fix
This commit is contained in:
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10301:10301
|
- 10301:10301
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-mainnet-archive`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.middlewares=alephzero-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-archive-leveldb-hash.middlewares=alephzero-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-mainnet-nitro-archive-leveldb-hash:
|
alephzero-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10301:10301
|
- 10301:10301
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-mainnet`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-mainnet-nitro-pruned-pebble-path:
|
alephzero-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10083:10083
|
- 10083:10083
|
||||||
@@ -76,8 +78,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/alephzero-sepolia-archive`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.middlewares=alephzero-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-archive-leveldb-hash.middlewares=alephzero-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-sepolia-nitro-archive-leveldb-hash:
|
alephzero-sepolia-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10083:10083
|
- 10083:10083
|
||||||
@@ -75,8 +77,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia`)}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/alephzero-sepolia`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-sepolia`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/alephzero-sepolia`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-sepolia-nitro-pruned-pebble-path:
|
alephzero-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10468:10468
|
- 10468:10468
|
||||||
@@ -69,8 +71,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova-archive`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-nova-archive`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-nova-archive`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-nova-nitro-archive-leveldb-hash:
|
arbitrum-nova-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10468:10468
|
- 10468:10468
|
||||||
@@ -69,8 +71,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-nova`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-nova`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-nova`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-nova-nitro-pruned-pebble-hash:
|
arbitrum-nova-nitro-pruned-pebble-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10317:10317
|
- 10317:10317
|
||||||
@@ -69,8 +71,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one-archive`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-one-archive`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=PathPrefix(`/arbitrum-one-archive`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-one-nitro-archive-leveldb-hash:
|
arbitrum-one-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10317:10317
|
- 10317:10317
|
||||||
@@ -69,8 +71,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-one`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-one`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=PathPrefix(`/arbitrum-one`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-one-nitro-pruned-pebble-hash:
|
arbitrum-one-nitro-pruned-pebble-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10360:10360
|
- 10360:10360
|
||||||
@@ -69,8 +71,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/arbitrum-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathPrefix(`/arbitrum-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=PathPrefix(`/arbitrum-sepolia-archive`)}
|
||||||
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-sepolia-nitro-archive-pebble-hash:
|
arbitrum-sepolia-nitro-archive-pebble-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10111:10111
|
- 10111:10111
|
||||||
@@ -76,8 +78,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/connext-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/connext-sepolia-archive`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
connext-sepolia-nitro-archive-leveldb-hash:
|
connext-sepolia-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10111:10111
|
- 10111:10111
|
||||||
@@ -75,8 +77,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia`)}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/connext-sepolia`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/connext-sepolia`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/connext-sepolia`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
connext-sepolia-nitro-pruned-pebble-path:
|
connext-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10870:10870
|
- 10870:10870
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/everclear-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/everclear-mainnet-archive`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
everclear-mainnet-nitro-archive-leveldb-hash:
|
everclear-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10870:10870
|
- 10870:10870
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/everclear-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/everclear-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/everclear-mainnet`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
everclear-mainnet-nitro-pruned-pebble-path:
|
everclear-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10953:10953
|
- 10953:10953
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/opencampuscodex-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=PathPrefix(`/opencampuscodex-sepolia-archive`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
opencampuscodex-sepolia-nitro-archive-leveldb-hash:
|
opencampuscodex-sepolia-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10953:10953
|
- 10953:10953
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia`)}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/opencampuscodex-sepolia`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/opencampuscodex-sepolia`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=PathPrefix(`/opencampuscodex-sepolia`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
opencampuscodex-sepolia-nitro-pruned-pebble-path:
|
opencampuscodex-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10728:10728
|
- 10728:10728
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/playblock-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/playblock-mainnet-archive`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
