Updated Knowledge Base

Knowledge Base

Updated Knowledge Base

Sep 19, 2020, by Chris

We improved our guide about updating cardano node to latest version 1.19.1.

Since we received some questions about updating cardano-node to 1.19.1 we improved the corresponding article in our Knowledge Base. If you have any questions feel free to contact us. We're happy to help and appreciate any feedback!


written by: Chris     published at: Sep 19, 2020
Further articles you might be interested in

Update grafana metrics when updating to cardano-node 1.25.1

Feb 2, 2021 by Chris

Cardano's [CAFE] and [CAFE2] are updated to newest version 1.25.1. For all stake pool operators (SPOs) it is important to know that with release of 1.25.1 the mainnet-config.json in the repository of CF / IOHK was consolidated and is a lot slimmer than previous! Some names of statistic variables have changed. In most cases the wording "ChainDB_" was removed. So be sure to update your grafana dashboard so that you can still enjoy your statistics after update to 1.25.1.


How to setup prometheus and grafana on a dedicated machine to monitor your cardano nodes

Nov 21, 2020 by Chris

Prometheus and grafana are helpful tools to monitor your nodes. They have a built-in alert function which notifies you about arising problems. This guide will show how to setup your infrastructure to do this monitoring with a separate machine thus not requiring additional installations on your vital cardano nodes.


Converting YAML to JSON when configuring RTView

Nov 8, 2020 by Chris

RTView is a new monitoring tool released by IOHK. When configuring or installing RTView, you might need the help of yaml to json converters.


Cardano Stake Pool Course

Oct 3, 2020 by Chris

A great way to help new stake pool operators in setting up their own stake pool is learning from the docs of the official Cardano Stake Pool School. It was launched by the Cardano Foundation in August 2020.


Security Tipps for Stake Pool Operators (SPOs)

Sep 21, 2020 by Chris

This article aims to provide an additional layer of security to your nodes according to swiss cheese model by preventing SSH login via public WAN. Using VPN and (V)LANs both relay- and block-producing nodes get isolated from the web.