hopefully nothing breaks
This commit is contained in:
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.rule=Path(`/alephzero-mainnet-archive`) || Path(`/alephzero-mainnet-archive/`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-archive-pebble-hash.middlewares=alephzero-mainnet-nitro-archive-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-mainnet-nitro-archive-pebble-hash:
|
alephzero-mainnet-nitro-archive-pebble-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.rule=Path(`/alephzero-mainnet`) || Path(`/alephzero-mainnet/`)}
|
||||||
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-mainnet-nitro-pruned-pebble-path.middlewares=alephzero-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-mainnet-nitro-pruned-pebble-path:
|
alephzero-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.rule=Path(`/alephzero-sepolia-archive`) || Path(`/alephzero-sepolia-archive/`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-archive-pebble-hash.middlewares=alephzero-sepolia-nitro-archive-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-sepolia-nitro-archive-pebble-hash:
|
alephzero-sepolia-nitro-archive-pebble-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.rule=Path(`/alephzero-sepolia`) || Path(`/alephzero-sepolia/`)}
|
||||||
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.alephzero-sepolia-nitro-pruned-pebble-path.middlewares=alephzero-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
alephzero-sepolia-nitro-pruned-pebble-path:
|
alephzero-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -57,7 +57,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-nova-archive`) || Path(`/arbitrum-nova-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-archive-leveldb-hash.middlewares=arbitrum-nova-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-nova-nitro-archive-leveldb-hash:
|
arbitrum-nova-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -57,7 +57,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-nova`) || Path(`/arbitrum-nova/`)}
|
||||||
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-nova-nitro-pruned-pebble-hash.middlewares=arbitrum-nova-nitro-pruned-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-nova-nitro-pruned-pebble-hash:
|
arbitrum-nova-nitro-pruned-pebble-hash:
|
||||||
|
|||||||
@@ -57,7 +57,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.rule=Path(`/arbitrum-one-archive`) || Path(`/arbitrum-one-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-archive-leveldb-hash.middlewares=arbitrum-one-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-one-nitro-archive-leveldb-hash:
|
arbitrum-one-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -57,7 +57,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-one`) || Path(`/arbitrum-one/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-one`) || Path(`/arbitrum-one/`)}
|
||||||
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-one-nitro-pruned-pebble-hash.middlewares=arbitrum-one-nitro-pruned-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-one-nitro-pruned-pebble-hash:
|
arbitrum-one-nitro-pruned-pebble-hash:
|
||||||
|
|||||||
@@ -57,7 +57,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.rule=Path(`/arbitrum-sepolia-archive`) || Path(`/arbitrum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-sepolia-nitro-archive-pebble-hash.middlewares=arbitrum-sepolia-nitro-archive-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-sepolia-nitro-archive-pebble-hash:
|
arbitrum-sepolia-nitro-archive-pebble-hash:
|
||||||
|
|||||||
@@ -56,7 +56,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.rule=Path(`/arbitrum-sepolia`) || Path(`/arbitrum-sepolia/`)}
|
||||||
- traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.middlewares=arbitrum-sepolia-nitro-pruned-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.arbitrum-sepolia-nitro-pruned-pebble-hash.middlewares=arbitrum-sepolia-nitro-pruned-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
arbitrum-sepolia-nitro-pruned-pebble-hash:
|
arbitrum-sepolia-nitro-pruned-pebble-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.rule=Path(`/connext-sepolia-archive`) || Path(`/connext-sepolia-archive/`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-archive-leveldb-hash.middlewares=connext-sepolia-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
connext-sepolia-nitro-archive-leveldb-hash:
|
connext-sepolia-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/connext-sepolia`) || Path(`/connext-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.rule=Path(`/connext-sepolia`) || Path(`/connext-sepolia/`)}
|
||||||
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.connext-sepolia-nitro-pruned-pebble-path.middlewares=connext-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
connext-sepolia-nitro-pruned-pebble-path:
|
connext-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.rule=Path(`/everclear-mainnet-archive`) || Path(`/everclear-mainnet-archive/`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-archive-leveldb-hash.middlewares=everclear-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
everclear-mainnet-nitro-archive-leveldb-hash:
|
everclear-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.rule=Path(`/everclear-mainnet`) || Path(`/everclear-mainnet/`)}
|
||||||
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.everclear-mainnet-nitro-pruned-pebble-path.middlewares=everclear-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
everclear-mainnet-nitro-pruned-pebble-path:
|
everclear-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.rule=Path(`/opencampuscodex-sepolia-archive`) || Path(`/opencampuscodex-sepolia-archive/`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-archive-leveldb-hash.middlewares=opencampuscodex-sepolia-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
opencampuscodex-sepolia-nitro-archive-leveldb-hash:
|
opencampuscodex-sepolia-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.rule=Path(`/opencampuscodex-sepolia`) || Path(`/opencampuscodex-sepolia/`)}
|
||||||
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.opencampuscodex-sepolia-nitro-pruned-pebble-path.middlewares=opencampuscodex-sepolia-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
opencampuscodex-sepolia-nitro-pruned-pebble-path:
|
opencampuscodex-sepolia-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.rule=Path(`/playblock-mainnet-archive`) || Path(`/playblock-mainnet-archive/`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-archive-leveldb-hash.middlewares=playblock-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
playblock-mainnet-nitro-archive-leveldb-hash:
|
playblock-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.rule=Path(`/playblock-mainnet`) || Path(`/playblock-mainnet/`)}
|
||||||
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.playblock-mainnet-nitro-pruned-pebble-path.middlewares=playblock-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
playblock-mainnet-nitro-pruned-pebble-path:
|
playblock-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-leveldb-hash.middlewares=real-mainnet-nitro-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
real-mainnet-nitro-archive-leveldb-hash:
|
real-mainnet-nitro-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.rule=Path(`/real-mainnet-archive`) || Path(`/real-mainnet-archive/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-archive-pebble-hash.middlewares=real-mainnet-nitro-archive-pebble-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
real-mainnet-nitro-archive-pebble-hash:
|
real-mainnet-nitro-archive-pebble-hash:
|
||||||
|
|||||||
@@ -63,7 +63,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/real-mainnet`) || Path(`/real-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.rule=Path(`/real-mainnet`) || Path(`/real-mainnet/`)}
|
||||||
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.real-mainnet-nitro-pruned-pebble-path.middlewares=real-mainnet-nitro-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
real-mainnet-nitro-pruned-pebble-path:
|
real-mainnet-nitro-pruned-pebble-path:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10350:10350
|
- 10046:10046
|
||||||
- 10350:10350/udp
|
- 10046:10046/udp
|
||||||
expose:
|
expose:
|
||||||
- 9650
|
- 9650
|
||||||
- 9650
|
- 9650
|
||||||
@@ -31,7 +31,7 @@ services:
|
|||||||
- --http-host=
|
- --http-host=
|
||||||
- --network-id=fuji
|
- --network-id=fuji
|
||||||
- --public-ip=${IP}
|
- --public-ip=${IP}
|
||||||
- --staking-port=10350
|
- --staking-port=10046
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
stop_grace_period: 5m
|
stop_grace_period: 5m
|
||||||
networks:
|
networks:
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-archive-leveldb.rule=Path(`/avalanche-fuji-archive`) || Path(`/avalanche-fuji-archive/`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-archive-leveldb.middlewares=avalanche-fuji-go-archive-leveldb-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
avalanche-fuji-go-archive-leveldb:
|
avalanche-fuji-go-archive-leveldb:
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))}
|
- ${NO_SSL:-traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.rule=Path(`/avalanche-fuji`) || Path(`/avalanche-fuji/`)}
|
||||||
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-fuji-go-pruned-pebbledb.middlewares=avalanche-fuji-go-pruned-pebbledb-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
avalanche-fuji-go-pruned-pebbledb:
|
avalanche-fuji-go-pruned-pebbledb:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11929:11929
|
- 12934:12934
|
||||||
- 11929:11929/udp
|
- 12934:12934/udp
|
||||||
expose:
|
expose:
|
||||||
- 9650
|
- 9650
|
||||||
- 9650
|
- 9650
|
||||||
@@ -31,7 +31,7 @@ services:
|
|||||||
- --http-host=
|
- --http-host=
|
||||||
- --network-id=mainnet
|
- --network-id=mainnet
|
||||||
- --public-ip=${IP}
|
- --public-ip=${IP}
|
||||||
- --staking-port=11929
|
- --staking-port=12934
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
stop_grace_period: 5m
|
stop_grace_period: 5m
|
||||||
networks:
|
networks:
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-archive-leveldb.rule=Path(`/avalanche-mainnet-archive`) || Path(`/avalanche-mainnet-archive/`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-archive-leveldb.middlewares=avalanche-mainnet-go-archive-leveldb-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
avalanche-mainnet-go-archive-leveldb:
|
avalanche-mainnet-go-archive-leveldb:
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Host(`$DOMAIN`) && (Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.rule=Path(`/avalanche-mainnet`) || Path(`/avalanche-mainnet/`)}
|
||||||
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipwhitelist
|
- traefik.http.routers.avalanche-mainnet-go-pruned-pebbledb.middlewares=avalanche-mainnet-go-pruned-pebbledb-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
avalanche-mainnet-go-pruned-pebbledb:
|
avalanche-mainnet-go-pruned-pebbledb:
|
||||||
|
|||||||
@@ -69,7 +69,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bartio-reth-archive-trace.rule=Path(`/berachain-bartio-archive`) || Path(`/berachain-bartio-archive/`)}
|
||||||
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bartio-reth-archive-trace.middlewares=berachain-bartio-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
berachain-bartio-archive-node:
|
berachain-bartio-archive-node:
|
||||||
build:
|
build:
|
||||||
|
|||||||
@@ -69,7 +69,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-bepolia-reth-archive-trace.rule=Path(`/berachain-bepolia-archive`) || Path(`/berachain-bepolia-archive/`)}
|
||||||
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-bepolia-reth-archive-trace.middlewares=berachain-bepolia-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
berachain-bepolia-archive-node:
|
berachain-bepolia-archive-node:
|
||||||
build:
|
build:
|
||||||
|
|||||||
@@ -25,13 +25,13 @@ services:
|
|||||||
- 8545
|
- 8545
|
||||||
- 8551
|
- 8551
|
||||||
environment:
|
environment:
|
||||||
- BOOTNODES=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303,enode://b6a3137d3a36ef37c4d31843775a9dc293f41bcbde33b6309c80b1771b6634827cd188285136a57474427bd8845adc2f6fe2e0b106bd58d14795b08910b9c326@34.64.247.85:30303,enode://0b6633300614bc2b9749aee0cace7a091ec5348762aee7b1d195f7616d03a9409019d9bef336624bab72e0d069cd4cf0b0de6fbbf53f04f6b6e4c5b39c6bdca6@34.22.73.21:30303,enode://552b001abebb5805fcd734ad367cd05d9078d18f23ec598d7165460fadcfc51116ad95c418f7ea9a141aa8cbc496c8bea3322b67a5de0d3380f11aab1a797513@34.64.37.55:30303,enode://5b037f66099d5ded86eb7e1619f6d06ceb15609e8cc345ced22a4772b06178004e1490a3cd32fd1222789de4c6e4021c2d648a3d750f6d5323e64b771bbd8de7@35.247.182.34:30303,enode://846db253c53753d3ea1197aec296306dc84c25f3afdf142b65cb0fe0f984de55072daa3bbf05a9aea046a38a2292403137b6eafefd5646fcf62120b74e3b898d@34.87.9.231:30303,enode://64b7f6ee9bcd942ad4949c70f2077627f078a057dfd930e6e904e12643d8952f5ae87c91e24559765393f244a72c9d5c011d7d5176e59191d38f315db85a20f5@34.126.78.49:30303,enode://cf4d19bfb8ec507427ec882bac0bac85a0c8c9ddaa0ec91b773bb614e5e09d107cd9fbe323b96f62f31c493f8f42cc5495c18b87c08560c5dea1dfd25256dcf6@35.240.200.36:30303,enode://bb7e44178543431feac8f0ee3827056b7b84d8235b802a8bdbbcd4939dab7f7dd2579ff577a38b002bb0139792af67abd2dd5c9f4f85b8da6e914fa76dca82bc@34.40.14.50:30303,enode://8fef1f5df45e7b31be00a21e1da5665d5a5f5bf4c379086b843f03eade941bdd157f08c95b31880c492577edb9a9b185df7191eaebf54ab06d5bd683b289f3af@35.246.168.217:30303,enode://ce9c87cfe089f6811d26c96913fa3ec10b938d9017fc6246684c74a33679ee34ceca9447180fb509e37bf2b706c2877a82085d34bfd83b5b520ee1288b0fc32f@34.40.28.159:30303,enode://713657eb6a53feadcbc47e634ad557326a51eb6818a3e19a00a8111492f50a666ccbf2f5d334d247ecf941e68d242ef5c3b812b63c44d381ef11f79c2cdb45c7@35.234.82.236:30303,enode://d071fa740e063ce1bb9cdc2b7937baeff6dc4000f91588d730a731c38a6ff0d4015814812c160fab8695e46f74b9b618735368ea2f16db4d785f16d29b3fb7b0@35.203.86.197:30303,enode://ffc452fe451a2e5f89fe634744aea334d92dcd30d881b76209d2db7dbf4b7ee047e7c69a5bb1633764d987a7441d9c4bc57ccdbfd6442a2f860bf953bc89a9b9@34.118.187.161:30303,enode://da94328302a1d1422209d1916744e90b6095a48b2340dcec39b22002c098bb4d58a880dab98eb26edf03fa4705d1b62f99a8c5c14e6666e4726b6d3066d8a4d7@34.95.30.190:30303,enode://19c7671a4844699b481e81a5bcfe7bafc7fefa953c16ebbe1951b1046371e73839e9058de6b7d3c934318fe7e7233dde3621c1c1018eb8b294ea3d4516147150@34.47.60.196:30303
|
- BOOTNODES=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303
|
||||||
- CHAINID=80094
|
- CHAINID=80094
|
||||||
- CHAINNAME=mainnet
|
- CHAINNAME=mainnet
|
||||||
- CHAIN_SPEC=mainnet
|
- CHAIN_SPEC=mainnet
|
||||||
entrypoint: [/bin/bash, -c, "trap 'exit 0' SIGTERM; while [ ! -f /config/eth-genesis.json ] && [ ! -f /tmp/stop ]; do sleep 1 & wait $!; done; exec reth node \"$@\"", --]
|
entrypoint: [/bin/bash, -c, "trap 'exit 0' SIGTERM; while [ ! -f /config/eth-genesis.json ] && [ ! -f /tmp/stop ]; do sleep 1 & wait $!; done; exec reth node \"$@\"", --]
|
||||||
command:
|
command:
|
||||||
- --bootnodes=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303,enode://b6a3137d3a36ef37c4d31843775a9dc293f41bcbde33b6309c80b1771b6634827cd188285136a57474427bd8845adc2f6fe2e0b106bd58d14795b08910b9c326@34.64.247.85:30303,enode://0b6633300614bc2b9749aee0cace7a091ec5348762aee7b1d195f7616d03a9409019d9bef336624bab72e0d069cd4cf0b0de6fbbf53f04f6b6e4c5b39c6bdca6@34.22.73.21:30303,enode://552b001abebb5805fcd734ad367cd05d9078d18f23ec598d7165460fadcfc51116ad95c418f7ea9a141aa8cbc496c8bea3322b67a5de0d3380f11aab1a797513@34.64.37.55:30303,enode://5b037f66099d5ded86eb7e1619f6d06ceb15609e8cc345ced22a4772b06178004e1490a3cd32fd1222789de4c6e4021c2d648a3d750f6d5323e64b771bbd8de7@35.247.182.34:30303,enode://846db253c53753d3ea1197aec296306dc84c25f3afdf142b65cb0fe0f984de55072daa3bbf05a9aea046a38a2292403137b6eafefd5646fcf62120b74e3b898d@34.87.9.231:30303,enode://64b7f6ee9bcd942ad4949c70f2077627f078a057dfd930e6e904e12643d8952f5ae87c91e24559765393f244a72c9d5c011d7d5176e59191d38f315db85a20f5@34.126.78.49:30303,enode://cf4d19bfb8ec507427ec882bac0bac85a0c8c9ddaa0ec91b773bb614e5e09d107cd9fbe323b96f62f31c493f8f42cc5495c18b87c08560c5dea1dfd25256dcf6@35.240.200.36:30303,enode://bb7e44178543431feac8f0ee3827056b7b84d8235b802a8bdbbcd4939dab7f7dd2579ff577a38b002bb0139792af67abd2dd5c9f4f85b8da6e914fa76dca82bc@34.40.14.50:30303,enode://8fef1f5df45e7b31be00a21e1da5665d5a5f5bf4c379086b843f03eade941bdd157f08c95b31880c492577edb9a9b185df7191eaebf54ab06d5bd683b289f3af@35.246.168.217:30303,enode://ce9c87cfe089f6811d26c96913fa3ec10b938d9017fc6246684c74a33679ee34ceca9447180fb509e37bf2b706c2877a82085d34bfd83b5b520ee1288b0fc32f@34.40.28.159:30303,enode://713657eb6a53feadcbc47e634ad557326a51eb6818a3e19a00a8111492f50a666ccbf2f5d334d247ecf941e68d242ef5c3b812b63c44d381ef11f79c2cdb45c7@35.234.82.236:30303,enode://d071fa740e063ce1bb9cdc2b7937baeff6dc4000f91588d730a731c38a6ff0d4015814812c160fab8695e46f74b9b618735368ea2f16db4d785f16d29b3fb7b0@35.203.86.197:30303,enode://ffc452fe451a2e5f89fe634744aea334d92dcd30d881b76209d2db7dbf4b7ee047e7c69a5bb1633764d987a7441d9c4bc57ccdbfd6442a2f860bf953bc89a9b9@34.118.187.161:30303,enode://da94328302a1d1422209d1916744e90b6095a48b2340dcec39b22002c098bb4d58a880dab98eb26edf03fa4705d1b62f99a8c5c14e6666e4726b6d3066d8a4d7@34.95.30.190:30303,enode://19c7671a4844699b481e81a5bcfe7bafc7fefa953c16ebbe1951b1046371e73839e9058de6b7d3c934318fe7e7233dde3621c1c1018eb8b294ea3d4516147150@34.47.60.196:30303
|
- --bootnodes=enode://0c5a4a3c0e81fce2974e4d317d88df783731183d534325e32e0fdf8f4b119d7889fa254d3a38890606ec300d744e2aa9c87099a4a032f5c94efe53f3fcdfecfe@34.22.104.177:30303
|
||||||
- --chain=/config/eth-genesis.json
|
- --chain=/config/eth-genesis.json
|
||||||
- --datadir=/root/.local/share/reth
|
- --datadir=/root/.local/share/reth
|
||||||
- --max-inbound-peers=50
|
- --max-inbound-peers=50
|
||||||
@@ -69,7 +69,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.berachain-mainnet-reth-archive-trace.rule=Path(`/berachain-mainnet-archive`) || Path(`/berachain-mainnet-archive/`)}
|
||||||
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.berachain-mainnet-reth-archive-trace.middlewares=berachain-mainnet-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
berachain-mainnet-archive-node:
|
berachain-mainnet-archive-node:
|
||||||
build:
|
build:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
|
||||||
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-bsc-pruned-pebble-path.middlewares=bsc-chapel-bsc-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-chapel-bsc-pruned-pebble-path:
|
bsc-chapel-bsc-pruned-pebble-path:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
|
||||||
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-bsc-pruned-pebble-path.middlewares=bsc-mainnet-bsc-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-mainnet-bsc-pruned-pebble-path:
|
bsc-mainnet-bsc-pruned-pebble-path:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-archive-trace.rule=Path(`/bsc-chapel-archive`) || Path(`/bsc-chapel-archive/`)}
|
||||||
- traefik.http.routers.bsc-chapel-erigon3-archive-trace.middlewares=bsc-chapel-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-erigon3-archive-trace.middlewares=bsc-chapel-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-chapel-erigon3-archive-trace:
|
bsc-chapel-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12810:12810
|
- 11017:11017
|
||||||
- 12810:12810/udp
|
- 11017:11017/udp
|
||||||
- 32810:32810
|
- 31017:31017
|
||||||
- 32810:32810/udp
|
- 31017:31017/udp
|
||||||
- 37810:37810
|
- 36017:36017
|
||||||
- 37810:37810/udp
|
- 36017:36017/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -38,9 +38,9 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=32810
|
- --p2p.allowed-ports=31017
|
||||||
- --p2p.allowed-ports=37810
|
- --p2p.allowed-ports=36017
|
||||||
- --port=12810
|
- --port=11017
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-minimal-trace.rule=Path(`/bsc-chapel-minimal`) || Path(`/bsc-chapel-minimal/`)}
|
||||||