playblock-mainnet-nitro-archive-leveldb-hash:
|
playblock-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10728:10728
|
- 10728:10728
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/playblock-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/playblock-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/playblock-mainnet`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
playblock-mainnet-nitro-pruned-pebble-path:
|
playblock-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10354:10354
|
- 10354:10354
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/real-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=PathPrefix(`/real-mainnet-archive`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
real-mainnet-nitro-archive-leveldb-hash:
|
real-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10354:10354
|
- 10354:10354
|
||||||
@@ -74,8 +76,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/real-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/real-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=PathPrefix(`/real-mainnet`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
real-mainnet-nitro-pruned-pebble-path:
|
real-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10350:10350
|
- 10350:10350
|
||||||
@@ -38,8 +40,6 @@ services:
|
|||||||
- ${AVALANCHE_FUJI_GO_ARCHIVE_LEVELDB_DATA:-avalanche-fuji-go-archive-leveldb}:/root/.avalanchego
|
- ${AVALANCHE_FUJI_GO_ARCHIVE_LEVELDB_DATA:-avalanche-fuji-go-archive-leveldb}:/root/.avalanchego
|
||||||
- ./avalanche/fuji:/config
|
- ./avalanche/fuji:/config
|
||||||
- /slowdisk:/slowdisk
|
- /slowdisk:/slowdisk
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
avalanche-fuji-archive:
|
avalanche-fuji-archive:
|
||||||
image: nginx
|
image: nginx
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10350:10350
|
- 10350:10350
|
||||||
@@ -38,8 +40,6 @@ services:
|
|||||||
- ${AVALANCHE_FUJI_GO_PRUNED_PEBBLEDB_DATA:-avalanche-fuji-go-pruned-pebbledb}:/root/.avalanchego
|
- ${AVALANCHE_FUJI_GO_PRUNED_PEBBLEDB_DATA:-avalanche-fuji-go-pruned-pebbledb}:/root/.avalanchego
|
||||||
- ./avalanche/fuji:/config
|
- ./avalanche/fuji:/config
|
||||||
- /slowdisk:/slowdisk
|
- /slowdisk:/slowdisk
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
avalanche-fuji:
|
avalanche-fuji:
|
||||||
image: nginx
|
image: nginx
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10929:10929
|
- 10929:10929
|
||||||
@@ -38,8 +40,6 @@ services:
|
|||||||
- ${AVALANCHE_MAINNET_GO_ARCHIVE_LEVELDB_DATA:-avalanche-mainnet-go-archive-leveldb}:/root/.avalanchego
|
- ${AVALANCHE_MAINNET_GO_ARCHIVE_LEVELDB_DATA:-avalanche-mainnet-go-archive-leveldb}:/root/.avalanchego
|
||||||
- ./avalanche/mainnet:/config
|
- ./avalanche/mainnet:/config
|
||||||
- /slowdisk:/slowdisk
|
- /slowdisk:/slowdisk
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
avalanche-mainnet-archive:
|
avalanche-mainnet-archive:
|
||||||
image: nginx
|
image: nginx
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10929:10929
|
- 10929:10929
|
||||||
@@ -38,8 +40,6 @@ services:
|
|||||||
- ${AVALANCHE_MAINNET_GO_PRUNED_PEBBLEDB_DATA:-avalanche-mainnet-go-pruned-pebbledb}:/root/.avalanchego
|
- ${AVALANCHE_MAINNET_GO_PRUNED_PEBBLEDB_DATA:-avalanche-mainnet-go-pruned-pebbledb}:/root/.avalanchego
|
||||||
- ./avalanche/mainnet:/config
|
- ./avalanche/mainnet:/config
|
||||||
- /slowdisk:/slowdisk
|
- /slowdisk:/slowdisk
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
avalanche-mainnet:
|
avalanche-mainnet:
|
||||||
image: nginx
|
image: nginx
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10527:10527
|
- 10527:10527
|
||||||
@@ -63,9 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bartio-archive`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bartio-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathPrefix(`/berachain-bartio-archive`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=PathPrefix(`/berachain-bartio-archive`)}
|
||||||
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
berachain-bartio-archive-node:
|
berachain-bartio-archive-node:
|
||||||
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BARTIO_BEACON_KIT_VERSION:-v1.1.3}
|
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BARTIO_BEACON_KIT_VERSION:-v1.1.3}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10347:10347
|
- 10347:10347
|
||||||
@@ -63,9 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-bepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathPrefix(`/berachain-bepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=PathPrefix(`/berachain-bepolia-archive`)}
|
||||||
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
berachain-bepolia-archive-node:
|
berachain-bepolia-archive-node:
|
||||||
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BEPOLIA_BEACON_KIT_VERSION:-v1.1.3}
|
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_BEPOLIA_BEACON_KIT_VERSION:-v1.1.3}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10881:10881
|
- 10881:10881
|
||||||
@@ -63,9 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/berachain-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathPrefix(`/berachain-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=PathPrefix(`/berachain-mainnet-archive`)}
|
||||||
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
berachain-mainnet-archive-node:
|
berachain-mainnet-archive-node:
|
||||||
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_MAINNET_BEACON_KIT_VERSION:-v1.1.3}
|
image: ${BERACHAIN_BEACON_KIT_IMAGE:-ghcr.io/berachain/beacon-kit}:${BERACHAIN_MAINNET_BEACON_KIT_VERSION:-v1.1.3}
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10759:10759
|
- 10759:10759
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-chapel`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-chapel`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-chapel`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-chapel`)}
|
||||||
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-chapel-bsc-pruned-pebble-path:
|
bsc-chapel-bsc-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10037:10037
|
- 10037:10037
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/bsc-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=PathPrefix(`/bsc-mainnet`)}
|
||||||
