hopefully nothing breaks

This commit is contained in:
Para Dox
2025-04-19 00:24:44 +07:00
parent efa0a7c56d
commit 4f12b8d0ed
251 changed files with 1151 additions and 1147 deletions

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)}
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
alephzero-mainnet-nitro-archive-pebble-hash: alephzero-mainnet-nitro-archive-pebble-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))} - ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)} - ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)}
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
alephzero-mainnet-nitro-pruned-pebble-path: alephzero-mainnet-nitro-pruned-pebble-path:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)}
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
alephzero-sepolia-nitro-archive-pebble-hash: alephzero-sepolia-nitro-archive-pebble-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))} - ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)} - ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)}
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
alephzero-sepolia-nitro-pruned-pebble-path: alephzero-sepolia-nitro-pruned-pebble-path:

View File

@@ -57,7 +57,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)}
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-nova-nitro-archive-leveldb-hash: arbitrum-nova-nitro-archive-leveldb-hash:

View File

@@ -57,7 +57,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)}
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-nova-nitro-pruned-pebble-hash: arbitrum-nova-nitro-pruned-pebble-hash:

View File

@@ -57,7 +57,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)}
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-one-nitro-archive-leveldb-hash: arbitrum-one-nitro-archive-leveldb-hash:

View File

@@ -57,7 +57,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)}
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-one-nitro-pruned-pebble-hash: arbitrum-one-nitro-pruned-pebble-hash:

View File

@@ -57,7 +57,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)}
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-sepolia-nitro-archive-pebble-hash: arbitrum-sepolia-nitro-archive-pebble-hash:

View File

@@ -56,7 +56,7 @@ services:
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`))} - ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`)} - ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`)}
- traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.middlewares=arbitrum-sepolia-nitro-pruned-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.middlewares=arbitrum-sepolia-nitro-pruned-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
arbitrum-sepolia-nitro-pruned-pebble-hash: arbitrum-sepolia-nitro-pruned-pebble-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)}
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
connext-sepolia-nitro-archive-leveldb-hash: connext-sepolia-nitro-archive-leveldb-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))} - ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)} - ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)}
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
connext-sepolia-nitro-pruned-pebble-path: connext-sepolia-nitro-pruned-pebble-path:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)}
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
everclear-mainnet-nitro-archive-leveldb-hash: everclear-mainnet-nitro-archive-leveldb-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))} - ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)} - ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)}
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
everclear-mainnet-nitro-pruned-pebble-path: everclear-mainnet-nitro-pruned-pebble-path:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)}
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
opencampuscodex-sepolia-nitro-archive-leveldb-hash: opencampuscodex-sepolia-nitro-archive-leveldb-hash:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))} - ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)} - ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)}
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
opencampuscodex-sepolia-nitro-pruned-pebble-path: opencampuscodex-sepolia-nitro-pruned-pebble-path:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)}
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
playblock-mainnet-nitro-archive-leveldb-hash: playblock-mainnet-nitro-archive-leveldb-hash:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))} - ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)} - ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)}
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
playblock-mainnet-nitro-pruned-pebble-path: playblock-mainnet-nitro-pruned-pebble-path:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
real-mainnet-nitro-archive-leveldb-hash: real-mainnet-nitro-archive-leveldb-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist - traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipallowlist
volumes: volumes:
real-mainnet-nitro-archive-pebble-hash: real-mainnet-nitro-archive-pebble-hash:

View File

@@ -63,7 +63,7 @@ services:
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))} - ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)} - ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)}
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
real-mainnet-nitro-pruned-pebble-path: real-mainnet-nitro-pruned-pebble-path:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10350:10350 - 10046:10046
- 10350:10350/udp - 10046:10046/udp
expose: expose:
- 9650 - 9650
- 9650 - 9650
@@ -31,7 +31,7 @@ services:
- --http-host= - --http-host=
- --network-id=fuji - --network-id=fuji
- --public-ip=${IP} - --public-ip=${IP}
- --staking-port=10350 - --staking-port=10046
restart: unless-stopped restart: unless-stopped
stop_grace_period: 5m stop_grace_period: 5m
networks: networks:
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))}
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)} - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)}
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist - traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipallowlist
volumes: volumes:
avalanche-fuji-go-archive-leveldb: avalanche-fuji-go-archive-leveldb:

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))} - ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))}
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)} - ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)}
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist - traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipallowlist
volumes: volumes:
avalanche-fuji-go-pruned-pebbledb: avalanche-fuji-go-pruned-pebbledb:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 11929:11929 - 12934:12934
- 11929:11929/udp - 12934:12934/udp
expose: expose:
- 9650 - 9650
- 9650 - 9650
@@ -31,7 +31,7 @@ services:
- --http-host= - --http-host=
- --network-id=mainnet - --network-id=mainnet
- --public-ip=${IP} - --public-ip=${IP}
- --staking-port=11929 - --staking-port=12934
restart: unless-stopped restart: unless-stopped
stop_grace_period: 5m stop_grace_period: 5m
networks: networks:
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)}
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist - traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipallowlist
volumes: volumes:
avalanche-mainnet-go-archive-leveldb: avalanche-mainnet-go-archive-leveldb:

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))} - ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)} - ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)}
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist - traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipallowlist
volumes: volumes:
avalanche-mainnet-go-pruned-pebbledb: avalanche-mainnet-go-pruned-pebbledb:

View File

@@ -69,7 +69,7 @@ services:
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))} - ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))}
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)} - ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)}
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipallowlist
berachain-bartio-archive-node: berachain-bartio-archive-node:
build: build:

View File

@@ -69,7 +69,7 @@ services:
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)}
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipallowlist
berachain-bepolia-archive-node: berachain-bepolia-archive-node:
build: build:

View File

@@ -25,13 +25,13 @@ services:
- 8545 - 8545
- 8551 - 8551
environment: environment:
- BOOTNODES=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303,enode://b6a3137d3a36ef37c4d31843775a9dc293f41bcbde33b6309c80b1771b6634827cd188285136a57474427bd8845adc2f6fe2e0b106bd58d14795b08910b9c326@34.64.247.85:30303,enode://0b6633300614bc2b9749aee0cace7a091ec5348762aee7b1d195f7616d03a9409019d9bef336624bab72e0d069cd4cf0b0de6fbbf53f04f6b6e4c5b39c6bdca6@34.22.73.21:30303,enode://552b001abebb5805fcd734ad367cd05d9078d18f23ec598d7165460fadcfc51116ad95c418f7ea9a141aa8cbc496c8bea3322b67a5de0d3380f11aab1a797513@34.64.37.55:30303,enode://5b037f66099d5ded86eb7e1619f6d06ceb15609e8cc345ced22a4772b06178004e1490a3cd32fd1222789de4c6e4021c2d648a3d750f6d5323e64b771bbd8de7@35.247.182.34:30303,enode://846db253c53753d3ea1197aec296306dc84c25f3afdf142b65cb0fe0f984de55072daa3bbf05a9aea046a38a2292403137b6eafefd5646fcf62120b74e3b898d@34.87.9.231:30303,enode://64b7f6ee9bcd942ad4949c70f2077627f078a057dfd930e6e904e12643d8952f5ae87c91e24559765393f244a72c9d5c011d7d5176e59191d38f315db85a20f5@34.126.78.49:30303,enode://cf4d19bfb8ec507427ec882bac0bac85a0c8c9ddaa0ec91b773bb614e5e09d107cd9fbe323b96f62f31c493f8f42cc5495c18b87c08560c5dea1dfd25256dcf6@35.240.200.36:30303,enode://bb7e44178543431feac8f0ee3827056b7b84d8235b802a8bdbbcd4939dab7f7dd2579ff577a38b002bb0139792af67abd2dd5c9f4f85b8da6e914fa76dca82bc@34.40.14.50:30303,enode://8fef1f5df45e7b31be00a21e1da5665d5a5f5bf4c379086b843f03eade941bdd157f08c95b31880c492577edb9a9b185df7191eaebf54ab06d5bd683b289f3af@35.246.168.217:30303,enode://ce9c87cfe089f6811d26c96913fa3ec10b938d9017fc6246684c74a33679ee34ceca9447180fb509e37bf2b706c2877a82085d34bfd83b5b520ee1288b0fc32f@34.40.28.159:30303,enode://713657eb6a53feadcbc47e634ad557326a51eb6818a3e19a00a8111492f50a666ccbf2f5d334d247ecf941e68d242ef5c3b812b63c44d381ef11f79c2cdb45c7@35.234.82.236:30303,enode://d071fa740e063ce1bb9cdc2b7937baeff6dc4000f91588d730a731c38a6ff0d4015814812c160fab8695e46f74b9b618735368ea2f16db4d785f16d29b3fb7b0@35.203.86.197:30303,enode://ffc452fe451a2e5f89fe634744aea334d92dcd30d881b76209d2db7dbf4b7ee047e7c69a5bb1633764d987a7441d9c4bc57ccdbfd6442a2f860bf953bc89a9b9@34.118.187.161:30303,enode://da94328302a1d1422209d1916744e90b6095a48b2340dcec39b22002c098bb4d58a880dab98eb26edf03fa4705d1b62f99a8c5c14e6666e4726b6d3066d8a4d7@34.95.30.190:30303,enode://19c7671a4844699b481e81a5bcfe7bafc7fefa953c16ebbe1951b1046371e73839e9058de6b7d3c934318fe7e7233dde3621c1c1018eb8b294ea3d4516147150@34.47.60.196:30303 - BOOTNODES=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303
- CHAINID=80094 - CHAINID=80094
- CHAINNAME=mainnet - CHAINNAME=mainnet
- CHAIN_SPEC=mainnet - CHAIN_SPEC=mainnet
entrypoint: [/bin/bash, -c, "trap 'exit 0' SIGTERM; while [ ! -f /config/eth-genesis.json ] && [ ! -f /tmp/stop ]; do sleep 1 & wait $!; done; exec reth node \"$@\"", --] entrypoint: [/bin/bash, -c, "trap 'exit 0' SIGTERM; while [ ! -f /config/eth-genesis.json ] && [ ! -f /tmp/stop ]; do sleep 1 & wait $!; done; exec reth node \"$@\"", --]
command: command:
- --bootnodes=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303,enode://b6a3137d3a36ef37c4d31843775a9dc293f41bcbde33b6309c80b1771b6634827cd188285136a57474427bd8845adc2f6fe2e0b106bd58d14795b08910b9c326@34.64.247.85:30303,enode://0b6633300614bc2b9749aee0cace7a091ec5348762aee7b1d195f7616d03a9409019d9bef336624bab72e0d069cd4cf0b0de6fbbf53f04f6b6e4c5b39c6bdca6@34.22.73.21:30303,enode://552b001abebb5805fcd734ad367cd05d9078d18f23ec598d7165460fadcfc51116ad95c418f7ea9a141aa8cbc496c8bea3322b67a5de0d3380f11aab1a797513@34.64.37.55:30303,enode://5b037f66099d5ded86eb7e1619f6d06ceb15609e8cc345ced22a4772b06178004e1490a3cd32fd1222789de4c6e4021c2d648a3d750f6d5323e64b771bbd8de7@35.247.182.34:30303,enode://846db253c53753d3ea1197aec296306dc84c25f3afdf142b65cb0fe0f984de55072daa3bbf05a9aea046a38a2292403137b6eafefd5646fcf62120b74e3b898d@34.87.9.231:30303,enode://64b7f6ee9bcd942ad4949c70f2077627f078a057dfd930e6e904e12643d8952f5ae87c91e24559765393f244a72c9d5c011d7d5176e59191d38f315db85a20f5@34.126.78.49:30303,enode://cf4d19bfb8ec507427ec882bac0bac85a0c8c9ddaa0ec91b773bb614e5e09d107cd9fbe323b96f62f31c493f8f42cc5495c18b87c08560c5dea1dfd25256dcf6@35.240.200.36:30303,enode://bb7e44178543431feac8f0ee3827056b7b84d8235b802a8bdbbcd4939dab7f7dd2579ff577a38b002bb0139792af67abd2dd5c9f4f85b8da6e914fa76dca82bc@34.40.14.50:30303,enode://8fef1f5df45e7b31be00a21e1da5665d5a5f5bf4c379086b843f03eade941bdd157f08c95b31880c492577edb9a9b185df7191eaebf54ab06d5bd683b289f3af@35.246.168.217:30303,enode://ce9c87cfe089f6811d26c96913fa3ec10b938d9017fc6246684c74a33679ee34ceca9447180fb509e37bf2b706c2877a82085d34bfd83b5b520ee1288b0fc32f@34.40.28.159:30303,enode://713657eb6a53feadcbc47e634ad557326a51eb6818a3e19a00a8111492f50a666ccbf2f5d334d247ecf941e68d242ef5c3b812b63c44d381ef11f79c2cdb45c7@35.234.82.236:30303,enode://d071fa740e063ce1bb9cdc2b7937baeff6dc4000f91588d730a731c38a6ff0d4015814812c160fab8695e46f74b9b618735368ea2f16db4d785f16d29b3fb7b0@35.203.86.197:30303,enode://ffc452fe451a2e5f89fe634744aea334d92dcd30d881b76209d2db7dbf4b7ee047e7c69a5bb1633764d987a7441d9c4bc57ccdbfd6442a2f860bf953bc89a9b9@34.118.187.161:30303,enode://da94328302a1d1422209d1916744e90b6095a48b2340dcec39b22002c098bb4d58a880dab98eb26edf03fa4705d1b62f99a8c5c14e6666e4726b6d3066d8a4d7@34.95.30.190:30303,enode://19c7671a4844699b481e81a5bcfe7bafc7fefa953c16ebbe1951b1046371e73839e9058de6b7d3c934318fe7e7233dde3621c1c1018eb8b294ea3d4516147150@34.47.60.196:30303 - --bootnodes=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303
- --chain=/config/eth-genesis.json - --chain=/config/eth-genesis.json
- --datadir=/root/.local/share/reth - --datadir=/root/.local/share/reth
- --max-inbound-peers=50 - --max-inbound-peers=50
@@ -69,7 +69,7 @@ services:
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)}
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipallowlist
berachain-mainnet-archive-node: berachain-mainnet-archive-node:
build: build:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))} - ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)} - ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
bsc-chapel-bsc-pruned-pebble-path: bsc-chapel-bsc-pruned-pebble-path:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)} - ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
bsc-mainnet-bsc-pruned-pebble-path: bsc-mainnet-bsc-pruned-pebble-path:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`))} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`))}
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`)} - ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`)}
- traefik.http.routers.bsc-chapel-erigon3-archive-trace.middlewares=bsc-chapel-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-chapel-erigon3-archive-trace.middlewares=bsc-chapel-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-chapel-erigon3-archive-trace: bsc-chapel-erigon3-archive-trace:

View File

@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12810:12810 - 11017:11017
- 12810:12810/udp - 11017:11017/udp
- 32810:32810 - 31017:31017
- 32810:32810/udp - 31017:31017/udp
- 37810:37810 - 36017:36017
- 37810:37810/udp - 36017:36017/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -38,9 +38,9 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=32810 - --p2p.allowed-ports=31017
- --p2p.allowed-ports=37810 - --p2p.allowed-ports=36017
- --port=12810 - --port=11017
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`))} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`))}
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`)} - ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`)}
- traefik.http.routers.bsc-chapel-erigon3-minimal-trace.middlewares=bsc-chapel-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-chapel-erigon3-minimal-trace.middlewares=bsc-chapel-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-chapel-erigon3-minimal-trace: bsc-chapel-erigon3-minimal-trace:

View File

@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12810:12810 - 10589:10589
- 12810:12810/udp - 10589:10589/udp
- 32810:32810 - 30589:30589
- 32810:32810/udp - 30589:30589/udp
- 37810:37810 - 35589:35589
- 37810:37810/udp - 35589:35589/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -38,9 +38,9 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=32810 - --p2p.allowed-ports=30589
- --p2p.allowed-ports=37810 - --p2p.allowed-ports=35589
- --port=12810 - --port=10589
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))} - ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)} - ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
- traefik.http.routers.bsc-chapel-erigon3-pruned-trace.middlewares=bsc-chapel-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-chapel-erigon3-pruned-trace.middlewares=bsc-chapel-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-chapel-erigon3-pruned-trace: bsc-chapel-erigon3-pruned-trace:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`)}
- traefik.http.routers.bsc-mainnet-erigon3-archive-trace.middlewares=bsc-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-mainnet-erigon3-archive-trace.middlewares=bsc-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-mainnet-erigon3-archive-trace: bsc-mainnet-erigon3-archive-trace:

View File

@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11327:11327 - 10987:10987
- 11327:11327/udp - 10987:10987/udp
- 31327:31327 - 30987:30987
- 31327:31327/udp - 30987:30987/udp
- 36327:36327 - 35987:35987
- 36327:36327/udp - 35987:35987/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -38,9 +38,9 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31327 - --p2p.allowed-ports=30987
- --p2p.allowed-ports=36327 - --p2p.allowed-ports=35987
- --port=11327 - --port=10987
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`))} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`))}
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`)} - ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`)}
- traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.middlewares=bsc-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.middlewares=bsc-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-mainnet-erigon3-minimal-trace: bsc-mainnet-erigon3-minimal-trace:

View File

@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11327:11327 - 10265:10265
- 11327:11327/udp - 10265:10265/udp
- 31327:31327 - 30265:30265
- 31327:31327/udp - 30265:30265/udp
- 36327:36327 - 35265:35265
- 36327:36327/udp - 35265:35265/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -38,9 +38,9 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31327 - --p2p.allowed-ports=30265
- --p2p.allowed-ports=36327 - --p2p.allowed-ports=35265
- --port=11327 - --port=10265
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))} - ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)} - ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
- traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.middlewares=bsc-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.middlewares=bsc-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
bsc-mainnet-erigon3-pruned-trace: bsc-mainnet-erigon3-pruned-trace:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 13307:13307 - 12386:12386
- 13307:13307/udp - 12386:12386/udp
expose: expose:
- 8545 - 8545
command: command:
@@ -32,7 +32,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=13307 - --port=12386
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --ws - --ws
@@ -55,7 +55,7 @@ services:
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))} - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))}
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)} - ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)}
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
celo-alfajores-geth-archive-leveldb-hash: celo-alfajores-geth-archive-leveldb-hash:

View File

@@ -55,7 +55,7 @@ services:
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))} - ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))}
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)} - ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)}
- traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.middlewares=celo-alfajores-geth-pruned-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.middlewares=celo-alfajores-geth-pruned-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
celo-alfajores-geth-pruned-leveldb-hash: celo-alfajores-geth-pruned-leveldb-hash:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 11882:11882 - 10164:10164
- 11882:11882/udp - 10164:10164/udp
expose: expose:
- 8545 - 8545
command: command:
@@ -32,7 +32,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=11882 - --port=10164
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --ws - --ws
@@ -55,7 +55,7 @@ services:
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)}
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
celo-mainnet-geth-archive-leveldb-hash: celo-mainnet-geth-archive-leveldb-hash:

View File

@@ -55,7 +55,7 @@ services:
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))} - ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)} - ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)}
- traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.middlewares=celo-mainnet-geth-pruned-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.middlewares=celo-mainnet-geth-pruned-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
celo-mainnet-geth-pruned-leveldb-hash: celo-mainnet-geth-pruned-leveldb-hash:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))} - ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))}
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)} - ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)}
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
core-buffalo-core-pruned-pebble-path: core-buffalo-core-pruned-pebble-path:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 11169:11169 - 14234:14234
- 11169:11169/udp - 14234:14234/udp
expose: expose:
- 8545 - 8545
entrypoint: [geth] entrypoint: [geth]
@@ -36,7 +36,7 @@ services:
- --mainnet - --mainnet
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=11169 - --port=14234
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --state.scheme=hash - --state.scheme=hash
@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)}
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
core-mainnet-core-archive-leveldb-hash: core-mainnet-core-archive-leveldb-hash:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))} - ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)} - ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)}
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipallowlist
volumes: volumes:
core-mainnet-core-pruned-leveldb-hash: core-mainnet-core-pruned-leveldb-hash:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))} - ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))}
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)} - ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)}
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipallowlist
volumes: volumes:
core-pigeon-core-pruned-pebble-path: core-pigeon-core-pruned-pebble-path:

View File

@@ -21,8 +21,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 14270:14270 - 14142:14142
- 14270:14270/udp - 14142:14142/udp
expose: expose:
- 8545 - 8545
- 8546 - 8546
@@ -80,7 +80,7 @@ services:
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist - traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipallowlist
cronos-zkevm-mainnet-archive-db: cronos-zkevm-mainnet-archive-db:
image: postgres:14 image: postgres:14

View File

@@ -80,7 +80,7 @@ services:
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)} - ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)}
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist - traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipallowlist
cronos-zkevm-mainnet-db: cronos-zkevm-mainnet-db:
image: postgres:14 image: postgres:14

View File

@@ -21,8 +21,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10397:10397 - 11917:11917
- 10397:10397/udp - 11917:11917/udp
expose: expose:
- 8545 - 8545
- 8546 - 8546
@@ -80,7 +80,7 @@ services:
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)} - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist - traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipallowlist
cronos-zkevm-testnet-archive-db: cronos-zkevm-testnet-archive-db:
image: postgres:14 image: postgres:14

View File

@@ -80,7 +80,7 @@ services:
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))} - ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))}
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)} - ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)}
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist - traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipallowlist
cronos-zkevm-testnet-db: cronos-zkevm-testnet-db:
image: postgres:14 image: postgres:14