- traefik.http.routers.bsc-chapel-erigon3-minimal-trace.middlewares=bsc-chapel-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-erigon3-minimal-trace.middlewares=bsc-chapel-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-chapel-erigon3-minimal-trace:
|
bsc-chapel-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12810:12810
|
- 10589:10589
|
||||||
- 12810:12810/udp
|
- 10589:10589/udp
|
||||||
- 32810:32810
|
- 30589:30589
|
||||||
- 32810:32810/udp
|
- 30589:30589/udp
|
||||||
- 37810:37810
|
- 35589:35589
|
||||||
- 37810:37810/udp
|
- 35589:35589/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -38,9 +38,9 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=32810
|
- --p2p.allowed-ports=30589
|
||||||
- --p2p.allowed-ports=37810
|
- --p2p.allowed-ports=35589
|
||||||
- --port=12810
|
- --port=10589
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-chapel`) || Path(`/bsc-chapel/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-chapel-erigon3-pruned-trace.rule=Path(`/bsc-chapel`) || Path(`/bsc-chapel/`)}
|
||||||
- traefik.http.routers.bsc-chapel-erigon3-pruned-trace.middlewares=bsc-chapel-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-chapel-erigon3-pruned-trace.middlewares=bsc-chapel-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-chapel-erigon3-pruned-trace:
|
bsc-chapel-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-archive-trace.rule=Path(`/bsc-mainnet-archive`) || Path(`/bsc-mainnet-archive/`)}
|
||||||
- traefik.http.routers.bsc-mainnet-erigon3-archive-trace.middlewares=bsc-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-erigon3-archive-trace.middlewares=bsc-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-mainnet-erigon3-archive-trace:
|
bsc-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11327:11327
|
- 10987:10987
|
||||||
- 11327:11327/udp
|
- 10987:10987/udp
|
||||||
- 31327:31327
|
- 30987:30987
|
||||||
- 31327:31327/udp
|
- 30987:30987/udp
|
||||||
- 36327:36327
|
- 35987:35987
|
||||||
- 36327:36327/udp
|
- 35987:35987/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -38,9 +38,9 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31327
|
- --p2p.allowed-ports=30987
|
||||||
- --p2p.allowed-ports=36327
|
- --p2p.allowed-ports=35987
|
||||||
- --port=11327
|
- --port=10987
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.rule=Path(`/bsc-mainnet-minimal`) || Path(`/bsc-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.middlewares=bsc-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-erigon3-minimal-trace.middlewares=bsc-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-mainnet-erigon3-minimal-trace:
|
bsc-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11327:11327
|
- 10265:10265
|
||||||
- 11327:11327/udp
|
- 10265:10265/udp
|
||||||
- 31327:31327
|
- 30265:30265
|
||||||
- 31327:31327/udp
|
- 30265:30265/udp
|
||||||
- 36327:36327
|
- 35265:35265
|
||||||
- 36327:36327/udp
|
- 35265:35265/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -38,9 +38,9 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31327
|
- --p2p.allowed-ports=30265
|
||||||
- --p2p.allowed-ports=36327
|
- --p2p.allowed-ports=35265
|
||||||
- --port=11327
|
- --port=10265
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.rule=Path(`/bsc-mainnet`) || Path(`/bsc-mainnet/`)}
|
||||||
- traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.middlewares=bsc-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bsc-mainnet-erigon3-pruned-trace.middlewares=bsc-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
bsc-mainnet-erigon3-pruned-trace:
|
bsc-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13307:13307
|
- 12386:12386
|
||||||
- 13307:13307/udp
|
- 12386:12386/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
command:
|
command:
|
||||||
@@ -32,7 +32,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=13307
|
- --port=12386
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --ws
|
- --ws
|
||||||
@@ -55,7 +55,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.rule=Path(`/celo-alfajores-archive`) || Path(`/celo-alfajores-archive/`)}
|
||||||
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-alfajores-geth-archive-leveldb-hash.middlewares=celo-alfajores-geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-alfajores-geth-archive-leveldb-hash:
|
celo-alfajores-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -55,7 +55,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))}
|
- ${NO_SSL:-traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-alfajores`) || Path(`/celo-alfajores/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)}
|
- ${NO_SSL:+traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.rule=Path(`/celo-alfajores`) || Path(`/celo-alfajores/`)}
|
||||||
- traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.middlewares=celo-alfajores-geth-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-alfajores-geth-pruned-leveldb-hash.middlewares=celo-alfajores-geth-pruned-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-alfajores-geth-pruned-leveldb-hash:
|
celo-alfajores-geth-pruned-leveldb-hash:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11882:11882
|
- 10164:10164
|
||||||
- 11882:11882/udp
|
- 10164:10164/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
command:
|
command:
|
||||||
@@ -32,7 +32,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=11882
|
- --port=10164
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --ws
|
- --ws
|
||||||
@@ -55,7 +55,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.rule=Path(`/celo-mainnet-archive`) || Path(`/celo-mainnet-archive/`)}
|
||||||
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-mainnet-geth-archive-leveldb-hash.middlewares=celo-mainnet-geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-mainnet-geth-archive-leveldb-hash:
|
celo-mainnet-geth-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -55,7 +55,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/celo-mainnet`) || Path(`/celo-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.rule=Path(`/celo-mainnet`) || Path(`/celo-mainnet/`)}
|
||||||
- traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.middlewares=celo-mainnet-geth-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.celo-mainnet-geth-pruned-leveldb-hash.middlewares=celo-mainnet-geth-pruned-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
celo-mainnet-geth-pruned-leveldb-hash:
|
celo-mainnet-geth-pruned-leveldb-hash:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))}
|
- ${NO_SSL:-traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-buffalo`) || Path(`/core-buffalo/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)}
|
- ${NO_SSL:+traefik.http.routers.core-buffalo-core-pruned-pebble-path.rule=Path(`/core-buffalo`) || Path(`/core-buffalo/`)}
|
||||||
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-buffalo-core-pruned-pebble-path.middlewares=core-buffalo-core-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-buffalo-core-pruned-pebble-path:
|
core-buffalo-core-pruned-pebble-path:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11169:11169
|
- 14234:14234
|
||||||
- 11169:11169/udp
|
- 14234:14234/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: [geth]
|
entrypoint: [geth]
|
||||||
@@ -36,7 +36,7 @@ services:
|
|||||||
- --mainnet
|
- --mainnet
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=11169
|
- --port=14234
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --state.scheme=hash
|
- --state.scheme=hash
|
||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-archive-leveldb-hash.rule=Path(`/core-mainnet-archive`) || Path(`/core-mainnet-archive/`)}
|
||||||
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-archive-leveldb-hash.middlewares=core-mainnet-core-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-mainnet-core-archive-leveldb-hash:
|
core-mainnet-core-archive-leveldb-hash:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/core-mainnet`) || Path(`/core-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.rule=Path(`/core-mainnet`) || Path(`/core-mainnet/`)}
|
||||||
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.core-mainnet-core-pruned-leveldb-hash.middlewares=core-mainnet-core-pruned-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-mainnet-core-pruned-leveldb-hash:
|
core-mainnet-core-pruned-leveldb-hash:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))}
|
- ${NO_SSL:-traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/core-pigeon`) || Path(`/core-pigeon/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)}
|
- ${NO_SSL:+traefik.http.routers.core-pigeon-core-pruned-pebble-path.rule=Path(`/core-pigeon`) || Path(`/core-pigeon/`)}
|
||||||
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.core-pigeon-core-pruned-pebble-path.middlewares=core-pigeon-core-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
core-pigeon-core-pruned-pebble-path:
|
core-pigeon-core-pruned-pebble-path:
|
||||||
|
|||||||
@@ -21,8 +21,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 14270:14270
|
- 14142:14142
|
||||||
- 14270:14270/udp
|
- 14142:14142/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 8546
|
- 8546
|
||||||
@@ -80,7 +80,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.rule=Path(`/cronos-zkevm-mainnet-archive`) || Path(`/cronos-zkevm-mainnet-archive/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-archive.middlewares=cronos-zkevm-mainnet-external-node-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-archive-db:
|
cronos-zkevm-mainnet-archive-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -80,7 +80,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.rule=Path(`/cronos-zkevm-mainnet`) || Path(`/cronos-zkevm-mainnet/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-mainnet-external-node-pruned.middlewares=cronos-zkevm-mainnet-external-node-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
cronos-zkevm-mainnet-db:
|
cronos-zkevm-mainnet-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -21,8 +21,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10397:10397
|
- 11917:11917
|
||||||
- 10397:10397/udp
|
- 11917:11917/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 8546
