Re: [CCAMP] [Inventory-yang] New Internet Draft on Peer-Mount

"Jan Lindblad (jlindbla)" <jlindbla@cisco.com> Fri, 10 November 2023 16:28 UTC

Return-Path: <jlindbla@cisco.com>
X-Original-To: ccamp@ietfa.amsl.com
Delivered-To: ccamp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D03C8C17C8BB; Fri, 10 Nov 2023 08:28:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.906
X-Spam-Level:
X-Spam-Status: No, score=-11.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="R+TRh3vm"; dkim=pass (1024-bit key) header.d=cisco.com header.b="N60aOz3e"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kNqi1uh_OGMc; Fri, 10 Nov 2023 08:28:26 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C2DE0C17DBEA; Fri, 10 Nov 2023 08:28:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5459; q=dns/txt; s=iport; t=1699633705; x=1700843305; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=Ljgr5s0oOQQXOEjvJmmdVwuFmb6MPHtTR6A8vzD2VwY=; b=R+TRh3vm7184QEmVKiOTe7MLK121qgWeYsK8A33E3GyxCumuCCwR1Ntl SAFqIF1UBI6eGFOcDuNeQocDG7zyL9wGKFodNwun64MxCpUfcPCGDNm+Z wYW0cbbjhbRhyzahrAj244P5q/bP9fbCePHi05kzy6WWF8W1cbh5vxAUd 8=;
X-CSE-ConnectionGUID: YP3+T5vAQz67voU4n4sKIg==
X-CSE-MsgGUID: miEAao2mSeqKsHkBVyxHPw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:oTqjWhDrLQjkyBLuJ/MuUyQVoBdPi9zP1kY9454jjfdJaqu8usikN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7H3Ho/Ug86z3si5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:JYVY5akOdE5B0ECkhNM7+J7o5gy/JkRdPkR7XQ2eYbSJt1+Wr1Gzt xIfDz2Oa6yON2uned9/bYrl/B8OvMTRyNQ2SApsrSo3HltH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaB4E/rav649SUUOZigHtLUEPTDNj16WThqQSIgjQMLs+Mii+aEu/Dha++2k Y20+5a31GONgWYuaTtNsvrb8nuDgdyr0N8mlg1mDRx0lAe2e0k9VPo3Oay3Jn3kdYhYdsbSq zHrlezREsvxpn/BO/v9+lrJWhRiro36YWBivkFrt52K2XCukMCdPpETb5LwYW8P49mAcksYJ N9l7fRcQi9xVkHAdXh0vxRwS0lD0aN6FLDvEEDk8vDO0WT/YSWz3fJTUEdqJq459bMiaY1O3 aRwxDEldBuPgae9x6i2D7A0wM8iN8LseogYvxmMzxmAUq1gGs+FEv6MvIMGtNszrpgm8fL2Z c4YbzZlaB3oaBxUMVBRA5U79AutriCkLWUA+AjK+8Lb5UDWzSFY2b+3NeHYY/+RZcZ/oFeIh lrZqjGR7hYybYzDlmXtHmiXru7Jgy79RIUIBfip//hlqFye2mJVDwcZPXO9rOW8jUKWWt9DJ QoT4CVGhaM5/UmzZtjwQxP+p2SL1iPwQPJKGOE8rQqK0KeRul7fDWkfRTkHY9sj3CMredA0/ m6xxJDVWCJGia/LFmyay+uS8SiRGCdAeAfuehQ4ZQcC5tDipqQ6gRTOUstvHcaJYjvdRG+YL 9ei8XVWulkDsSIY//7kog2f0lpAsrCMH1FlvFyGNo6wxlohPNbNWmC+1bTMAR99wGuxVFKNu j0PnNKTqblWS5qMjyeKBu4KGdlFBspp0hWC2DaD/LF4qlxBHkJPm6gMu1mSw281aq45lcfBO hO7hO+ozMY70IGWRaF2eZmtLM8h0LLtE9/oPtiNMIsfP8UtKlPXp34yDaJ144wLuBZ1+U3YE cnDGftA8V5GYUia5GPsHrxEgeNDKt4Wnz+JG/gXMChLIZLHNCLKFt/pwXOFb/sy6+ufsR7J/ tNEX/ZmOD0BONASlhL/qNZJRXhTdCBTLcmv+6R/KLXZSiI4Qz5JNhMk6e57E2CTt/4Lxr6gE 7DUchIw9WcTclWdd1rXNSA+Mu2/NXu9xFpiVRER0Z+T8yFLSa6k7bwUcN08erxPyQCp5acco yUtEylYPslydw==