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-holesky-archive: ethereum-holesky-archive:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace - traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node - traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
- traefik.http.services.ethereum-holesky-erigon3-archive-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-holesky-erigon3-archive-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-holesky-erigon3-archive-trace: ethereum-holesky-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-holesky-minimal: ethereum-holesky-minimal:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 13947:13947 - 12582:12582
- 13947:13947/udp - 12582:12582/udp
- 18947:18947 - 17582:17582
- 18947:18947/udp - 17582:17582/udp
- 28947:28947 - 27582:27582
- 28947:28947/udp - 27582:27582/udp
- 33947:33947 - 32582:32582
- 33947:33947/udp - 32582:32582/udp
- 38947:38947 - 37582:37582
- 38947:38947/udp - 37582:37582/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=18947 - --caplin.discovery.port=17582
- --caplin.discovery.tcpport=18947 - --caplin.discovery.tcpport=17582
- --chain=holesky - --chain=holesky
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=33947 - --p2p.allowed-ports=32582
- --p2p.allowed-ports=38947 - --p2p.allowed-ports=37582
- --port=13947 - --port=12582
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=28947 - --torrent.port=27582
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)}
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-holesky-erigon3-minimal-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)}
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-holesky-erigon3-minimal-trace: ethereum-holesky-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-holesky: ethereum-holesky:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 13947:13947 - 11685:11685
- 13947:13947/udp - 11685:11685/udp
- 18947:18947 - 16685:16685
- 18947:18947/udp - 16685:16685/udp
- 28947:28947 - 26685:26685
- 28947:28947/udp - 26685:26685/udp
- 33947:33947 - 31685:31685
- 33947:33947/udp - 31685:31685/udp
- 38947:38947 - 36685:36685
- 38947:38947/udp - 36685:36685/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=18947 - --caplin.discovery.port=16685
- --caplin.discovery.tcpport=18947 - --caplin.discovery.tcpport=16685
- --chain=holesky - --chain=holesky
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=33947 - --p2p.allowed-ports=31685
- --p2p.allowed-ports=38947 - --p2p.allowed-ports=36685
- --port=13947 - --port=11685
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=28947 - --torrent.port=26685
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-holesky-erigon3-pruned-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-holesky-erigon3-pruned-trace: ethereum-holesky-erigon3-pruned-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-mainnet-archive: ethereum-mainnet-archive:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-mainnet-erigon3-archive-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-mainnet-erigon3-archive-trace: ethereum-mainnet-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-mainnet-minimal: ethereum-mainnet-minimal:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11675:11675 - 14614:14614
- 11675:11675/udp - 14614:14614/udp
- 16675:16675 - 19614:19614
- 16675:16675/udp - 19614:19614/udp
- 26675:26675 - 29614:29614
- 26675:26675/udp - 29614:29614/udp
- 31675:31675 - 34614:34614
- 31675:31675/udp - 34614:34614/udp
- 36675:36675 - 39614:39614
- 36675:36675/udp - 39614:39614/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=16675 - --caplin.discovery.port=19614
- --caplin.discovery.tcpport=16675 - --caplin.discovery.tcpport=19614
- --chain=mainnet - --chain=mainnet
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31675 - --p2p.allowed-ports=34614
- --p2p.allowed-ports=36675 - --p2p.allowed-ports=39614
- --port=11675 - --port=14614
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=26675 - --torrent.port=29614
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)}
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-mainnet-erigon3-minimal-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)}
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-mainnet-erigon3-minimal-trace: ethereum-mainnet-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-mainnet: ethereum-mainnet:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11675:11675 - 14616:14616
- 11675:11675/udp - 14616:14616/udp
- 16675:16675 - 19616:19616
- 16675:16675/udp - 19616:19616/udp
- 26675:26675 - 29616:29616
- 26675:26675/udp - 29616:29616/udp
- 31675:31675 - 34616:34616
- 31675:31675/udp - 34616:34616/udp
- 36675:36675 - 39616:39616
- 36675:36675/udp - 39616:39616/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=16675 - --caplin.discovery.port=19616
- --caplin.discovery.tcpport=16675 - --caplin.discovery.tcpport=19616
- --chain=mainnet - --chain=mainnet
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31675 - --p2p.allowed-ports=34616
- --p2p.allowed-ports=36675 - --p2p.allowed-ports=39616
- --port=11675 - --port=14616
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=26675 - --torrent.port=29616
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-mainnet-erigon3-pruned-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-mainnet-erigon3-pruned-trace: ethereum-mainnet-erigon3-pruned-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-sepolia-archive: ethereum-sepolia-archive:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-sepolia-erigon3-archive-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-sepolia-erigon3-archive-trace: ethereum-sepolia-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-sepolia-minimal: ethereum-sepolia-minimal:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 13317:13317 - 11087:11087
- 13317:13317/udp - 11087:11087/udp
- 18317:18317 - 16087:16087
- 18317:18317/udp - 16087:16087/udp
- 28317:28317 - 26087:26087
- 28317:28317/udp - 26087:26087/udp
- 33317:33317 - 31087:31087
- 33317:33317/udp - 31087:31087/udp
- 38317:38317 - 36087:36087
- 38317:38317/udp - 36087:36087/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=18317 - --caplin.discovery.port=16087
- --caplin.discovery.tcpport=18317 - --caplin.discovery.tcpport=16087
- --chain=sepolia - --chain=sepolia
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=33317 - --p2p.allowed-ports=31087
- --p2p.allowed-ports=38317 - --p2p.allowed-ports=36087
- --port=13317 - --port=11087
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=28317 - --torrent.port=26087
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)}
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-sepolia-erigon3-minimal-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)}
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-sepolia-erigon3-minimal-trace: ethereum-sepolia-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
ethereum-sepolia: ethereum-sepolia:
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 13317:13317 - 11930:11930
- 13317:13317/udp - 11930:11930/udp
- 18317:18317 - 16930:16930
- 18317:18317/udp - 16930:16930/udp
- 28317:28317 - 26930:26930
- 28317:28317/udp - 26930:26930/udp
- 33317:33317 - 31930:31930
- 33317:33317/udp - 31930:31930/udp
- 38317:38317 - 36930:36930
- 38317:38317/udp - 36930:36930/udp
expose: expose:
- 8545 - 8545
- 5555 - 5555
@@ -39,8 +39,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=18317 - --caplin.discovery.port=16930
- --caplin.discovery.tcpport=18317 - --caplin.discovery.tcpport=16930
- --chain=sepolia - --chain=sepolia
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -50,13 +50,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=33317 - --p2p.allowed-ports=31930
- --p2p.allowed-ports=38317 - --p2p.allowed-ports=36930
- --port=13317 - --port=11930
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=28317 - --torrent.port=26930
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -74,7 +74,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace-node.loadbalancer.server.port=5555 - traefik.http.services.ethereum-sepolia-erigon3-pruned-trace-node.loadbalancer.server.port=5555
@@ -82,7 +82,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
ethereum-sepolia-erigon3-pruned-trace: ethereum-sepolia-erigon3-pruned-trace:

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipallowlist
ethereum-holesky-node: ethereum-holesky-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
@@ -99,7 +99,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-holesky/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.middlewares=ethereum-holesky-geth-pruned-pebble-path-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.middlewares=ethereum-holesky-geth-pruned-pebble-path-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-holesky-geth-pruned-pebble-path: ethereum-holesky-geth-pruned-pebble-path:

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipallowlist
ethereum-mainnet-node: ethereum-mainnet-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
@@ -99,7 +99,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-mainnet/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.middlewares=ethereum-mainnet-geth-pruned-pebble-path-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.middlewares=ethereum-mainnet-geth-pruned-pebble-path-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-mainnet-geth-pruned-pebble-path: ethereum-mainnet-geth-pruned-pebble-path:

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipallowlist
ethereum-sepolia-node: ethereum-sepolia-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
@@ -99,7 +99,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-sepolia/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.middlewares=ethereum-sepolia-geth-pruned-pebble-path-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.middlewares=ethereum-sepolia-geth-pruned-pebble-path-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-sepolia-geth-pruned-pebble-path: ethereum-sepolia-geth-pruned-pebble-path:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipallowlist
ethereum-holesky-archive-node: ethereum-holesky-archive-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
@@ -97,7 +97,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
- traefik.http.routers.ethereum-holesky-reth-archive-trace-node.middlewares=ethereum-holesky-reth-archive-trace-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-holesky-reth-archive-trace-node.middlewares=ethereum-holesky-reth-archive-trace-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-holesky-reth-archive-trace: ethereum-holesky-reth-archive-trace:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipallowlist
ethereum-mainnet-archive-node: ethereum-mainnet-archive-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
@@ -97,7 +97,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
- traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.middlewares=ethereum-mainnet-reth-archive-trace-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.middlewares=ethereum-mainnet-reth-archive-trace-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-mainnet-reth-archive-trace: ethereum-mainnet-reth-archive-trace:

View File

@@ -62,7 +62,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipallowlist
ethereum-sepolia-archive-node: ethereum-sepolia-archive-node:
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1} image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
@@ -97,7 +97,7 @@ services:
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)} - ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)} - ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
- traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.middlewares=ethereum-sepolia-reth-archive-trace-node-stripprefix, ipwhitelist - traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.middlewares=ethereum-sepolia-reth-archive-trace-node-stripprefix, ipallowlist
volumes: volumes:
ethereum-sepolia-reth-archive-trace: ethereum-sepolia-reth-archive-trace:

View File

@@ -67,7 +67,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipallowlist
volumes: volumes:
fantom-mainnet-opera-archive-trace: fantom-mainnet-opera-archive-trace:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 14897:14897 - 14723:14723
- 14897:14897/udp - 14723:14723/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=14897 - --port=14723
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=full - --syncmode=full
@@ -66,7 +66,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist - traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipallowlist
volumes: volumes:
fantom-mainnet-opera-archive: fantom-mainnet-opera-archive:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 14897:14897 - 10916:10916
- 14897:14897/udp - 10916:10916/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=14897 - --port=10916
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=snap - --syncmode=snap
@@ -67,7 +67,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
fantom-mainnet-opera-pruned-trace: fantom-mainnet-opera-pruned-trace:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 14897:14897 - 10439:10439
- 14897:14897/udp - 10439:10439/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=14897 - --port=10439
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=snap - --syncmode=snap
@@ -66,7 +66,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist - traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipallowlist
volumes: volumes:
fantom-mainnet-opera-pruned: fantom-mainnet-opera-pruned:

View File

@@ -67,7 +67,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipallowlist
volumes: volumes:
fantom-testnet-opera-archive-trace: fantom-testnet-opera-archive-trace:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10196:10196 - 11055:11055
- 10196:10196/udp - 11055:11055/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=10196 - --port=11055
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=full - --syncmode=full
@@ -66,7 +66,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist - traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipallowlist
volumes: volumes:
fantom-testnet-opera-archive: fantom-testnet-opera-archive:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10196:10196 - 14037:14037
- 10196:10196/udp - 14037:14037/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=10196 - --port=14037
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=snap - --syncmode=snap
@@ -67,7 +67,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
fantom-testnet-opera-pruned-trace: fantom-testnet-opera-pruned-trace:

View File

@@ -23,8 +23,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10196:10196 - 10846:10846
- 10196:10196/udp - 10846:10846/udp
expose: expose:
- 8545 - 8545
environment: environment:
@@ -42,7 +42,7 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=10196 - --port=10846
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --syncmode=snap - --syncmode=snap
@@ -66,7 +66,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))} - ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist - traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipallowlist
volumes: volumes:
fantom-testnet-opera-pruned: fantom-testnet-opera-pruned:

View File

@@ -65,7 +65,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist - traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipallowlist
volumes: volumes:
fantom-mainnet-sonic-archive: fantom-mainnet-sonic-archive:

View File

@@ -65,7 +65,7 @@ services:
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))} - ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)} - ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist - traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipallowlist
volumes: volumes:
fantom-testnet-sonic-archive: fantom-testnet-sonic-archive:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-chiado-archive: gnosis-chiado-archive:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)}
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-chiado-erigon3-archive-trace: gnosis-chiado-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-chiado-minimal: gnosis-chiado-minimal:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11986:11986 - 11010:11010
- 11986:11986/udp - 11010:11010/udp
- 16986:16986 - 16010:16010
- 16986:16986/udp - 16010:16010/udp
- 26986:26986 - 26010:26010
- 26986:26986/udp - 26010:26010/udp
- 31986:31986 - 31010:31010
- 31986:31986/udp - 31010:31010/udp
- 36986:36986 - 36010:36010
- 36986:36986/udp - 36010:36010/udp
expose: expose:
- 8545 - 8545
entrypoint: [erigon] entrypoint: [erigon]
@@ -38,8 +38,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=16986 - --caplin.discovery.port=16010
- --caplin.discovery.tcpport=16986 - --caplin.discovery.tcpport=16010
- --chain=chiado - --chain=chiado
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -49,13 +49,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31986 - --p2p.allowed-ports=31010
- --p2p.allowed-ports=36986 - --p2p.allowed-ports=36010
- --port=11986 - --port=11010
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=26986 - --torrent.port=26010
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)}
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-chiado-erigon3-minimal-trace: gnosis-chiado-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-chiado: gnosis-chiado:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 11986:11986 - 11886:11886
- 11986:11986/udp - 11886:11886/udp
- 16986:16986 - 16886:16886
- 16986:16986/udp - 16886:16886/udp
- 26986:26986 - 26886:26886
- 26986:26986/udp - 26886:26886/udp
- 31986:31986 - 31886:31886
- 31986:31986/udp - 31886:31886/udp
- 36986:36986 - 36886:36886
- 36986:36986/udp - 36886:36886/udp
expose: expose:
- 8545 - 8545
entrypoint: [erigon] entrypoint: [erigon]
@@ -38,8 +38,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=16986 - --caplin.discovery.port=16886
- --caplin.discovery.tcpport=16986 - --caplin.discovery.tcpport=16886
- --chain=chiado - --chain=chiado
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -49,13 +49,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=31986 - --p2p.allowed-ports=31886
- --p2p.allowed-ports=36986 - --p2p.allowed-ports=36886
- --port=11986 - --port=11886
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=26986 - --torrent.port=26886
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))} - ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)} - ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)}
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-chiado-erigon3-pruned-trace: gnosis-chiado-erigon3-pruned-trace:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-mainnet-archive: gnosis-mainnet-archive:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)}
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-mainnet-erigon3-archive-trace: gnosis-mainnet-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-mainnet-minimal: gnosis-mainnet-minimal:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12974:12974 - 13429:13429
- 12974:12974/udp - 13429:13429/udp
- 17974:17974 - 18429:18429
- 17974:17974/udp - 18429:18429/udp
- 27974:27974 - 28429:28429
- 27974:27974/udp - 28429:28429/udp
- 32974:32974 - 33429:33429
- 32974:32974/udp - 33429:33429/udp
- 37974:37974 - 38429:38429
- 37974:37974/udp - 38429:38429/udp
expose: expose:
- 8545 - 8545
entrypoint: [erigon] entrypoint: [erigon]
@@ -38,8 +38,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=17974 - --caplin.discovery.port=18429
- --caplin.discovery.tcpport=17974 - --caplin.discovery.tcpport=18429
- --chain=gnosis - --chain=gnosis
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -49,13 +49,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=32974 - --p2p.allowed-ports=33429
- --p2p.allowed-ports=37974 - --p2p.allowed-ports=38429
- --port=12974 - --port=13429
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=27974 - --torrent.port=28429
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)}
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-mainnet-erigon3-minimal-trace: gnosis-mainnet-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
gnosis-mainnet: gnosis-mainnet:
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,16 +19,16 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12974:12974 - 12147:12147
- 12974:12974/udp - 12147:12147/udp
- 17974:17974 - 17147:17147
- 17974:17974/udp - 17147:17147/udp
- 27974:27974 - 27147:27147
- 27974:27974/udp - 27147:27147/udp
- 32974:32974 - 32147:32147
- 32974:32974/udp - 32147:32147/udp
- 37974:37974 - 37147:37147
- 37974:37974/udp - 37147:37147/udp
expose: expose:
- 8545 - 8545
entrypoint: [erigon] entrypoint: [erigon]
@@ -38,8 +38,8 @@ services:
- --beacon.api.port=5555 - --beacon.api.port=5555
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config - --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
- --caplin.discovery.addr=0.0.0.0 - --caplin.discovery.addr=0.0.0.0
- --caplin.discovery.port=17974 - --caplin.discovery.port=17147
- --caplin.discovery.tcpport=17974 - --caplin.discovery.tcpport=17147
- --chain=gnosis - --chain=gnosis
- --datadir=/root/.local/share/erigon - --datadir=/root/.local/share/erigon
- --http - --http
@@ -49,13 +49,13 @@ services:
- --http.vhosts=* - --http.vhosts=*
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --p2p.allowed-ports=32974 - --p2p.allowed-ports=32147
- --p2p.allowed-ports=37974 - --p2p.allowed-ports=37147
- --port=12974 - --port=12147
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
- --torrent.port=27974 - --torrent.port=27147
- --ws - --ws
- --ws.port=8545 - --ws.port=8545
restart: unless-stopped restart: unless-stopped
@@ -73,7 +73,7 @@ services:
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))} - ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)} - ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)}
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
gnosis-mainnet-erigon3-pruned-trace: gnosis-mainnet-erigon3-pruned-trace:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 10640:10640 - 12891:12891
- 10640:10640/udp - 12891:12891/udp
expose: expose:
- 8545 - 8545
command: command:
@@ -29,7 +29,7 @@ services:
- --goat=mainnet - --goat=mainnet
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=10640 - --port=12891
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --state.scheme=hash - --state.scheme=hash
@@ -64,19 +64,19 @@ services:
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)}
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipallowlist
goat-mainnet-archive-node: goat-mainnet-archive-node:
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3} image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}
ports: ports:
- 15640:15640 - 17891:17891
- 15640:15640/udp - 17891:17891/udp
entrypoint: [goatd, start] entrypoint: [goatd, start]
command: command:
- --chain-id=goat-mainnet - --chain-id=goat-mainnet
- --goat.geth=/geth/geth.ipc - --goat.geth=/geth/geth.ipc
- --p2p.external-address=${IP}:15640 - --p2p.external-address=${IP}:17891
- --p2p.laddr=0.0.0.0:15640 - --p2p.laddr=0.0.0.0:17891
restart: unless-stopped restart: unless-stopped
networks: networks:
- chains - chains