|
- 8546
|
||||||
@@ -80,7 +80,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-archive.rule=Path(`/cronos-zkevm-testnet-archive`) || Path(`/cronos-zkevm-testnet-archive/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-archive.middlewares=cronos-zkevm-testnet-external-node-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
cronos-zkevm-testnet-archive-db:
|
cronos-zkevm-testnet-archive-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -80,7 +80,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))}
|
- ${NO_SSL:-traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)}
|
- ${NO_SSL:+traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.rule=Path(`/cronos-zkevm-testnet`) || Path(`/cronos-zkevm-testnet/`)}
|
||||||
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.cronos-zkevm-testnet-external-node-pruned.middlewares=cronos-zkevm-testnet-external-node-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
cronos-zkevm-testnet-db:
|
cronos-zkevm-testnet-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-holesky-archive:
|
ethereum-holesky-archive:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace.service=ethereum-holesky-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.service=ethereum-holesky-erigon3-archive-trace-node
|
||||||
- traefik.http.services.ethereum-holesky-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-holesky-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-archive-trace-node.middlewares=ethereum-holesky-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-archive-trace:
|
ethereum-holesky-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-holesky-minimal:
|
ethereum-holesky-minimal:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13947:13947
|
- 12582:12582
|
||||||
- 13947:13947/udp
|
- 12582:12582/udp
|
||||||
- 18947:18947
|
- 17582:17582
|
||||||
- 18947:18947/udp
|
- 17582:17582/udp
|
||||||
- 28947:28947
|
- 27582:27582
|
||||||
- 28947:28947/udp
|
- 27582:27582/udp
|
||||||
- 33947:33947
|
- 32582:32582
|
||||||
- 33947:33947/udp
|
- 32582:32582/udp
|
||||||
- 38947:38947
|
- 37582:37582
|
||||||
- 38947:38947/udp
|
- 37582:37582/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=18947
|
- --caplin.discovery.port=17582
|
||||||
- --caplin.discovery.tcpport=18947
|
- --caplin.discovery.tcpport=17582
|
||||||
- --chain=holesky
|
- --chain=holesky
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=33947
|
- --p2p.allowed-ports=32582
|
||||||
- --p2p.allowed-ports=38947
|
- --p2p.allowed-ports=37582
|
||||||
- --port=13947
|
- --port=12582
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=28947
|
- --torrent.port=27582
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.rule=Path(`/ethereum-holesky-minimal`) || Path(`/ethereum-holesky-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace.service=ethereum-holesky-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.service=ethereum-holesky-erigon3-minimal-trace-node
|
||||||
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-holesky-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-holesky-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-minimal-trace-node.middlewares=ethereum-holesky-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-minimal-trace:
|
ethereum-holesky-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-holesky:
|
ethereum-holesky:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_HOLESKY_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13947:13947
|
- 11685:11685
|
||||||
- 13947:13947/udp
|
- 11685:11685/udp
|
||||||
- 18947:18947
|
- 16685:16685
|
||||||
- 18947:18947/udp
|
- 16685:16685/udp
|
||||||
- 28947:28947
|
- 26685:26685
|
||||||
- 28947:28947/udp
|
- 26685:26685/udp
|
||||||
- 33947:33947
|
- 31685:31685
|
||||||
- 33947:33947/udp
|
- 31685:31685/udp
|
||||||
- 38947:38947
|
- 36685:36685
|
||||||
- 38947:38947/udp
|
- 36685:36685/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=18947
|
- --caplin.discovery.port=16685
|
||||||
- --caplin.discovery.tcpport=18947
|
- --caplin.discovery.tcpport=16685
|
||||||
- --chain=holesky
|
- --chain=holesky
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=33947
|
- --p2p.allowed-ports=31685
|
||||||
- --p2p.allowed-ports=38947
|
- --p2p.allowed-ports=36685
|
||||||
- --port=13947
|
- --port=11685
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=28947
|
- --torrent.port=26685
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace.service=ethereum-holesky-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.service=ethereum-holesky-erigon3-pruned-trace-node
|
||||||
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-holesky-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-erigon3-pruned-trace-node.middlewares=ethereum-holesky-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-erigon3-pruned-trace:
|
ethereum-holesky-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-mainnet-archive:
|
ethereum-mainnet-archive:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace.service=ethereum-mainnet-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.service=ethereum-mainnet-erigon3-archive-trace-node
|
||||||
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-mainnet-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-archive-trace-node.middlewares=ethereum-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-archive-trace:
|
ethereum-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-mainnet-minimal:
|
ethereum-mainnet-minimal:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11675:11675
|
- 14614:14614
|
||||||
- 11675:11675/udp
|
- 14614:14614/udp
|
||||||
- 16675:16675
|
- 19614:19614
|
||||||
- 16675:16675/udp
|
- 19614:19614/udp
|
||||||
- 26675:26675
|
- 29614:29614
|
||||||
- 26675:26675/udp
|
- 29614:29614/udp
|
||||||
- 31675:31675
|
- 34614:34614
|
||||||
- 31675:31675/udp
|
- 34614:34614/udp
|
||||||
- 36675:36675
|
- 39614:39614
|
||||||
- 36675:36675/udp
|
- 39614:39614/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=16675
|
- --caplin.discovery.port=19614
|
||||||
- --caplin.discovery.tcpport=16675
|
- --caplin.discovery.tcpport=19614
|
||||||
- --chain=mainnet
|
- --chain=mainnet
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31675
|
- --p2p.allowed-ports=34614
|
||||||
- --p2p.allowed-ports=36675
|
- --p2p.allowed-ports=39614
|
||||||
- --port=11675
|
- --port=14614
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=26675
|
- --torrent.port=29614
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.rule=Path(`/ethereum-mainnet-minimal`) || Path(`/ethereum-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace.service=ethereum-mainnet-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.service=ethereum-mainnet-erigon3-minimal-trace-node
|
||||||
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-mainnet-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-mainnet-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-minimal-trace-node.middlewares=ethereum-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-minimal-trace:
|
ethereum-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-mainnet:
|
ethereum-mainnet:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11675:11675
|
- 14616:14616
|
||||||
- 11675:11675/udp
|
- 14616:14616/udp
|
||||||
- 16675:16675
|
- 19616:19616
|
||||||
- 16675:16675/udp
|
- 19616:19616/udp
|
||||||
- 26675:26675
|
- 29616:29616
|
||||||
- 26675:26675/udp
|
- 29616:29616/udp
|
||||||
- 31675:31675
|
- 34616:34616
|
||||||
- 31675:31675/udp
|
- 34616:34616/udp
|
||||||
- 36675:36675
|
- 39616:39616
|
||||||
- 36675:36675/udp
|
- 39616:39616/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=16675
|
- --caplin.discovery.port=19616
|
||||||
- --caplin.discovery.tcpport=16675
|
- --caplin.discovery.tcpport=19616
|
||||||
- --chain=mainnet
|
- --chain=mainnet
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31675
|
- --p2p.allowed-ports=34616
|
||||||
- --p2p.allowed-ports=36675
|
- --p2p.allowed-ports=39616
|
||||||
- --port=11675
|
- --port=14616
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=26675
|
- --torrent.port=29616
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace.service=ethereum-mainnet-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.service=ethereum-mainnet-erigon3-pruned-trace-node
|
||||||
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-mainnet-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-erigon3-pruned-trace-node.middlewares=ethereum-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-erigon3-pruned-trace:
|
ethereum-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-sepolia-archive:
|
ethereum-sepolia-archive:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace.service=ethereum-sepolia-erigon3-archive-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.service=ethereum-sepolia-erigon3-archive-trace-node
|
||||||
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-sepolia-erigon3-archive-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-archive-trace-node.middlewares=ethereum-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-archive-trace:
|
ethereum-sepolia-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-sepolia-minimal:
|
ethereum-sepolia-minimal:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13317:13317
|
- 11087:11087
|
||||||
- 13317:13317/udp
|
- 11087:11087/udp
|
||||||
- 18317:18317
|
- 16087:16087
|
||||||
- 18317:18317/udp
|
- 16087:16087/udp
|
||||||
- 28317:28317
|
- 26087:26087
|
||||||
- 28317:28317/udp
|
- 26087:26087/udp
|
||||||
- 33317:33317
|
- 31087:31087
|
||||||
- 33317:33317/udp
|
- 31087:31087/udp
|
||||||
- 38317:38317
|
- 36087:36087
|
||||||
- 38317:38317/udp
|
- 36087:36087/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=18317
|
- --caplin.discovery.port=16087
|
||||||
- --caplin.discovery.tcpport=18317
|
- --caplin.discovery.tcpport=16087
|
||||||
- --chain=sepolia
|
- --chain=sepolia
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=33317
|
- --p2p.allowed-ports=31087
|
||||||
- --p2p.allowed-ports=38317
