Install & Use Darkstat Web Based Linux Network Traffic Analyzer

stats png on dark blue background

Darkstat is an easy to use, low-resource, cross-platform, web-based network traffic analyzer application. For managing Linux servers, this is a great tool. It can analyze network traffic, calculates statistics concerning usage, and serves these reports over the HTTPS.

This tool has an integrated web server. Darkstat also supports IPv6 protocol and asynchronous DNS resolution. Because of low-resource usage, it can keep running in the background and collect data and then present that data in a comprehensible format in its integrated web server.

In this article we’ll learn how to install Darkstat on Linux, how to set up its basic configuration, how to access it from the Web UI, and how to manage it from the command-line.

Install Darkstat on Your Linux Computer

Darkstat is available for download in the software repositories of mainstream Linux distributions. Follow one of the methods defined below depending upon which Linux distribution you are using.

For Ubuntu/Debian

To install Darkstat web-based network traffic analyzer, run the following command in the terminal.

sudo apt install darkstat

For RHEL/CentOS/Fedora 22+/Rocky Linux/AlmaLinux

If you are running RHEL/CentOS operating system, you will need to execute the following code to install Darkstat on your system.

sudo dnf install darkstat

Configuring Darkstat

To analyze web traffic using Darkstat we need to configure it. Some basic configurations that we must apply to make use of this tool include but are not limited to: Network Interface, port, and listening IP.

Edit the /etc/darkstat/init.cfg in any editor of your choice that is available. We are going to use nano text editor for this purpose.

nano /etc/darkstat/init.cfg

The above command will return the following window, and you will need to make some changes to it in order to utilize the Darkstat web analyzer.

word image 11822 1

Change the START_DARKSTAT parameter to yes.

Make sure that you uncomment the DIR, PORT, BINDIP, LOCAL, and DAYLOG parameters. DIR specifies the directory and DAYLOG specifies the log file. BINDIP is used to specify any specific IP you wish to bind the web interface to.

Now the changes should look something like this.

/etc/darkstat/init.cfg
START_DARKSTAT=yes
INTERFACE="-i eth0"
DIR="/var/lib/darkstat"
PORT="-p 666"
BINDIP="-b 127.0.0.1"
DAYLOG="--daylog darkstat.log"

Allow Access to Darkstat from External Machines

Important: With the above configurations you will only be able to access the Darkstat Web Interface from the local machine (localhost).

To allow access to Darkstat from external machines, we need to make a few more changes to the /etc/darkstat/init.cfg file. We need to configure our INTERFACE, BINDIP and to make sure our firewall allows connections on port 666.

First we should find out what network interface your machine is using. The default INTERFACE in the Darkstat config file is eth0. In my case, for example, it needs to change to ens2.

To find out run the following command:

ip addr

As you can see, my interface is ens2:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: ens2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether de:1c:d8:2c:00:02 brd ff:ff:ff:ff:ff:ff
    altname enp0s2
    inet 10.194.170.3/31 metric 100 scope global dynamic ens2
       valid_lft 85867sec preferred_lft 85867sec
    inet6 2001:bc8:610:ff01::1/64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::dc1c:d8ff:fe2c:2/64 scope link
       valid_lft forever preferred_lft forever

As for the BINDIP, we can change it to the IP from which we plan to access Darkstat, or 0.0.0.0 if we want to allow connections from any other computer. For this example I’ll change it to 0.0.0.0.

The config file will look like this now:

/etc/darkstat/init.cfg
START_DARKSTAT=yes
INTERFACE="-i ens2"
DIR="/var/lib/darkstat"
PORT="-p 666"
BINDIP="-b 0.0.0.0"
DAYLOG="--daylog darkstat.log"

Configure Firewall to Allow Connections to Darkstat

Lastly, you’ll need to configure your firewall to allow connections to port 666. If you’re using ufw on Ubuntu/Debian-based distros, or Firewalld on RHEL-based distros, you can do the following:

For Ubuntu/Debian-based distros using ufw
sudo ufw allow 666/tcp
sudo ufw reload
For RHEL-based distros using Firewalld
sudo firewall-cmd --zone=public --add-port=666/tcp
sudo firewall-cmd --reload

Starting Darkstat

Once the configuration is complete, you will need to restart Darkstat.

systemctl restart darkstat

The following command can be executed to start the Darkstat network traffic analyzer tool manually.

sudo systemctl start darkstat

We can also enable it to start at system boot, which is also the recommended setting. To do so, execute the following code.

sudo /lib/systemd/systemd-sysv-install enable darkstat

To check the status of the Darkstat tool, run the following command.

systemctl status darkstat
Output
● darkstat.service - LSB: start darkstat monitoring system at boot time
     Loaded: loaded (/etc/init.d/darkstat; generated)
     Active: active (exited) since Fri 2022-08-12 18:12:55 UTC; 18s ago
       Docs: man:systemd-sysv-generator(8)
        CPU: 8ms

Aug 12 18:12:55 darkstat systemd[1]: Starting LSB: start darkstat monitoring system at boot time...
Aug 12 18:12:55 darkstat darkstat[24056]:  * Starting darkstat network daemon : darkstat
Aug 12 18:12:55 darkstat darkstat[24056]:  * done
Aug 12 18:12:55 darkstat darkstat[24056]:    ...done.
Aug 12 18:12:55 darkstat systemd[1]: Started LSB: start darkstat monitoring system at boot time.

Access Darkstat via Web UI

Darkstat is running and listening on port 666, in our case. Open your browser and go to the web address: http://localhost:666, or change the IP depending on how you configured your Darkstat application. The above address will take you to the web-based graphical interface of the Darkstat web analyzer tool, and it will look like the image below.

Darkstat Screenshot

Automatic reload is set to Off but you can turn it On to load graphs automatically or click the Reload Graphs button every time you want to reload the graphs manually.

Using the Darkstat web analyzer will also give you access to a list of all the hosts that have tried to reach the server. You can access this list by clicking on the host section in the top-right corner of the screen.

Manage Darkstat via Command Line

The thing that makes this tool so amazing to use is that you can also manage it via the command line, without having to access its web interface. Let’s take a closer look at how you can manage Darkstat via the command line.

  • To collect network statistics on the eth0 interface, we can use the -i flag and execute the following command to retrieve the statistics.
    darkstat -i eth0
  • To serve web pages on a specific web port you desire, include the -p flag and your desired port number in the command shown below.
    darkstat -i eth0 -p 8080
  • Use the -f flag or filter flag to monitor the network statistics of a particular service. The filter flag we specify in the command below is going to capture traffic concerned with the SSH port.
    darkstat -i eth0 -f  "port 22"

Shutdown Darkstat via Command Line

If you want to shutdown the Darkstat web traffic analyzer in a clean way using the command line, the best practice is to get the process id of its parent process and then send a SIGTERM or SIGINT to the Darkstat parent process.

To get the Darkstat parent process ID (or PPID) using the PIDOF command. Execute the following command to do so.

pidof darkstat

Next we kill the process after retrieving its ID by using 1 of the 2 commands listed below

sudo kill -SIGTERM 4790

OR

sudo kill -15 4790
Note: In order to find information on additional options available, you can read more via the Darkstat manpage. Execute the following command to do so.
man darkstat

Conclusion

In this tutorial, we learned what the Darkstat web analyzer is, how to install it on our system, how to configure it to capture web traffic, how to access the web UI, and how to manage Darkstat via the command line.

0 Shares:
Subscribe
Notify of
guest
Receive notifications when your comment receives a reply. (Optional)
Your username will link to your website. (Optional)

2 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
sam
sam
1 year ago

Great Site mate.

You May Also Like