- 1. Introduction
- 2. Installation
- 2.1. Pre-Built Binaries
- 2.2. Docker
- 2.3. Build from Source
- 2.4. Cross-Compiling
- 2.5. Homebrew
- 2.6. Update Priorities
- 3. Run a Node
- 4. Become a Validator
- 5. Validator Management
- 5.1. The validator-manager Command
- 5.1.1. Creating validators
- 5.1.2. Moving validators
- 5.1.3. Managing validators
- 5.2. Slashing Protection
- 5.3. Voluntary Exits
- 5.4. Validator Sweep
- 5.5. Validator Monitoring
- 5.6. Doppelganger Protection
- 5.7. Suggested Fee Recipient
- 5.8. Validator Graffiti
- 5.9. Consolidation
- 6. APIs
- 6.1. Beacon Node API
- 6.1.1. Lighthouse API
- 6.1.2. Validator Inclusion APIs
- 6.2. Validator Client API
- 6.2.1. Endpoints
- 6.2.2. Authorization Header
- 6.3. Prometheus Metrics
- 7. Lighthouse UI (Siren)
- 7.1. Installation
- 7.2. Authentication
- 7.3. Usage
- 7.4. FAQs
- 8. Advanced Usage
- 8.1. Checkpoint Sync
- 8.2. Custom Data Directories
- 8.3. Proposer Only Beacon Nodes
- 8.4. Remote Signing with Web3Signer
- 8.5. Database Configuration
- 8.6. Database Migrations
- 8.7. Key Recovery
- 8.8. Advanced Networking
- 8.9. Running a Slasher
- 8.10. Redundancy
- 8.11. Release Candidates
- 8.12. MEV
- 8.13. Late Block Re-orgs
- 8.14. Blobs
- 9. Command Line Reference (CLI)
- 9.1. Beacon Node
- 9.2. Validator Client
- 9.3. Validator Manager
- 9.3.1. Create
- 9.3.2. Import
- 9.3.3. Move
- 10. Contributing
- 10.1. Development Environment
- 11. FAQs
- 12. Protocol Developers
- 12.1. Lighthouse Architecture
- 13. Security Researchers
- 14. Archived
- 14.1. Merge Migration
- 14.2. Raspberry Pi 4
- 14.3. Key Management