|
- --p2p.allowed-ports=36087
|
||||||
- --port=13317
|
- --port=11087
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=28317
|
- --torrent.port=26087
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.rule=Path(`/ethereum-sepolia-minimal`) || Path(`/ethereum-sepolia-minimal/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace.service=ethereum-sepolia-erigon3-minimal-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.service=ethereum-sepolia-erigon3-minimal-trace-node
|
||||||
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-sepolia-erigon3-minimal-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.rule=PathPrefix(`/ethereum-sepolia-minimal/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-minimal-trace-node.middlewares=ethereum-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-minimal-trace:
|
ethereum-sepolia-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
ethereum-sepolia:
|
ethereum-sepolia:
|
||||||
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${ETHEREUM_ERIGON3_IMAGE:-erigontech/erigon}:${ETHEREUM_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13317:13317
|
- 11930:11930
|
||||||
- 13317:13317/udp
|
- 11930:11930/udp
|
||||||
- 18317:18317
|
- 16930:16930
|
||||||
- 18317:18317/udp
|
- 16930:16930/udp
|
||||||
- 28317:28317
|
- 26930:26930
|
||||||
- 28317:28317/udp
|
- 26930:26930/udp
|
||||||
- 33317:33317
|
- 31930:31930
|
||||||
- 33317:33317/udp
|
- 31930:31930/udp
|
||||||
- 38317:38317
|
- 36930:36930
|
||||||
- 38317:38317/udp
|
- 36930:36930/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 5555
|
- 5555
|
||||||
@@ -39,8 +39,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=18317
|
- --caplin.discovery.port=16930
|
||||||
- --caplin.discovery.tcpport=18317
|
- --caplin.discovery.tcpport=16930
|
||||||
- --chain=sepolia
|
- --chain=sepolia
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -50,13 +50,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=33317
|
- --p2p.allowed-ports=31930
|
||||||
- --p2p.allowed-ports=38317
|
- --p2p.allowed-ports=36930
|
||||||
- --port=13317
|
- --port=11930
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=28317
|
- --torrent.port=26930
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -74,7 +74,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace.service=ethereum-sepolia-erigon3-pruned-trace
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.service=ethereum-sepolia-erigon3-pruned-trace-node
|
||||||
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
- traefik.http.services.ethereum-sepolia-erigon3-pruned-trace-node.loadbalancer.server.port=5555
|
||||||
@@ -82,7 +82,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-erigon3-pruned-trace-node.middlewares=ethereum-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-erigon3-pruned-trace:
|
ethereum-sepolia-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.rule=Path(`/ethereum-holesky`) || Path(`/ethereum-holesky/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path.middlewares=ethereum-holesky-geth-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-holesky-node:
|
ethereum-holesky-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -99,7 +99,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-holesky/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.middlewares=ethereum-holesky-geth-pruned-pebble-path-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-geth-pruned-pebble-path-node.middlewares=ethereum-holesky-geth-pruned-pebble-path-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-geth-pruned-pebble-path:
|
ethereum-holesky-geth-pruned-pebble-path:
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.rule=Path(`/ethereum-mainnet`) || Path(`/ethereum-mainnet/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path.middlewares=ethereum-mainnet-geth-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-mainnet-node:
|
ethereum-mainnet-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -99,7 +99,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-mainnet/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.middlewares=ethereum-mainnet-geth-pruned-pebble-path-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-geth-pruned-pebble-path-node.middlewares=ethereum-mainnet-geth-pruned-pebble-path-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-geth-pruned-pebble-path:
|
ethereum-mainnet-geth-pruned-pebble-path:
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.rule=Path(`/ethereum-sepolia`) || Path(`/ethereum-sepolia/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path.middlewares=ethereum-sepolia-geth-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-sepolia-node:
|
ethereum-sepolia-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -99,7 +99,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.rule=PathPrefix(`/ethereum-sepolia/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.middlewares=ethereum-sepolia-geth-pruned-pebble-path-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-geth-pruned-pebble-path-node.middlewares=ethereum-sepolia-geth-pruned-pebble-path-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-geth-pruned-pebble-path:
|
ethereum-sepolia-geth-pruned-pebble-path:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace.rule=Path(`/ethereum-holesky-archive`) || Path(`/ethereum-holesky-archive/`)}
|
||||||
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-reth-archive-trace.middlewares=ethereum-holesky-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-holesky-archive-node:
|
ethereum-holesky-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_HOLESKY_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -97,7 +97,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-holesky-reth-archive-trace-node.rule=PathPrefix(`/ethereum-holesky-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-holesky-reth-archive-trace-node.middlewares=ethereum-holesky-reth-archive-trace-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-holesky-reth-archive-trace-node.middlewares=ethereum-holesky-reth-archive-trace-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-holesky-reth-archive-trace:
|
ethereum-holesky-reth-archive-trace:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace.rule=Path(`/ethereum-mainnet-archive`) || Path(`/ethereum-mainnet-archive/`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-reth-archive-trace.middlewares=ethereum-mainnet-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-mainnet-archive-node:
|
ethereum-mainnet-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_MAINNET_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -97,7 +97,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.rule=PathPrefix(`/ethereum-mainnet-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.middlewares=ethereum-mainnet-reth-archive-trace-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-mainnet-reth-archive-trace-node.middlewares=ethereum-mainnet-reth-archive-trace-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-mainnet-reth-archive-trace:
|
ethereum-mainnet-reth-archive-trace:
|
||||||
|
|||||||
@@ -62,7 +62,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace.rule=Path(`/ethereum-sepolia-archive`) || Path(`/ethereum-sepolia-archive/`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-reth-archive-trace.middlewares=ethereum-sepolia-reth-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
ethereum-sepolia-archive-node:
|
ethereum-sepolia-archive-node:
|
||||||
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
image: ${ETHEREUM_PRYSM_IMAGE:-prysmaticlabs/prysm-beacon-chain}:${ETHEREUM_SEPOLIA_PRYSM_VERSION:-v5.3.1}
|
||||||
@@ -97,7 +97,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:-traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=Host(`$DOMAIN`) && PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
- ${NO_SSL:+traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.rule=PathPrefix(`/ethereum-sepolia-archive/eth`)}
|
||||||
- traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.middlewares=ethereum-sepolia-reth-archive-trace-node-stripprefix, ipwhitelist
|
- traefik.http.routers.ethereum-sepolia-reth-archive-trace-node.middlewares=ethereum-sepolia-reth-archive-trace-node-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
ethereum-sepolia-reth-archive-trace:
|
ethereum-sepolia-reth-archive-trace:
|
||||||
|
|||||||
@@ -67,7 +67,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive-trace.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive-trace.middlewares=fantom-mainnet-opera-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-archive-trace:
|
fantom-mainnet-opera-archive-trace:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 14897:14897
|
- 14723:14723
|
||||||
- 14897:14897/udp
|
- 14723:14723/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=14897
|
- --port=14723
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=full
|
- --syncmode=full
|
||||||
@@ -66,7 +66,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-archive.middlewares=fantom-mainnet-opera-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-archive:
|
fantom-mainnet-opera-archive:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 14897:14897
|
- 10916:10916
|
||||||
- 14897:14897/udp
|
- 10916:10916/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=14897
|
- --port=10916
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=snap
|
- --syncmode=snap
|
||||||
@@ -67,7 +67,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned-trace.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned-trace.middlewares=fantom-mainnet-opera-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-pruned-trace:
|
fantom-mainnet-opera-pruned-trace:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 14897:14897
|
- 10439:10439
|
||||||
- 14897:14897/udp
|
- 10439:10439/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=14897
|
- --port=10439
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=snap
|
- --syncmode=snap
|
||||||