IronPort-HdrOrdr: A9a23:hiEYyaO/HUiub8BcT7L255DYdb4zR+YMi2TDiHoBKiC9I/b5qy nxppUmPEfP+UcssREb9expOMG7MArhHQYc2/hRAV7QZniXhILOFvAj0WKC+UyvJ8SazJ8+6U 4OSdkCNDSdNykcsS++2njHLz9C+qjFzEnLv5aj854Fd2gDAM8QinYcNu/YKDwIeOAsP+tAKH Po3Ls8m9PWQwVtUi3UPAhiY8Hz4/fwuNbNZxkACxQ76A+Iow+JxdfBeSSw71M1aR8K5a0t31 TkvmXCi5lLtcvV9jbsk0voq7hGktrozdVOQOaWjNIOFznqggG0IKx8RryrplkO0aSSwWdvtO OJjwYrPsx15X+UVHqyuwHR1w7p1ytrw2P+yGWfnWDoraXCNXYH4ot69MVkmynimhMdVeJHof p2NqWixsFq5Cb77WLADh7zJktXfwSP0CcfeKUo/g9iuMMlGc1sRMokjQFo+FNqJlOk1Gjhe9 MeUP309bJYd0iXYGveuXQqyNuwXm4rFhPDWUQavNeJugIm0UyQXyMjtbkid1o7hdkAoqN/lq 75G7UtkKsLQt4dbKp7CutEScyrCnbVSRaJNG6JO1zoGKwOJnqI8vfMkfoIzfDvfIZNwIo5mZ zHXl8dvWkue1j2AcnL2JFQ6BjCTGi0QDyowMBD4JpyvKH6WdPQQGG+YUFrl9Hlr+QUA8XdVf r2MJVKA+X7JW+rAopN1x2WYegbFZDfarxdhj8WYSP5niuQEPyfigXySoelGIbQ
X-Talos-CUID: 9a23:JLzqWGtpZnOOkqiXKseEdZT66IsUSiae8CrOCnaqVzl3T4DJTwOL24Jrxp8=
X-Talos-MUID: 9a23:Jbu61AZtVZ0l/OBTsj7BrThlbsJT7r2NE2AOu6sXq+m8Knkl
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Nov 2023 16:28:25 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 3AAGSOk4029930 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 10 Nov 2023 16:28:24 GMT
X-CSE-ConnectionGUID: OfEEa4toTE2/VcWIAw7mxg==
X-CSE-MsgGUID: hy3OmNTpT8KEXUY9ljyB7w==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=jlindbla@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.03,291,1694736000"; d="scan'208";a="7869734"
Received: from mail-mw2nam10lp2101.outbound.protection.outlook.com (HELO NAM10-MW2-obe.outbound.protection.outlook.com) ([104.47.55.101]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Nov 2023 16:28:24 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DQtSESQmoc3w/z8Si7vDIdlXuH/IhdsVdzoY7Rgo3SxAJCKShDg10fxUoMSUEppUmq/+cFKGfzMrem9yWFFRacvuvuOCk69POafyIFb1HUSzyHk0/zVEGHAWdisIdeeLKYpmAXptWit4nAhW2vPB232pprLbwYENynT6ODSYoU8EaJLZBObJuiPegwaLaLw/g0uoNVTJ6ttCS+bsl5ddzJ5+K9rpvayunvKlyd1eZWk0FiuA7RFqk9lytRbwluNWfC8zrpuFw/KKmgAAwx+NYV4Nr4c9f63edAFiFSLH3Q4OdTMZAIVUbgEOXXPsxcklswiWDfDO7jpE2DpPii6z4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lCaN2fha8N8GnPEZOtLe4r2V5+NQWkNpdKcPwf+P2z0=; b=lZWd/GBNehTjBQBZ+LFylU0Z7lpEClgukB76ePzJ1/ie1fLie9nZ9D9KswLJbXyxs+RIstIUJ5QvmPQ8QmW6+r9rxL3dE0zSad5YnTuCSUIgaHgGfB6GpFUfg0pvzqkj6HluoWyVqjNJ552nhvFxU3nm/q52y+P2A3FZY9owt5COv8YGOdc0yMJWSN1w/kH8vxIDhYAmOu9uuXlk11fKlIuQWex7UvwtCNl7E1dTo2w0aj5fGOeVMgIi7HAyLFTTYKE46fTHVBspEIlYqb1Ft5lvdj6ZYgLyzcVPIXpBbEn583HOysXYULVPWDjzG+rSwBSUmDS3GgIQJ+/Q/mH9bA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lCaN2fha8N8GnPEZOtLe4r2V5+NQWkNpdKcPwf+P2z0=; b=N60aOz3eMiXDGo5YDVcA5epXx03hWNK1dqaSdm8ieOGdaqjICbqSOy/h3orh/tvX2qXT0XcBPFZcQXtYHaJHReauo+y5s/ByqpEYHg2UlJMpSUsi0nZyph+gFiczj9lHYCFk6nzIB6NZmlXDJ+o38YO6TEmskNc8rY+UCJz//EQ=
Received: from DM6PR11MB2841.namprd11.prod.outlook.com (2603:10b6:5:c8::32) by PH0PR11MB5673.namprd11.prod.outlook.com (2603:10b6:510:d6::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6977.21; Fri, 10 Nov 2023 16:28:21 +0000
Received: from DM6PR11MB2841.namprd11.prod.outlook.com ([fe80::43a3:8075:5809:e442]) by DM6PR11MB2841.namprd11.prod.outlook.com ([fe80::43a3:8075:5809:e442%2]) with mapi id 15.20.6977.019; Fri, 10 Nov 2023 16:28:21 +0000
From: "Jan Lindblad (jlindbla)" <jlindbla@cisco.com>
To: Alexander L Clemm <ludwig@clemm.org>
CC: "ccamp@ietf.org" <ccamp@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "inventory-yang@ietf.org" <inventory-yang@ietf.org>, "Eric Voit (evoit)" <evoit@cisco.com>, Aihua Guo <aihuaguo.ietf@gmail.com>, IGNACIO DOMINGUEZ MARTINEZ-CASANUEVA <ignacio.dominguezmartinez@telefonica.com>
Thread-Topic: [Inventory-yang] New Internet Draft on Peer-Mount
Thread-Index: AQHZ+MIaqGx5dn982UGVNlJjNtf+17Bz9EUA
Date: Fri, 10 Nov 2023 16:28:21 +0000
Message-ID: <27CEDDF4-1374-4DD1-BF9F-494DFA374FA7@cisco.com>
References: <bfe298e9-1e58-4186-ad6b-9e7e89c4b13e@clemm.org>
In-Reply-To: <bfe298e9-1e58-4186-ad6b-9e7e89c4b13e@clemm.org>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3731.700.6)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR11MB2841:EE_|PH0PR11MB5673:EE_
x-ms-office365-filtering-correlation-id: a97e8144-b5d0-412e-eb05-08dbe20a0e08
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB2841.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(366004)(39860400002)(346002)(136003)(396003)(230922051799003)(64100799003)(1800799009)(451199024)(186009)(5660300002)(66574015)(41300700001)(2906002)(83380400001)(8676002)(4326008)(8936002)(122000001)(54906003)(64756008)(316002)(6916009)(2616005)(66899024)(66946007)(38100700002)(76116006)(66556008)(91956017)(66476007)(66446008)(38070700009)(6512007)(6506007)(33656002)(966005)(478600001)(6486002)(36756003)(71200400001)(86362001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-ID: <7509E7AD90137A49B3975C36623385FC@namprd11.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB2841.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a97e8144-b5d0-412e-eb05-08dbe20a0e08
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Nov 2023 16:28:21.5655 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IecQtKURy72ZHwTAbGVdBqLeefM5Be0+0oCwxDcppIQgq2c1gSqXf6gnlAJyTRQUyEej53nDsa7SX1QRZ44JUw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5673
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ccamp/H0TFKIuEZVEdk9WU2F-UN1K3Ej0>
Subject: Re: [CCAMP] [Inventory-yang] New Internet Draft on Peer-Mount
X-BeenThere: ccamp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Discussion list for the CCAMP working group <ccamp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ccamp>, <mailto:ccamp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ccamp/>
List-Post: <mailto:ccamp@ietf.org>
List-Help: <mailto:ccamp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Nov 2023 16:28:29 -0000

