
solana
OCT 31, 2022
Table of Contents
Validator Checklist
Selecting a Blockchain
Hosting and Infrastructure
Managing the Keys
Server Security
Monitoring the Node State
Updates
Interacting with Other Network Participants
Conclusion
Share with your network
At the end of September, the Everstake team held a workshop for validators at the invitation of our friends in the Solana Foundation, Validator Relations Lead Tim Garcia and Product Manager Ella Kuzmenko.
We centered the workshop around questions from 20+ solo validators and rookie teams and split it up into three sections: marketing, technology, and liquid staking pools. The event lasted three and a half hours and answered 37 questions. Incidentally, that’s how many people were present.
Today, we’re happy to share a recap of the second section on tech specifications for validators that was hosted by Andrii Kravets, Head of DevOps at Everstake. The final section on staking pools will be published in the coming weeks.
The duty of a validator on any PoS blockchain is to try to achieve 100% uptime, not miss blocks, and keep delegators’ funds safe. According to the guide, this is much harder than just running a node, especially if you want to validate multiple networks.
Here’s what you should heed:
Everstake works with over 70 blockchains. The team’s technical specialists have faced and solved many problems, and now, having checked point 7, they want to share their experience with others.
The first rule of working with blockchains, especially if you risk money, is do your own research. You need to research the technology, the experience and expertise of the core teams, the plans for developing the protocol, the costs of maintaining a node, and the economic incentives.
Everstake regularly reviews the blockchains it works with and sometimes makes the tough decision to shut down the nodes. A prime example is Terra, where one failure caused the entire network to collapse and the validators to lose potential revenue.
New blockchains are particularly difficult: the code is not quite ready, documentation is sparse, and half the features are missing. It’s hard to guess what will happen to the native token in a year. There needs to be serious research to assess whether the solution is competitive and whether it can interest other participants in the blockchain ecosystem.
It is essential to understand that it is not possible to find the perfect hosting provider that will fit all parameters. When choosing a hosting provider, you should have wiggle room in case of problems: for instance, don’t sign a contract with a new provider requiring you to pay for a year in advance.
It is a good idea to test a few hosting providers first and choose the one that provides the best service. Major validators have it a little easier: it’s simpler to get discounts if you spend a lot on infrastructure, and the provider is more proactive in answering questions and resolving problems. Still, rookie validators also have an advantage: they can test three or four providers weekly, whereas in our case, it takes two months and much more money.
The most common problem with hosting providers is rate-limiting. You can take a server with 10 GB/s NIC and get only 200 MB/s or even less.

Image: Volume of the network traffic
Don’t abandon the research even if you have found an excellent hosting service. Manufacturers are constantly releasing new equipment, providers are upgrading their hardware, and moving a node to a new server can significantly improve performance. Everstake has a provider that uses Intel Optane NVMes with read/write speeds slightly lower than RAM. The team cares a lot about these servers.
It will help if you also discuss with the providers what they will do in an abnormal situation. For example, your node may get too much traffic, and the provider may shut down your server with its protection protocol, blacklist your IP address, or send you a bill for “deflecting an attack.” These points need to be discussed.
Consider three main principles: minimum privileges, constant monitoring, and mild paranoia.
Therefore, keys on a server should always be encrypted because even a shut-down server can be attacked. It will be best if you also look into ways to protect yourself as a validator on a blockchain, such as reading about disputes and the ability to reclaim validation rights if your key is slashed or the likelihood of your token issuer putting a contract on hold, freezing it, or somehow depriving you of revenue. You need to know what could happen in theory and prepare for it.
There’s also a risk that the hosting provider’s employees might decide to steal your keys or someone else could get physical access to a server. Everything should be encrypted and multi-sigged so that you won’t lose your keys in an emergency, and your employees can access them and keep working.
The main thing to know is that you can’t do without a security professional. No matter how good your DevOps, system admin or developer is, there is no substitute for a trained information security specialist.
You also need to make sure the teams do not interfere with each other. There are times when security specialists break the DevOps methodology, and the project doesn’t work with all security stuff. In such a case, a decision to, if possible, use alternative security measures must be made after weighing the pros and cons.
The second obvious point that is often forgotten is the official binaries. It is better to build everything yourself than to use some interactive tool and then find network ports that should not be open. The official binaries reduce potential attack vectors in case of problems or unwillingness to build a binary yourself.
There is also an example of firewalls. UFW is easy to use, but it’s hard to spot vulnerabilities in the generated rules. Iptables, on the other hand, are more challenging to deploy, but they don’t hide abstractions and are ultimately safer.
Third, validators also need backups. While everyone considers the risk of an attack on the validator or the network, few think about the hosting provider’s uptime. It is worth developing a migration procedure and keeping backups with other providers so that if there are problems on their side, you retain the ability to switch to another one quickly.
There is never too much monitoring. When the infrastructure grows, it is essential to monitor all components, identify problems on time or find ways to improve performance.
You should not do everything at once but make one good solution and duplicate it for other tasks. This way, you can maintain, improve, and double-check how it works. For example, you may have no trigger on a stopped validator due to some edge case. Yes, it can happen, too.