@@ -66,7 +66,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-opera-pruned.rule=Path(`/fantom-mainnet`) || Path(`/fantom-mainnet/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-opera-pruned.middlewares=fantom-mainnet-opera-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-opera-pruned:
|
fantom-mainnet-opera-pruned:
|
||||||
|
|||||||
@@ -67,7 +67,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive-trace.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive-trace.middlewares=fantom-testnet-opera-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-archive-trace:
|
fantom-testnet-opera-archive-trace:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10196:10196
|
- 11055:11055
|
||||||
- 10196:10196/udp
|
- 11055:11055/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=10196
|
- --port=11055
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=full
|
- --syncmode=full
|
||||||
@@ -66,7 +66,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-archive.middlewares=fantom-testnet-opera-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-archive:
|
fantom-testnet-opera-archive:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10196:10196
|
- 14037:14037
|
||||||
- 10196:10196/udp
|
- 14037:14037/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=10196
|
- --port=14037
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=snap
|
- --syncmode=snap
|
||||||
@@ -67,7 +67,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned-trace.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned-trace.middlewares=fantom-testnet-opera-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-pruned-trace:
|
fantom-testnet-opera-pruned-trace:
|
||||||
|
|||||||
@@ -23,8 +23,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10196:10196
|
- 10846:10846
|
||||||
- 10196:10196/udp
|
- 10846:10846/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
environment:
|
environment:
|
||||||
@@ -42,7 +42,7 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=10196
|
- --port=10846
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --syncmode=snap
|
- --syncmode=snap
|
||||||
@@ -66,7 +66,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-opera-pruned.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet`) || Path(`/fantom-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-opera-pruned.rule=Path(`/fantom-testnet`) || Path(`/fantom-testnet/`)}
|
||||||
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-opera-pruned.middlewares=fantom-testnet-opera-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-opera-pruned:
|
fantom-testnet-opera-pruned:
|
||||||
|
|||||||
@@ -65,7 +65,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-mainnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-mainnet-sonic-archive.rule=Path(`/fantom-mainnet-archive`) || Path(`/fantom-mainnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-mainnet-sonic-archive.middlewares=fantom-mainnet-sonic-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-mainnet-sonic-archive:
|
fantom-mainnet-sonic-archive:
|
||||||
|
|||||||
@@ -65,7 +65,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.fantom-testnet-sonic-archive.rule=Host(`$DOMAIN`) && (Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.fantom-testnet-sonic-archive.rule=Path(`/fantom-testnet-archive`) || Path(`/fantom-testnet-archive/`)}
|
||||||
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.fantom-testnet-sonic-archive.middlewares=fantom-testnet-sonic-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
fantom-testnet-sonic-archive:
|
fantom-testnet-sonic-archive:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-chiado-archive:
|
gnosis-chiado-archive:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-archive-trace.rule=Path(`/gnosis-chiado-archive`) || Path(`/gnosis-chiado-archive/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-archive-trace.middlewares=gnosis-chiado-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-archive-trace:
|
gnosis-chiado-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-chiado-minimal:
|
gnosis-chiado-minimal:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11986:11986
|
- 11010:11010
|
||||||
- 11986:11986/udp
|
- 11010:11010/udp
|
||||||
- 16986:16986
|
- 16010:16010
|
||||||
- 16986:16986/udp
|
- 16010:16010/udp
|
||||||
- 26986:26986
|
- 26010:26010
|
||||||
- 26986:26986/udp
|
- 26010:26010/udp
|
||||||
- 31986:31986
|
- 31010:31010
|
||||||
- 31986:31986/udp
|
- 31010:31010/udp
|
||||||
- 36986:36986
|
- 36010:36010
|
||||||
- 36986:36986/udp
|
- 36010:36010/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: [erigon]
|
entrypoint: [erigon]
|
||||||
@@ -38,8 +38,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=16986
|
- --caplin.discovery.port=16010
|
||||||
- --caplin.discovery.tcpport=16986
|
- --caplin.discovery.tcpport=16010
|
||||||
- --chain=chiado
|
- --chain=chiado
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -49,13 +49,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31986
|
- --p2p.allowed-ports=31010
|
||||||
- --p2p.allowed-ports=36986
|
- --p2p.allowed-ports=36010
|
||||||
- --port=11986
|
- --port=11010
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=26986
|
- --torrent.port=26010
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.rule=Path(`/gnosis-chiado-minimal`) || Path(`/gnosis-chiado-minimal/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-minimal-trace.middlewares=gnosis-chiado-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-minimal-trace:
|
gnosis-chiado-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-chiado:
|
gnosis-chiado:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_CHIADO_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 11986:11986
|
- 11886:11886
|
||||||
- 11986:11986/udp
|
- 11886:11886/udp
|
||||||
- 16986:16986
|
- 16886:16886
|
||||||
- 16986:16986/udp
|
- 16886:16886/udp
|
||||||
- 26986:26986
|
- 26886:26886
|
||||||
- 26986:26986/udp
|
- 26886:26886/udp
|
||||||
- 31986:31986
|
- 31886:31886
|
||||||
- 31986:31986/udp
|
- 31886:31886/udp
|
||||||
- 36986:36986
|
- 36886:36886
|
||||||
- 36986:36986/udp
|
- 36886:36886/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: [erigon]
|
entrypoint: [erigon]
|
||||||
@@ -38,8 +38,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=16986
|
- --caplin.discovery.port=16886
|
||||||
- --caplin.discovery.tcpport=16986
|
- --caplin.discovery.tcpport=16886
|
||||||
- --chain=chiado
|
- --chain=chiado
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -49,13 +49,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=31986
|
- --p2p.allowed-ports=31886
|
||||||
- --p2p.allowed-ports=36986
|
- --p2p.allowed-ports=36886
|
||||||
- --port=11986
|
- --port=11886
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=26986
|
- --torrent.port=26886
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.rule=Path(`/gnosis-chiado`) || Path(`/gnosis-chiado/`)}
|
||||||
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-chiado-erigon3-pruned-trace.middlewares=gnosis-chiado-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-chiado-erigon3-pruned-trace:
|
gnosis-chiado-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-mainnet-archive:
|
gnosis-mainnet-archive:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.rule=Path(`/gnosis-mainnet-archive`) || Path(`/gnosis-mainnet-archive/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-archive-trace.middlewares=gnosis-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-archive-trace:
|
gnosis-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-mainnet-minimal:
|
gnosis-mainnet-minimal:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12974:12974
|
- 13429:13429
|
||||||
- 12974:12974/udp
|
- 13429:13429/udp
|
||||||
- 17974:17974
|
- 18429:18429
|
||||||
- 17974:17974/udp
|
- 18429:18429/udp
|
||||||
- 27974:27974
|
- 28429:28429
|
||||||
- 27974:27974/udp
|
- 28429:28429/udp
|
||||||
- 32974:32974
|
- 33429:33429
|
||||||
- 32974:32974/udp
|
- 33429:33429/udp
|
||||||
- 37974:37974
|
- 38429:38429
|
||||||
- 37974:37974/udp
|
- 38429:38429/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: [erigon]
|
entrypoint: [erigon]
|
||||||
@@ -38,8 +38,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=17974
|
- --caplin.discovery.port=18429
|
||||||
- --caplin.discovery.tcpport=17974
|
- --caplin.discovery.tcpport=18429
|
||||||
- --chain=gnosis
|
- --chain=gnosis
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -49,13 +49,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=32974
|
- --p2p.allowed-ports=33429
|
||||||
- --p2p.allowed-ports=37974
|
- --p2p.allowed-ports=38429
|
||||||
- --port=12974
|
- --port=13429
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=27974
|
- --torrent.port=28429
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.rule=Path(`/gnosis-mainnet-minimal`) || Path(`/gnosis-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-minimal-trace.middlewares=gnosis-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-minimal-trace:
|
gnosis-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
gnosis-mainnet:
|
gnosis-mainnet:
|
||||||
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${GNOSIS_ERIGON3_IMAGE:-erigontech/erigon}:${GNOSIS_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,16 +19,16 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12974:12974
|
- 12147:12147
|
||||||
- 12974:12974/udp
|
- 12147:12147/udp
|
||||||
- 17974:17974
|
- 17147:17147
|
||||||
- 17974:17974/udp
|
- 17147:17147/udp
|
||||||
- 27974:27974
|
- 27147:27147
|
||||||
- 27974:27974/udp
|
- 27147:27147/udp
|
||||||
- 32974:32974
|
- 32147:32147
|
||||||
- 32974:32974/udp
|
- 32147:32147/udp
|
||||||
- 37974:37974
|
- 37147:37147
|
||||||
- 37974:37974/udp
|
- 37147:37147/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: [erigon]
|
entrypoint: [erigon]
|
||||||
@@ -38,8 +38,8 @@ services:
|
|||||||
- --beacon.api.port=5555
|
- --beacon.api.port=5555
|
||||||
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
- --beacon.api=beacon,builder,debug,lighthouse,node,validator,config
|
||||||
- --caplin.discovery.addr=0.0.0.0