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-mainnet-bsc-pruned-pebble-path:
|
bsc-mainnet-bsc-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10386:10386
|
- 10386:10386
|
||||||
@@ -59,8 +61,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-alfajores-archive`)}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-alfajores-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-alfajores-archive`)}
|
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-alfajores-archive`)}
|
||||||
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-alfajores-geth-archive-leveldb-hash:
|
celo-alfajores-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10164:10164
|
- 10164:10164
|
||||||
@@ -59,8 +61,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/celo-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/celo-mainnet-archive`)}
|
||||||
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-mainnet-geth-archive-leveldb-hash:
|
celo-mainnet-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10384:10384
|
- 10384:10384
|
||||||
@@ -56,8 +58,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-buffalo`)}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-buffalo`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathPrefix(`/core-buffalo`)}
|
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=PathPrefix(`/core-buffalo`)}
|
||||||
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-buffalo-core-pruned-pebble-path:
|
core-buffalo-core-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10169:10169
|
- 10169:10169
|
||||||
@@ -56,8 +58,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathPrefix(`/core-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=PathPrefix(`/core-mainnet-archive`)}
|
||||||
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-mainnet-core-archive-leveldb-hash:
|
core-mainnet-core-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10169:10169
|
- 10169:10169
|
||||||
@@ -56,8 +58,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/core-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathPrefix(`/core-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=PathPrefix(`/core-mainnet`)}
|
||||||
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-mainnet-core-pruned-leveldb-hash:
|
core-mainnet-core-pruned-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10478:10478
|
- 10478:10478
|
||||||
@@ -56,8 +58,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-pigeon`)}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/core-pigeon`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathPrefix(`/core-pigeon`)}
|
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=PathPrefix(`/core-pigeon`)}
|
||||||
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-pigeon-core-pruned-pebble-path:
|
core-pigeon-core-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10947:10947
|
- 10947:10947
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-archive-trace:
|
ethereum-holesky-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10947:10947
|
- 10947:10947
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-minimal-trace:
|
ethereum-holesky-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10947:10947
|
- 10947:10947
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-pruned-trace:
|
ethereum-holesky-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10675:10675
|
- 10675:10675
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-archive-trace:
|
ethereum-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10675:10675
|
- 10675:10675
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-minimal-trace:
|
ethereum-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10675:10675
|
- 10675:10675
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-pruned-trace:
|
ethereum-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10317:10317
|
- 10317:10317
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-archive-trace:
|
ethereum-sepolia-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10317:10317
|
- 10317:10317
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-minimal-trace:
|
ethereum-sepolia-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10317:10317
|
- 10317:10317
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-pruned-trace:
|
ethereum-sepolia-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10993:10993
|
- 10993:10993
|
||||||
@@ -64,8 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-holesky`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-holesky`)}
|
||||||
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
ethereum-holesky-node:
|
ethereum-holesky-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10023:10023
|
- 10023:10023
|
||||||
@@ -64,8 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-mainnet`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
ethereum-mainnet-node:
|
ethereum-mainnet-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10710:10710
|
- 10710:10710
|
||||||
@@ -64,8 +66,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-sepolia`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=PathPrefix(`/ethereum-sepolia`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
ethereum-sepolia-node:
|
ethereum-sepolia-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10752:10752
|
- 10752:10752
|
||||||
@@ -61,9 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathPrefix(`/ethereum-holesky-archive`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=PathPrefix(`/ethereum-holesky-archive`)}
|
||||||
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
ethereum-holesky-archive-node:
|
ethereum-holesky-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10563:10563
|
- 10563:10563
|
||||||
@@ -61,9 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathPrefix(`/ethereum-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=PathPrefix(`/ethereum-mainnet-archive`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
ethereum-mainnet-archive-node:
|
ethereum-mainnet-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10330:10330
|
- 10330:10330
|
||||||
@@ -61,9 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathPrefix(`/ethereum-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=PathPrefix(`/ethereum-sepolia-archive`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
ethereum-sepolia-archive-node:
|
ethereum-sepolia-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-archive-trace:
|
fantom-mainnet-opera-archive-trace:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-archive:
|
fantom-mainnet-opera-archive:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathPrefix(`/fantom-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=PathPrefix(`/fantom-mainnet`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-pruned-trace:
|
fantom-mainnet-opera-pruned-trace:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathPrefix(`/fantom-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=PathPrefix(`/fantom-mainnet`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-pruned:
|
fantom-mainnet-opera-pruned:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-archive-trace:
|
fantom-testnet-opera-archive-trace:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-archive:
|
fantom-testnet-opera-archive:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathPrefix(`/fantom-testnet`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=PathPrefix(`/fantom-testnet`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-pruned-trace:
|
fantom-testnet-opera-pruned-trace:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: opera.Dockerfile
|
dockerfile: opera.Dockerfile
|
||||||
@@ -61,8 +63,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathPrefix(`/fantom-testnet`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=PathPrefix(`/fantom-testnet`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-pruned:
|
fantom-testnet-opera-pruned:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: sonic.Dockerfile
|
dockerfile: sonic.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=PathPrefix(`/fantom-mainnet-archive`)}
|
||||||
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-sonic-archive:
|
fantom-mainnet-sonic-archive:
|
||||||
|
|||||||
@@ -14,6 +14,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
build:
|
build:
|
||||||
context: ./fantom
|
context: ./fantom
|
||||||
dockerfile: sonic.Dockerfile
|
dockerfile: sonic.Dockerfile
|
||||||
@@ -62,8 +64,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathPrefix(`/fantom-testnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=PathPrefix(`/fantom-testnet-archive`)}
|
||||||
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-sonic-archive:
|
fantom-testnet-sonic-archive:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10986:10986
|
- 10986:10986
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-chiado-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-chiado-archive/eth`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace-node.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-archive-trace:
|
gnosis-chiado-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10986:10986
|
- 10986:10986
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-chiado-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-chiado-minimal/eth`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace-node.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-minimal-trace:
|
gnosis-chiado-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10986:10986
|
- 10986:10986
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-chiado/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-chiado/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-chiado/eth`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace-node.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-pruned-trace:
|
gnosis-chiado-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10974:10974
|
- 10974:10974
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-mainnet-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/gnosis-mainnet-archive/eth`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace-node.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-archive-trace:
|
gnosis-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10974:10974
|
- 10974:10974
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-mainnet-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/gnosis-mainnet-minimal/eth`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace-node.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-minimal-trace:
|
gnosis-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10974:10974
|
- 10974:10974
|
||||||
@@ -81,9 +84,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet/eth`)}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/gnosis-mainnet/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-mainnet/eth`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/gnosis-mainnet/eth`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace-node.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-pruned-trace:
|
gnosis-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10640:10640
|
- 10640:10640
|
||||||
@@ -40,8 +42,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-mainnet-archive`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
goat-mainnet-geth-archive-leveldb-hash:
|
goat-mainnet-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10640:10640
|
- 10640:10640
|
||||||
@@ -40,8 +42,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/goat-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=PathPrefix(`/goat-mainnet`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
goat-mainnet-geth-pruned-pebble-path:
|
goat-mainnet-geth-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10272:10272
|
- 10272:10272
|
||||||
@@ -40,8 +42,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3-archive`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-testnet3-archive`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=PathPrefix(`/goat-testnet3-archive`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
goat-testnet3-geth-archive-leveldb-hash:
|
goat-testnet3-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10272:10272
|
- 10272:10272
|
||||||
@@ -40,8 +42,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3`)}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && PathPrefix(`/goat-testnet3`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathPrefix(`/goat-testnet3`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=PathPrefix(`/goat-testnet3`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
goat-testnet3-geth-pruned-pebble-path:
|
goat-testnet3-geth-pruned-pebble-path:
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10465:10465
|
- 10465:10465
|
||||||
@@ -39,8 +41,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/haqq-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && PathPrefix(`/haqq-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathPrefix(`/haqq-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=PathPrefix(`/haqq-mainnet`)}
|
||||||
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
haqq-mainnet-haqq-pruned:
|
haqq-mainnet-haqq-pruned:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10060:10060
|
- 10060:10060
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathPrefix(`/linea-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=PathPrefix(`/linea-mainnet-archive`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-archive-trace:
|
linea-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10060:10060
|
- 10060:10060
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-minimal`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet-minimal`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathPrefix(`/linea-mainnet-minimal`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=PathPrefix(`/linea-mainnet-minimal`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-minimal-trace:
|
linea-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10060:10060
|
- 10060:10060
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet`)}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-mainnet`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathPrefix(`/linea-mainnet`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=PathPrefix(`/linea-mainnet`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-pruned-trace:
|
linea-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10235:10235
|
- 10235:10235
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathPrefix(`/linea-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=PathPrefix(`/linea-sepolia-archive`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-archive-trace:
|
linea-sepolia-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10235:10235
|
- 10235:10235
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-minimal`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia-minimal`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathPrefix(`/linea-sepolia-minimal`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=PathPrefix(`/linea-sepolia-minimal`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-minimal-trace:
|
linea-sepolia-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10235:10235
|
- 10235:10235
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia`)}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/linea-sepolia`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathPrefix(`/linea-sepolia`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=PathPrefix(`/linea-sepolia`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-pruned-trace:
|
linea-sepolia-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10092:10092
|
- 10092:10092
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/base-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/base-mainnet-archive`)}
|
||||||
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
base-mainnet-archive-node:
|
base-mainnet-archive-node:
|
||||||
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10487:10487
|
- 10487:10487
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/base-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/base-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/base-sepolia-archive`)}
|
||||||
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
base-sepolia-archive-node:
|
base-sepolia-archive-node:
|
||||||
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10071:10071
|
- 10071:10071
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/bob-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/bob-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/bob-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/bob-mainnet-archive`)}
|
||||||
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
bob-mainnet-archive-node:
|
bob-mainnet-archive-node:
|
||||||
image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10732:10732
|
- 10732:10732
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/boba-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/boba-mainnet-archive`)}
|
||||||
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
boba-mainnet-archive-node:
|
boba-mainnet-archive-node:
|
||||||
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18}
|
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10249:10249
|
- 10249:10249
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/boba-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/boba-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.boba-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/boba-sepolia-archive`)}
|
||||||
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-sepolia-op-erigon-archive-trace.middlewares=boba-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
boba-sepolia-archive-node:
|
boba-sepolia-archive-node:
|
||||||
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_SEPOLIA_NODE_VERSION:-v1.6.18}
|
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_SEPOLIA_NODE_VERSION:-v1.6.18}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10378:10378
|
- 10378:10378
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/hashkeychain-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/hashkeychain-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/hashkeychain-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/hashkeychain-mainnet-archive`)}
|
||||||
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.hashkeychain-mainnet-op-erigon-archive-trace.middlewares=hashkeychain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
hashkeychain-mainnet-archive-node:
|
hashkeychain-mainnet-archive-node:
|
||||||
image: ${HASHKEYCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${HASHKEYCHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${HASHKEYCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${HASHKEYCHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10990:10990
|
- 10990:10990
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/ink-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.ink-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/ink-mainnet-archive`)}
|
||||||
