Configuring Syncrify Server (x64) on Linux

As far as diy offsite backup software goes, Syncrify is pretty neat. I do have one complaint though; the documentation covering the x64 version for Linux is lacking (read: damn near nonexistent). In addition, you have to write your own startup script. This post intends to clear this up a bit–mainly for my own sanity–and hopefully be of some help to others who might want to deploy a Syncrify server. This post assumes that you are using some flavor of Debian, in a 64 bit environment. These instructions have been tested on Ubuntu 12.04 (x64).

Step #1: Configure java

This is the simplest way I’ve found to get java configured for use with Syncrify. There are many ways to do this, feel free to deviate from this step.

apt-get install python-software-properties
add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-jdk7-installer

You will have to accept the license agreement from line #4 in order to continue. After the installation, you can verify that everything ran correctly by doing the following:

update-alternatives --display java && javac -version

The output of this command should be:

java - auto mode
  link currently points to /usr/lib/jvm/java-7-oracle/jre/bin/java
/usr/lib/jvm/java-7-oracle/jre/bin/java - priority 1
  slave java.1.gz: /usr/lib/jvm/java-7-oracle/man/man1/java.1.gz
Current 'best' version is '/usr/lib/jvm/java-7-oracle/jre/bin/java'.
javac 1.7.0_17

Next, edit /etc/environment and add the following line:

JAVA_HOME="/usr/lib/jvm/java-7-oracle"

Step #2: Configure the upstart script

Copy and paste the following text into a file and save it as /etc/init/syncrify.conf:

# Syncrify - Upstart script for Syncrify

description "Syncrify backup manager"
author "Charles Hamilton <musashi@nefaria.com>"

start on runlevel [2345]
stop on runlevel [016]
respawn

script
        cd /opt/Syncrify
        CP=""
        for i in `ls /opt/Syncrify/lib/*.jar`; do
                CP=$CP:$i
        done
        /usr/bin/java -server -Xmx512m -cp $CP -DLoggingConfigFile=/opt/Syncrify/logconfig.xml com.synametrics.sradef.BootLoader
end script

Step #3: Download and “install” Syncrify

mkdir /opt/Syncrify
cd /opt/Syncrify
wget http://www2.synametrics.com/files/Syncrify/SyncrifyOther.tar.gz
tar -xf SyncrifyOther.tar.gz
chown -R root.root /opt/Syncrify
service syncrify start

At this point, you should be able to browse to http://127.0.0.1:5800. Alternatively, if you are running a server without a gui, you can do the following:

Edit /opt/Syncrify/config/AppConfig.xml and modify this line:

<parameter name="httpIP" type="1" value=""></parameter>

…to look like this:

<parameter name="httpIP" type="1" value="192.168.0.5"></parameter>

Where the IP address: “192.168.0.5” belongs to the machine on which you’re configuring Syncrify. Save the file and kill Syncrify with a good old fashioned kill -9, then ./run.sh again to restart the service. Now you should be able to browse to http://192.168.0.5:5800. If, for some reason, nothing appears when browsing to that URL, make sure that Syncrify is running. If it isn’t, try starting it with the included “run” script:

/opt/Syncrify/run.sh

Try to browse to http://127.0.0.1:5800 (alternatively, http://192.168.0.5:5800) … if this works then something is probably wrong with the upstart script. Make sure you copied/pasted correctly, then make sure permissions are correct:

chown -R root.root /opt/Syncrify
chown root.root /etc/init/syncrify.conf && chmod 0644 /etc/init/syncrify.conf

Once you’ve managed to browse to the admin page (http://host:5800) you will be prompted to start configuring the server (these should be self explanatory):

1_0

2_0

3_0

4_1

Once you’ve gone through the prompts, login and enable SSL by navigating to the HTTP Configuration page and fill in the text box for “Secure HTTP Port” … it will be -1 by default; change it to whatever you want:

configure_https_1

configure_https_2

configure_https_3

Of course, this means you’re going to be using Syncrify’s bundled certificate with your server. I plan on updating this post sometime in the future with instructions on how to install a real SSL cert. Anyway, now all you have to do is configure your backup clients/user accounts and you’re done.