Skip to main content

Defense Finder: allow for a systematic search of all known anti-phage systems.

Project description

Documentation DefenseFinder

DefenseFinder is a program to systematically detect known anti-phage systems. DefenseFinder uses MacSyFinder.

If you are using DefenseFinder please cite

  • "Systematic and quantitative view of the antiviral arsenal of prokaryotes" Nature Communication, 2022, Tesson F., Hervé A. , Mordret E., Touchon M., d’Humières C., Cury J., Bernheim A.
  • "MacSyFinder: A Program to Mine Genomes for Molecular Systems with an Application to CRISPR-Cas Systems." PloS one 2014 Abby S., Néron B.,Ménager H., Touchon M. Rocha EPC.
  • "CRISPRCasFinder, an update of CRISRFinder, includes a portable version, enhanced performance and integrates search for Cas proteins." Nucleic Acids Research 2018 Couvin D. et al.

DefenseFinder Models

This repository contains DefenseFinder a tool allowing for a systematic search of anti-phage systems. The DefenseFinder models based on MacSyFinder architecture can be here.

The CRISPR-Cas models used in DefenseFinder come from the macsy models of CasFinder available here.

DefenseFinder website

More information on defense systems on the DefenseFinder

To make DefenseFinder results more intuitive, we created a Wiki of defense systems to gather information on all the defense systems. The defense wiki is available here.

This website gather information on all defense systems detected by DefenseFinder as well as precomputed results and predicted structure of defense systems.

DefenseFinder webserver

DefenseFinder is available as a webservice.

Installing DefenseFinder command-line interface

Install dependency

DefenseFinder has one program dependency: the Hmmer program, version 3.1 or greater (http://hmmer.org/). The hmmsearch program should be installed (e.g., in the PATH) to use MacSyFinder. DefenseFinder also relies on Python library dependencies:

  • macsyfinder
  • colorlog
  • pyyaml
  • packaging
  • networkx
  • These dependencies will be automatically retrieved and installed when using pip for installation (see below).

Install DefenseFinder

DefenseFinder is installable through pip. Before starting, if you can, it is recommended to install DefenseFinder in a virtualenv (such as condas).

conda create –name defensefinder
conda activate defensefinder
pip install mdmparis-defense-finder

However, you can also install DefenseFinder using only pip.

pip install mdmparis-defense-finder

At this stage, if you have an issue, this could be due to a problem with your pip installer. Check the following webpage for details on how to solve it

After installing DefenseFinder, you need to retrieve the DefenseFinder models. To retrieve it run:

defense-finder update

Updating DefenseFinder

When you have not used DefenseFinder in the last days, make sure you have the latest versions of the models. To verify and downloaded if necessary the latest models run:

defense-finder update

When the DefenseFinder models are updated you only have to update the models and not the tool. However, if you have an outdated version of the DefenseFinder tool, you can use the following line to get the most recent version

pip install -U mdmparis-defense-finder
defense-finder update

defense-finder update options

To check the different DefenseFinder update options run

$ defense-finder update --help

Usage: defense-finder update [OPTIONS]

  Fetches the latest defense finder models.

  The models will be downloaded from mdmparis repositories and installed on
  macsydata.

  This will make them available to macsyfinder and ultimately to defense-
  finder.

  Models repository: https://github.com/mdmparis/defense-finder-models.

Options:
  --models-dir TEXT  Specify a directory containing your models.
  --help             Show this message and exit.

Running Defense Finder

Quick run

If you want to run DefenseFinder on a small set of genomes (< 30 000 proteins). You can run the following command.

defense-finder run genome.faa

Input.

The input file, here “genome.faa” can be a protein fasta file or a nucleotide fasta file. In case of a protein file all proteins should in the order of their position in the genome. Indeed DefenseFinder takes into account the order of the proteins. DefenseFinder automatically detects whether the file is a nucleotide or a protein fasta file.

A run on a genome (few thousand proteins) should take less than two minutes on a standard laptop. If more, make sure everything is installed properly. In this configuration, all the replicon will be named UserReplicon. ATTENTION, If you want to run DefenseFinder on a larger set of genomes you need to format your dataset as described in "Larger dataset and Gembase Format".

Outputs

DefenseFinder will generate three types of files (and an option to conserve MacSyFinder options). All the files are described below.

defense_finder_systems.tsv : In this file, each line corresponds to a system found in the given genomes. This is a summary of what was found and gives the following information

  • sys_id : Each system detected by DefenseFinder have a unique ID based on the replicon where it was found and the type of systems
  • type: Type of the anti-phage system found (such as RM, Cas...)
  • subtype : Subtype of the anti-phage system found (such as RM_type_I, CAS_Class1-Subtype-I-E)
  • sys_beg : Protein where the system begins (name found in the input file)
  • sys_end : Protein where the system ends (name found in the input file)
  • protein_in_syst : List of all protein(s) present in this system (name found in the input file)
  • genes_count : Number of genes found in the system
  • name_of_profiles_in_sys: List of the protein profiles that hit the protein of the system (name from the HMM).

defense_finder_genes.tsv : In this file, each line corresponds to a gene found in a system. For each gene, there is several information such as the replicon, the position, the system.. All the information comes from MacSyFinder and follows MacSyFinder nomenclature (best_solution.tsv) and more can be found in the MacSyFinder Ma documentation.

defense_finder_hmmer.tsv : In this file, each line corresponds to an HMM hit. This file show all hit of HMM regardless if they are in a complete system or not. Those results have to be used cautiously for deep inspection. Indeed, biologically, it was shown that only a full system will be anti phage. This function can be used to found defense gene in small portion of genomes. Beware, a single protein can have several hits. The output is a part of the result of HMMer results table.

