Run an execution client
In order to perform validation duties, you need to also be running an execution client — at least one for each beacon node.
Nimbus has been tested all major execution clients, see the execution client comparison for more information.
You need to run your own execution client. Relying on third-party services such as Infura, Alchemy and Pocket is no longer possible. Sharing the same execution client between multiple beacon nodes is not supported.
Syncing an execution client may take hours or even days, depending on your hardware!
1. Install execution client
Select an execution client and install it, configuring it such that that the authenticated JSON-RPC interface is enabled and a JWT secret file is created.
In parallel to
nimbus-eth2, we are working hard on the Nimbus execution client.
While this is very much a project in development (i.e. not yet ready for public consumption), we welcome you to experiment with it.
1. Install Geth
See the Installing Geth for instructions on installing Geth.
2. Start Geth
Once you have geth installed, make sure to enable the authenticated JSON-RPC interface when running geth:
See the Getting started guide to set up Nethermind.
Make sure to enable the JSON-RPC interface and pass
--JsonRpc.JwtSecretFile=/tmp/jwtsecret to select a JWT secret file location.
See the Besu documentation for instructions on setting up Besu.
Make sure to enable the JSON-RPC interface and store the JWT token in
See the Erigon README for instructions on setting up Erigon.
Make sure to enable the JSON-RPC interface and use
--authrpc.jwtsecret=/tmp/jwtsecret to set a path to the JWT token file.
2. Leave the execution client running
The execution client needs to be running at all times in order for the beacon node to be able to support validators. It will start its syncing process as soon as the beacon node connects to it. Once both are synced, they will continue to work in tandem to validate the latest Ethereum state.
It is safe to start the beacon node even if the execution client is not yet fully synced, and vice versa.
3. Pass the URL and JWT secret to Nimbus
--el option informs the beacon node how to connect to the execution client — both
ws:// URLs are supported.
By default, the execution client accepts connections on the localhost interface (
127.0.0.1), with default authenticated RPC port
--el option is not explicitly specified, Nimbus will assume that the execution client is running on the same machine with such default settings.
Once started, the execution client will create a file containing a JWT secret token. The token file is needed for Nimbus to authenticate itself with the execution client and perform trusted operations. You will need to pass the path to the token file to Nimbus together with the web3 URL.
--jwt-secret option is not specified and the execution client is running on the same machine under default setting, Nimbus may be able to connect successfully to it by using the default secret value
This is a proposed standard protocol that aims to simplify the required user configuration, but it's not yet adopted by all execution clients.
Running multiple execution clients
You can increase the resilience of your setup and eliminate any downtime during upgrade procedure of the execution client software by allowing your beacon node to manage multiple execution clients.
To enable this mode, just specify multiple URLs through the
--el option when starting your beacon node:
./run-mainnet-beacon-node.sh \ --el=http://127.0.0.1:8551 \ --el=ws://other:8551 \ --jwt-secret=/tmp/jwtsecret
You can use a different secret for each connection by specifying
jwt-secret-file as a query parameter in the anchor section of the URL (e.g.
If you use a TOML config file, you can also use the following, more natural, syntax:
As long as any of execution clients remains operational and fully synced, Nimbus will keep performing all validator duties.
To carry out an upgrade procedure without any downtime, just restart the execution clients one by one, waiting for each instance to re-sync before moving to the next one.
If you use this mode with different execution client implementations, Nimbus will act as an execution layer consensus violation detector, preventing the publishing of blocks that may trigger a catastrophic partitioning in the network.