-
Notifications
You must be signed in to change notification settings - Fork 810
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Holesky Rescue [INFORMATIONAL] #7040
Comments
We've just released https://github.com/sigp/lighthouse/releases/tag/v7.0.0-beta.1 |
If you are syncing Holesky, you may experience high memory usage. Tips to reduce memory usage:
Resync Lighthouse with checkpoint sync if using EL that was affected by the issueIf you are using EL that was affected by the issue, chances are the Lighthouse database has been corrupted with the invalid blocks/forks. In this case, delete the Lighthouse database and start a fresh checkpoint sync. An up-to-date checkpoint sync url is given here with the checkpoint-sync-url as: https://checkpoint-sync.holesky.ethpandaops.io/ |
I have developed a health and readiness probes for EL and CL which might come in handy. They can be found here https://github.com/mysteryForge/eth-kit. If you are using k8s I would recommend to clone the conf from here for CL and adjust for your setup. |
Latest info as of Feb 28 at ~04:00:00 UTC: (the time of this comment posted) There will be a coordinated slashing that will be happening at slot 3737760 (Feb 28, 15:12:00 UTC). If you have a Holesky node with validators, kindly proceed with the instruction at the top post about how to If you have already done so before, no further action required, other than using the latest version of clients and getting the node online. If you have not disabled slashing protection, you may now proceed to delete the slashing protection database by following the steps in the top post. Then, run the node as usual. Additional info (got from here):
|
Holesky Rescue - Feb 2025
This issue acts as a "front page" for the rescue efforts on Holesky. Holesky failed the Electra upgrade due to a config issue in some ELs.
The config issue in Nethermind, Geth & Besu resulted in an invalid block being justified. This means that for some users it will be impossible to start attesting on the valid chain without being slashed. Lighthouse will natively protect against this slashing; if you are affected your VC will log errors about slashing protection but you will not be slashed.
The community is still developing a unified approach to solving the slashing issue, but it is a strong possibility that these validators are destined to be slashed or leaked out. Even if your validators cannot attest, they can still produce blocks which is very valuable. We encourage all Holesky validators to try and get their setups online and functioning.
Lighthouse Advice
If you're a Holesky validator, we recommend you use the v7.0.0-beta.1 release.
There are some VC flags that may be relevant to your scenario:
--beacon-nodes-sync-tolerances 1000,2000,3000
--disable-attesting
No additional flags are required for the BN.
Disabling Slashing Protection
DO NOT DO THIS UNTIL INSTRUCTED TO DO SO
If your validators won't attest due to CRIT errors from the slashing protection database, you should disable slashing protection in coordination with the rest of the validator set (monitor Discord/Telegram). To disable slashing protection in Lighthouse:
slashing_protection.sqlite
file located in$datadir/validators
. You should also deleteslashing_protection.sqlite-journal
.--init-slashing-protection
. The flag is required to force Lighthouse to start in the absence of a slashing protection DB. A new slashing protection DB will be created, but will not contain any of the historic information that would block your validators from signing.Once slashing protection is disabled, your validators will most likely get slashed. Our hope is that they contribute to finalizing Holesky before doing so (hence the importance of a coordinated slashing).
EL Client Advice
The text was updated successfully, but these errors were encountered: