Certification Domains & Competencies

The exam domains and competencies outlined below serve as a reference for training partners wishing to align materials and candidates preparing to take the Certified Hyperledger Sawtooth Administrator (CHSA) exam.

Install – 10%

  • Install Sawtooth packages
  • Start component services
  • Generate keys
  • Register validator
  • Configure peering
  • Verify install and fix if necessary
  • Connect transaction processor to validator
  • Create genesis block
  • Verify system meets hardware requirements

Configuration – 25%

  • Configure validator peering and network
  • Configure consensus
  • Configure logging
  • Configure REST API
  • Configure layer 3 network ports/firewall
  • Configure metrics
  • Configure transaction processor endpoint
  • Configure systemd services
  • Choose parallel / sync scheduler
  • Configure storage paths
  • Configure Sawtooth CLI

Permissioning, Identity Management, and Security – 20%

  • Identify network ID / system / peer ID
  • Permission a transaction processor
  • Policy management
  • Validator registration
  • System permissions
  • Configure validator local policy file
  • Validator key permissioning
  • Role management: transactor roles
  • Role management: network roles
  • Configure transactor permissions
  • Secure connections between components
  • Use a proxy server to authorize the REST API
  • Securing connecting between validators
  • Manage validator keys and secrets

Lifecycle – 25%

  • Create new network
  • Joining an existing network
  • Remove validator node from the network
  • Rejoin network after network failure
  • Restart validator after crash or maintenance
  • Restart components after crash or maintenance
  • Add new transaction processor
  • Changing consensus mode
  • Change network configuration
  • Update Sawtooth software
  • Update transaction processor version

Troubleshooting – 20%

  • Troubleshoot network communication
  • Troubleshoot REST API
  • Troubleshoot consensus
  • Troubleshoot transaction processor
  • Identify and resolve chain fork
  • Fix validator
  • Enable Sawtooth monitoring
  • Monitor network topology
  • Troubleshoot deployment
  • Troubleshoot resource constraints