|
- --caplin.discovery.addr=0.0.0.0
|
||||||
- --caplin.discovery.port=17974
|
- --caplin.discovery.port=17147
|
||||||
- --caplin.discovery.tcpport=17974
|
- --caplin.discovery.tcpport=17147
|
||||||
- --chain=gnosis
|
- --chain=gnosis
|
||||||
- --datadir=/root/.local/share/erigon
|
- --datadir=/root/.local/share/erigon
|
||||||
- --http
|
- --http
|
||||||
@@ -49,13 +49,13 @@ services:
|
|||||||
- --http.vhosts=*
|
- --http.vhosts=*
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --p2p.allowed-ports=32974
|
- --p2p.allowed-ports=32147
|
||||||
- --p2p.allowed-ports=37974
|
- --p2p.allowed-ports=37147
|
||||||
- --port=12974
|
- --port=12147
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
- --torrent.port=27974
|
- --torrent.port=27147
|
||||||
- --ws
|
- --ws
|
||||||
- --ws.port=8545
|
- --ws.port=8545
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
@@ -73,7 +73,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.rule=Path(`/gnosis-mainnet`) || Path(`/gnosis-mainnet/`)}
|
||||||
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.gnosis-mainnet-erigon3-pruned-trace.middlewares=gnosis-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
gnosis-mainnet-erigon3-pruned-trace:
|
gnosis-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10640:10640
|
- 12891:12891
|
||||||
- 10640:10640/udp
|
- 12891:12891/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
command:
|
command:
|
||||||
@@ -29,7 +29,7 @@ services:
|
|||||||
- --goat=mainnet
|
- --goat=mainnet
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=10640
|
- --port=12891
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --state.scheme=hash
|
- --state.scheme=hash
|
||||||
@@ -64,19 +64,19 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.rule=Path(`/goat-mainnet-archive`) || Path(`/goat-mainnet-archive/`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-archive-leveldb-hash.middlewares=goat-mainnet-geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
goat-mainnet-archive-node:
|
goat-mainnet-archive-node:
|
||||||
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}
|
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}
|
||||||
ports:
|
ports:
|
||||||
- 15640:15640
|
- 17891:17891
|
||||||
- 15640:15640/udp
|
- 17891:17891/udp
|
||||||
entrypoint: [goatd, start]
|
entrypoint: [goatd, start]
|
||||||
command:
|
command:
|
||||||
- --chain-id=goat-mainnet
|
- --chain-id=goat-mainnet
|
||||||
- --goat.geth=/geth/geth.ipc
|
- --goat.geth=/geth/geth.ipc
|
||||||
- --p2p.external-address=${IP}:15640
|
- --p2p.external-address=${IP}:17891
|
||||||
- --p2p.laddr=0.0.0.0:15640
|
- --p2p.laddr=0.0.0.0:17891
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
networks:
|
networks:
|
||||||
- chains
|
- chains
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-mainnet`) || Path(`/goat-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.rule=Path(`/goat-mainnet`) || Path(`/goat-mainnet/`)}
|
||||||
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-mainnet-geth-pruned-pebble-path.middlewares=goat-mainnet-geth-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
goat-mainnet-node:
|
goat-mainnet-node:
|
||||||
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}
|
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_MAINNET_NODE_VERSION:-v0.2.3}
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 13272:13272
|
- 14461:14461
|
||||||
- 13272:13272/udp
|
- 14461:14461/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
command:
|
command:
|
||||||
@@ -29,7 +29,7 @@ services:
|
|||||||
- --goat=testnet3
|
- --goat=testnet3
|
||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --port=13272
|
- --port=14461
|
||||||
- --rpc.gascap=600000000
|
- --rpc.gascap=600000000
|
||||||
- --rpc.txfeecap=0
|
- --rpc.txfeecap=0
|
||||||
- --state.scheme=hash
|
- --state.scheme=hash
|
||||||
@@ -64,19 +64,19 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.rule=Path(`/goat-testnet3-archive`) || Path(`/goat-testnet3-archive/`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-archive-leveldb-hash.middlewares=goat-testnet3-geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
goat-testnet3-archive-node:
|
goat-testnet3-archive-node:
|
||||||
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}
|
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}
|
||||||
ports:
|
ports:
|
||||||
- 18272:18272
|
- 19461:19461
|
||||||
- 18272:18272/udp
|
- 19461:19461/udp
|
||||||
entrypoint: [goatd, start]
|
entrypoint: [goatd, start]
|
||||||
command:
|
command:
|
||||||
- --chain-id=goat-testnet3
|
- --chain-id=goat-testnet3
|
||||||
- --goat.geth=/geth/geth.ipc
|
- --goat.geth=/geth/geth.ipc
|
||||||
- --p2p.external-address=${IP}:18272
|
- --p2p.external-address=${IP}:19461
|
||||||
- --p2p.laddr=0.0.0.0:18272
|
- --p2p.laddr=0.0.0.0:19461
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
networks:
|
networks:
|
||||||
- chains
|
- chains
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))}
|
- ${NO_SSL:-traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Host(`$DOMAIN`) && (Path(`/goat-testnet3`) || Path(`/goat-testnet3/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)}
|
- ${NO_SSL:+traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.rule=Path(`/goat-testnet3`) || Path(`/goat-testnet3/`)}
|
||||||
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipwhitelist
|
- traefik.http.routers.goat-testnet3-geth-pruned-pebble-path.middlewares=goat-testnet3-geth-pruned-pebble-path-stripprefix, ipallowlist
|
||||||
|
|
||||||
goat-testnet3-node:
|
goat-testnet3-node:
|
||||||
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}
|
image: ${GOAT_NODE_IMAGE:-ghcr.io/goatnetwork/goat}:${GOAT_TESTNET3_NODE_VERSION:-testnet3}
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Host(`$DOMAIN`) && (Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.haqq-mainnet-haqq-pruned.rule=Path(`/haqq-mainnet`) || Path(`/haqq-mainnet/`)}
|
||||||
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.haqq-mainnet-haqq-pruned.middlewares=haqq-mainnet-haqq-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
haqq-mainnet-haqq-pruned:
|
haqq-mainnet-haqq-pruned:
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12044:12044
|
- 11169:11169
|
||||||
- 12044:12044/udp
|
- 11169:11169/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 8546
|
- 8546
|
||||||
@@ -85,7 +85,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-archive.rule=Path(`/lens-mainnet-archive`) || Path(`/lens-mainnet-archive/`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-archive.middlewares=lens-mainnet-external-node-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
lens-mainnet-archive-db:
|
lens-mainnet-archive-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -85,7 +85,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.lens-mainnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-mainnet`) || Path(`/lens-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.lens-mainnet-external-node-pruned.rule=Path(`/lens-mainnet`) || Path(`/lens-mainnet/`)}
|
||||||
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-mainnet-external-node-pruned.middlewares=lens-mainnet-external-node-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
lens-mainnet-db:
|
lens-mainnet-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -18,8 +18,8 @@ services:
|
|||||||
nofile: 1048576 # Max open files (for RPC/WS connections)
|
nofile: 1048576 # Max open files (for RPC/WS connections)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 14432:14432
|
- 12553:12553
|
||||||
- 14432:14432/udp
|
- 12553:12553/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
- 8546
|
- 8546
|
||||||
@@ -84,7 +84,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-archive.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-archive.rule=Path(`/lens-testnet-archive`) || Path(`/lens-testnet-archive/`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-archive.middlewares=lens-testnet-external-node-archive-stripprefix, ipallowlist
|
||||||
|
|
||||||
lens-testnet-archive-db:
|
lens-testnet-archive-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -84,7 +84,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))}
|
- ${NO_SSL:-traefik.http.routers.lens-testnet-external-node-pruned.rule=Host(`$DOMAIN`) && (Path(`/lens-testnet`) || Path(`/lens-testnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)}
|
- ${NO_SSL:+traefik.http.routers.lens-testnet-external-node-pruned.rule=Path(`/lens-testnet`) || Path(`/lens-testnet/`)}
|
||||||
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipwhitelist
|
- traefik.http.routers.lens-testnet-external-node-pruned.middlewares=lens-testnet-external-node-pruned-stripprefix, ipallowlist
|
||||||
|
|
||||||
lens-testnet-db:
|
lens-testnet-db:
|
||||||
image: postgres:14
|
image: postgres:14
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-mainnet-archive:
|
linea-mainnet-archive:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-archive-trace.rule=Path(`/linea-mainnet-archive`) || Path(`/linea-mainnet-archive/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-archive-trace.middlewares=linea-mainnet-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-archive-trace:
|
linea-mainnet-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-mainnet-minimal:
|
linea-mainnet-minimal:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10060:10060
|
- 14000:14000
|
||||||
- 10060:10060/udp
|
- 14000:14000/udp
|
||||||
- 30060:30060
|
- 34000:34000
|
||||||
- 30060:30060/udp
|
- 34000:34000/udp
|
||||||
- 35060:35060
|
- 39000:39000
|
||||||
- 35060:35060/udp
|
- 39000:39000/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -40,9 +40,9 @@ services:
|
|||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --networkid=59144
|
- --networkid=59144
|
||||||
- --p2p.allowed-ports=30060
|
- --p2p.allowed-ports=34000
|
||||||
- --p2p.allowed-ports=35060
|
- --p2p.allowed-ports=39000
|
||||||
- --port=10060
|
- --port=14000
