A Bitcoin network monitor
Provides log aggregation, a Grafana dashboard, automated alerting, and a framework for doing realtime analysis (via logs and RPC) on a collection of bitcoind nodes.
- Ensure you have Python 3.10+, Docker, and docker-compose on your host.
pip install docker-compose
- Install the local infrastructure tools:
pip install -e ./infra
- Bring everything up with
bmon-config && ./dev reup
- Build local config tree:
bmon-config
- Run the database migrations:
./dev managepy migrate
- Bring docker-compose up:
docker-compose up [-d]
Then browse to http://localhost:3000
to access Grafana; use the default admin
credentials admin
/admin
. You should see a nice little sample dashboard displaying
bitcoind logs etc.
./dev test
- Try generating a block locally:
docker-compose up -d
- In one terminal:
./dev watchlogs
- In another:
./dev generateblock
bmon-infra rg <query>
ssh some-bmon-host
cd bmon/
./dev shell
from bmon.server_tasks import redisdb
from bmon.mempool import full_scan
full_scan(redisdb, '*<some txid>*')
Modify ./etc/prom-alerts.yml
and redeploy to the server with
bmon-infra -f bmon deploy
.
- Add an entry to
./infra/hosts_prod.yml
corresponding to the desired bitcoind settings. You might want to specifyssh_hostname:
andbecome_method:
. - Run
bmon-infra bootstrap
with the required arguments. If for some reason the script doesn't or can't run to completion, just do the stuff that's in there manually - it shouldn't be hard to figure out. This will output a wireguard pubkey that you should use in subsequent steps. - Modify
wg-bmon
wireguard configuration on the serverside (the bmon administrator has to do this) using the bitcoind wg pubkey. - Update the bmon secrets store with
sudo_password
for host. - Test deployment to the new host
sh bmon-infra -f new-hostname deploy
- If that succeeds, update the server's monitoring configs etc.
sh bmon-infra -t server deploy
And the new host should be fully online.
Bmon consists of two machine types: one server and many nodes. The nodes run bitcoind, and provide information to the server, which collects and synthesizes all the data necessary. The server also provides views on the data, including log exploration, metric presentation, and other high-level insights (TBD).
The bmon server runs
- loki, for log aggregation
- alertmanager, for alerts
- grafana, for presenting logs and metrics
- prometheus, for aggregating metrics
- [tbd] bmon_collector, which aggregates insights
Each bmon node (the analogue of a bitcoind node) runs
- bitcoind, which runs bitcoin
- promtail, which pushes logs into loki (on the server)
- node_exporter, which offers system metrics for scraping by prometheus
- bmon_exporter, which pushes interesting high-level data into
flowchart TD
subgraph node
node_exporter
bmon_exporter
end
subgraph server
loki
grafana
alertmanager
prometheus
loki --> grafana
prometheus --> grafana
bmon_exporter --> bmon_collector
end
subgraph node
promtail
promtail --> loki
bitcoind --> /bmon/logs/bitcoin.log
/bmon/logs/bitcoin.log --> promtail
bitcoind --> bmon_exporter
node_exporter --> prometheus
prometheus --> alertmanager
end
For simplification, all servers participate in a single wireguard network.
All known participants in bmon are listed in ./infra/hosts.yml
. This file is parsed
by ./infra/bmon_infra/infra.py
(which gets installed as the bmon-infra
), which
then configures each host over SSH (using fscm,
which itself uses mitogen, a Python library that basically facilitates remote execution of
Python code over an SSH connection).
During provisioning, a copy of the bmon
repo is cloned on each host at ~/bmon
,
and then bmon-config
(./infra/bmon_infra/config.py
) is run to generate a .env
file with all configuration and secrets based on the host's entry in hosts.yml
.
The .env
file is read in by docker-compose and used to set various parameters of the
container runtimes. The docker-compose lifecycle is managed by systemd on each host; a
user-level systemd unit is installed by the bmon-infra
command.
Since monitored hosts will live on different networks, wireguard is used to create a flat networking topology so that all hosts can be easily reached by the central bmon server, which aggregates measurements across each host.
To add a host, file an issue here and I'll give a wireguard config to use.
Wireguard is also used to simulate geographical dispersion of the monitored nodes. A VPN provider gives us Wireguard configurations for diverse networks, which we then use on certain monitored bitcoind hosts.
- One for each major release
- One for current RC
- Maintain 3 rotating versions of master, staggered backwards by
- 1 week
- 4 weeks
- 16 weeks
-
For a given block, determine when it was seen by each node. Present variance. Alert on anomalous variance.
-
For a given transaction, determine when it was seen by each node. Present variance. Alert on anomalous variance.
-
"Selfish mining" detector: alert on multiple blocks in rapid succession that cause a reorg.
- mempool empty
- inflation (rolling sum of UTXO amounts + (block_created_amt - block_destroyed_amt) > supply_at_height)
- tip older than 90 minutes
- transactions rejected from mempool
- bad blocks
- reorgs
- block reception time per node
- txn reception time per node
- reorg count (number of unused tips?)
- usual system metrics: memory usage, disk usage, CPU load, etc.
- mempool contents
- getblocktemplate contents (do they differ at all?)
- block processing time (per logs)
- block reception time diff
- txn reception time diff
- logs sent to a centralized log explorer (Loki-Grafana)
sudo cfdisk /dev/sda sudo resize2fs -p -F /dev/sda1