Bean Cash (BITB) Pool Setup — Safe, Verifiable Operator Steps
Before you write configs, confirm BITB is actually mineable with your chosen daemon build. Some coins change consensus over time. This page shows the checks to run so your pool does not launch against the wrong assumptions.
BITB setup mindset: verify first, automate second
Treat BITB integration as an engineering verification task. Confirm the daemon can serve templates and accept blocks, then build the share and payout pipeline around observed behavior. Avoid relying on old forum posts or assumed parameters.
- Consensus check: Verify how BITB produces blocks with your daemon build.
- RPC surface: Confirm which wallet and template calls are available.
- Payout realism: Test small sends; observe fee and unlock behavior.
- Monitoring first: Add alerts before you accept external hashpower.
Software choices for BITB, depending on your constraints
If BITB support requires customization, pick the stack that makes changes easy to review. A quick UI is useful, but operator control and audit logs matter more when chain behavior is uncertain.
- Yiimp base: Good when the coin behaves like typical SHA256 daemons. See the Yiimp setup guide.
- Miningcore base: Good when you want clean services and APIs. See the Miningcore setup guide.
- Custom glue: Sometimes BITB needs adapters around RPC and payout calls.
Do not expose endpoints until you can mine a block in a controlled test. A “pool” that cannot submit blocks reliably will generate support debt instantly.
What we set up for a BITB pool (when PoW is supported)
- BITB daemon vetting: Build/install, then confirm getblocktemplate and block submission paths.
- Wallet automation: Encrypt, unlock strategy, backups, and controlled hot wallet funding.
- Share ingestion: DB sizing and pruning so share writes never back up.
- Reward logic: Choose a payout model and document it (see payout schemes).payout model guide.)
- Operator visibility: Dashboards for height, rejects, payout queue, and wallet balance.
- Security controls: Network hardening and access review (see hardening guide).
If BITB’s daemon differs from Bitcoin‑like RPC, we adapt the integration and document the deviations. The goal is to keep pool operators in control of the unknowns.
BITB miner strings and worker conventions
Once BITB is validated, publish concise miner examples and one worker naming rule. Keep the defaults simple and enforce them server‑side.
stratum+tcp://POOL-DOMAIN:3333
stratum+ssl://POOL-DOMAIN:3443
We also document how to rotate payout addresses safely, so miner support does not depend on ad‑hoc wallet moves.
BITB validation topics that prevent bad launches
- Is it PoW today?: Confirm BITB’s current consensus and whether pool mining is supported by your chosen codebase.
- UTXO management: High‑frequency payouts can create many small outputs; plan consolidation and wallet performance checks.
- Upgrade discipline: Record daemon version and config flags so future upgrades can be staged and tested without surprises.
BITB production checklist
- BITB daemon behavior verified: templates, submit, and restart paths.
- RPC locked down; only pool services can reach it.
- Wallet encryption and backups validated; restore tested once.
- Stratum endpoints configured; rejects and bans recorded with reasons.
- Database growth modeled; pruning job tested under load.
- Payout process dry‑run completed; manual pause/resume confirmed.
- Operator docs published; support flow and escalation defined.
BITB pool setup questions (and what to check)
How do I confirm BITB can be mined by a pool?
Run the daemon, inspect help output for template and submit calls, and perform a controlled local mining test. If the daemon cannot provide a usable template, pool setup will stall.
What if BITB changes behavior after a daemon upgrade?
We stage upgrades, re‑run the validation tests, and compare template and wallet behavior before promoting to production. That prevents silent breaks.
Can you build a private BITB pool for an internal farm?
Yes. Private pools can limit user management and public UI, while still keeping monitoring and payout safety. The core validation steps remain the same.
How do you keep BITB wallet keys safe on a pool server?
We keep hot wallet exposure minimal, restrict OS access, and design a backup and rotation plan. For higher security needs, we can add offline custody workflows.
What information helps you scope a BITB engagement?
Provide your daemon source/build, target environment, and whether you need a public website. Also share any constraints around custody, payouts, or multi‑coin operation.
If BITB validation is blocking your rollout, Contact us and we can outline a safe test plan.