Complete Tutorial: How to Install the Linux OS SELKS
Welcome, brave network defender! If youve ever dreamed of a turnkey security distribution that combines Suricata, Elasticsearch, Logstash, Kibana and more, all under one roof, you’ve come to the right place. Grab your favorite beverage (coffee, tea, or energy drink of choice), and prepare to journey into the land of packet capture, rule management, and gorgeous dashboards. Let’s get SELKSing!
1. What Is SELKS and Why Should You Care?
SELKS (Suricata ELK Scirius) is an open-source intrusion detection, prevention, and network security monitoring distribution based on Debian. It bundles:
- Suricata: High-performance IDS/IPS engine
- Elasticsearch: Distributed search analytics engine
- Logstash: Data processing pipeline
- Kibana: Visualization frontend
- Scirius: Web-based rule management
With SELKS, you can:
- Detect suspicious traffic in real time
- Store and analyze packet captures
- Search terabytes of logs in seconds
- Build interactive charts and heatmaps
Humor break: If you’ve ever wanted to catch sneaky hackers red-handed, SELKS is your digital mousetrap. 🐭
2. Hardware Software Prerequisites
First, make sure your hardware is up to the task. You don’t need a supercomputer, but underpowered toasters might complain.
| Component | Minimum | Recommended |
|---|---|---|
| CPU | 2 cores (x86_64) | 4 cores (Intel/AMD) |
| RAM | 4 GB | 8 GB |
| Storage | 50 GB | 100 GB SSD |
| Network | 1 NIC | 2 NICs for monitoring management |
Software prerequisites:
- Host machine capable of booting from USB/DVD
- Reliable Internet connection (for updates rule downloads)
3. Downloading the SELKS ISO
Head over to the official Stamus Networks site to grab the latest SELKS ISO:
https://www.stamus-networks.com/selks
Choose the stable release, hit “Download” and watch the progress bar like a hawk—or grab popcorn, if you prefer spectator sports.
4. Verifying the ISO Checksum
Security best practice: trust, but verify. Once the download completes, jump into a terminal and run:
sha256sum SELKS-.iso
Compare the resulting hash with the one provided on the download page. If they match, congratulations—you’ve avoided a corrupted ISO or, worse, a magically tampered one.
5. Creating a Bootable USB/DVD
- On Linux:
sudo dd if=SELKS-.iso of=/dev/sdX bs=4M status=progress sync - On Windows: use Rufus or balenaEtcher. Select the ISO, target your USB stick, click “Start.”
Tip: Double-check the target device to avoid wiping out your cat videos.
6. Booting the Installer
- Insert your USB stick or DVD into the target machine.
- Reboot and enter BIOS/UEFI setup (F2, F12, DEL—depends on vendor).
- Select the USB/DVD as first boot device, save and exit.
You’ll arrive at the SELKS boot menu. Choose Graphical Install (unless you’re a command-line ninja and prefer Console Install).
7. Step-by-Step Installation
a. Choose Language, Location Keyboard
- Select your preferred language (English by default).
- Select your country (for locale settings).
- Choose a keyboard layout. If you type umlauts by accident, pick the right one now.
b. Network Configuration
- Configure network via DHCP or manual IP.
- Set hostname (
selks-serverrecommended) and domain (localor your corporate domain).
c. Partition Disks
You can let the installer Guided: use entire disk (quick dirty) or go with Manual if you fancy LVM, separate /var or /home partitions.
Tip: Putting /var/lib/elasticsearch on a separate fast SSD can boost performance.
d. Select Time Zone Create Users
- Pick your time zone.
- Set root password (choose something memorable but not
password123). - Create an admin user (
admindefault in SELKS live, but you can change).
e. Software Selection
The installer will fetch and install:
- Base Debian system
- Suricata IDS/IPS engine
- Elasticsearch, Logstash, Kibana
- Scirius Community Edition (rule manager)
- Other utilities (tcpdump, nmap, etc.)
No need to manually pick packages unless you’re a Debian purist.
8. First Reboot Post-Install Configuration
After installation completes, remove the USB/DVD and reboot. You’ll be greeted by a login prompt:
Login: admin
Password: stamus (you’ll be prompted to change it)
Then, let’s tune SELKS to your environment.
9. Updating Upgrading the System
Open a terminal (or SSH in) and run:
sudo apt update sudo apt full-upgrade -y
This ensures all the security tools and Elasticsearch plugins are up to date.
10. Verifying Running Services
Check the status of key services:
sudo systemctl status suricata sudo systemctl status elasticsearch sudo systemctl status kibana sudo systemctl status logstash
If everything shows active (running), you’re golden. Otherwise, inspect logs in /var/log or use journalctl.
11. Accessing the Web Interfaces
From your workstation, open a browser and navigate to:
- Kibana: http://SELKS_IP:5601
- Scirius (rule manager): http://SELKS_IP:8000
- Stamus Dashboard: http://SELKS_IP (built on top of Kibana)
Log in with your admin credentials. Bask in the dashboards. Revel in the charts. You’re now an internet security hero.
12. Basic Testing Validation
To ensure Suricata is sniffing traffic, you can generate a simple alert:
sudo suricatasc -c /var/run/suricata-command.socket stats
Or drop a test pcap:
sudo tcpreplay -i eth0 /usr/share/suricata/pcap/evil.pcap
Watch alerts populate in Kibana in real time. If nothing fires, check your network tap or mirror port.
13. Fine-Tuning Best Practices
- Rule Updates: Configure automatic pull from EmergingThreats via Scirius.
- Performance: Allocate more memory to Elasticsearch in
/etc/elasticsearch/jvm.options. - Backups: Snapshot your Elasticsearch indices regularly.
- Security: Enable HTTPS and set up reverse proxy for Kibana/Scirius.
14. Troubleshooting Tips
- Service fails to start? Inspect
sudo journalctl -u elasticsearch. - No traffic in Kibana? Check that
suricata.yamlhas the correctaf-packetorpfringinterface. - Login problems? Reset passwords with
htpasswdfor Scirius/Kibana users.
15. Wrapping Up
Congratulations! You’ve successfully installed SELKS, the Swiss Army knife of network security distributions. You now possess the power to detect, analyze, and visualize network threats with professional-grade tools—all on one server.
Remember: with great power comes great responsibility. Keep your SELKS updated, fine-tune rules, and stay ahead of emerging threats. And don’t forget to share your newfound wisdom with fellow defenders!
Now, go forth and secure the networks. May your logs be plentiful and your alerts be precise!
Leave a Reply