Alex,

Great meeting you this week, and thanks for the many presentations about interesting and sometimes pressing topics. I have read the draft and have a few comments.

First of all I want to say that I understand the value of this use case. In fact, we have implemented a fairly similar proprietary mechanism more than 10 years ago, and it is still in daily use around the world today. That said, I can also attest to the wealth of implementation difficulties when it comes to make this efficient/reliable enough for a broad range of use cases.

Restricting this mechanism to only provide read-only data is smart :-) when it comes to limiting potential issues. To standardize federated config management in this vein would be a truly massive undertaking. Still, what you propose isn't easy to get right. We will have to open a can of worms (even if we avoid the "config true" barrel of worms).

You have obviously thought about this quite a bit, but let me ask what you think about the following:

1) Performance & caching

The primary problem we see with our existing, proprietary implementation of something in this direction is that the performance is not good enough for many use cases. The mechanism is used a fair bit, so clearly it is good enough for some. Every time a call to another server is required (and you even talk about cascading mounts), a delay is incurred. This can of course be mitigated by caching strategies. Anyone who has studied distributed caching algorithms knows this is really complex, though, and results are not always ideal.

2) Authentication & mount server mgmt

You propose a YANG module for management of mounts. This list includes details about server IP addresses etc, but not user credentials. This means the structure is not usable by itself, additional knowledge is required to do the reading. I am not so sure everyone would want to manage their device federation and authentication/authorization mapping using this model structure (we certainly would not), so maybe it would be better to just provide a list of host names (string) and leave the exact meaning of that string out of scope?

3) YANG model merging

Since we are in the YANG world where all data we read is well described by a YANG DM, we'd like the clients to know what the mounted YANG looks like. This is a non-trivial matter even with YANG-mount, but here we're also not mounting entire modules, but rather pointing at random points in those mounted models. How a client is to make sense of that situation is not entirely clear, even if it is only for config false.

4) YANG-push, gnmi subscriptions, etc

You mentioned yourself that it may be difficult to create the (synchronized?) responses to any client's subscriptions over this data. Maybe it could be left out of scope, but doing so would make the federated solution appear as something negative to clients.

5) Consistent network configuration

The mechanism described in section 4.2 is a kind of configuration mechanism. I do think it looks rather weak, however, compared to the functionality available to applications running on top of common NETCONF servers. In order to get proper transactional behavior, clients will typically need to validate and coordinate their consumption of configuration changes, and that sounds difficult to achieve with this approach. I fear this would lead to low quality systems (i.e. not fully transactional, not properly validated, etc).


So to summarize, while I say "we need this" (and have and use this in our proprietary context), I'm also saying it's not going to be easy to standardize.

Best Regards,
/jan



> we have just submitted a new Internet Draft regarding Peer-Mount, a mechanism that allows to reference and incorporate information from remote datastores.  This will allow, for example, a network controller to provide a federated datastore containing management data transcending individual network devices without needing to keep this data redundantly.  You can find the draft here: https://datatracker.ietf.org/doc/html/draft-clemm-netmod-peermount-00
> 
> The concept of Peer-Mount was in fact originally introduced several years ago but not pursued further due to lack of interest and IETF use cases at the time.   It is being revived now, with a few modifications, in light of IETF interest in network inventory, network topology, and related use cases that have emerged since. Inevitably, these use cases may lead to the need to incorporate some management data regarding particular state or configuration that is already maintained on networking devices into a holistic network-wide view.  Unlike Schema Mount, which allows to reuse existing model definitions by allowing them to be  instantiated in a local data tree, Peer Mount is aimed at incorporating a  local view of data subtrees that are remote, authoritatively owned and maintained by separate systems.
> 
> We believe that this work belongs into Netmod, while the potential users are in network inventory - hence we are cross-posting this to netmod, ivy, and ccamp.
> 
> --- Alex (on behalf of coauthors)
> 
> -- 
> Inventory-yang mailing list
> Inventory-yang@ietf.org
> https://www.ietf.org/mailman/listinfo/inventory-yang