Skip to main content
Version: pre-release (v0.79)

Setting up a Vega node

The Vega node software supports creating a network run on a set of publicly maintained computers. The network needs validator nodes that take part in consensus, as well as data nodes that receive and store network events that can be queried.

The more people run validators, the more robust the network will be. This is however limited by scalability of the underlying consensus protocol, and also requires some diversity properties (e.g., not all validators using the same cloud provider).

danger

It is highly recommended that you have significant system administration experience before attempting to run your own validator node.

You must be able to handle and act on technical issues with your node. Being a validator involves more than just executing the Vega binary and self-staking.

Requirements

Security, infrastructure, self-stake and active communication: Prospective validators on Vega must meet the requirements for their node infrastructure as well as building trust with the community.

Validator node overview: Before beginning the process, learn how validator nodes work on Vega. Explore the different types of validator nodes that run a network, how they're chosen, and what impact their scores have on their status.

Data node overview: Read about what a data node does, how the architecture is structured, how the data is stored and how the APIs work.

Get started with a validator node

Setting up and running a validator can be broken down into these parts:

  1. Setting up the validator node
  2. Joining the network and the validator set

Get started with a data node

Setting up and running a data node with a non-validator node can be broken down into these parts:

  1. Setting up the non-validator node
  2. Setting up the data node

Maintain your node

To keep your node and its related components functioning and up-to-date, refer to the how-tos below.

TopicDescription
Restart from snapshotsThis guide will take you through using the state snapshots.
Propose and execute a protocol upgradeThis guide describes how to propose a protocol software upgrade and then upgrade the network using Visor or manually.
Rotate Ethereum keysThis guide will take you through rotating your Ethereum key for security purposes.
Rotate Vega keysThis guide will take you through rotating your Vega key for security purposes.
Resolve common issuesThis guide will describe issues you may encounter, and potential solutions.