How to Install the Operating System SELKS

Complete Tutorial: How to Install the Linux OS SELKS

Welcome, brave network defender! If youve ever dreamed of a turnkey security distribution that combines Suricata, Elasticsearch, Logstash, Kibana and more, all under one roof, you’ve come to the right place. Grab your favorite beverage (coffee, tea, or energy drink of choice), and prepare to journey into the land of packet capture, rule management, and gorgeous dashboards. Let’s get SELKSing!

1. What Is SELKS and Why Should You Care?

SELKS (Suricata ELK Scirius) is an open-source intrusion detection, prevention, and network security monitoring distribution based on Debian. It bundles:

  • Suricata: High-performance IDS/IPS engine
  • Elasticsearch: Distributed search analytics engine
  • Logstash: Data processing pipeline
  • Kibana: Visualization frontend
  • Scirius: Web-based rule management

With SELKS, you can:

  • Detect suspicious traffic in real time
  • Store and analyze packet captures
  • Search terabytes of logs in seconds
  • Build interactive charts and heatmaps

Humor break: If you’ve ever wanted to catch sneaky hackers red-handed, SELKS is your digital mousetrap. 🐭

2. Hardware Software Prerequisites

First, make sure your hardware is up to the task. You don’t need a supercomputer, but underpowered toasters might complain.

Component Minimum Recommended
CPU 2 cores (x86_64) 4 cores (Intel/AMD)
RAM 4 GB 8 GB
Storage 50 GB 100 GB SSD
Network 1 NIC 2 NICs for monitoring management

Software prerequisites:

  • Host machine capable of booting from USB/DVD
  • Reliable Internet connection (for updates rule downloads)

3. Downloading the SELKS ISO

Head over to the official Stamus Networks site to grab the latest SELKS ISO:

https://www.stamus-networks.com/selks

Choose the stable release, hit “Download” and watch the progress bar like a hawk—or grab popcorn, if you prefer spectator sports.

4. Verifying the ISO Checksum

Security best practice: trust, but verify. Once the download completes, jump into a terminal and run:

sha256sum SELKS-.iso

Compare the resulting hash with the one provided on the download page. If they match, congratulations—you’ve avoided a corrupted ISO or, worse, a magically tampered one.

5. Creating a Bootable USB/DVD

  1. On Linux: sudo dd if=SELKS-.iso of=/dev/sdX bs=4M status=progress sync
  2. On Windows: use Rufus or balenaEtcher. Select the ISO, target your USB stick, click “Start.”

Tip: Double-check the target device to avoid wiping out your cat videos.

6. Booting the Installer

  1. Insert your USB stick or DVD into the target machine.
  2. Reboot and enter BIOS/UEFI setup (F2, F12, DEL—depends on vendor).
  3. Select the USB/DVD as first boot device, save and exit.

You’ll arrive at the SELKS boot menu. Choose Graphical Install (unless you’re a command-line ninja and prefer Console Install).

7. Step-by-Step Installation

a. Choose Language, Location Keyboard

  • Select your preferred language (English by default).
  • Select your country (for locale settings).
  • Choose a keyboard layout. If you type umlauts by accident, pick the right one now.

b. Network Configuration

  • Configure network via DHCP or manual IP.
  • Set hostname (selks-server recommended) and domain (local or your corporate domain).

c. Partition Disks

You can let the installer Guided: use entire disk (quick dirty) or go with Manual if you fancy LVM, separate /var or /home partitions.

Tip: Putting /var/lib/elasticsearch on a separate fast SSD can boost performance.

d. Select Time Zone Create Users

  • Pick your time zone.
  • Set root password (choose something memorable but not password123).
  • Create an admin user (admin default in SELKS live, but you can change).

e. Software Selection

The installer will fetch and install:

  • Base Debian system
  • Suricata IDS/IPS engine
  • Elasticsearch, Logstash, Kibana
  • Scirius Community Edition (rule manager)
  • Other utilities (tcpdump, nmap, etc.)

No need to manually pick packages unless you’re a Debian purist.

8. First Reboot Post-Install Configuration

After installation completes, remove the USB/DVD and reboot. You’ll be greeted by a login prompt:

Login: admin
Password: stamus (you’ll be prompted to change it)

Then, let’s tune SELKS to your environment.

9. Updating Upgrading the System

Open a terminal (or SSH in) and run:

sudo apt update  sudo apt full-upgrade -y

This ensures all the security tools and Elasticsearch plugins are up to date.

10. Verifying Running Services

Check the status of key services:

sudo systemctl status suricata
sudo systemctl status elasticsearch
sudo systemctl status kibana
sudo systemctl status logstash

If everything shows active (running), you’re golden. Otherwise, inspect logs in /var/log or use journalctl.

11. Accessing the Web Interfaces

From your workstation, open a browser and navigate to:

Log in with your admin credentials. Bask in the dashboards. Revel in the charts. You’re now an internet security hero.

12. Basic Testing Validation

To ensure Suricata is sniffing traffic, you can generate a simple alert:

sudo suricatasc -c /var/run/suricata-command.socket stats

Or drop a test pcap:

sudo tcpreplay -i eth0 /usr/share/suricata/pcap/evil.pcap

Watch alerts populate in Kibana in real time. If nothing fires, check your network tap or mirror port.

13. Fine-Tuning Best Practices

  • Rule Updates: Configure automatic pull from EmergingThreats via Scirius.
  • Performance: Allocate more memory to Elasticsearch in /etc/elasticsearch/jvm.options.
  • Backups: Snapshot your Elasticsearch indices regularly.
  • Security: Enable HTTPS and set up reverse proxy for Kibana/Scirius.

14. Troubleshooting Tips

  • Service fails to start? Inspect sudo journalctl -u elasticsearch.
  • No traffic in Kibana? Check that suricata.yaml has the correct af-packet or pfring interface.
  • Login problems? Reset passwords with htpasswd for Scirius/Kibana users.

15. Wrapping Up

Congratulations! You’ve successfully installed SELKS, the Swiss Army knife of network security distributions. You now possess the power to detect, analyze, and visualize network threats with professional-grade tools—all on one server.

Remember: with great power comes great responsibility. Keep your SELKS updated, fine-tune rules, and stay ahead of emerging threats. And don’t forget to share your newfound wisdom with fellow defenders!

Now, go forth and secure the networks. May your logs be plentiful and your alerts be precise!

Official Website of SELKS

Download TXT




Leave a Reply

Your email address will not be published. Required fields are marked *