  • hit_id : the protein name (name found in the input file)
  • replicon : The name of the replicon
  • position_hit: The position in the input file
  • Gene_name : the name of the HMM

By using the argument --preserve-raw , you will have all the results from MacSyFinder. Those results are explained here

Running DefenseFinder on several genomes

When running DefenseFInder on several genomes, like MacSyFinder, we propose to adopt the following convention to fulfill the requirements for the “gembase db_type”. The difference between any fasta file and the gembase format is the name of the protein (Protein name = the text after > in a fasta file). For both type, protein have to be ordered but in the first case the name of the protein do not matter (except no repetition). In the gembase format, protein name are composeded of two part: the replicon and the position. The replicon name is the same for all the protein that the user want to be analyse simultaneously (for example a complete genome, a plasmid...) The second component is the position. Those two component must be separated by "". It is possible to use "" in the replicon name, only the last instance will be used as the separator between replicon name and position. With this format of file, MacSyFinder will be able to treat each replicon separately to assess macromolecular systems presence and reduce ressource use.

Example: esco_genomes.faa
> ESCO388_0001
XXXXXXX
> ESCO388_0002
XXXXXXX
…..
> ESCO388_3603
XXXXXXX
> ESCO389_0001
XXXXXXX
> ESCO389_0002
XXXXXXX
…..
> ESCO389_3555
XXXXXXX

To use DefenseFinder with gembase format file on larger dataset of genomes run

defense-finder run –dbtype gembase esco_genomes.faa

defense-finder run options

To check the different DefenseFinder options run

$ defense-finder run --help

Usage: defense-finder run [OPTIONS] FILE

  Search for all known anti-phage defense systems in the target fasta file.

Options:
  -o, --out-dir TEXT     The target directory where to store the results.
                         Defaults to the current directory.
  -w, --workers INTEGER  The workers count. By default all cores will be used
                         (w=0).
  -c, --coverage FLOAT   Minimal percentage of coverage for each profiles. By
                         default set to 0.4
  --db-type TEXT         The macsyfinder --db-type option. Run macsyfinder
                         --help for more details. Possible values are
                         ordered_replicon, gembase, unordered, defaults to
                         ordered_replicon.
  --preserve-raw         Preserve raw MacsyFinder outputs alongside Defense
                         Finder results inside the output directory.
  --models-dir TEXT      Specify a directory containing your models.
  --no-cut-ga            Advanced! Run macsyfinder in no-cut-ga mode. The
                         validity of the genes and systems found is not
                         guaranteed!
  --log-level TEXT       set the logging level among DEBUG, [INFO], WARNING,
                         ERROR, CRITICAL
  -h, --help             Show this message and exit.

Development

To install defense-finder in development mode (so when you edit a file the changes are directly visible without reinstalling), one can do :

conda create -n defensefinder_dev
conda activate defensefinder_dev
pip install -e .
defense-finder update

To test that changes in the code are not breaking the output, you can compare your results with the test dataset :

defense-finder run test/df_test_prot.faa
defense-finder run test/df_test_nt.fna

#
for i in systems genes hmmer; do
echo "Verifying $i results in : " 
echo -n "Protein file :"
diff -q df_test_prot_defense_finder_$i.tsv test/expected_results/df_test_prot_defense_finder_$i.tsv && echo " > Tests OK" || echo " >> Test Failed <<"
echo -n "Nucleotide file :"
diff -q df_test_nt_defense_finder_$i.tsv test/expected_results/df_test_nt_defense_finder_$i.tsv && echo " > Tests OK" || echo " >> Test Failed <<"
echo
done

For questions: you can contact aude.bernheim@pasteur.fr

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mdmparis-defense-finder-1.3.0.tar.gz (27.5 kB view details)

Uploaded Source

Built Distribution

mdmparis_defense_finder-1.3.0-py3-none-any.whl (26.0 kB view details)

Uploaded Python 3

File details

Details for the file mdmparis-defense-finder-1.3.0.tar.gz.

File metadata

File hashes

Hashes for mdmparis-defense-finder-1.3.0.tar.gz
Algorithm Hash digest
SHA256 6abd7317eb3bafe8514f6bd86f27c4ba87a91eb42bf44276d0f70e944450f385
MD5 7804f3d561fec08e024db547061fd64d
BLAKE2b-256 db0ea2b9b8cbedbe3cc3430673af8ddd4b36d9f045d99b7829caa2264c49dd93

See more details on using hashes here.

File details

Details for the file mdmparis_defense_finder-1.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for mdmparis_defense_finder-1.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3532d8b03fb1bc8b6afe2f53f523b40963eb5ecbed1aa608ebcb0169acb6cffd
MD5 1c87cf09c4d5c5ee296de2610b41822c
BLAKE2b-256 52e8b99f3991099333e9ac8032007abc725840d0220830e3f2124a75b126ddd1

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page