24
KÅRE FIEDLER CHRISTIANSEN [email protected] LOCKSS Practical Testing Kåre Fiedler Christiansen Statsbiblioteket

LOCKSS Practical testing

  • Upload
    kaarefc

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

KÅRE FIEDLER [email protected]

LOCKSS Practical Testing

Kåre Fiedler Christiansen

Statsbiblioteket

KÅRE FIEDLER [email protected]

Agenda

• The problem description

• Installation of LOCKSS

• Harvesting from OJS

• Recovering from bit corruption

• Conclusions on the technical evaluation

• Thoughts about LOCKSS for persistent access to subscription journals

KÅRE FIEDLER [email protected]

The problem description

KÅRE FIEDLER [email protected]

The Problem Description

Test af Global LOCKSS

I dette hovedelement gennemføres test af Global LOCKSS med henblik på at afklare, om Global LOCKSS er en brugbar platform for lagring af lokale kopier af de videnskabelige publikationer, som universitetsbiblioteket har licens på. Det første skridt bliver udarbejdelse af en liste over krav til systemet som danner udgangspunkt for den efterfølgende test og evaluering. Her tages udgangspunkt i Neil Beagries fjerde anbefaling og de krav, som han har registeret.

Test og evaluering af Global LOCKSS vil omfatte områder som etablering, opsætning, daglig drift og ”trigger events”. Der testes for eksempel, om man kan tilgængeliggøre en dansk publikation som endnu ikke er omfattet af en Global LOCKSS-aftale og om man kan reetablere tabt indhold i universitetsbibliotekets LOCKSS via indhold fra andre LOCKSS servere. Der installeres en LOCKSS-BOX hos SB, KB og DTU Bibliotek for at teste blandt andet denne funktionalitet.

Metodemæssigt anvendes der en blanding af fælles drøftelser, analyser, installation og test af prototyper samt lokale indsatser.

KÅRE FIEDLER [email protected]

The Problem Description

Målet er, at etablere 3 fulde prototyper af Global LOCKSS, hvor alle funktionelle krav som integration med proxyserver, ingest og logning af materiale, korrekt replikering samt stabilitet, er aftestet.

Vurdering: Kravene i pkt. d har været anvendt som udgangspunkt for en test af prototyperne og der er gennemført test ved projektets afslutning.

KÅRE FIEDLER [email protected]

The Problem Description

Deltagere Opgaver Mandemåneder

Test af LOCKSS prototype:

Projektledelse KB Projektledelse og afrapportering 0,5

Krav og opsætning af testmiljø

KB, SB og DTIC

Udarbejdelse af liste over krav. Installation og konfiguration af servere

1,5

Test og evaluering KB, SB og DTIC

Implementering og gennemtestning af indholdmæssige funktionaliteter som Integration til EZ-proxy, Ingest af danske og udenlandske (med eksisterende LOCKSS aftale) publikationer.

3

KÅRE FIEDLER [email protected]

Installation of LOCKSS

KÅRE FIEDLER [email protected]

Installation of LOCKSS

• Installing a LOCKSS box is a reasonably well described process

• While LOCKSS is distributed it does need access to a central server that configures the LOCKSS network

• We asked Stanford to connect it to the Global LOCKSS test network

• Support from Stanford was very helpful

KÅRE FIEDLER [email protected]

Installation of LOCKSS

• The central server distributes configuration to the LOCKSS-boxes about:– Participants in the network

– Journals that can be harvested and how

– Whether journals are live

• Standard procedure is to allow the configuration server full access to the LOCKSS box, including SSH

KÅRE FIEDLER [email protected]

Installation of LOCKSS

• At a later point it became clear the Global LOCKSS would not host Danish journals

• Instead a Danish Private LOCKSS network was defined

• Stanford was very helpful in setting this up for us

KÅRE FIEDLER [email protected]

Installation of LOCKSS

• To run our own Danish Private LOCKSS network, we would need to be able to run the central LOCKSS server

• Installing and running a LOCKSS box is fairly easy. Running a central server does not seem to be so

KÅRE FIEDLER [email protected]

Harvesting our OJS material

KÅRE FIEDLER [email protected]

Harvesting our OJS material

• There are two things needed to harvest an OJS journal– The OJS server must present itself as ready

to be harvested

– The LOCKSS network must be configured to harvest the journal

KÅRE FIEDLER [email protected]

Harvesting our OJS material

• Configuring the OJS server is easy

• A standard plugin will present the license and structure of the journal for a LOCKSS network to harvest it

• In newer versions of OJS the plugin supports more granularity for private LOCKSS networks

KÅRE FIEDLER [email protected]

Harvesting our OJS material

• Configuring the LOCKSS network to be able to harvest the material turns out to be something done on the central configuration server

• Again Stanford was very helpful. If we want to run out own configuration server we need to make this configuration

• Once it has been set up, harvesting the material is a matter of a single click

KÅRE FIEDLER [email protected]

Recovering from bit corruption

KÅRE FIEDLER [email protected]

Recovering from bit corruption

• We set up four test scenarios– The file is missing, but available at the journal

server

– The file is missing, and not available at the journal server

– The file is corrupted, but available at the journal server

– The file is corrupted, and not available at the journal server

KÅRE FIEDLER [email protected]

Recovering from bit corruption

KÅRE FIEDLER [email protected]

Recovering from bit corruption

• The bit errors were all discovered• The first set of errors introduced were

discovered without any intervention

• In the second set we did a manual check (both to test this, and to reduce the time)

• The journals were reharvested from the journal server when it was available

• The journals were harvested from other LOCKSS boxes when it was not

KÅRE FIEDLER [email protected]

Recovering from bit corruption

• The central server may update the configuration for the journal to be permanently offline

KÅRE FIEDLER [email protected]

LOCKSS Evaluation

KÅRE FIEDLER [email protected]

LOCKSS technical evaluation conclusions

• The LOCKSS box software seems robust and well documented

• The support is excellent

• The end user interfaces are ”design by engineers” - fully functional but sometimes quirky

• The central server seems complex and less documented

KÅRE FIEDLER [email protected]

LOCKSS for persistent access to subscription journals?

• Technical considerations– The software is robust and functional

– Strong qualifications are needed to run the central server

• Do we want to run it ourselves or can Stanford host it?

• Content considerations– Can we get license agreements to put the

content in the Danish network LOCKSS boxes?– Will the Global LOCKSS agreements cover this?

KÅRE FIEDLER [email protected]

Questions?