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))} - ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)} - ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)}
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipallowlist
goat-mainnet-node: goat-mainnet-node:
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3} image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 13272:13272 - 14461:14461
- 13272:13272/udp - 14461:14461/udp
expose: expose:
- 8545 - 8545
command: command:
@@ -29,7 +29,7 @@ services:
- --goat=testnet3 - --goat=testnet3
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --port=13272 - --port=14461
- --rpc.gascap=600000000 - --rpc.gascap=600000000
- --rpc.txfeecap=0 - --rpc.txfeecap=0
- --state.scheme=hash - --state.scheme=hash
@@ -64,19 +64,19 @@ services:
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))}
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)} - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)}
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipallowlist
goat-testnet3-archive-node: goat-testnet3-archive-node:
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3} image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}
ports: ports:
- 18272:18272 - 19461:19461
- 18272:18272/udp - 19461:19461/udp
entrypoint: [goatd, start] entrypoint: [goatd, start]
command: command:
- --chain-id=goat-testnet3 - --chain-id=goat-testnet3
- --goat.geth=/geth/geth.ipc - --goat.geth=/geth/geth.ipc
- --p2p.external-address=${IP}:18272 - --p2p.external-address=${IP}:19461
- --p2p.laddr=0.0.0.0:18272 - --p2p.laddr=0.0.0.0:19461
restart: unless-stopped restart: unless-stopped
networks: networks:
- chains - chains

View File

@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))} - ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))}
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)} - ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)}
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist - traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipallowlist
goat-testnet3-node: goat-testnet3-node:
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3} image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}

View File

@@ -39,7 +39,7 @@ services:
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))} - ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)} - ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)}
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist - traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipallowlist
volumes: volumes:
haqq-mainnet-haqq-pruned: haqq-mainnet-haqq-pruned:

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 12044:12044 - 11169:11169
- 12044:12044/udp - 11169:11169/udp
expose: expose:
- 8545 - 8545
- 8546 - 8546
@@ -85,7 +85,7 @@ services:
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)}
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist - traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipallowlist
lens-mainnet-archive-db: lens-mainnet-archive-db:
image: postgres:14 image: postgres:14

View File

@@ -85,7 +85,7 @@ services:
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))} - ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)} - ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)}
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist - traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipallowlist
lens-mainnet-db: lens-mainnet-db:
image: postgres:14 image: postgres:14

View File

@@ -18,8 +18,8 @@ services:
nofile: 1048576 # Max open files (for RPC/WS connections) nofile: 1048576 # Max open files (for RPC/WS connections)
user: root user: root
ports: ports:
- 14432:14432 - 12553:12553
- 14432:14432/udp - 12553:12553/udp
expose: expose:
- 8545 - 8545
- 8546 - 8546
@@ -84,7 +84,7 @@ services:
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)} - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)}
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist - traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipallowlist
lens-testnet-archive-db: lens-testnet-archive-db:
image: postgres:14 image: postgres:14

