Difference between revisions of "Ingest (0.5)"
Line 16: | Line 16: | ||
|- | |- | ||
|- | |- | ||
− | | | + | |Producer places SIP in shared folder on host machine |
| | | | ||
*The purpose of shared folders is to allow the Producer to drop SIPs into a folder on their host machine or network and have the SIPs automatically appear in a folder in Archivematica. | *The purpose of shared folders is to allow the Producer to drop SIPs into a folder on their host machine or network and have the SIPs automatically appear in a folder in Archivematica. | ||
Line 25: | Line 25: | ||
| | | | ||
|- | |- | ||
− | | | + | |SIP appears in shared folder in Archivematica |
| | | | ||
*SIP will appear in /home/demo/receiveSIP/. | *SIP will appear in /home/demo/receiveSIP/. | ||
Line 31: | Line 31: | ||
| | | | ||
|- | |- | ||
− | | | + | |Archivist copies SIP from shared folder to SIP backup folder |
| | | | ||
*Copy the SIP in /home/demo/receiveSIP/ and paste it into /home/demo/receiveSIPbackup/. If anything goes wrong during the ingest process, this backup copy can be retrieved and processed. | *Copy the SIP in /home/demo/receiveSIP/ and paste it into /home/demo/receiveSIPbackup/. If anything goes wrong during the ingest process, this backup copy can be retrieved and processed. | ||
Line 50: | Line 50: | ||
!style="width:40%"|'''UML diagram references''' | !style="width:40%"|'''UML diagram references''' | ||
|- | |- | ||
− | | | + | |Archivist moves SIP from shared folder into quarantine |
| | | | ||
*Drag the SIP from /home/demo/receiveSIP/ to /home/demo/quarantine. | *Drag the SIP from /home/demo/receiveSIP/ to /home/demo/quarantine. | ||
| | | | ||
|- | |- | ||
− | | | + | |SIP is quarantined for 2 minutes |
| | | | ||
*In a production system, SIPs would normally be quarantined for a set period of time (for example, four weeks), to allow anti-virus software to be updated with the latest virus profiles. | *In a production system, SIPs would normally be quarantined for a set period of time (for example, four weeks), to allow anti-virus software to be updated with the latest virus profiles. | ||
Line 61: | Line 61: | ||
| | | | ||
|- | |- | ||
− | | | + | |SIP is scanned for malware |
| | | | ||
*At the end of the quarantine period, ClamAV will automatically scan the files for viruses and other malware. | *At the end of the quarantine period, ClamAV will automatically scan the files for viruses and other malware. | ||
| | | | ||
|- | |- | ||
− | | | + | |Infected files are sent to possiblevirii folder |
| | | | ||
*Infected files will appear in /home/demo/possiblevirii/. If this occurs, do not take any further steps in the ingest process. Inform the Producer that infected files have been found. It is recommended at this point to delete all SIP copies and request that the Producer take steps to review the causes of the problem and eventually resubmit a malware-free SIP. | *Infected files will appear in /home/demo/possiblevirii/. If this occurs, do not take any further steps in the ingest process. Inform the Producer that infected files have been found. It is recommended at this point to delete all SIP copies and request that the Producer take steps to review the causes of the problem and eventually resubmit a malware-free SIP. | ||
Line 86: | Line 86: | ||
|- | |- | ||
− | | | + | |SIP contents are identified and validated using FITS |
| | | | ||
*FITS (File Information Tool Set) is automatically launched once the quarantine period has ended and the files have been scanned for viruses. | *FITS (File Information Tool Set) is automatically launched once the quarantine period has ended and the files have been scanned for viruses. | ||
*FITS incorporates format identification and validation tools such as DROID. JHOVE and the New Zealand Metadata Extractor, comparing the results of each tool and extracting a set of identification, validation and technical metadata. For more information on the FITS tool, see [http://code.google.com/p/fits/ File Information Tool Set (FITS) [http://code.google.com/p/fits/ File Information Tool Set (FITS)] | *FITS incorporates format identification and validation tools such as DROID. JHOVE and the New Zealand Metadata Extractor, comparing the results of each tool and extracting a set of identification, validation and technical metadata. For more information on the FITS tool, see [http://code.google.com/p/fits/ File Information Tool Set (FITS) [http://code.google.com/p/fits/ File Information Tool Set (FITS)] | ||
|- | |- | ||
− | | | + | |Identification/validation reports are sent to accessions folder |
| | | | ||
*The FITS report will appear in /home/demo/accessionreports/. The report appears as a folder with a 10-digit number; inside the folder is a report for each file in the SIP. | *The FITS report will appear in /home/demo/accessionreports/. The report appears as a folder with a 10-digit number; inside the folder is a report for each file in the SIP. | ||
Line 97: | Line 97: | ||
| | | | ||
|- | |- | ||
− | | | + | |Virus-checker report is sent to accessions folder |
| | | | ||
*A report on ClamAV's virus scan will appear automatically: home/demo/accessionreports/virus.log. | *A report on ClamAV's virus scan will appear automatically: home/demo/accessionreports/virus.log. | ||
| | | | ||
|- | |- | ||
− | | | + | |Accession log is sent to accessions folder |
| | | | ||
*A report on the accession process will appear automatically: home/demo/accessionreports/accession.log. | *A report on the accession process will appear automatically: home/demo/accessionreports/accession.log. |
Revision as of 13:27, 19 November 2009
Main Page > Documentation > Release 0.3 Documentation > Ingest (0.3)
AD1 Receive SIP
File:Archivematica AD1 ReceiveSIP v1.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
Producer places SIP in shared folder on host machine |
|
|
SIP appears in shared folder in Archivematica |
|
|
Archivist copies SIP from shared folder to SIP backup folder |
|
AD2 Audit SIP
File:Archivematica AD2 AuditSIP v5.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
Archivist moves SIP from shared folder into quarantine |
|
|
SIP is quarantined for 2 minutes |
|
|
SIP is scanned for malware |
|
|
Infected files are sent to possiblevirii folder |
|
AD3 Accept SIP for Ingest
File:Archivematica AD3 AcceptSIPforIngest v4.pdf
Workflow diagram step | Description | UML diagram references |
---|---|---|
SIP contents are identified and validated using FITS |
| |
Identification/validation reports are sent to accessions folder |
|
|
Virus-checker report is sent to accessions folder |
|
|
Accession log is sent to accessions folder |
Go to: 3.5 - Extract metadata |
|
3.5 Extract metadata |
Extract preservation metadata from content objects in the SIP Go to: - 3.6 Audit submission and select for preservation |
|
3.6 Audit submission and select for preservation (UC-4.6) |
Based on the results of steps 3.2, 3.3, and 3.4, apply Archives policies and determine which (if any) content objects in the SIP should not be included in the AIP Document which content objects will not be included and why. If all SIP content is to be included in the AIP, go to: 3.10 - Accept selected SIP components for ingest
|
Possible reasons for exclusion:
|
3.7 Notify Producer about appraisal decision(s) | Provide the Producer with copies of the appraisal report or other documentation as required by the submisssion agreement identifying SIP components to be destroyed.
If the Producer appeals the appraisal decision, go to: 3.8 - Evaluate appeals Else, go to: 3.9 - Destroy unselected SIP components |
|
3.8 Evaluate appeals |
Go to: 3.9 - Destroy unselected SIP components |
|
3.9 - Destroy unselected SIP components |
|
|
3.10 Accept selected SIP components for ingest |
AD4 Generate AIP
File:Archivematica AD4 GenerateAIP v2.pdf
Step | Implementation | Notes |
---|---|---|
4.1 Create AIP containers | If 1 SIP = 1 AIP this step is not necessary. It is only necessary if the SIP is being divided into multiple AIPs. | |
4.2 Add Content Information to AIP | See note for step 4.1, above | |
4.3 Transform Content Information |
|
|
4.4 Add Transformed Content Information to AIP | See step 4.3, above. | |
4.5 Add PDI to AIP | Create a plain text report containing provenance and other PDI elements (including arrangement information) and save it to the AIP. | |
4.6 Generate Descriptive Information (UC-1.4) |
|
AD5 Transfer AIP to Archival Storage
File:Archivematica AD5 TransferAIPtoArchivalStorage v2.pdf
Step | Implementation | Notes |
---|---|---|
5.1 Request storage of AIP (UC-1.5) | ||
5.2 Transfer AIP to Archival storage (UC-1.5) |
|
|
5.3 Confirm receipt and storage of AIP (UC-1.5) | ||
5.4 Add AIP storage location to descriptive information (UC-1.6) | In the physical storage area in Qubit, add the storage location. | |
5.5 Add Descriptive Information to Data Management (UC-1.6) | This was done in AD4, step 4.6. In OAIS, generating descriptive information and adding them to data management are two different steps; however, in Archivematica this is done in one step in Qubit, which is used to upload images to a web interface, generate derivatives for searching and browsing and record descriptive information. | |
5.6 Confirm update of Data Management | ||
5.7 Destroy SIP and AIP copies | Destroy /home/demo/ingest/2009_01 and /home/demo/mybags/2009_01. |