml index 47e8b657..c74fafc1 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10675:10675 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)} - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-mainnet-erigon3-archive-trace: diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml index 2409b395..902d0a3e 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10675:10675 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)} - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-mainnet-erigon3-minimal-trace: diff --git a/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml index 234af452..7bdf3b83 100644 --- a/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-mainnet-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10675:10675 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)} - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-mainnet-erigon3-pruned-trace: diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml index 7f606e2c..b2c0524e 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10317:10317 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)} - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-sepolia-erigon3-archive-trace: diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml index 4061b7cd..a26c8c01 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10317:10317 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)} - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-sepolia-erigon3-minimal-trace: diff --git a/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml b/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml index a9af2257..42937dfd 100644 --- a/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml +++ b/ethereum/erigon3/ethereum-sepolia-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10317:10317 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)} - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: ethereum-sepolia-erigon3-pruned-trace: diff --git a/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml index dbc6c988..5ff7d3ba 100644 --- a/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-holesky-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10993:10993 @@ -64,8 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-holesky`)} - traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ethereum-holesky-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1} diff --git a/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml index c347662c..eca725e3 100644 --- a/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-mainnet-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10023:10023 @@ -64,8 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-mainnet`)} - traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ethereum-mainnet-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1} diff --git a/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml b/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml index 39da1028..8a8e60ee 100644 --- a/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml +++ b/ethereum/geth/ethereum-sepolia-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10710:10710 @@ -64,8 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-sepolia`)} - traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ethereum-sepolia-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1} diff --git a/ethereum/reth/ethereum-holesky-reth-archive-trace.yml b/ethereum/reth/ethereum-holesky-reth-archive-trace.yml index fa4a89cd..d93af8cf 100644 --- a/ethereum/reth/ethereum-holesky-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-holesky-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10752:10752 @@ -61,9 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathPrefix(`/ethereum-holesky-archive`)} - traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) ethereum-holesky-archive-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1} diff --git a/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml b/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml index 09c0febe..a4587c3f 100644 --- a/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-mainnet-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10563:10563 @@ -61,9 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathPrefix(`/ethereum-mainnet-archive`)} - traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) ethereum-mainnet-archive-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1} diff --git a/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml b/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml index 439cbe35..d3eac393 100644 --- a/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml +++ b/ethereum/reth/ethereum-sepolia-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10330:10330 @@ -61,9 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathPrefix(`/ethereum-sepolia-archive`)} - traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) ethereum-sepolia-archive-node: image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1} diff --git a/fantom/opera/fantom-mainnet-opera-archive-trace.yml b/fantom/opera/fantom-mainnet-opera-archive-trace.yml index 5c718b85..cdafbc1e 100644 --- a/fantom/opera/fantom-mainnet-opera-archive-trace.yml +++ b/fantom/opera/fantom-mainnet-opera-archive-trace.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathPrefix(`/fantom-mainnet-archive`)} - traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-mainnet-opera-archive-trace: diff --git a/fantom/opera/fantom-mainnet-opera-archive.yml b/fantom/opera/fantom-mainnet-opera-archive.yml index 1bee2e11..5fbe46e0 100644 --- a/fantom/opera/fantom-mainnet-opera-archive.yml +++ b/fantom/opera/fantom-mainnet-opera-archive.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathPrefix(`/fantom-mainnet-archive`)} - traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-mainnet-opera-archive: diff --git a/fantom/opera/fantom-mainnet-opera-pruned-trace.yml b/fantom/opera/fantom-mainnet-opera-pruned-trace.yml index 4ab946bb..bd5eae1b 100644 --- a/fantom/opera/fantom-mainnet-opera-pruned-trace.yml +++ b/fantom/opera/fantom-mainnet-opera-pruned-trace.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathPrefix(`/fantom-mainnet`)} - traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-mainnet-opera-pruned-trace: diff --git a/fantom/opera/fantom-mainnet-opera-pruned.yml b/fantom/opera/fantom-mainnet-opera-pruned.yml index 4adba541..6cf556c4 100644 --- a/fantom/opera/fantom-mainnet-opera-pruned.yml +++ b/fantom/opera/fantom-mainnet-opera-pruned.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathPrefix(`/fantom-mainnet`)} - traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-mainnet-opera-pruned: diff --git a/fantom/opera/fantom-testnet-opera-archive-trace.yml b/fantom/opera/fantom-testnet-opera-archive-trace.yml index b921d066..f53b1041 100644 --- a/fantom/opera/fantom-testnet-opera-archive-trace.yml +++ b/fantom/opera/fantom-testnet-opera-archive-trace.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathPrefix(`/fantom-testnet-archive`)} - traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-testnet-opera-archive-trace: diff --git a/fantom/opera/fantom-testnet-opera-archive.yml b/fantom/opera/fantom-testnet-opera-archive.yml index 4f01720c..31bb7fef 100644 --- a/fantom/opera/fantom-testnet-opera-archive.yml +++ b/fantom/opera/fantom-testnet-opera-archive.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathPrefix(`/fantom-testnet-archive`)} - traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-testnet-opera-archive: diff --git a/fantom/opera/fantom-testnet-opera-pruned-trace.yml b/fantom/opera/fantom-testnet-opera-pruned-trace.yml index a190bc40..095f35e6 100644 --- a/fantom/opera/fantom-testnet-opera-pruned-trace.yml +++ b/fantom/opera/fantom-testnet-opera-pruned-trace.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathPrefix(`/fantom-testnet`)} - traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-testnet-opera-pruned-trace: diff --git a/fantom/opera/fantom-testnet-opera-pruned.yml b/fantom/opera/fantom-testnet-opera-pruned.yml index f7d5ac59..6ed764b7 100644 --- a/fantom/opera/fantom-testnet-opera-pruned.yml +++ b/fantom/opera/fantom-testnet-opera-pruned.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: opera.Dockerfile @@ -61,8 +63,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathPrefix(`/fantom-testnet`)} - traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-testnet-opera-pruned: diff --git a/fantom/sonic/fantom-mainnet-sonic-archive.yml b/fantom/sonic/fantom-mainnet-sonic-archive.yml index 41a0e355..94d92257 100644 --- a/fantom/sonic/fantom-mainnet-sonic-archive.yml +++ b/fantom/sonic/fantom-mainnet-sonic-archive.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: sonic.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathPrefix(`/fantom-mainnet-archive`)} - traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-mainnet-sonic-archive: diff --git a/fantom/sonic/fantom-testnet-sonic-archive.yml b/fantom/sonic/fantom-testnet-sonic-archive.yml index 47edbe8f..fa323fb3 100644 --- a/fantom/sonic/fantom-testnet-sonic-archive.yml +++ b/fantom/sonic/fantom-testnet-sonic-archive.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./fantom dockerfile: sonic.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathPrefix(`/fantom-testnet-archive`)} - traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: fantom-testnet-sonic-archive: diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml index 8c1e8ee7..c9d1998d 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10986:10986 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-archive/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-chiado-archive/eth`)} - traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-chiado-erigon3-archive-trace: diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml index 8359c271..b81b6cde 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10986:10986 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-chiado-minimal/eth`)} - traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-chiado-erigon3-minimal-trace: diff --git a/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml b/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml index 582ed083..0f0861d3 100644 --- a/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml +++ b/gnosis/erigon3/gnosis-chiado-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10986:10986 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-chiado/eth`)} - traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-chiado-erigon3-pruned-trace: diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml index 324f64aa..0bb93140 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10974:10974 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-archive/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-mainnet-archive/eth`)} - traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-mainnet-erigon3-archive-trace: diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml index a07a490f..1c9bda33 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10974:10974 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-mainnet-minimal/eth`)} - traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-mainnet-erigon3-minimal-trace: diff --git a/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml b/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml index ccfdabe2..d9811a29 100644 --- a/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml +++ b/gnosis/erigon3/gnosis-mainnet-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10974:10974 @@ -81,9 +84,6 @@ services: - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet/eth`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-mainnet/eth`)} - traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: gnosis-mainnet-erigon3-pruned-trace: diff --git a/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml b/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml index ce7b80ef..de3f14ac 