Table of contents
◆ Getting Started
⚠ Help!
- My validator is offline! What do I do?
- Missed attestations! What can I do?
- I'm worried about downtime!
- I'm worried about slashing ⚠
- Common errors and mistakes
◆ Rewards
◆ Hardware
- Hardware requirements
- Hardware examples:
- Hardware security
- Hardware best practices
◆ Networking
- Port forwarding
- Firewalls and subnetting
- Brute-force SSH protection
- Setting up home VPN access
- Setting up Tailscale VPN
◆ Validator Clients
- Validator clients explained
- Execution clients
- Consensus clients
- Checkpoint sync
- Validator effectiveness
- MEV boost
◆ Validator Keys
◆ Tutorials
- Solo staking guides
- Installing Linux
- Use all available disk space
- Automatic security updates
- Connect with SSH
- SSH security - 2FA
- Configuring an RPC endpoint
- How to resync an execution client
- Methods to minimize downtime
- Safely migrating validator keys
- How to exit a validator
- Updating withdrawal credentials
◆ DVT
◆ Scaled Node Operators
- What is a scaled node operator?
- Security at scale
- Node health checks
- On-Call/Incidence response
- Alerting at scale
- MEV at scale
- Updates at scale
- Resource scaling
- Key management at scale
- Migration at scale
- Monitoring at scale
- Uptime at scale