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-minimal-trace.rule=Path(`/linea-mainnet-minimal`) || Path(`/linea-mainnet-minimal/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-minimal-trace.middlewares=linea-mainnet-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-minimal-trace:
|
linea-mainnet-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-mainnet:
|
linea-mainnet:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_MAINNET_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 10060:10060
|
- 12622:12622
|
||||||
- 10060:10060/udp
|
- 12622:12622/udp
|
||||||
- 30060:30060
|
- 32622:32622
|
||||||
- 30060:30060/udp
|
- 32622:32622/udp
|
||||||
- 35060:35060
|
- 37622:37622
|
||||||
- 35060:35060/udp
|
- 37622:37622/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -40,9 +40,9 @@ services:
|
|||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --networkid=59144
|
- --networkid=59144
|
||||||
- --p2p.allowed-ports=30060
|
- --p2p.allowed-ports=32622
|
||||||
- --p2p.allowed-ports=35060
|
- --p2p.allowed-ports=37622
|
||||||
- --port=10060
|
- --port=12622
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-mainnet`) || Path(`/linea-mainnet/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-mainnet-erigon3-pruned-trace.rule=Path(`/linea-mainnet`) || Path(`/linea-mainnet/`)}
|
||||||
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-mainnet-erigon3-pruned-trace.middlewares=linea-mainnet-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-mainnet-erigon3-pruned-trace:
|
linea-mainnet-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-sepolia-archive:
|
linea-sepolia-archive:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-archive-trace.rule=Path(`/linea-sepolia-archive`) || Path(`/linea-sepolia-archive/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-archive-trace.middlewares=linea-sepolia-erigon3-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-archive-trace:
|
linea-sepolia-erigon3-archive-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-sepolia-minimal:
|
linea-sepolia-minimal:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12235:12235
|
- 12410:12410
|
||||||
- 12235:12235/udp
|
- 12410:12410/udp
|
||||||
- 32235:32235
|
- 32410:32410
|
||||||
- 32235:32235/udp
|
- 32410:32410/udp
|
||||||
- 37235:37235
|
- 37410:37410
|
||||||
- 37235:37235/udp
|
- 37410:37410/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -40,9 +40,9 @@ services:
|
|||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --networkid=59141
|
- --networkid=59141
|
||||||
- --p2p.allowed-ports=32235
|
- --p2p.allowed-ports=32410
|
||||||
- --p2p.allowed-ports=37235
|
- --p2p.allowed-ports=37410
|
||||||
- --port=12235
|
- --port=12410
|
||||||
- --prune.mode=minimal
|
- --prune.mode=minimal
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-minimal-trace.rule=Path(`/linea-sepolia-minimal`) || Path(`/linea-sepolia-minimal/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-minimal-trace.middlewares=linea-sepolia-erigon3-minimal-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-minimal-trace:
|
linea-sepolia-erigon3-minimal-trace:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
linea-sepolia:
|
linea-sepolia:
|
||||||
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.1}
|
image: ${LINEA_ERIGON3_IMAGE:-erigontech/erigon}:${LINEA_SEPOLIA_ERIGON3_VERSION:-v3.0.2}
|
||||||
sysctls:
|
sysctls:
|
||||||
# TCP Performance
|
# TCP Performance
|
||||||
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
net.ipv4.tcp_slow_start_after_idle: 0 # Disable slow start after idle
|
||||||
@@ -19,12 +19,12 @@ services:
|
|||||||
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
memlock: -1 # Disable memory locking limits (for in-memory DBs like MDBX)
|
||||||
user: root
|
user: root
|
||||||
ports:
|
ports:
|
||||||
- 12235:12235
|
- 10620:10620
|
||||||
- 12235:12235/udp
|
- 10620:10620/udp
|
||||||
- 32235:32235
|
- 30620:30620
|
||||||
- 32235:32235/udp
|
- 30620:30620/udp
|
||||||
- 37235:37235
|
- 35620:35620
|
||||||
- 37235:37235/udp
|
- 35620:35620/udp
|
||||||
expose:
|
expose:
|
||||||
- 8545
|
- 8545
|
||||||
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
entrypoint: /bin/sh -c '[ ! -d /root/.local/share/erigon/chaindata/mdbx.dat ] && erigon init --datadir /root/.local/share/erigon /config/genesis.json; exec erigon "$@"' --
|
||||||
@@ -40,9 +40,9 @@ services:
|
|||||||
- --maxpeers=50
|
- --maxpeers=50
|
||||||
- --nat=extip:${IP}
|
- --nat=extip:${IP}
|
||||||
- --networkid=59141
|
- --networkid=59141
|
||||||
- --p2p.allowed-ports=32235
|
- --p2p.allowed-ports=30620
|
||||||
- --p2p.allowed-ports=37235
|
- --p2p.allowed-ports=35620
|
||||||
- --port=12235
|
- --port=10620
|
||||||
- --prune.mode=full
|
- --prune.mode=full
|
||||||
- --rpc.gascap=6000000000
|
- --rpc.gascap=6000000000
|
||||||
- --rpc.returndata.limit=1100000
|
- --rpc.returndata.limit=1100000
|
||||||
@@ -64,7 +64,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))}
|
- ${NO_SSL:-traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Host(`$DOMAIN`) && (Path(`/linea-sepolia`) || Path(`/linea-sepolia/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)}
|
- ${NO_SSL:+traefik.http.routers.linea-sepolia-erigon3-pruned-trace.rule=Path(`/linea-sepolia`) || Path(`/linea-sepolia/`)}
|
||||||
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.linea-sepolia-erigon3-pruned-trace.middlewares=linea-sepolia-erigon3-pruned-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
linea-sepolia-erigon3-pruned-trace:
|
linea-sepolia-erigon3-pruned-trace:
|
||||||
|
|||||||
@@ -99,7 +99,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-mainnet-archive`) || Path(`/metis-andromeda-mainnet-archive/`)}
|
||||||
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.metis-andromeda-mainnet-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-mainnet-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
metis-andromeda-mainnet-archive-node:
|
metis-andromeda-mainnet-archive-node:
|
||||||
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_MAINNET_DTL_VERSION:-v0.1.3}
|
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_MAINNET_DTL_VERSION:-v0.1.3}
|
||||||
|
|||||||
@@ -99,7 +99,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Host(`$DOMAIN`) && (Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.rule=Path(`/metis-andromeda-sepolia-archive`) || Path(`/metis-andromeda-sepolia-archive/`)}
|
||||||
- traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipwhitelist
|
- traefik.http.routers.metis-andromeda-sepolia-l2geth-archive-leveldb-hash.middlewares=metis-andromeda-sepolia-l2geth-archive-leveldb-hash-stripprefix, ipallowlist
|
||||||
|
|
||||||
metis-andromeda-sepolia-archive-node:
|
metis-andromeda-sepolia-archive-node:
|
||||||
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_SEPOLIA_DTL_VERSION:-v0.1.3}
|
image: ${METIS_ANDROMEDA_DTL_IMAGE:-metisdao/dtl}:${METIS_ANDROMEDA_SEPOLIA_DTL_VERSION:-v0.1.3}
|
||||||
|
|||||||
@@ -66,10 +66,10 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.base-mainnet-op-erigon-archive-trace.rule=Path(`/base-mainnet-archive`) || Path(`/base-mainnet-archive/`)}
|
||||||
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-mainnet-op-erigon-archive-trace.middlewares=base-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
base-mainnet-archive-node:
|
base-mainnet-archive-node:
|
||||||
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_MAINNET_NODE_VERSION:-v1.13.2}
|
||||||
ports:
|
ports:
|
||||||
- 18092:18092
|
- 18092:18092
|
||||||
- 18092:18092/udp
|
- 18092:18092/udp
|
||||||
|
|||||||
@@ -66,10 +66,10 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.base-sepolia-op-erigon-archive-trace.rule=Path(`/base-sepolia-archive`) || Path(`/base-sepolia-archive/`)}
|
||||||
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.base-sepolia-op-erigon-archive-trace.middlewares=base-sepolia-op-erigon-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
base-sepolia-archive-node:
|
base-sepolia-archive-node:
|
||||||
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.1}
|
image: ${BASE_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BASE_SEPOLIA_NODE_VERSION:-v1.13.2}
|
||||||
ports:
|
ports:
|
||||||
- 18487:18487
|
- 18487:18487
|
||||||
- 18487:18487/udp
|
- 18487:18487/udp
|
||||||
|
|||||||
@@ -67,10 +67,10 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.bob-mainnet-op-erigon-archive-trace.rule=Path(`/bob-mainnet-archive`) || Path(`/bob-mainnet-archive/`)}
|
||||||
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.bob-mainnet-op-erigon-archive-trace.middlewares=bob-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
bob-mainnet-archive-node:
|
bob-mainnet-archive-node:
|
||||||
image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.1}
|
image: ${BOB_NODE_IMAGE:-us-docker.pkg.dev/oplabs-tools-artifacts/images/op-node}:${BOB_MAINNET_NODE_VERSION:-v1.13.2}
|
||||||
ports:
|
ports:
|
||||||
- 16071:16071
|
- 16071:16071
|
||||||
- 16071:16071/udp
|
- 16071:16071/udp
|
||||||
|
|||||||
@@ -67,7 +67,7 @@ services:
|
|||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.tls.certresolver=myresolver}
|
||||||
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))}
|
- ${NO_SSL:-traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Host(`$DOMAIN`) && (Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`))}
|
||||||
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)}
|
- ${NO_SSL:+traefik.http.routers.boba-mainnet-op-erigon-archive-trace.rule=Path(`/boba-mainnet-archive`) || Path(`/boba-mainnet-archive/`)}
|
||||||
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipwhitelist
|
- traefik.http.routers.boba-mainnet-op-erigon-archive-trace.middlewares=boba-mainnet-op-erigon-archive-trace-stripprefix, ipallowlist
|
||||||
|
|
||||||
boba-mainnet-archive-node:
|
boba-mainnet-archive-node:
|
||||||
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18}
|
image: ${BOBA_NODE_IMAGE:-us-docker.pkg.dev/boba-392114/bobanetwork-tools-artifacts/images/op-node}:${BOBA_MAINNET_NODE_VERSION:-v1.6.18}
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user