100644 --- a/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml +++ b/goat/geth/goat-mainnet-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10640:10640 @@ -40,8 +42,6 @@ services: - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-mainnet-archive`)} - traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: goat-mainnet-geth-archive-leveldb-hash: diff --git a/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml b/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml index a42049ee..adcc7243 100644 --- a/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml +++ b/goat/geth/goat-mainnet-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10640:10640 @@ -40,8 +42,6 @@ services: - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet`)} - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/goat-mainnet`)} - traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: goat-mainnet-geth-pruned-pebble-path: diff --git a/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml b/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml index 3c5b2065..25b935c9 100644 --- a/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml +++ b/goat/geth/goat-testnet3-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10272:10272 @@ -40,8 +42,6 @@ services: - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3-archive`)} - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-testnet3-archive`)} - traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: goat-testnet3-geth-archive-leveldb-hash: diff --git a/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml b/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml index 3bfd2314..01ec3b23 100644 --- a/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml +++ b/goat/geth/goat-testnet3-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10272:10272 @@ -40,8 +42,6 @@ services: - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3`)} - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathPrefix(`/goat-testnet3`)} - traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: goat-testnet3-geth-pruned-pebble-path: diff --git a/haqq/haqq/haqq-mainnet-haqq-pruned.yml b/haqq/haqq/haqq-mainnet-haqq-pruned.yml index 91b191fc..3d3addcc 100644 --- a/haqq/haqq/haqq-mainnet-haqq-pruned.yml +++ b/haqq/haqq/haqq-mainnet-haqq-pruned.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10465:10465 @@ -39,8 +41,6 @@ services: - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/haqq-mainnet`)} - ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathPrefix(`/haqq-mainnet`)} - traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: haqq-mainnet-haqq-pruned: diff --git a/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml b/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml index e63cb822..5791c98a 100644 --- a/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10060:10060 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathPrefix(`/linea-mainnet-archive`)} - traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-mainnet-erigon3-archive-trace: diff --git a/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml b/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml index c5f66631..e5369bd9 100644 --- a/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10060:10060 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-minimal`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathPrefix(`/linea-mainnet-minimal`)} - traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-mainnet-erigon3-minimal-trace: diff --git a/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml b/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml index a201ea73..20fd2154 100644 --- a/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml +++ b/linea/erigon3/linea-mainnet-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10060:10060 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathPrefix(`/linea-mainnet`)} - traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-mainnet-erigon3-pruned-trace: diff --git a/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml b/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml index 9e48614b..016cead1 100644 --- a/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10235:10235 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathPrefix(`/linea-sepolia-archive`)} - traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-sepolia-erigon3-archive-trace: diff --git a/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml b/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml index c0fc9839..cc5f6f7f 100644 --- a/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-minimal-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10235:10235 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-minimal`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathPrefix(`/linea-sepolia-minimal`)} - traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-sepolia-erigon3-minimal-trace: diff --git a/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml b/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml index 51dfb66b..1ebc7414 100644 --- a/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml +++ b/linea/erigon3/linea-sepolia-erigon3-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10235:10235 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathPrefix(`/linea-sepolia`)} - traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) volumes: linea-sepolia-erigon3-pruned-trace: diff --git a/op/erigon/base-mainnet-op-erigon-archive-trace.yml b/op/erigon/base-mainnet-op-erigon-archive-trace.yml index 4fb64960..66f39042 100644 --- a/op/erigon/base-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/base-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10092:10092 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/base-mainnet-archive`)} - traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-mainnet-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/base-sepolia-op-erigon-archive-trace.yml b/op/erigon/base-sepolia-op-erigon-archive-trace.yml index 2cac19f2..13075759 100644 --- a/op/erigon/base-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/base-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10487:10487 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/base-sepolia-archive`)} - traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-sepolia-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/bob-mainnet-op-erigon-archive-trace.yml b/op/erigon/bob-mainnet-op-erigon-archive-trace.yml index d527937e..a3e26f48 100644 --- a/op/erigon/bob-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/bob-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10071:10071 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/bob-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/bob-mainnet-archive`)} - traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) bob-mainnet-archive-node: image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/boba-mainnet-op-erigon-archive-trace.yml b/op/erigon/boba-mainnet-op-erigon-archive-trace.yml index 8c7e9c4e..9ed0bcab 100644 --- a/op/erigon/boba-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/boba-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10732:10732 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/boba-mainnet-archive`)} - traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) boba-mainnet-archive-node: image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18} diff --git a/op/erigon/boba-sepolia-op-erigon-archive-trace.yml b/op/erigon/boba-sepolia-op-erigon-archive-trace.yml index 0ec848c1..97562278 100644 --- a/op/erigon/boba-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/boba-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10249:10249 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/boba-sepolia-archive`)} - traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) boba-sepolia-archive-node: image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_SEPOLIA_NODE_VERSION:-v1.6.18} diff --git a/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml b/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml index bd47983e..45eb53ba 100644 --- a/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/hashkeychain-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10378:10378 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/hashkeychain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/hashkeychain-mainnet-archive`)} - traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) hashkeychain-mainnet-archive-node: image: ${HASHKEYCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${HASHKEYCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/ink-mainnet-op-erigon-archive-trace.yml b/op/erigon/ink-mainnet-op-erigon-archive-trace.yml index 0fdf5016..e310995d 100644 --- a/op/erigon/ink-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/ink-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10990:10990 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/ink-mainnet-archive`)} - traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) ink-mainnet-archive-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/ink-sepolia-op-erigon-archive-trace.yml b/op/erigon/ink-sepolia-op-erigon-archive-trace.yml index d0dc79f9..f7d4137d 100644 --- a/op/erigon/ink-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/ink-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10826:10826 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/ink-sepolia-archive`)} - traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) ink-sepolia-archive-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml b/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml index 9427cd73..5f384169 100644 --- a/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/lisk-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10831:10831 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/lisk-mainnet-archive`)} - traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) lisk-mainnet-archive-node: image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/metal-mainnet-op-erigon-archive-trace.yml b/op/erigon/metal-mainnet-op-erigon-archive-trace.yml index bc45763d..dd17ded0 100644 --- a/op/erigon/metal-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/metal-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10543:10543 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/metal-mainnet-archive`)} - traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) metal-mainnet-archive-node: image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/mode-mainnet-op-erigon-archive-trace.yml b/op/erigon/mode-mainnet-op-erigon-archive-trace.yml index 4821e7a8..08a2dca6 100644 --- a/op/erigon/mode-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/mode-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10509:10509 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/mode-mainnet-archive`)} - traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) mode-mainnet-archive-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/mode-sepolia-op-erigon-archive-trace.yml b/op/erigon/mode-sepolia-op-erigon-archive-trace.yml index e2aa9a00..692f0d82 100644 --- a/op/erigon/mode-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/mode-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10212:10212 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/mode-sepolia-archive`)} - traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) mode-sepolia-archive-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/op-mainnet-op-erigon-archive-trace.yml b/op/erigon/op-mainnet-op-erigon-archive-trace.yml index cadd60fc..3e9eab0c 100644 --- a/op/erigon/op-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/op-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10509:10509 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/op-mainnet-archive`)} - traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-mainnet-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/op-sepolia-op-erigon-archive-trace.yml