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-mainnet-op-erigon-archive-trace.middlewares=ink-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
ink-mainnet-archive-node:
|
ink-mainnet-archive-node:
|
||||||
image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10826:10826
|
- 10826:10826
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/ink-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/ink-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.ink-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/ink-sepolia-archive`)}
|
||||||
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ink-sepolia-op-erigon-archive-trace.middlewares=ink-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
ink-sepolia-archive-node:
|
ink-sepolia-archive-node:
|
||||||
image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${INK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${INK_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10831:10831
|
- 10831:10831
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/lisk-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/lisk-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/lisk-mainnet-archive`)}
|
||||||
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.lisk-mainnet-op-erigon-archive-trace.middlewares=lisk-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
lisk-mainnet-archive-node:
|
lisk-mainnet-archive-node:
|
||||||
image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${LISK_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${LISK_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10543:10543
|
- 10543:10543
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/metal-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/metal-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.metal-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/metal-mainnet-archive`)}
|
||||||
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.metal-mainnet-op-erigon-archive-trace.middlewares=metal-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
metal-mainnet-archive-node:
|
metal-mainnet-archive-node:
|
||||||
image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${METAL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${METAL_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10509:10509
|
- 10509:10509
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/mode-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.mode-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/mode-mainnet-archive`)}
|
||||||
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-mainnet-op-erigon-archive-trace.middlewares=mode-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
mode-mainnet-archive-node:
|
mode-mainnet-archive-node:
|
||||||
image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10212:10212
|
- 10212:10212
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/mode-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/mode-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.mode-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/mode-sepolia-archive`)}
|
||||||
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.mode-sepolia-op-erigon-archive-trace.middlewares=mode-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
mode-sepolia-archive-node:
|
mode-sepolia-archive-node:
|
||||||
image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${MODE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${MODE_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10509:10509
|
- 10509:10509
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/op-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.op-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/op-mainnet-archive`)}
|
||||||
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-mainnet-op-erigon-archive-trace.middlewares=op-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
op-mainnet-archive-node:
|
op-mainnet-archive-node:
|
||||||
image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10373:10373
|
- 10373:10373
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/op-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/op-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.op-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/op-sepolia-archive`)}
|
||||||
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.op-sepolia-op-erigon-archive-trace.middlewares=op-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
op-sepolia-archive-node:
|
op-sepolia-archive-node:
|
||||||
image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${OP_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${OP_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10671:10671
|
- 10671:10671
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/snax-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/snax-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/snax-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.snax-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/snax-mainnet-archive`)}
|
||||||
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.snax-mainnet-op-erigon-archive-trace.middlewares=snax-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
snax-mainnet-archive-node:
|
snax-mainnet-archive-node:
|
||||||
image: ${SNAX_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SNAX_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${SNAX_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SNAX_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10314:10314
|
- 10314:10314
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/soneium-minato-archive`)}
|
- ${NO_SSL:-traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/soneium-minato-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=PathPrefix(`/soneium-minato-archive`)}
|
- ${NO_SSL:+traefik.http.routers.soneium-minato-op-erigon-archive-trace.rule=PathPrefix(`/soneium-minato-archive`)}
|
||||||
- traefik.http.routers.soneium-minato-op-erigon-archive-trace.middlewares=soneium-minato-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.soneium-minato-op-erigon-archive-trace.middlewares=soneium-minato-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
soneium-minato-archive-node:
|
soneium-minato-archive-node:
|
||||||
image: ${SONEIUM_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SONEIUM_MINATO_NODE_VERSION:-v1.13.1}
|
image: ${SONEIUM_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SONEIUM_MINATO_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10810:10810
