Skip to main content
This page outlines the infrastructure requirements for running a validator node on Canton Network. Requirements vary by deployment method and scale.

Minimum Requirements

Hardware

Requirements vary based on your expected usage level:
Usage LevelValidator CPUsValidator RAMDB CPUsDB RAMDB Storage
Development/Local16 GB11 GB1 GB
Low-activity production28 GB24 GB10 GB
Moderate-activity production216 GB24 GB100 GB
ComponentMinimumRecommended
Network100 Mbps1 Gbps
Storage typeSSDNVMe
Storage requirements grow over time based on transaction volume. Plan for growth and consider implementing pruning. Database components are sensitive to latency—place managed databases in the same region and zone as your cluster.

Software

ComponentVersionNotes
Operating SystemLinux (Ubuntu 22.04+, RHEL 8+)Windows not supported for production
Docker24.0+If using Docker Compose deployment
Docker Compose2.26.0+Required for quickstart
Kubernetes1.27+If using Kubernetes deployment
PostgreSQL14+For participant database
Java17 or 21Java 22+ is not supported

Network

RequirementDetails
Static egress IPRequired for network allowlisting
Outbound connectivityHTTPS (443) to Global Synchronizer endpoints
Firewall rulesAllow outbound to synchronizer IPs
DNS resolutionMust resolve sync.global domains

Deployment Options

Docker Compose (Development/Small Scale)

Suitable for development, testing, and small-scale deployments.
# Minimum Docker resources
Docker Desktop:
  Memory: 8 GB
  CPUs: 4
  Disk: 50 GB

Colima (Mac):
  colima start --memory 8 --cpu 4
Pros:
  • Simple setup
  • Good for development
  • Lower operational overhead
Cons:
  • Limited scalability
  • Manual high availability setup
  • Not suitable for large-scale production

Kubernetes (Production)

Recommended for production deployments requiring high availability and scalability. Minimum cluster:
ComponentCountResources
Nodes3+For high availability
CPU per node4 coresProduction workloads
RAM per node16 GBWith headroom
Storage classSSD-backedLow-latency required
Recommended Kubernetes distributions:
  • AWS EKS
  • Google GKE
  • Azure AKS
  • Self-managed (with experience)

Database Requirements

The participant node requires a PostgreSQL database:
ParameterDevelopmentProduction
Version14+14+
Storage50 GB500 GB+
IOPSStandard3000+
Connections50200+
BackupOptionalRequired

Database Hosting Options

OptionProsCons
Managed (RDS, Cloud SQL)Automated backups, HACost, less control
Self-managedFull control, cost-effectiveOperational overhead
Container-localSimple setupNot for production

Network Architecture

Ingress Requirements

Your validator needs to be reachable for:
ServicePortPurpose
Ledger API5001/5003Application access
Admin API5002Node administration
Health endpointsVariousMonitoring
Never expose Admin API to the public internet. Use VPN or private networks for administrative access.

Egress Requirements

Your validator connects outbound to:
DestinationPurpose
Global Synchronizer sequencerTransaction submission
Global Synchronizer mediatorConfirmation protocol
Super Validator endpointsOnboarding, sponsorship
Ensure your firewall allows outbound HTTPS (443) to:
  • *.sync.global
  • *.canton.network.digitalasset.com

IP Allowlisting

Canton Network requires egress IP registration:
  1. Single IP per environment: DevNet, TestNet, and MainNet each require a distinct IP
  2. Static IP required: Dynamic IPs cannot be allowlisted
  3. NAT considerations: Ensure all traffic egresses through the registered IP

Scaling Considerations

Factors Affecting Scale

FactorImpact
Number of hosted partiesDatabase size, memory usage
Transaction volumeCPU, network, database IOPS
Contract complexityCPU for Daml execution
Historical retentionStorage requirements

Scaling Strategies

StrategyWhen to Use
Vertical scalingIncrease node resources for moderate growth
Database optimizationTune PostgreSQL for workload
PruningRemove old data to manage storage
PQS offloadingMove read queries to separate service

Security Requirements

Network Security

RequirementDetails
TLSAll API endpoints must use TLS 1.2+
FirewallWhitelist-based access control
Network isolationSeparate management and data planes
DDoS protectionRecommended for public endpoints

Key Management

Key TypeStorage
Party keysHSM recommended for production
TLS certificatesSecure certificate management
Database credentialsSecrets management (Vault, KMS)

Access Control

AccessRecommendation
Admin APIVPN or private network only
SSH/ConsoleKey-based, MFA enabled
DatabaseNetwork-restricted, strong passwords

Cloud-Specific Guidance

AWS

ServiceRecommendation
ComputeEC2 (m6i.xlarge+) or EKS
DatabaseRDS PostgreSQL or Aurora
Storagegp3 EBS volumes
NetworkingVPC with NAT Gateway

Google Cloud

ServiceRecommendation
ComputeGCE (n2-standard-4+) or GKE
DatabaseCloud SQL PostgreSQL
StorageSSD persistent disks
NetworkingVPC with Cloud NAT

Azure

ServiceRecommendation
ComputeVM (Standard_D4s_v5+) or AKS
DatabaseAzure Database for PostgreSQL
StoragePremium SSD
NetworkingVNet with NAT Gateway

Next Steps