b/op/erigon/op-sepolia-op-erigon-archive-trace.yml index 6418bdcc..47c37ab1 100644 --- a/op/erigon/op-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/op-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10373:10373 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/op-sepolia-archive`)} - traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-sepolia-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/snax-mainnet-op-erigon-archive-trace.yml b/op/erigon/snax-mainnet-op-erigon-archive-trace.yml index 71ac4231..3c8d7201 100644 --- a/op/erigon/snax-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/snax-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10671:10671 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/snax-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/snax-mainnet-archive`)} - traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) snax-mainnet-archive-node: image: ${SNAX_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SNAX_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/soneium-minato-op-erigon-archive-trace.yml b/op/erigon/soneium-minato-op-erigon-archive-trace.yml index a6953ff2..7b0f9bae 100644 --- a/op/erigon/soneium-minato-op-erigon-archive-trace.yml +++ b/op/erigon/soneium-minato-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10314:10314 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/soneium-minato-archive`)} - ${NO_SSL:+traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=PathPrefix(`/soneium-minato-archive`)} - traefik.http.routers.soneium-minato-op-erigon-archive-trace.middlewares=soneium-minato-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) soneium-minato-archive-node: image: ${SONEIUM_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SONEIUM_MINATO_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/swell-mainnet-op-erigon-archive-trace.yml b/op/erigon/swell-mainnet-op-erigon-archive-trace.yml index 69823b32..2814cbf1 100644 --- a/op/erigon/swell-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/swell-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10810:10810 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/swell-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/swell-mainnet-archive`)} - traefik.http.routers.swell-mainnet-op-erigon-archive-trace.middlewares=swell-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) swell-mainnet-archive-node: image: ${SWELL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SWELL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml b/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml index 28a663bf..88e024e5 100644 --- a/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/unichain-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10415:10415 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/unichain-mainnet-archive`)} - traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.middlewares=unichain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) unichain-mainnet-archive-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml b/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml index af689281..41d2ff68 100644 --- a/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/unichain-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10196:10196 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/unichain-sepolia-archive`)} - traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.middlewares=unichain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) unichain-sepolia-archive-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml b/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml index 237ed2b3..9e2775d5 100644 --- a/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/worldchain-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10629:10629 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-mainnet-archive`)} - traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.middlewares=worldchain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) worldchain-mainnet-archive-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml b/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml index c60d44bc..f2cc738b 100644 --- a/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/worldchain-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10046:10046 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-sepolia-archive`)} - traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.middlewares=worldchain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) worldchain-sepolia-archive-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/zora-mainnet-op-erigon-archive-trace.yml b/op/erigon/zora-mainnet-op-erigon-archive-trace.yml index 3da76a8f..b18c81f3 100644 --- a/op/erigon/zora-mainnet-op-erigon-archive-trace.yml +++ b/op/erigon/zora-mainnet-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10360:10360 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/zora-mainnet-archive`)} - traefik.http.routers.zora-mainnet-op-erigon-archive-trace.middlewares=zora-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) zora-mainnet-archive-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/erigon/zora-sepolia-op-erigon-archive-trace.yml b/op/erigon/zora-sepolia-op-erigon-archive-trace.yml index fa1d9223..b200e096 100644 --- a/op/erigon/zora-sepolia-op-erigon-archive-trace.yml +++ b/op/erigon/zora-sepolia-op-erigon-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10839:10839 @@ -64,9 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/zora-sepolia-archive`)} - traefik.http.routers.zora-sepolia-op-erigon-archive-trace.middlewares=zora-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) zora-sepolia-archive-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml index 93c40d4e..50aa2d58 100644 --- a/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/base-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10422:10422 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/base-mainnet-archive`)} - traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.middlewares=base-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) base-mainnet-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml index eb4c7488..186e6ba1 100644 --- a/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/base-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10422:10422 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/base-mainnet`)} - traefik.http.routers.base-mainnet-op-geth-pruned-pebble-path.middlewares=base-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) base-mainnet-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml index c04c1735..45cf49d5 100644 --- a/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/base-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10022:10022 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/base-sepolia-archive`)} - traefik.http.routers.base-sepolia-op-geth-archive-leveldb-hash.middlewares=base-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) base-sepolia-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml index 74b46706..6f2fc3ed 100644 --- a/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/base-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10022:10022 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/base-sepolia`)} - traefik.http.routers.base-sepolia-op-geth-pruned-pebble-path.middlewares=base-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) base-sepolia-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml index 8116bdc8..84a050ef 100644 --- a/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/blast-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10769:10769 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/blast-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/blast-mainnet-archive`)} - traefik.http.routers.blast-mainnet-op-geth-archive-leveldb-hash.middlewares=blast-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) blast-mainnet-archive-node: image: ${BLAST_NODE_IMAGE:-blastio/blast-optimism}:${BLAST_MAINNET_NODE_VERSION:-v1.1.0-mainnet} diff --git a/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml index 53b50975..eb2502df 100644 --- a/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/blast-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10769:10769 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/blast-mainnet`)} - ${NO_SSL:+traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/blast-mainnet`)} - traefik.http.routers.blast-mainnet-op-geth-pruned-pebble-path.middlewares=blast-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) blast-mainnet-node: image: ${BLAST_NODE_IMAGE:-blastio/blast-optimism}:${BLAST_MAINNET_NODE_VERSION:-v1.1.0-mainnet} diff --git a/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml b/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml index 1d6e2f20..7e50657c 100644 --- a/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml +++ b/op/geth/blast-sepolia-op-geth-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10591:10591 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/blast-sepolia`)} - ${NO_SSL:+traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.rule=PathPrefix(`/blast-sepolia`)} - traefik.http.routers.blast-sepolia-op-geth-pruned-pebble-hash.middlewares=blast-sepolia-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) blast-sepolia-node: image: ${BLAST_NODE_IMAGE:-blastio/blast-optimism}:${BLAST_SEPOLIA_NODE_VERSION:-sepolia-v1.2.3} diff --git a/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml index fed5e117..4310efa7 100644 --- a/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/bob-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10363:10363 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/bob-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/bob-mainnet-archive`)} - traefik.http.routers.bob-mainnet-op-geth-archive-leveldb-hash.middlewares=bob-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) bob-mainnet-archive-node: image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml index 0fcde2c6..30bd72f1 100644 --- a/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/bob-mainnet-op-geth-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10363:10363 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/bob-mainnet`)} - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.rule=PathPrefix(`/bob-mainnet`)} - traefik.http.routers.bob-mainnet-op-geth-pruned-pebble-hash.middlewares=bob-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) bob-mainnet-node: image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/boba-mainnet-op-geth-pruned.yml b/op/geth/boba-mainnet-op-geth-pruned.yml index eb143bd6..891b5bc9 100644 --- a/op/geth/boba-mainnet-op-geth-pruned.yml +++ b/op/geth/boba-mainnet-op-geth-pruned.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10022:10022 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-geth-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-mainnet`)} - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-geth-pruned.rule=PathPrefix(`/boba-mainnet`)} - traefik.http.routers.boba-mainnet-op-geth-pruned.middlewares=boba-mainnet-op-geth-pruned-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) boba-mainnet-node: image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18} diff --git a/op/geth/boba-sepolia-op-geth-pruned.yml b/op/geth/boba-sepolia-op-geth-pruned.yml index 01e64186..eefa7772 100644 --- a/op/geth/boba-sepolia-op-geth-pruned.yml +++ b/op/geth/boba-sepolia-op-geth-pruned.