This page covers operational procedures for Super Validator (SV) nodes: managing identities, onboarding validators, configuring rewards, and bootstrapping new networks.Documentation Index
Fetch the complete documentation index at: https://cantonfoundation-issue-365-details-history.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
SV Node Identities
An SV node involves several distinct identities across different layers:- SV identity — An EC keypair (prime256v1) that identifies the SV operator. Stable across network resets and redeployments. Generated during initial setup (see Kubernetes Deployment).
- Participant identities — Automatically generated by the Canton participant node on first startup. These are specific to a particular deployment and are not reused across network resets.
- CometBFT node identities — The node key and validator key used by the CometBFT consensus layer. These identify your node within the BFT ordering protocol.
Security Notice
An SV node operator must review any Daml code (DARs) installed on their participant node. Third-party Daml apps running on the same participant can interact with the Splice Daml models and potentially trigger unintended behavior. Only install DARs from trusted sources, and audit all third-party code before deployment.Generating Validator Onboarding Secrets
To onboard a new validator to the network, an SV generates an onboarding secret that the validator operator uses during their initial setup. The onboarding secret is a one-time credential that authorizes the new validator to connect to the Global Synchronizer. The SV web UI provides an interface for generating these secrets. Each secret is single-use and should be transmitted securely to the validator operator.Reward Weight Configuration
Each SV has a configurable reward weight that determines its share of minted Canton Coin rewards. Reward weights are set through the DSO governance process — changes require approval from a threshold of SVs. To update your SV’s reward weight, submit a proposal through the SV governance mechanism. The proposal must specify the new weight and requires sufficient votes from other SVs before it takes effect.Synchronizer Traffic Parameters
SVs collectively determine the traffic parameters for the Global Synchronizer. These parameters control the cost of ledger transactions in terms of Canton Coin. Key parameters include:- Read vs. write scaling factors — The relative cost of read operations versus write operations on the synchronizer
- CC transfer costs — The base cost for transferring Canton Coin between parties
- Traffic price — The per-byte cost for transaction data processed by the synchronizer
Bootstrapping a New Network
Bootstrapping a new Global Synchronizer deployment requires coordination among the founding SVs. The process establishes the initial network state, including the genesis configuration and initial governance parameters.Process Overview
- Agree on genesis configuration — Founding SVs agree on initial parameters: network name, initial reward weights, traffic parameters, and governance rules
- Generate SV identities — Each founding SV generates their identity keypair
- Exchange identity information — SVs share their public keys and desired SV names
- Configure CometBFT genesis — Create the CometBFT genesis file with all founding validators
- Deploy nodes — Each SV deploys their node with the agreed genesis configuration
- Verify network operation — Confirm that BFT consensus is operational and the synchronizer is processing transactions
Helm Values for Bootstrap
The release artifacts bundle includes example Helm values for each component. The SV values file configures the core SV identity and network connections:Infrastructure Considerations
- Quorum requirements — The network requires at least 2f+1 SVs online for consensus, where f is the maximum number of faulty SVs tolerated
- Geographic distribution — Distribute SVs across regions for resilience
- Network connectivity — All SVs must be able to reach each other’s sequencer endpoints
- Time synchronization — Ensure NTP is configured on all nodes for consistent timestamps
Running a Hard Domain Migration (HDM)
In rare cases, the Global Synchronizer may need a hard synchronizer migration — replacing the existing synchronizer with a new one while preserving the application state. This corresponds to a Type 3 upgrade as described in Deployment Progression. HDMs are triggered by protocol-level changes that cannot be applied through standard upgrade procedures. The migration preserves the active contract set (ACS) while creating a new synchronizer with updated protocol parameters. HDMs require coordination among all SVs and increment the migration ID. See Upgrade Procedures for the operational steps.Next Steps
- Kubernetes Deployment — Detailed SV node deployment guide
- Upgrade Procedures — Upgrading SV nodes
- Security Operations — Hardening and key management