Image: Solana monitoring dashboard
We use Zabbix and Grafana with duplicate triggers and cross-draw data. We’ve come a long way in three years, and we’ve seen a lot of weird and absurd things, so it’s impossible to give a concrete guide on how to set up monitoring. You have to do it and refine it yourself.
You also need to know that monitoring runs through the whole team. You need to break down responsibilities and design in advance who will be responsible for what, who to write to if someone is unavailable, and what to do in an emergency.
For example, we have a bot that transmits alerts to Telegram, and if a person in charge does not respond in due time, it writes to other messengers or another person. Again, the bot also needs to be monitored. Ideally, make sure to duplicate the alerts in another way.
Another helpful thing is data source checking. You can get data about your node and other nodes from public services, which process data too slowly. For example, Solana Validators gather data and output an average result for the nodes’ performance. If you are a validator and run a node yourself, it makes sense to do the calculations, too: take the number of blocks created in a given period, divide it by the number of blocks you were obliged to create, and get the actual skip rate.


Image: Solana validator skip-rate and delinquent status
Also, don’t forget to monitor testnets and other services running on your servers. This way, you can detect any faults typical for your deployment and then improve your nodes on the mainnet.
Core teams constantly update things and sometimes forget to tell you about it. On the other hand, you mustn’t forget to read the documentation and change logs to see if anything useful is available in terms of security or performance.
Also, feel free to test new kernels, nodes, and systems. Do this on spare nodes but not on the main validator. Current updates often improve node performance on modern CPUs, and the newer the kernel, the fewer security issues it has (not always, of course).
The key is to ask questions of central blockchain organizations (foundations). They are used to this and can provide valuable insights: how to set up a node in a secure way, which providers are best suited for hosting, and what problems may arise and how to solve them.
Blockchains are decentralized and open, and validators should strive for that. If you find a bug, don’t try to fix it yourself, but report it to GitHub. Maybe they will offer you a workaround. This way, you help yourself and the entire ecosystem, ultimately affecting your earnings and prospects.
The same goes for communicating with other validators. Yes, we are competitors, but we are working together to make blockchain work, to share expertise, and to improve protocols. If you have something to share, publish open source, share dashboards, and discuss ideas. There will always be people who can help you improve your solution, and you won’t lose your competitive edge. You’ll even win. If you have done a lot of work and don’t want to give it away for free, you can apply for a grant and turn it into a paid service.
The first thing to do is research, ask other validators and project representatives, and find out what they have and how they are doing.
Next, find a good hosting provider and discuss the details of cooperation, but don’t stop testing others or thinking about alternatives.
Once the node runs, you need to secure the keys and the server, develop a threat model and think about the potential risks and losses. Security must be handled by a specialist, not an employee in another specialty that you are taking away from their direct responsibilities.
Nodes must be monitored all the time but set up alert systems and work out response scenarios for all sorts of problems. It’s better to make a good solution for monitoring the most critical indicators than use a fancy service with an unclear methodology.
It is necessary and useful to update the node, especially if you are running on the newest hardware. But update wisely so as not to break the core validator.
And while all validators are technically competitors, they are willing to help each other for a common goal. So don’t hesitate to ask questions and seek help.
Check out our Twitter for the latest updates, and see our Blog for further valuable information, news, and best industry practices.
Share with your network

solana
While priority fees incentivize block inclusion through economic bidding, Stake-weighted Quality of Service (SWQoS) ensures transactions actually reach the validator during high congestion by providing a dedicated, stake-backed network lane.
MAR 04, 2026

solana
This article explores how Solana’s Proof of History functions as a cryptographic clock to establish a verifiable sequence of events, eliminating the communication setbacks found in traditional blockchains.
FEB 24, 2026

ethereum
solana
Everstake has partnered with Digital Shield to support a security-first approach to non-custodial staking for self-custody users. As staking becomes a foundational component of Proof-of-Stake networks, the reliability of validator infrastructure and the clarity of custody boundaries are increasingly important. This partnership brings together hardware-based key protection and non-custodial validator operations to support secure participation...
FEB 05, 2026
Disclaimer
Everstake, Inc. or any of its affiliates is a software platform that provides infrastructure tools and resources for users but does not offer investment advice or investment opportunities, manage funds, facilitate collective investment schemes, provide financial services or take custody of, or otherwise hold or manage, customer assets. Everstake, Inc. or any of its affiliates does not conduct any independent diligence on or substantive review of any blockchain asset, digital currency, cryptocurrency or associated funds. Everstake, Inc. or any of its affiliates’s provision of technology services allowing a user to stake digital assets is not an endorsement or a recommendation of any digital assets by it. Users are fully and solely responsible for evaluating whether to stake digital assets.
By submitting this form, you are acknowledging that you have read and agree to our Privacy Notice, which details how we collect and use your information.
SECURITY
RESOURCES
Everstake Validation Services LLC
Hermes Corporate Services Ltd., Fifth Floor, Zephyr House
122 Mary Street, George Town, P.O. Box 31493
Grand Cayman KY1-1206, Cayman Islands
Everstake is a software platform that provides infrastructure tools and resources for users but does not offer investment advice or investment opportunities, manage funds, facilitate collective investment schemes, provide financial services or take custody of, or otherwise hold or manage, customer assets. Everstake does not conduct any independent diligence on or substantive review of any blockchain asset, digital currency, cryptocurrency or associated funds. Everstake’s provision of technology services allowing a user to stake digital assets is not an endorsement or a recommendation of any digital assets by it. Users are fully and solely responsible for evaluating whether to stake digital assets. All metrics displayed on the website, including without limitations value of staked assets, total number of active users, rewards rates, and networks supported, are historical figures and may not represent the actual real-time data.
Copyright © 2026 Everstake