|
- 10810:10810
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/swell-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/swell-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/swell-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.swell-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/swell-mainnet-archive`)}
|
||||||
- traefik.http.routers.swell-mainnet-op-erigon-archive-trace.middlewares=swell-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.swell-mainnet-op-erigon-archive-trace.middlewares=swell-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
swell-mainnet-archive-node:
|
swell-mainnet-archive-node:
|
||||||
image: ${SWELL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SWELL_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${SWELL_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${SWELL_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10415:10415
|
- 10415:10415
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/unichain-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/unichain-mainnet-archive`)}
|
||||||
- traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.middlewares=unichain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.unichain-mainnet-op-erigon-archive-trace.middlewares=unichain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
unichain-mainnet-archive-node:
|
unichain-mainnet-archive-node:
|
||||||
image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10196:10196
|
- 10196:10196
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/unichain-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/unichain-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/unichain-sepolia-archive`)}
|
||||||
- traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.middlewares=unichain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.unichain-sepolia-op-erigon-archive-trace.middlewares=unichain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
unichain-sepolia-archive-node:
|
unichain-sepolia-archive-node:
|
||||||
image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${UNICHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${UNICHAIN_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10629:10629
|
- 10629:10629
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-mainnet-archive`)}
|
||||||
- traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.middlewares=worldchain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.worldchain-mainnet-op-erigon-archive-trace.middlewares=worldchain-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
worldchain-mainnet-archive-node:
|
worldchain-mainnet-archive-node:
|
||||||
image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10046:10046
|
- 10046:10046
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/worldchain-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/worldchain-sepolia-archive`)}
|
||||||
- traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.middlewares=worldchain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.worldchain-sepolia-op-erigon-archive-trace.middlewares=worldchain-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
worldchain-sepolia-archive-node:
|
worldchain-sepolia-archive-node:
|
||||||
image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${WORLDCHAIN_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${WORLDCHAIN_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10360:10360
|
- 10360:10360
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/zora-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.zora-mainnet-op-erigon-archive-trace.rule=PathPrefix(`/zora-mainnet-archive`)}
|
||||||
- traefik.http.routers.zora-mainnet-op-erigon-archive-trace.middlewares=zora-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.zora-mainnet-op-erigon-archive-trace.middlewares=zora-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
zora-mainnet-archive-node:
|
zora-mainnet-archive-node:
|
||||||
image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,9 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10839:10839
|
- 10839:10839
|
||||||
@@ -64,9 +67,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-sepolia-archive`)}
|
- ${NO_SSL:-traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && PathPrefix(`/zora-sepolia-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/zora-sepolia-archive`)}
|
- ${NO_SSL:+traefik.http.routers.zora-sepolia-op-erigon-archive-trace.rule=PathPrefix(`/zora-sepolia-archive`)}
|
||||||
- traefik.http.routers.zora-sepolia-op-erigon-archive-trace.middlewares=zora-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.zora-sepolia-op-erigon-archive-trace.middlewares=zora-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
|
||||||
|
|
||||||
zora-sepolia-archive-node:
|
zora-sepolia-archive-node:
|
||||||
image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${ZORA_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${ZORA_SEPOLIA_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
@@ -15,6 +15,8 @@ services:
|
|||||||
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
# net.core.netdev_max_backlog: 50000 # Increase network buffer
|
||||||
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
net.ipv4.tcp_max_syn_backlog: 30000 # More SYN requests
|
||||||
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
net.ipv4.tcp_max_tw_buckets: 2000000 # Allow more TIME_WAIT sockets
|
||||||
|
ulimits:
|
||||||
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10422:10422
|
- 10422:10422
|
||||||
@@ -66,8 +68,6 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && PathPrefix(`/base-mainnet-archive`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/base-mainnet-archive`)}
|
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.rule=PathPrefix(`/base-mainnet-archive`)}
|
||||||
- traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.middlewares=base-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.base-mainnet-op-geth-archive-leveldb-hash.middlewares=base-mainnet-op-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
||||||
ulimits:
|
|
||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
|
||||||
|
|
||||||
base-mainnet-archive-node:
|
base-mainnet-archive-node:
|
||||||
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1}
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user