View File

@@ -84,7 +84,7 @@ services:
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))} - ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))}
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)} - ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)}
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist - traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipallowlist
lens-testnet-db: lens-testnet-db:
image: postgres:14 image: postgres:14

View File

@@ -2,7 +2,7 @@
services: services:
linea-mainnet-archive: linea-mainnet-archive:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)}
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
linea-mainnet-erigon3-archive-trace: linea-mainnet-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
linea-mainnet-minimal: linea-mainnet-minimal:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 10060:10060 - 14000:14000
- 10060:10060/udp - 14000:14000/udp
- 30060:30060 - 34000:34000
- 30060:30060/udp - 34000:34000/udp
- 35060:35060 - 39000:39000
- 35060:35060/udp - 39000:39000/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -40,9 +40,9 @@ services:
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --networkid=59144 - --networkid=59144
- --p2p.allowed-ports=30060 - --p2p.allowed-ports=34000
- --p2p.allowed-ports=35060 - --p2p.allowed-ports=39000
- --port=10060 - --port=14000
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))}
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)}
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
linea-mainnet-erigon3-minimal-trace: linea-mainnet-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
linea-mainnet: linea-mainnet:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 10060:10060 - 12622:12622
- 10060:10060/udp - 12622:12622/udp
- 30060:30060 - 32622:32622
- 30060:30060/udp - 32622:32622/udp
- 35060:35060 - 37622:37622
- 35060:35060/udp - 37622:37622/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -40,9 +40,9 @@ services:
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --networkid=59144 - --networkid=59144
- --p2p.allowed-ports=30060 - --p2p.allowed-ports=32622
- --p2p.allowed-ports=35060 - --p2p.allowed-ports=37622
- --port=10060 - --port=12622
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))} - ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))}
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)} - ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)}
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
linea-mainnet-erigon3-pruned-trace: linea-mainnet-erigon3-pruned-trace:

View File

@@ -2,7 +2,7 @@
services: services:
linea-sepolia-archive: linea-sepolia-archive:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)}
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
volumes: volumes:
linea-sepolia-erigon3-archive-trace: linea-sepolia-erigon3-archive-trace:

View File

@@ -2,7 +2,7 @@
services: services:
linea-sepolia-minimal: linea-sepolia-minimal:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12235:12235 - 12410:12410
- 12235:12235/udp - 12410:12410/udp
- 32235:32235 - 32410:32410
- 32235:32235/udp - 32410:32410/udp
- 37235:37235 - 37410:37410
- 37235:37235/udp - 37410:37410/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -40,9 +40,9 @@ services:
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --networkid=59141 - --networkid=59141
- --p2p.allowed-ports=32235 - --p2p.allowed-ports=32410
- --p2p.allowed-ports=37235 - --p2p.allowed-ports=37410
- --port=12235 - --port=12410
- --prune.mode=minimal - --prune.mode=minimal
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))}
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)}
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
volumes: volumes:
linea-sepolia-erigon3-minimal-trace: linea-sepolia-erigon3-minimal-trace:

View File

@@ -2,7 +2,7 @@
services: services:
linea-sepolia: linea-sepolia:
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1} image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
sysctls: sysctls:
# TCP Performance # TCP Performance
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
@@ -19,12 +19,12 @@ services:
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX) memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
user: root user: root
ports: ports:
- 12235:12235 - 10620:10620
- 12235:12235/udp - 10620:10620/udp
- 32235:32235 - 30620:30620
- 32235:32235/udp - 30620:30620/udp
- 37235:37235 - 35620:35620
- 37235:37235/udp - 35620:35620/udp
expose: expose:
- 8545 - 8545
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' -- entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
@@ -40,9 +40,9 @@ services:
- --maxpeers=50 - --maxpeers=50
- --nat=extip:${IP} - --nat=extip:${IP}
- --networkid=59141 - --networkid=59141
- --p2p.allowed-ports=32235 - --p2p.allowed-ports=30620
- --p2p.allowed-ports=37235 - --p2p.allowed-ports=35620
- --port=12235 - --port=10620
- --prune.mode=full - --prune.mode=full
- --rpc.gascap=6000000000 - --rpc.gascap=6000000000
- --rpc.returndata.limit=1100000 - --rpc.returndata.limit=1100000
@@ -64,7 +64,7 @@ services:
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))} - ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))}
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)} - ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)}
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist - traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
volumes: volumes:
linea-sepolia-erigon3-pruned-trace: linea-sepolia-erigon3-pruned-trace:

View File

@@ -99,7 +99,7 @@ services:
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)}
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
metis-andromeda-mainnet-archive-node: metis-andromeda-mainnet-archive-node:
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_MAINNET_DTL_VERSION:-v0.1.3} image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_MAINNET_DTL_VERSION:-v0.1.3}

View File

@@ -99,7 +99,7 @@ services:
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`)}
- traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist - traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
metis-andromeda-sepolia-archive-node: metis-andromeda-sepolia-archive-node:
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_SEPOLIA_DTL_VERSION:-v0.1.3} image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_SEPOLIA_DTL_VERSION:-v0.1.3}

View File

@@ -66,10 +66,10 @@ services:
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)}
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
base-mainnet-archive-node: base-mainnet-archive-node:
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1} image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.2}
ports: ports:
- 18092:18092 - 18092:18092
- 18092:18092/udp - 18092:18092/udp

View File

@@ -66,10 +66,10 @@ services:
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))} - ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))}
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)} - ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)}
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipallowlist
base-sepolia-archive-node: base-sepolia-archive-node:
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1} image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.2}
ports: ports:
- 18487:18487 - 18487:18487
- 18487:18487/udp - 18487:18487/udp

View File

@@ -67,10 +67,10 @@ services:
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)}
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
bob-mainnet-archive-node: bob-mainnet-archive-node:
image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1} image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.2}
ports: ports:
- 16071:16071 - 16071:16071
- 16071:16071/udp - 16071:16071/udp

View File

@@ -67,7 +67,7 @@ services:
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver} - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))} - ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))}
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)} - ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)}
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist - traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
boba-mainnet-archive-node: boba-mainnet-archive-node:
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18} image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18}

Some files were not shown because too many files have changed in this diff Show More