This guide explains how Arkime is integrated into CyberBlueSOC and how to use it effectively.
Arkime is a full packet capture and analysis tool that provides deep network visibility. In CyberBlueSOC, it's automatically configured to work with OpenSearch for data storage and analysis.
When you run ./cyberblue_init.sh, Arkime is automatically:
- ✅ Database Initialized - OpenSearch indices created
- ✅ Sample Data Generated - Live network traffic captured
- ✅ PCAP Processing - Traffic analyzed and indexed
- ✅ Admin User Created - Ready for immediate use
- ✅ Web Interface Started - Accessible at port 7008
# Quick setup with 1-minute live capture
./fix-arkime.sh --live
# Custom duration captures
./fix-arkime.sh --live-30s # 30 seconds
./fix-arkime.sh --live-5min # 5 minutes
./fix-arkime.sh -t 2min # 2 minutes
# Force database reinitialization
./fix-arkime.sh --force --live
# Short burst capture (original method)
./fix-arkime.sh --capture-live# Generate PCAP files for Arkime analysis
./generate-pcap-for-arkime.sh # 1-minute capture
./generate-pcap-for-arkime.sh -d 5min # 5-minute capture
./generate-pcap-for-arkime.sh --keep-files # Preserve PCAP files
./generate-pcap-for-arkime.sh --background -d 10min # Background capture# Original initialization script (still available)
./scripts/initialize-arkime.sh --capture-live --force- URL:
http://YOUR_IP:7008 - Username:
admin - Password:
admin
The enhanced Arkime setup now includes real-time network capture capabilities:
./fix-arkime.sh --live-2minOutput Example:
⏰ 20s | 📦 2MB (+1024KB) | 📈 Docs: 45 (+22) | ⏳ 100s left
⏰ 30s | 📦 3MB (+1024KB) | 📈 Docs: 67 (+22) | ⏳ 90s left
| Format | Example | Duration |
|---|---|---|
--live |
./fix-arkime.sh --live |
1 minute (default) |
--live-Ns |
./fix-arkime.sh --live-30s |
30 seconds |
--live-Nmin |
./fix-arkime.sh --live-5min |
5 minutes |
-t DURATION |
./fix-arkime.sh -t 2min |
Custom duration |
# 30-second capture for quick testing
./generate-pcap-for-arkime.sh -d 30s
# 1-minute standard capture
./generate-pcap-for-arkime.sh# 5-minute deep investigation
./generate-pcap-for-arkime.sh -d 5min --keep-files
# Custom incident analysis
./generate-pcap-for-arkime.sh -f "incident_001.pcap" -d 10min --keep-files# Start background capture and continue with other tasks
./generate-pcap-for-arkime.sh --background -d 30min
# Check background process
ps aux | grep tcpdump- Captures → Processes → Auto-deletes PCAP
- Preserves indexed data in Arkime
- Saves disk space automatically
# Keep PCAP files for manual analysis
./generate-pcap-for-arkime.sh --keep-files
# Custom output directory
./generate-pcap-for-arkime.sh -o /tmp/pcaps --keep-files# Get session data
curl -u admin:admin "http://localhost:7008/api/sessions?length=10"
# Search for specific traffic
curl -u admin:admin "http://localhost:7008/api/sessions?expression=ip==192.168.1.1"- Manual Upload: Use the web interface to upload PCAP files
- Directory Upload: Copy files to
./arkime/pcaps/and run processing script - Live Capture: Enable live packet capture (requires tcpdump)
# Process all PCAP files in the directory
sudo docker exec arkime bash -c 'find /data/pcap -name "*.pcap" -exec /opt/arkime/bin/capture -c /opt/arkime/etc/config.ini -r {} \;'
# Process specific file
sudo docker exec arkime /opt/arkime/bin/capture -c /opt/arkime/etc/config.ini -r /data/pcap/your_file.pcapArkime is configured to connect to the os01 OpenSearch container:
- Host:
os01:9200 - Indices:
arkime_sessions3-* - Health Check: Available at
http://localhost:9200/_cluster/health
# Configure data retention (example)
sudo docker exec arkime /opt/arkime/db/db.pl http://os01:9200 expire daily 30- All Traffic: Leave search field empty
- Specific IP:
ip == 192.168.1.100 - HTTP Traffic:
protocols == http - Time Range: Use the time picker in the interface
- Port Filter:
port == 80 || port == 443
# Find suspicious traffic
protocols == http && http.statuscode == [400..499]
# Large file transfers
bytes > 1000000
# External communications
ip.dst != 192.168.0.0/16 && ip.dst != 10.0.0.0/8# Check container status
sudo docker ps | grep arkime
# Check logs
sudo docker logs arkime
# Verify OpenSearch connection
curl http://localhost:9200/_cat/indices/arkime*
# Reinitialize if needed
./scripts/initialize-arkime.sh --force# Check OpenSearch health
curl http://localhost:9200/_cluster/health
# Restart OpenSearch if needed
sudo docker-compose restart os01
# Wait and retry Arkime initialization
sleep 30 && ./scripts/initialize-arkime.sh# Check PCAP file permissions
ls -la ./arkime/pcaps/
# Fix permissions if needed
sudo chown -R 1000:1000 ./arkime/pcaps/
# Reprocess files
sudo docker exec arkime bash -c 'find /data/pcap -name "*.pcap" -exec /opt/arkime/bin/capture -c /opt/arkime/etc/config.ini -r {} \;'Arkime complements Suricata by providing:
- Full packet details for Suricata alerts
- Deep protocol analysis beyond what IDS rules detect
- Historical packet data for forensic analysis
Use Arkime data to:
- Extract IOCs from captured traffic
- Validate threat intelligence against real traffic
- Create new indicators from observed patterns
Combine Arkime with Velociraptor for:
- Network + endpoint correlation
- Complete attack timeline reconstruction
- Evidence collection from multiple sources
# Weekly: Clean old data (optional)
sudo docker exec arkime /opt/arkime/db/db.pl http://os01:9200 expire daily 30
# Monthly: Optimize indices
curl -X POST "localhost:9200/arkime_*/_forcemerge?max_num_segments=1"
# As needed: Add new users
sudo docker exec arkime /opt/arkime/bin/arkime_add_user.sh newuser "Full Name" password# Arkime config.ini optimizations
maxFileSizeG=12
magicMode=both
pcapWriteSize=262144
dbBulkSize=300000Create custom views in the Arkime interface:
- Security View: Focus on suspicious traffic patterns
- Performance View: Monitor bandwidth and top talkers
- Compliance View: Track specific protocols and communications
# Set up automated PCAP processing
# Add to crontab for regular processing
0 */6 * * * cd /home/ubuntu/CyberBlueSOC && ./scripts/initialize-arkime.sh --capture-live- Regular Data Capture: Set up automated traffic capture
- Storage Management: Monitor disk usage and set retention policies
- User Management: Create role-based users for different teams
- Integration: Use with other CyberBlueSOC tools for comprehensive analysis
- Documentation: Document custom queries and analysis procedures