Disable SELinux
sed -i 's/SELINUX=enforcing/SELINUX=disabled/g' /etc/selinux/config
Install the software package
yum install -y zip unzip ntp epel-release
Synchronize network time
ntpdate -u cn.pool.ntp.org
#Add a scheduled task to automatically synchronize the time at 3 o'clock in the morning every day
echo "0 3 * * * /usr/sbin/ntpdate -u cn.pool.ntp.org ;/usr/sbin/hwclock -w" >>/var/spool/cron/root
Install related dependencies
rpm -ivh https://mirrors.aliyun.com/centos-vault/8.0.1905/BaseOS/x86_64/os/Packages/crypto-policies-20181217-6.git9a35207.el8.noarch.rpm
rpm -ivh --replacefiles https://mirrors.aliyun.com/centos-vault/8.1.1911/BaseOS/x86_64/os/Packages/openssl-libs-1.1.1c-2.el8_1.1.x86_64.rpm
rpm -ivh --replacefiles https://mirrors.aliyun.com/centos-vault/8.1.1911/BaseOS/x86_64/os/Packages/openssl-1.1.1c-2.el8_1.1.x86_64.rpm
rpm -ivh https://mirrors.aliyun.com/centos-vault/7.0.1406/os/x86_64/Packages/libevent-2.0.21-4.el7.x86_64.rpm
yum install -y supervisor
Adjust the maximum number of files that users can use:
echo -ne "
* soft nofile 65536
* hard nofile 65536
" >> /etc/security/limits.conf
Kernel parameter optimization
echo -ne "
net.ipv4.tcp_max_tw_buckets=10000
net.ipv4.tcp_sack=1
net.ipv4.tcp_window_scaling=1
net.ipv4.tcp_rmem=4096 87380 4194304
net.ipv4.tcp_wmem=4096 16384 4194304
net.ipv4.tcp_max_syn_backlog=65536
net.core.netdev_max_backlog=65536
net.core.somaxconn=32768
net.core.wmem_default=8388608
net.core.rmem_default=8388608
net.core.wmem_max=16777216
net.core.rmem_max=16777216
net.ipv4.tcp_synack_retries=2
net.ipv4.tcp_syn_retries=2
net.ipv4.tcp_tw_recycle=1
net.ipv4.tcp_tw_reuse=1
net.ipv4.tcp_keepalive_time=1200
net.ipv4.tcp_mem=94500000 915000000 927000000
net.ipv4.tcp_max_orphans=3276800
net.ipv4.ip_local_port_range=9000 65000
vm.swappiness=0
net.ipv4.tcp_fin_timeout=15
fs.file-max=1048576
" >> /etc/sysctl.conf
Use jemalloc to optimize memory usage In order to optimize the memory usage, you can use jemalloc instead of the system glibc malloc, the method is as follows: centos7 (you need to restart the server after configuration):
rpm -ivh https://cbs.centos.org/kojifiles/packages/jemalloc/3.6.0/8.el7.centos/x86_64/jemalloc-3.6.0-8.el7.centos.x86_64.rpm
rpm -ivh https://cbs.centos.org/kojifiles/packages/jemalloc/3.6.0/8.el7.centos/x86_64/jemalloc-devel-3.6.0-8.el7.centos.x86_64.rpm
echo "/usr/lib64/libjemalloc.so" >> /etc/ld.so.preload
Minimum configuration to run BCF program:
CPU: 2+ cores (X86,main frequency 3.0G+)
Memory: 8G
Hard Disk: SSD 500G or above
System: CentOS 7.*
we recommend that you use the following configuration equipment:
CPU: 8 cores (main frequency 3.0G+)+
Memory: 16G
Hard Disk: SSD 2T or above
System: CentOS 7.*
The installation and configuration steps of the node program and the upgrade service program are as follows:
Create a directory for bfmchain
mkdir -p /data
Upload the zip files (the compressed file contains the BFMeta program and the upgrade service program) and unzip it to the /data directory
unzip -o -q /data/release/bfmchain.zip -d /data/
Grant executable permissions to the file
chmod u+x /data/bfmchain/bcf
chmod u+x /data/bfmchain/mongoComponents/linux/mongo*
chmod u+x /data/upgrade/mongoComponents/linux/mongo*
chmod u+x /data/upgrade/upgrade
echo "export BCF_HOME=/data/bfmchain" >> /etc/profile
#effective environment change
source /etc/profile
Configure supervisor (manage BFMeta running in the background and upgrade service process)
echo -ne "
[program:bcf]
command=/data/bfmchain/bcf ;
directory=/data/bfmchain
autostart=true ;
user=root ;
autorestart=unexpected ;
exitcode=0,2 ;
startretries=3 ;
priority=999 ;
redirect_stderr=true ;
stdout_logfile_maxbytes=50MB ;
stdout_logfile_backups = 20 ;
stdout_logfile=/data/bfmchain/logs/bcf.log ;
stopasgroup=true ;
" >> /etc/supervisord.d/bcf.ini
echo -ne "
[program:upgrade]
command=/data/upgrade/upgrade ;
directory=/data/upgrade
autostart=true ;
user=root ;
autorestart=unexpected ;
exitcode=0,2 ;
startretries=3 ;
priority=999 ;
redirect_stderr=true ;
stdout_logfile_maxbytes=50MB ;
stdout_logfile_backups = 20 ;
stdout_logfile=/data/upgrade/logs/console.log ;
stopasgroup=true ;
" >> /etc/supervisord.d/upgrade.ini
System firewall policy
Allow all external ip access:
firewall-cmd --add-port=22000/tcp --add-port=22001/tcp --add-port=22002/tcp --add-port=22003/tcp --add-port=22005/tcp --add-port=22007/tcp --add-port=22009/tcp --permanent
Allow external ip (such as 1.1.1.1/32) to access:
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22000" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22001" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22002" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22003" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22005" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22007" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="1.1.1.1/32" port port="22009" protocol="tcp" accept"
iptable
Allow all external ip access:
iptables -A INPUT -p tcp -m multiport --dport 22000:22003,22005,22007,22009 -m state --state NEW,ESTABLISHED -j ACCEPT
Allow external ip (such as 1.1.1.1/32) to access:
iptables -A INPUT -p tcp -m multiport --dport 22000:22003,22005,22007,22009 -m state --state NEW,ESTABLISHED -s 1.1.1.1/32 -j ACCEPT
Cloud platform fire protection strategy The node program is deployed on the cloud server, and the firewall inbound rules need to be opened according to the cloud service provider's operating document.
Google Cloud:
1. Go to the "Firewall" (Network---VPC Network--Firewall) page in the Google Cloud Console.
2. Click Create firewall rule.
3. Enter the name of the firewall rule. The name must be unique in the project.
4. Specify the network to implement firewall rules.
5. Specify the priority of the rule.
6. Select inbound as the flow direction.
7. For the operation performed on the matching item, select Allow.
8. For the target, perform one of the following operations:
If you want to allow traffic from the BFMeta node instance to all clients in the network, please select all instances in the network.
If you want to allow traffic from a specific client of the BFMeta node instance, select the specified target tag. Enter the instance name of the client in the target tag.
9. Keep the default value of the IP address range of the source filter condition.
10. For the source IP address range, enter the IP address range of the BFMeta node instance to be allowed as the source of access.
You can enter 0.0.0.0/0 to allow all ip address access traffic to pass, or you can enter a specific IP address to restrict access to only that ip address (the CIDR notation must be used).
11. Keep the default value of none for the secondary source filter condition.
12. For the protocol and port, please select the specified protocol and port, and then:
Check the tcp checkbox and enter 22000,22001,22002,22003,22005,22007,22009 in the associated field.
13. Choose Create.
a) The open ports of all backend cloud servers allow all ip addresses to access:
b) The open ports of all the back-end cloud servers allow access with characteristic ip addresses (such as 1.1.1.1):
c) The open port of the cloud server with a specific back-end tag (such as BFMeta node) allows all ip addresses to access:
d) The open port of the cloud server with a specific back-end tag (such as BFMeta node) allows access to the characteristic ip address (such as 1.1.1.1):
AWS:
Click on the instance details that need to be configured "Security"-"Security Group":
Then click "Edit Security Group Rules" in the pop-up security group:
Add inbound rules:
Ali Cloud:
Log in to the ECS cloud server console If you can't see the ECS instance, you can switch the geographic search to find the target instance that needs to be operated.
In the instance list, click "More"-"Network and Security Group"-"Security Group Configuration"
Open the security group configuration interface and click "Configure Rules"
Security group access rule configuration (manually add rules) The access rules in the security group rules have two aspects, namely the inbound direction and the outbound direction. The inbound direction refers to the direction in which users access the server, and the outbound direction refers to the outbound access of the cloud server, which is generally not restricted.
Start BFMeta node program-BCF
systemctl enable supervisord
systemctl start supervisord
Configuration | IP | |
---|---|---|
Node1 | CPU: 16 cores Memory: 16G Bandwidth: 1G SSD: 1T System: centos 7.8 | 172.30.56.61 |
Node2 | CPU: 16 cores Memory: 16G Bandwidth: 1G SSD: 1T System: centos 7.8 | 172.30.56.62 |
Node3 | CPU: 16 cores Memory: 16G Bandwidth: 1G SSD: 1T System: centos 7.8 | 172.30.56.63 |
Please make sure that your device has installed the appropriate dependent environment.
Create BFMeta directory
mkdir -p /data/bfmchain/
Download the release version to obtain the complete BFMeta installation package (bfmchain.zip).
Unzip bfmchain.zip to the /data/bfmchain directory
unzip -o -q /data/release/bfmchain.zip -d /data/bfmchain
Grant executable permissions to the file
chmod u+x /data/bfmchain/bcf
chmod u+x /data/bfmchain/mongoComponents/linux/mongo*
chmod u+x /data/bfmchain/turnserver/bin/turnserver
echo "export BCF_HOME=/data/bfmchain" >> /etc/profile
#Effective environment variables
source /etc/profile
Configuration file
Download genesis block Purchase the genesis block from the BFMeta team and put the files in the /data/bfmchain/genesisInfos directory
Modify the configuration file (/data/bfmchain/conf/base-config.json)
Configure the externally introduced genesis block isGenesisInfoProvideExternally to true Configure the official network or test network bnid as b or c Configure the imported genesis chain chain name chainName Configure the blockchain asset name chainAssetType of the imported genesis block Configure the magic chainMagic of the imported genesis block
Configure node IP Modify the peers field in the configuration file /data/bfmchain/conf/bfm-config-mainnet.json and add the ip of the initial connection
Configure supervisor (manage the BFMeta process running in the background)
echo -ne "
[program:bcf]
command=/data/bfmchain/bcf;
directory=/data/bfmchain
autostart=true;
user=root;
autorestart=unexpected;
exitcode=0,2;
startretries=3;
priority=999;
redirect_stderr=true;
stdout_logfile_maxbytes=50MB;
stdout_logfile_backups = 20;
stdout_logfile=/data/bfmchain/logs/bcf.log;
stopasgroup=true;
">> /etc/supervisord.d/bcf.ini
System firewall strategy (only 3 nodes are open for interconnection)
FIREWALLD:
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22000" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22001" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22002" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22003" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22005" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22007" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.61" port port="22009" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22000" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22001" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22002" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22003" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22005" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22007" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.62" port port="22009" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22000" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22001" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22002" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22003" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22005" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22007" protocol="tcp" accept"
firewall-cmd --permanent --add-rich-rule="rule family="ipv4" source address="172.30.56.63" port port="22009" protocol="tcp" accept"
iptables:
iptables -A INPUT -p tcp -m multiport --dport 22000:22003,22005,22007,22009 -m state --state NEW,ESTABLISHED -s 172.30.56.61,172.30.56.62,172.30.56.63 -j ACCEPT
Start BFMeta node program-BCF
systemctl enable supervisord
systemctl start supervisord
Disable SELinux
sed -i 's/SELINUX=enforcing/SELINUX=disabled/g' /etc/selinux/configselinux/config
setenforce 0
Install the software package
yum install -y zip unzip epel-release
Configure to add a clock source
sed -i "/^pool/ a pool cn.pool.ntp.org iburst" /etc/chrony.conf
chronyc makestep
Adjust the maximum number of files that users can use:
echo -ne "
* soft nofile 65536
* hard nofile 65536
" >> /etc/security/limits.conf
Kernel parameter optimization
echo -ne "
net.ipv4.tcp_max_tw_buckets=10000
net.ipv4.tcp_sack=1
net.ipv4.tcp_window_scaling=1
net.ipv4.tcp_rmem=4096 87380 4194304
net.ipv4.tcp_wmem=4096 16384 4194304
net.ipv4.tcp_max_syn_backlog=65536
net.core.netdev_max_backlog=65536
net.core.somaxconn=32768
net.core.wmem_default=8388608
net.core.rmem_default=8388608
net.core.wmem_max=16777216
net.core.rmem_max=16777216
net.ipv4.tcp_synack_retries=2
net.ipv4.tcp_syn_retries=2
net.ipv4.tcp_tw_reuse=1
net.ipv4.tcp_keepalive_time=1200
net.ipv4.tcp_mem=94500000 915000000 927000000
net.ipv4.tcp_max_orphans=3276800
net.ipv4.ip_local_port_range=9000 65000
vm.swappiness=0
net.ipv4.tcp_fin_timeout=15
fs.file-max=1048576
" >> /etc/sysctl.conf
sysctl -p
Install dependencies
yum -y install compat-openssl10
Minimum configuration to run BCF program:
CPU: 2+ cores (X86,main frequency 3.0G+)
Memory: 8G
Hard Disk: SSD 500G or above
System: RockyLinux 8.x
we recommend that you use the following configuration equipment:
CPU: 8 cores (main frequency 3.0G+)+
Memory: 16G
Hard Disk: SSD 2T or above
System: RockyLinux 8.x
The installation and configuration steps of the node program and the upgrade service program are as follows:
Create a directory for bfmchain
mkdir -p /data
Upload the zip files (the compressed file contains the BFMeta program and the upgrade service program) and unzip it to the /data directory
unzip -o -q bfmeta-mainnet-3.7.2-linux-full.zip -d /data/
Grant executable permissions to the file
chmod u+x /data/bfmeta/bcf
chmod u+x /data/bfmeta/mongoComponents/linux/mongo*
chmod u+x /data/upgrade/mongoComponents/linux/mongo*
chmod u+x /data/upgrade/upgrade
Set the main program environment variable
echo "export BCF_HOME=/data/bfmeta" >> /etc/profile
source /etc/profile
Run node program manually
cd /data/bfmeta/
./bcf
Configure supervisor (manage BFMeta running in the background and upgrade service process)
Install supervisor
yum install -y supervisor
Configure managed nodes and upgrade service processes
echo -ne "
[program:bcf]
command=/data/bfmeta/bcf ;
directory=/data/bfmeta
autostart=true ;
user=root ;
autorestart=unexpected ;
exitcode=0,2 ;
startretries=3 ;
priority=999 ;
redirect_stderr=true ;
stdout_logfile_maxbytes=50MB ;
stdout_logfile_backups = 20 ;
stdout_logfile=/data/bfmeta/logs/bcf.log ;
stopasgroup=true ;
" >> /etc/supervisord.d/bcf.ini
echo -ne "
[program:upgrade]
command=/data/upgrade/upgrade ;
directory=/data/upgrade
autostart=true ;
user=root ;
autorestart=unexpected ;
exitcode=0,2 ;
startretries=3 ;
priority=999 ;
redirect_stderr=true ;
stdout_logfile_maxbytes=50MB ;
stdout_logfile_backups = 20 ;
stdout_logfile=/data/upgrade/logs/console.log ;
stopasgroup=true ;
" >> /etc/supervisord.d/upgrade.ini
Start supervisord service
systemctl start supervisord
upervisor View process status
supervisorctl status
Start/stop bcf service using supervisor
supervisorctl start bcf
supervisorctl stop bcf
Set the supervisord service to start at boot
systemctl enable supervisord
System firewall policy
firewall-cmd --list-all
firewall-cmd --zone=public --add-port=24000/tcp --add-port=24001/tcp --add-port=24002/tcp --add-port=24003/tcp --add-port=24005/tcp --add-port=24007/tcp --add-port=24009/tcp --permanent
firewall-cmd --reload
firewall-cmd --list-all