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10901:10901 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.boba-sepolia-op-geth-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-sepolia`)} - ${NO_SSL:+traefik.http.routers.boba-sepolia-op-geth-pruned.rule=PathPrefix(`/boba-sepolia`)} - traefik.http.routers.boba-sepolia-op-geth-pruned.middlewares=boba-sepolia-op-geth-pruned-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) boba-sepolia-node: image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_SEPOLIA_NODE_VERSION:-v1.6.18} diff --git a/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml b/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml index 1d01e586..40fbe76a 100644 --- a/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml +++ b/op/geth/celo-alfajores-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10457:10457 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-alfajores-archive`)} - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-alfajores-archive`)} - traefik.http.routers.celo-alfajores-op-geth-archive-leveldb-hash.middlewares=celo-alfajores-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) celo-alfajores-archive-node: image: ${CELO_NODE_IMAGE:-us-west1-docker.pkg.dev/devopsre/celo-blockchain-public/op-node}:${CELO_ALFAJORES_NODE_VERSION:-celo-v2.0.0} diff --git a/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml b/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml index ba9a033d..c1fbec7f 100644 --- a/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml +++ b/op/geth/celo-alfajores-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10457:10457 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-alfajores`)} - ${NO_SSL:+traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.rule=PathPrefix(`/celo-alfajores`)} - traefik.http.routers.celo-alfajores-op-geth-pruned-pebble-path.middlewares=celo-alfajores-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) celo-alfajores-node: image: ${CELO_NODE_IMAGE:-us-west1-docker.pkg.dev/devopsre/celo-blockchain-public/op-node}:${CELO_ALFAJORES_NODE_VERSION:-celo-v2.0.0} diff --git a/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml index 8d79c09e..d1af794b 100644 --- a/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/celo-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10993:10993 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-mainnet-archive`)} - traefik.http.routers.celo-mainnet-op-geth-archive-leveldb-hash.middlewares=celo-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) celo-mainnet-archive-node: image: ${CELO_NODE_IMAGE:-us-west1-docker.pkg.dev/devopsre/celo-blockchain-public/op-node}:${CELO_MAINNET_NODE_VERSION:-celo-v2.0.0} diff --git a/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml index e77f7c7d..92aa2af5 100644 --- a/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/celo-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10993:10993 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-mainnet`)} - ${NO_SSL:+traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/celo-mainnet`)} - traefik.http.routers.celo-mainnet-op-geth-pruned-pebble-path.middlewares=celo-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) celo-mainnet-node: image: ${CELO_NODE_IMAGE:-us-west1-docker.pkg.dev/devopsre/celo-blockchain-public/op-node}:${CELO_MAINNET_NODE_VERSION:-celo-v2.0.0} diff --git a/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml index 38217768..d2a5c96d 100644 --- a/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/fraxtal-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10282:10282 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/fraxtal-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/fraxtal-mainnet-archive`)} - traefik.http.routers.fraxtal-mainnet-op-geth-archive-leveldb-hash.middlewares=fraxtal-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) fraxtal-mainnet-archive-node: image: ${FRAXTAL_NODE_IMAGE:-ghcr.io/fraxfinance/fraxtal-node}:${FRAXTAL_MAINNET_NODE_VERSION:-v1.12.2-frax-1.1.0} diff --git a/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml index 4a5025bc..8c4614ad 100644 --- a/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/fraxtal-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10282:10282 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/fraxtal-mainnet`)} - ${NO_SSL:+traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/fraxtal-mainnet`)} - traefik.http.routers.fraxtal-mainnet-op-geth-pruned-pebble-path.middlewares=fraxtal-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) fraxtal-mainnet-node: image: ${FRAXTAL_NODE_IMAGE:-ghcr.io/fraxfinance/fraxtal-node}:${FRAXTAL_MAINNET_NODE_VERSION:-v1.12.2-frax-1.1.0} diff --git a/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml b/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml index 5b9f4cb7..29662a0c 100644 --- a/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/fraxtal-testnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10370:10370 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/fraxtal-testnet-archive`)} - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/fraxtal-testnet-archive`)} - traefik.http.routers.fraxtal-testnet-op-geth-archive-leveldb-hash.middlewares=fraxtal-testnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) fraxtal-testnet-archive-node: image: ${FRAXTAL_NODE_IMAGE:-ghcr.io/fraxfinance/fraxtal-node}:${FRAXTAL_TESTNET_NODE_VERSION:-v1.12.2-frax-1.1.0} diff --git a/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml b/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml index c992bf09..db8bd74f 100644 --- a/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/fraxtal-testnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10370:10370 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/fraxtal-testnet`)} - ${NO_SSL:+traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/fraxtal-testnet`)} - traefik.http.routers.fraxtal-testnet-op-geth-pruned-pebble-path.middlewares=fraxtal-testnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) fraxtal-testnet-node: image: ${FRAXTAL_NODE_IMAGE:-ghcr.io/fraxfinance/fraxtal-node}:${FRAXTAL_TESTNET_NODE_VERSION:-v1.12.2-frax-1.1.0} diff --git a/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml index a4b4676c..2637b79b 100644 --- a/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/hashkeychain-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10188:10188 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/hashkeychain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/hashkeychain-mainnet-archive`)} - traefik.http.routers.hashkeychain-mainnet-op-geth-archive-leveldb-hash.middlewares=hashkeychain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) hashkeychain-mainnet-archive-node: image: ${HASHKEYCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${HASHKEYCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml index 15df4535..4218d82f 100644 --- a/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/hashkeychain-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10188:10188 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/hashkeychain-mainnet`)} - ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/hashkeychain-mainnet`)} - traefik.http.routers.hashkeychain-mainnet-op-geth-pruned-pebble-path.middlewares=hashkeychain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) hashkeychain-mainnet-node: image: ${HASHKEYCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${HASHKEYCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml index 39f59331..7a58e7e2 100644 --- a/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/ink-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10271:10271 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/ink-mainnet-archive`)} - traefik.http.routers.ink-mainnet-op-geth-archive-leveldb-hash.middlewares=ink-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ink-mainnet-archive-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml index cb2d1413..6e760109 100644 --- a/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/ink-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10271:10271 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-mainnet`)} - ${NO_SSL:+traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/ink-mainnet`)} - traefik.http.routers.ink-mainnet-op-geth-pruned-pebble-path.middlewares=ink-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ink-mainnet-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml index fbecbeb8..81af0b0f 100644 --- a/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/ink-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10869:10869 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/ink-sepolia-archive`)} - traefik.http.routers.ink-sepolia-op-geth-archive-leveldb-hash.middlewares=ink-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ink-sepolia-archive-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml index afee8f07..d5d8671e 100644 --- a/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/ink-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10869:10869 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-sepolia`)} - ${NO_SSL:+traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/ink-sepolia`)} - traefik.http.routers.ink-sepolia-op-geth-pruned-pebble-path.middlewares=ink-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) ink-sepolia-node: image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml index 6df14b81..6aad6193 100644 --- a/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/lisk-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10971:10971 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/lisk-mainnet-archive`)} - traefik.http.routers.lisk-mainnet-op-geth-archive-leveldb-hash.middlewares=lisk-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) lisk-mainnet-archive-node: image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml index 368404f3..9b6142c8 100644 --- a/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/lisk-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10971:10971 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet`)} - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/lisk-mainnet`)} - traefik.http.routers.lisk-mainnet-op-geth-pruned-pebble-path.middlewares=lisk-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) lisk-mainnet-node: image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml index e8660f97..5b77abba 100644 --- a/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/lisk-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10490:10490 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/lisk-sepolia-archive`)} - traefik.http.routers.lisk-sepolia-op-geth-archive-leveldb-hash.middlewares=lisk-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) lisk-sepolia-archive-node: build: diff --git a/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml index dc3ec9c5..24938352 100644 --- a/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/lisk-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10490:10490 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-sepolia`)} - ${NO_SSL:+traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/lisk-sepolia`)} - traefik.http.routers.lisk-sepolia-op-geth-pruned-pebble-path.middlewares=lisk-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) lisk-sepolia-node: build: diff --git a/op/geth/manta-pacific-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/manta-pacific-mainnet-op-geth-archive-leveldb-hash.yml index 1fed197c..b80aea20 100644 --- a/op/geth/manta-pacific-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/manta-pacific-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10877:10877 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/manta-pacific-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.manta-pacific-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/manta-pacific-mainnet-archive`)} - traefik.http.routers.manta-pacific-mainnet-op-geth-archive-leveldb-hash.middlewares=manta-pacific-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) manta-pacific-mainnet-archive-node: image: ${MANTA_PACIFIC_NODE_IMAGE:-public.ecr.aws/i6b2w2n6/op-node}:${MANTA_PACIFIC_MAINNET_NODE_VERSION:-celestia-3.0.0-dencun} diff --git a/op/geth/manta-pacific-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/manta-pacific-mainnet-op-geth-pruned-pebble-path.yml index ad0cef7a..5e06cd17 100644 --- a/op/geth/manta-pacific-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/manta-pacific-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10877:10877 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.manta-pacific-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/manta-pacific-mainnet`)} - ${NO_SSL:+traefik.http.routers.manta-pacific-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/manta-pacific-mainnet`)} - traefik.http.routers.manta-pacific-mainnet-op-geth-pruned-pebble-path.middlewares=manta-pacific-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) manta-pacific-mainnet-node: image: ${MANTA_PACIFIC_NODE_IMAGE:-public.ecr.aws/i6b2w2n6/op-node}:${MANTA_PACIFIC_MAINNET_NODE_VERSION:-celestia-3.0.0-dencun} diff --git a/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml index 8be96b19..47aeff39 100644 --- a/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mantle-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10067:10067 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mantle-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/mantle-mainnet-archive`)} - traefik.http.routers.mantle-mainnet-op-geth-archive-leveldb-hash.middlewares=mantle-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mantle-mainnet-archive-node: image: ${MANTLE_NODE_IMAGE:-mantlenetworkio/mantle-node}:${MANTLE_MAINNET_NODE_VERSION:-v1.1.1} diff --git a/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml b/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml index 9ca58bd8..df448a4d 100644 --- a/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/mantle-mainnet-op-geth-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10067:10067 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mantle-mainnet`)} - ${NO_SSL:+traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.rule=PathPrefix(`/mantle-mainnet`)} - traefik.http.routers.mantle-mainnet-op-geth-pruned-leveldb-hash.middlewares=mantle-mainnet-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mantle-mainnet-node: image: ${MANTLE_NODE_IMAGE:-mantlenetworkio/mantle-node}:${MANTLE_MAINNET_NODE_VERSION:-v1.1.1} diff --git a/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml index 546e729d..3d6885cf 100644 --- a/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mantle-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10358:10358 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mantle-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/mantle-sepolia-archive`)} - traefik.http.routers.mantle-sepolia-op-geth-archive-leveldb-hash.middlewares=mantle-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mantle-sepolia-archive-node: image: ${MANTLE_NODE_IMAGE:-mantlenetworkio/mantle-node}:${MANTLE_SEPOLIA_NODE_VERSION:-v1.1.1} diff --git a/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml b/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml index 8d4c7004..107f2b6b 100644 --- a/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml +++ b/op/geth/mantle-sepolia-op-geth-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10358:10358 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mantle-sepolia`)} - ${NO_SSL:+traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.rule=PathPrefix(`/mantle-sepolia`)} - traefik.http.routers.mantle-sepolia-op-geth-pruned-leveldb-hash.middlewares=mantle-sepolia-op-geth-pruned-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mantle-sepolia-node: image: ${MANTLE_NODE_IMAGE:-mantlenetworkio/mantle-node}:${MANTLE_SEPOLIA_NODE_VERSION:-v1.1.1} diff --git a/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml index 2b0f7cf4..06c44a43 100644 --- a/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/metal-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10821:10821 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/metal-mainnet-archive`)} - traefik.http.routers.metal-mainnet-op-geth-archive-leveldb-hash.middlewares=metal-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) metal-mainnet-archive-node: image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml index 81ae09cc..9bb67300 100644 --- a/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/metal-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10821:10821 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-mainnet`)} - ${NO_SSL:+traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/metal-mainnet`)} - traefik.http.routers.metal-mainnet-op-geth-pruned-pebble-path.middlewares=metal-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) metal-mainnet-node: image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml index b43cef84..fc634106 100644 --- a/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/metal-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10701:10701 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/metal-sepolia-archive`)} - traefik.http.routers.metal-sepolia-op-geth-archive-leveldb-hash.middlewares=metal-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) metal-sepolia-archive-node: image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml index a631486f..a1087bdd 100644 --- a/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/metal-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10701:10701 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-sepolia`)} - ${NO_SSL:+traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/metal-sepolia`)} - traefik.http.routers.metal-sepolia-op-geth-pruned-pebble-path.middlewares=metal-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) metal-sepolia-node: image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml index c374df52..7005ea9c 100644 --- a/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mode-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10054:10054 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/mode-mainnet-archive`)} - traefik.http.routers.mode-mainnet-op-geth-archive-leveldb-hash.middlewares=mode-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mode-mainnet-archive-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml index 600a127d..49a0c07b 100644 --- a/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/mode-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10054:10054 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-mainnet`)} - ${NO_SSL:+traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/mode-mainnet`)} - traefik.http.routers.mode-mainnet-op-geth-pruned-pebble-path.middlewares=mode-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mode-mainnet-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml index e29b2f9a..56896e3f 100644 --- a/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/mode-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10308:10308 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/mode-sepolia-archive`)} - traefik.http.routers.mode-sepolia-op-geth-archive-leveldb-hash.middlewares=mode-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mode-sepolia-archive-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml index 42079dc4..90f4695c 100644 --- a/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/mode-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10308:10308 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-sepolia`)} - ${NO_SSL:+traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/mode-sepolia`)} - traefik.http.routers.mode-sepolia-op-geth-pruned-pebble-path.middlewares=mode-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) mode-sepolia-node: image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml index 37fdb876..a09b2adc 100644 --- a/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/op-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10687:10687 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/op-mainnet-archive`)} - traefik.http.routers.op-mainnet-op-geth-archive-leveldb-hash.middlewares=op-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) op-mainnet-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml index 3ee7da49..1f4b9715 100644 --- a/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/op-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10687:10687 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet`)} - ${NO_SSL:+traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/op-mainnet`)} - traefik.http.routers.op-mainnet-op-geth-pruned-pebble-path.middlewares=op-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) op-mainnet-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml index 43f783f6..aa0c6c73 100644 --- a/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/op-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10981:10981 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/op-sepolia-archive`)} - traefik.http.routers.op-sepolia-op-geth-archive-leveldb-hash.middlewares=op-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) op-sepolia-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml index 201f8a75..a9d2bad2 100644 --- a/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/op-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10981:10981 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia`)} - ${NO_SSL:+traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/op-sepolia`)} - traefik.http.routers.op-sepolia-op-geth-pruned-pebble-path.middlewares=op-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) op-sepolia-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml index 291a25e1..1fd13469 100644 --- a/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/snax-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10332:10332 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/snax-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/snax-mainnet-archive`)} - traefik.http.routers.snax-mainnet-op-geth-archive-leveldb-hash.middlewares=snax-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) snax-mainnet-archive-node: image: ${SNAX_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SNAX_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml index cd6b265c..9041389d 100644 --- a/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/snax-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10332:10332 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/snax-mainnet`)} - ${NO_SSL:+traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/snax-mainnet`)} - traefik.http.routers.snax-mainnet-op-geth-pruned-pebble-path.middlewares=snax-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) snax-mainnet-node: image: ${SNAX_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SNAX_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml b/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml index d40cd704..d6b537bd 100644 --- a/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml +++ b/op/geth/soneium-minato-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10702:10702 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/soneium-minato-archive`)} - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.rule=PathPrefix(`/soneium-minato-archive`)} - traefik.http.routers.soneium-minato-op-geth-archive-leveldb-hash.middlewares=soneium-minato-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) soneium-minato-archive-node: image: ${SONEIUM_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SONEIUM_MINATO_NODE_VERSION:-v1.13.1} diff --git a/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml b/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml index 485cb44b..6c1ba473 100644 --- a/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml +++ b/op/geth/soneium-minato-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10702:10702 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/soneium-minato`)} - ${NO_SSL:+traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.rule=PathPrefix(`/soneium-minato`)} - traefik.http.routers.soneium-minato-op-geth-pruned-pebble-path.middlewares=soneium-minato-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) soneium-minato-node: image: ${SONEIUM_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SONEIUM_MINATO_NODE_VERSION:-v1.13.1} diff --git a/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml index 954fce6f..d5266e74 100644 --- a/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/swell-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10312:10312 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/swell-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/swell-mainnet-archive`)} - traefik.http.routers.swell-mainnet-op-geth-archive-leveldb-hash.middlewares=swell-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) swell-mainnet-archive-node: image: ${SWELL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SWELL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml index 5d91e8ce..b5ebd070 100644 --- a/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/swell-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10312:10312 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/swell-mainnet`)} - ${NO_SSL:+traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/swell-mainnet`)} - traefik.http.routers.swell-mainnet-op-geth-pruned-pebble-path.middlewares=swell-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) swell-mainnet-node: image: ${SWELL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SWELL_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml index af4b0051..3316b9f4 100644 --- a/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/unichain-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10954:10954 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/unichain-mainnet-archive`)} - traefik.http.routers.unichain-mainnet-op-geth-archive-leveldb-hash.middlewares=unichain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) unichain-mainnet-archive-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml index 1c6b34a9..c1966ffb 100644 --- a/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/unichain-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10954:10954 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-mainnet`)} - ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/unichain-mainnet`)} - traefik.http.routers.unichain-mainnet-op-geth-pruned-pebble-path.middlewares=unichain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) unichain-mainnet-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml index f6f673be..bae45a14 100644 --- a/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/unichain-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10226:10226 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/unichain-sepolia-archive`)} - traefik.http.routers.unichain-sepolia-op-geth-archive-leveldb-hash.middlewares=unichain-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) unichain-sepolia-archive-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml index 6b2bfd23..dce72bca 100644 --- a/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/unichain-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10226:10226 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-sepolia`)} - ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/unichain-sepolia`)} - traefik.http.routers.unichain-sepolia-op-geth-pruned-pebble-path.middlewares=unichain-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) unichain-sepolia-node: image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml index b2727b42..a85a265e 100644 --- a/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/worldchain-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10096:10096 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/worldchain-mainnet-archive`)} - traefik.http.routers.worldchain-mainnet-op-geth-archive-leveldb-hash.middlewares=worldchain-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) worldchain-mainnet-archive-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml index 8f05de7c..8f0fbe45 100644 --- a/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/worldchain-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10096:10096 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-mainnet`)} - ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/worldchain-mainnet`)} - traefik.http.routers.worldchain-mainnet-op-geth-pruned-pebble-path.middlewares=worldchain-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) worldchain-mainnet-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml index 7d04cf6a..c790511c 100644 --- a/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/worldchain-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10620:10620 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/worldchain-sepolia-archive`)} - traefik.http.routers.worldchain-sepolia-op-geth-archive-leveldb-hash.middlewares=worldchain-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) worldchain-sepolia-archive-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml index 899faffe..0f01967b 100644 --- a/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/worldchain-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10620:10620 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-sepolia`)} - ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/worldchain-sepolia`)} - traefik.http.routers.worldchain-sepolia-op-geth-pruned-pebble-path.middlewares=worldchain-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) worldchain-sepolia-node: image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml index bb20324c..5d64f595 100644 --- a/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-garfield-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10397:10397 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-garfield-archive`)} - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.rule=PathPrefix(`/zircuit-garfield-archive`)} - traefik.http.routers.zircuit-garfield-op-geth-archive-leveldb-hash.middlewares=zircuit-garfield-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-garfield-archive-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_GARFIELD_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml index 15f82f5a..470d4408 100644 --- a/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-garfield-op-geth-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10397:10397 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-garfield`)} - ${NO_SSL:+traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.rule=PathPrefix(`/zircuit-garfield`)} - traefik.http.routers.zircuit-garfield-op-geth-pruned-pebble-hash.middlewares=zircuit-garfield-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-garfield-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_GARFIELD_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml index 359517e4..9b3cc264 100644 --- a/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10688:10688 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/zircuit-mainnet-archive`)} - traefik.http.routers.zircuit-mainnet-op-geth-archive-leveldb-hash.middlewares=zircuit-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-mainnet-archive-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_MAINNET_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml index e95b5ac3..d8dca4cf 100644 --- a/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-mainnet-op-geth-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10688:10688 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-mainnet`)} - ${NO_SSL:+traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.rule=PathPrefix(`/zircuit-mainnet`)} - traefik.http.routers.zircuit-mainnet-op-geth-pruned-pebble-hash.middlewares=zircuit-mainnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-mainnet-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_MAINNET_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml b/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml index b3463253..e4a99340 100644 --- a/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zircuit-testnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10357:10357 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-testnet-archive`)} - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/zircuit-testnet-archive`)} - traefik.http.routers.zircuit-testnet-op-geth-archive-leveldb-hash.middlewares=zircuit-testnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-testnet-archive-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_TESTNET_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml b/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml index a7de0247..b727d389 100644 --- a/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml +++ b/op/geth/zircuit-testnet-op-geth-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10357:10357 @@ -68,8 +70,6 @@ services: - ${NO_SSL:-traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zircuit-testnet`)} - ${NO_SSL:+traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.rule=PathPrefix(`/zircuit-testnet`)} - traefik.http.routers.zircuit-testnet-op-geth-pruned-pebble-hash.middlewares=zircuit-testnet-op-geth-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zircuit-testnet-node: image: ${ZIRCUIT_NODE_IMAGE:-zircuit1/node}:${ZIRCUIT_TESTNET_NODE_VERSION:-19a5d3f21a701dac6a8215ed51c17173c9b91c59} diff --git a/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml b/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml index fe11a4f5..f0510496 100644 --- a/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zora-mainnet-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10714:10714 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/zora-mainnet-archive`)} - traefik.http.routers.zora-mainnet-op-geth-archive-leveldb-hash.middlewares=zora-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zora-mainnet-archive-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml b/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml index c1973db8..f6a7d72b 100644 --- a/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml +++ b/op/geth/zora-mainnet-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10714:10714 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-mainnet`)} - ${NO_SSL:+traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.rule=PathPrefix(`/zora-mainnet`)} - traefik.http.routers.zora-mainnet-op-geth-pruned-pebble-path.middlewares=zora-mainnet-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zora-mainnet-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml b/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml index 667f063c..5b82918e 100644 --- a/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml +++ b/op/geth/zora-sepolia-op-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10083:10083 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.rule=PathPrefix(`/zora-sepolia-archive`)} - traefik.http.routers.zora-sepolia-op-geth-archive-leveldb-hash.middlewares=zora-sepolia-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zora-sepolia-archive-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml b/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml index 93b52132..bdf5ace2 100644 --- a/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml +++ b/op/geth/zora-sepolia-op-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10083:10083 @@ -66,8 +68,6 @@ services: - ${NO_SSL:-traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-sepolia`)} - ${NO_SSL:+traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.rule=PathPrefix(`/zora-sepolia`)} - traefik.http.routers.zora-sepolia-op-geth-pruned-pebble-path.middlewares=zora-sepolia-op-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zora-sepolia-node: image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/reth/base-mainnet-op-reth-archive-trace.yml b/op/reth/base-mainnet-op-reth-archive-trace.yml index c0a93fe3..2837022b 100644 --- a/op/reth/base-mainnet-op-reth-archive-trace.yml +++ b/op/reth/base-mainnet-op-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10221:10221 @@ -62,9 +65,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-archive-trace.rule=PathPrefix(`/base-mainnet-archive`)} - traefik.http.routers.base-mainnet-op-reth-archive-trace.middlewares=base-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-mainnet-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/base-mainnet-op-reth-pruned-trace.yml b/op/reth/base-mainnet-op-reth-pruned-trace.yml index 38c32469..1ec991bb 100644 --- a/op/reth/base-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/base-mainnet-op-reth-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10221:10221 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-reth-pruned-trace.rule=PathPrefix(`/base-mainnet`)} - traefik.http.routers.base-mainnet-op-reth-pruned-trace.middlewares=base-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-mainnet-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/base-sepolia-op-reth-archive-trace.yml b/op/reth/base-sepolia-op-reth-archive-trace.yml index 486a2014..d00844c8 100644 --- a/op/reth/base-sepolia-op-reth-archive-trace.yml +++ b/op/reth/base-sepolia-op-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10390:10390 @@ -62,9 +65,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-archive-trace.rule=PathPrefix(`/base-sepolia-archive`)} - traefik.http.routers.base-sepolia-op-reth-archive-trace.middlewares=base-sepolia-op-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-sepolia-archive-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/reth/base-sepolia-op-reth-pruned-trace.yml b/op/reth/base-sepolia-op-reth-pruned-trace.yml index 25acdfee..82cbc6ba 100644 --- a/op/reth/base-sepolia-op-reth-pruned-trace.yml +++ b/op/reth/base-sepolia-op-reth-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10390:10390 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-reth-pruned-trace.rule=PathPrefix(`/base-sepolia`)} - traefik.http.routers.base-sepolia-op-reth-pruned-trace.middlewares=base-sepolia-op-reth-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) base-sepolia-node: image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/reth/lisk-mainnet-op-reth-archive-trace.yml b/op/reth/lisk-mainnet-op-reth-archive-trace.yml index b654a2a7..1e4db2ba 100644 --- a/op/reth/lisk-mainnet-op-reth-archive-trace.yml +++ b/op/reth/lisk-mainnet-op-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10598:10598 @@ -62,9 +65,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-archive-trace.rule=PathPrefix(`/lisk-mainnet-archive`)} - traefik.http.routers.lisk-mainnet-op-reth-archive-trace.middlewares=lisk-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) lisk-mainnet-archive-node: image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/lisk-mainnet-op-reth-pruned-trace.yml b/op/reth/lisk-mainnet-op-reth-pruned-trace.yml index c4ee4bd7..0a0a41f4 100644 --- a/op/reth/lisk-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/lisk-mainnet-op-reth-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10598:10598 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet`)} - ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.rule=PathPrefix(`/lisk-mainnet`)} - traefik.http.routers.lisk-mainnet-op-reth-pruned-trace.middlewares=lisk-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) lisk-mainnet-node: image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/op-mainnet-op-reth-archive-trace.yml b/op/reth/op-mainnet-op-reth-archive-trace.yml index 63a4e44a..1bd8f7f1 100644 --- a/op/reth/op-mainnet-op-reth-archive-trace.yml +++ b/op/reth/op-mainnet-op-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10114:10114 @@ -62,9 +65,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-archive-trace.rule=PathPrefix(`/op-mainnet-archive`)} - traefik.http.routers.op-mainnet-op-reth-archive-trace.middlewares=op-mainnet-op-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-mainnet-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/op-mainnet-op-reth-pruned-trace.yml b/op/reth/op-mainnet-op-reth-pruned-trace.yml index b588a750..92c3e83c 100644 --- a/op/reth/op-mainnet-op-reth-pruned-trace.yml +++ b/op/reth/op-mainnet-op-reth-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10114:10114 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet`)} - ${NO_SSL:+traefik.http.routers.op-mainnet-op-reth-pruned-trace.rule=PathPrefix(`/op-mainnet`)} - traefik.http.routers.op-mainnet-op-reth-pruned-trace.middlewares=op-mainnet-op-reth-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-mainnet-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1} diff --git a/op/reth/op-sepolia-op-reth-archive-trace.yml b/op/reth/op-sepolia-op-reth-archive-trace.yml index 6a828fdc..57366c7c 100644 --- a/op/reth/op-sepolia-op-reth-archive-trace.yml +++ b/op/reth/op-sepolia-op-reth-archive-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10326:10326 @@ -62,9 +65,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-archive-trace.rule=PathPrefix(`/op-sepolia-archive`)} - traefik.http.routers.op-sepolia-op-reth-archive-trace.middlewares=op-sepolia-op-reth-archive-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-sepolia-archive-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/op/reth/op-sepolia-op-reth-pruned-trace.yml b/op/reth/op-sepolia-op-reth-pruned-trace.yml index 0c143304..443a908e 100644 --- a/op/reth/op-sepolia-op-reth-pruned-trace.yml +++ b/op/reth/op-sepolia-op-reth-pruned-trace.yml @@ -15,6 +15,9 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) + memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) user: root ports: - 10326:10326 @@ -63,9 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia`)} - ${NO_SSL:+traefik.http.routers.op-sepolia-op-reth-pruned-trace.rule=PathPrefix(`/op-sepolia`)} - traefik.http.routers.op-sepolia-op-reth-pruned-trace.middlewares=op-sepolia-op-reth-pruned-trace-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) - memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) op-sepolia-node: image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1} diff --git a/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml b/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml index ad16d69d..5e137248 100644 --- a/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml +++ b/polygon/bor/polygon-amoy-bor-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10188:10188 @@ -64,8 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/polygon-amoy`)} - ${NO_SSL:+traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.rule=PathPrefix(`/polygon-amoy`)} - traefik.http.routers.polygon-amoy-bor-pruned-pebble-path.middlewares=polygon-amoy-bor-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: polygon-amoy-bor-pruned-pebble-path: diff --git a/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml b/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml index 7cd65960..38649c22 100644 --- a/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml +++ b/polygon/bor/polygon-mainnet-bor-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10961:10961 @@ -64,8 +66,6 @@ services: - ${NO_SSL:-traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/polygon-mainnet`)} - ${NO_SSL:+traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.rule=PathPrefix(`/polygon-mainnet`)} - traefik.http.routers.polygon-mainnet-bor-pruned-pebble-path.middlewares=polygon-mainnet-bor-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: polygon-mainnet-bor-pruned-pebble-path: diff --git a/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml b/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml index 3bc2e6b4..9bea664b 100644 --- a/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml +++ b/ronin/ronin/ronin-mainnet-ronin-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10276:10276 @@ -51,8 +53,6 @@ services: - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ronin-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.rule=PathPrefix(`/ronin-mainnet-archive`)} - traefik.http.routers.ronin-mainnet-ronin-archive-leveldb-hash.middlewares=ronin-mainnet-ronin-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: ronin-mainnet-ronin-archive-leveldb-hash: diff --git a/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml b/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml index 3bff6367..4bd4bd1b 100644 --- a/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml +++ b/ronin/ronin/ronin-mainnet-ronin-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10276:10276 @@ -51,8 +53,6 @@ services: - ${NO_SSL:-traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ronin-mainnet`)} - ${NO_SSL:+traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.rule=PathPrefix(`/ronin-mainnet`)} - traefik.http.routers.ronin-mainnet-ronin-pruned-pebble-hash.middlewares=ronin-mainnet-ronin-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: ronin-mainnet-ronin-pruned-pebble-hash: diff --git a/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml b/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml index ac42cb9b..8aceb132 100644 --- a/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml +++ b/ronin/ronin/ronin-saigon-ronin-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10493:10493 @@ -51,8 +53,6 @@ services: - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ronin-saigon-archive`)} - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.rule=PathPrefix(`/ronin-saigon-archive`)} - traefik.http.routers.ronin-saigon-ronin-archive-leveldb-hash.middlewares=ronin-saigon-ronin-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: ronin-saigon-ronin-archive-leveldb-hash: diff --git a/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml b/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml index 6218c69d..34060325 100644 --- a/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml +++ b/ronin/ronin/ronin-saigon-ronin-pruned-pebble-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10493:10493 @@ -51,8 +53,6 @@ services: - ${NO_SSL:-traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/ronin-saigon`)} - ${NO_SSL:+traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.rule=PathPrefix(`/ronin-saigon`)} - traefik.http.routers.ronin-saigon-ronin-pruned-pebble-hash.middlewares=ronin-saigon-ronin-pruned-pebble-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: ronin-saigon-ronin-pruned-pebble-hash: diff --git a/rootstock/rskj/rootstock-bamboo-rskj-archive.yml b/rootstock/rskj/rootstock-bamboo-rskj-archive.yml index f1a153a3..50705647 100644 --- a/rootstock/rskj/rootstock-bamboo-rskj-archive.yml +++ b/rootstock/rskj/rootstock-bamboo-rskj-archive.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10238:10238 @@ -29,8 +31,6 @@ services: volumes: - ${ROOTSTOCK_BAMBOO_RSKJ_ARCHIVE_DATA:-rootstock-bamboo-rskj-archive}:/var/lib/rsk/database/mainnet - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) rootstock-bamboo-archive: image: nginx diff --git a/rootstock/rskj/rootstock-mainnet-rskj-archive.yml b/rootstock/rskj/rootstock-mainnet-rskj-archive.yml index 7c13bf0f..db43864e 100644 --- a/rootstock/rskj/rootstock-mainnet-rskj-archive.yml +++ b/rootstock/rskj/rootstock-mainnet-rskj-archive.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10808:10808 @@ -30,8 +32,6 @@ services: - ${ROOTSTOCK_MAINNET_RSKJ_ARCHIVE_DATA:-rootstock-mainnet-rskj-archive}:/var/lib/rsk/database/mainnet - ./rootstock/mainnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) rootstock-mainnet-archive: image: nginx diff --git a/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml b/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml index 042ab33c..c776b8ef 100644 --- a/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml +++ b/scroll/l2geth/scroll-mainnet-l2geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10083:10083 @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/scroll-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.rule=PathPrefix(`/scroll-mainnet-archive`)} - traefik.http.routers.scroll-mainnet-l2geth-archive-leveldb-hash.middlewares=scroll-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: scroll-mainnet-l2geth-archive-leveldb-hash: diff --git a/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml b/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml index 882c0def..5dd51a7e 100644 --- a/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml +++ b/scroll/l2geth/scroll-sepolia-l2geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10455:10455 @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/scroll-sepolia-archive`)} - ${NO_SSL:+traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.rule=PathPrefix(`/scroll-sepolia-archive`)} - traefik.http.routers.scroll-sepolia-l2geth-archive-leveldb-hash.middlewares=scroll-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: scroll-sepolia-l2geth-archive-leveldb-hash: diff --git a/sonic/sonic/sonic-mainnet-sonic-archive.yml b/sonic/sonic/sonic-mainnet-sonic-archive.yml index 83f4f060..1a3718d9 100644 --- a/sonic/sonic/sonic-mainnet-sonic-archive.yml +++ b/sonic/sonic/sonic-mainnet-sonic-archive.yml @@ -14,6 +14,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) build: context: ./sonic dockerfile: sonic.Dockerfile @@ -62,8 +64,6 @@ services: - ${NO_SSL:-traefik.http.routers.sonic-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/sonic-mainnet-archive`)} - ${NO_SSL:+traefik.http.routers.sonic-mainnet-sonic-archive.rule=PathPrefix(`/sonic-mainnet-archive`)} - traefik.http.routers.sonic-mainnet-sonic-archive.middlewares=sonic-mainnet-sonic-archive-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: sonic-mainnet-sonic-archive: diff --git a/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml b/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml index 3d6f348e..30dfcc54 100644 --- a/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml +++ b/taiko/geth/taiko-alethia-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10251:10251 @@ -65,8 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/taiko-alethia-archive`)} - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.rule=PathPrefix(`/taiko-alethia-archive`)} - traefik.http.routers.taiko-alethia-geth-archive-leveldb-hash.middlewares=taiko-alethia-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) taiko-alethia-archive-node: image: ${TAIKO_DRIVER_IMAGE:-us-docker.pkg.dev/evmchain/images/taiko-client}:${TAIKO_ALETHIA_DRIVER_VERSION:-taiko-alethia-client-v0.43.1} diff --git a/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml b/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml index dc6a9cce..40f7e31c 100644 --- a/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml +++ b/taiko/geth/taiko-alethia-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10251:10251 @@ -65,8 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/taiko-alethia`)} - ${NO_SSL:+traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.rule=PathPrefix(`/taiko-alethia`)} - traefik.http.routers.taiko-alethia-geth-pruned-pebble-path.middlewares=taiko-alethia-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) taiko-alethia-node: image: ${TAIKO_DRIVER_IMAGE:-us-docker.pkg.dev/evmchain/images/taiko-client}:${TAIKO_ALETHIA_DRIVER_VERSION:-taiko-alethia-client-v0.43.1} diff --git a/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml b/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml index 9c3fc418..90703f01 100644 --- a/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml +++ b/taiko/geth/taiko-hekla-geth-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10396:10396 @@ -65,8 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/taiko-hekla-archive`)} - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.rule=PathPrefix(`/taiko-hekla-archive`)} - traefik.http.routers.taiko-hekla-geth-archive-leveldb-hash.middlewares=taiko-hekla-geth-archive-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) taiko-hekla-archive-node: image: ${TAIKO_DRIVER_IMAGE:-us-docker.pkg.dev/evmchain/images/taiko-client}:${TAIKO_HEKLA_DRIVER_VERSION:-taiko-alethia-client-v1.4.1} diff --git a/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml b/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml index d46a6cf3..2969d938 100644 --- a/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml +++ b/taiko/geth/taiko-hekla-geth-pruned-pebble-path.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10396:10396 @@ -65,8 +67,6 @@ services: - ${NO_SSL:-traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/taiko-hekla`)} - ${NO_SSL:+traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.rule=PathPrefix(`/taiko-hekla`)} - traefik.http.routers.taiko-hekla-geth-pruned-pebble-path.middlewares=taiko-hekla-geth-pruned-pebble-path-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) taiko-hekla-node: image: ${TAIKO_DRIVER_IMAGE:-us-docker.pkg.dev/evmchain/images/taiko-client}:${TAIKO_HEKLA_DRIVER_VERSION:-taiko-alethia-client-v1.4.1} diff --git a/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml b/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml index 3478ed42..4fa1d5f2 100644 --- a/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml +++ b/thundercore/thunder/thundercore-venus-thunder-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10368:10368 @@ -41,8 +43,6 @@ services: - ${NO_SSL:-traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/thundercore-venus`)} - ${NO_SSL:+traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.rule=PathPrefix(`/thundercore-venus`)} - traefik.http.routers.thundercore-venus-thunder-pruned-leveldb-hash.middlewares=thundercore-venus-thunder-pruned-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: thundercore-venus-thunder-pruned-leveldb-hash: diff --git a/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml b/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml index 6d77870d..ac056ba5 100644 --- a/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml +++ b/thundercore/thunder/thundercore-zeus-thunder-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10645:10645 @@ -41,8 +43,6 @@ services: - ${NO_SSL:-traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/thundercore-zeus`)} - ${NO_SSL:+traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.rule=PathPrefix(`/thundercore-zeus`)} - traefik.http.routers.thundercore-zeus-thunder-pruned-leveldb-hash.middlewares=thundercore-zeus-thunder-pruned-leveldb-hash-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: thundercore-zeus-thunder-pruned-leveldb-hash: diff --git a/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml b/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml index 88b39b40..f0c6645c 100644 --- a/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml +++ b/tron/java-tron/tron-mainnet-java-tron-pruned-rocksdb.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 25815:25815 @@ -39,8 +41,6 @@ services: - ${NO_SSL:-traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=Host(`$DOMAIN`) && PathPrefix(`/tron-mainnet`)} - ${NO_SSL:+traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.rule=PathPrefix(`/tron-mainnet`)} - traefik.http.routers.tron-mainnet-java-tron-pruned-rocksdb.middlewares=tron-mainnet-java-tron-pruned-rocksdb-stripprefix, ipwhitelist - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) volumes: tron-mainnet-java-tron-pruned-rocksdb: diff --git a/viction/node/viction-mainnet-node-archive-leveldb-hash.yml b/viction/node/viction-mainnet-node-archive-leveldb-hash.yml index 8270ceed..850fbb04 100644 --- a/viction/node/viction-mainnet-node-archive-leveldb-hash.yml +++ b/viction/node/viction-mainnet-node-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10670:10670 @@ -39,8 +41,6 @@ services: - ${VICTION_MAINNET_NODE_ARCHIVE_LEVELDB_HASH_DATA:-viction-mainnet-node-archive-leveldb-hash}:/tomochain/data - ./viction/mainnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) viction-mainnet-archive: image: nginx diff --git a/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml b/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml index 8c9eca37..f4a8ec36 100644 --- a/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml +++ b/viction/node/viction-mainnet-node-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10670:10670 @@ -39,8 +41,6 @@ services: - ${VICTION_MAINNET_NODE_PRUNED_LEVELDB_HASH_DATA:-viction-mainnet-node-pruned-leveldb-hash}:/tomochain/data - ./viction/mainnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) viction-mainnet: image: nginx diff --git a/viction/node/viction-testnet-node-archive-leveldb-hash.yml b/viction/node/viction-testnet-node-archive-leveldb-hash.yml index ec9077d2..89bf8276 100644 --- a/viction/node/viction-testnet-node-archive-leveldb-hash.yml +++ b/viction/node/viction-testnet-node-archive-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10254:10254 @@ -39,8 +41,6 @@ services: - ${VICTION_TESTNET_NODE_ARCHIVE_LEVELDB_HASH_DATA:-viction-testnet-node-archive-leveldb-hash}:/tomochain/data - ./viction/testnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) viction-testnet-archive: image: nginx diff --git a/viction/node/viction-testnet-node-pruned-leveldb-hash.yml b/viction/node/viction-testnet-node-pruned-leveldb-hash.yml index 47aa0a25..6b0d0a69 100644 --- a/viction/node/viction-testnet-node-pruned-leveldb-hash.yml +++ b/viction/node/viction-testnet-node-pruned-leveldb-hash.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10254:10254 @@ -39,8 +41,6 @@ services: - ${VICTION_TESTNET_NODE_PRUNED_LEVELDB_HASH_DATA:-viction-testnet-node-pruned-leveldb-hash}:/tomochain/data - ./viction/testnet:/config - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) viction-testnet: image: nginx diff --git a/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml b/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml index a9c9b4fe..993bfd86 100644 --- a/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml +++ b/zksync-era/external-node/zksync-era-mainnet-external-node-archive.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10342:10342 @@ -36,8 +38,6 @@ services: volumes: - ${ZKSYNC_ERA_MAINNET_EXTERNAL_NODE_ARCHIVE_DATA:-zksync-era-mainnet-external-node-archive}:/db \ - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zksync-era-mainnet-archive: image: nginx diff --git a/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml b/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml index 06e7c796..f3e0cfb0 100644 --- a/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml +++ b/zksync-era/external-node/zksync-era-mainnet-external-node-pruned.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10342:10342 @@ -36,8 +38,6 @@ services: volumes: - ${ZKSYNC_ERA_MAINNET_EXTERNAL_NODE_PRUNED_DATA:-zksync-era-mainnet-external-node-pruned}:/db \ - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zksync-era-mainnet: image: nginx diff --git a/zksync-era/external-node/zksync-era-sepolia-external-node-archive.yml b/zksync-era/external-node/zksync-era-sepolia-external-node-archive.yml index 723d842c..a13788ac 100644 --- a/zksync-era/external-node/zksync-era-sepolia-external-node-archive.yml +++ b/zksync-era/external-node/zksync-era-sepolia-external-node-archive.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10780:10780 @@ -36,8 +38,6 @@ services: volumes: - ${ZKSYNC_ERA_SEPOLIA_EXTERNAL_NODE_ARCHIVE_DATA:-zksync-era-sepolia-external-node-archive}:/db \ - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zksync-era-sepolia-archive: image: nginx diff --git a/zksync-era/external-node/zksync-era-sepolia-external-node-pruned.yml b/zksync-era/external-node/zksync-era-sepolia-external-node-pruned.yml index 41f531e4..95316621 100644 --- a/zksync-era/external-node/zksync-era-sepolia-external-node-pruned.yml +++ b/zksync-era/external-node/zksync-era-sepolia-external-node-pruned.yml @@ -15,6 +15,8 @@ services: # net.core.netdev_max_backlog: 50000 # Increase network buffer net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets + ulimits: + nofile: 1048576 # Max open files (for RPC/WS connections) user: root ports: - 10780:10780 @@ -36,8 +38,6 @@ services: volumes: - ${ZKSYNC_ERA_SEPOLIA_EXTERNAL_NODE_PRUNED_DATA:-zksync-era-sepolia-external-node-pruned}:/db \ - /slowdisk:/slowdisk - ulimits: - nofile: 1048576 # Max open files (for RPC/WS connections) zksync-era-sepolia: image: nginx