Strelka is a real-time file scanning system used for threat hunting, threat detection, and incident response. Based on the design established by Lockheed Martin’s Laika BOSS and similar projects (see: related projects), Strelka’s purpose is to perform file extraction and metadata collection at huge scale.

Depending on what options you choose in Setup, it may ask if you want to use Zeek or Suricata for metadata. Whichever engine you choose for metadata will then extract files from network traffic. Strelka then analyzes those files and they end up in /nsm/strelka/processed/.

You can find Strelka logs in Hunt and Kibana. Here’s an example of Strelka logs in Hunt:



Strelka reads its configuration from /opt/so/conf/strelka/. However, please keep in mind that if you make any changes to this directory they may be overwritten since the configuration is managed with Salt.

More Information

See also

For more information about Strelka, please see