Re: [CCAMP] Alarm Module work

stefan vallin <stefan@wallan.se> Thu, 31 May 2018 19:04 UTC

Return-Path: <stefan@wallan.se>
X-Original-To: ccamp@ietfa.amsl.com
Delivered-To: ccamp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2998B13147B for <ccamp@ietfa.amsl.com>; Thu, 31 May 2018 12:04:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.607
X-Spam-Level:
X-Spam-Status: No, score=-2.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DC_PNG_UNO_LARGO=0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=wallan-se.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mzN8zCfeSNNR for <ccamp@ietfa.amsl.com>; Thu, 31 May 2018 12:04:12 -0700 (PDT)
Received: from mail-lf0-x235.google.com (mail-lf0-x235.google.com [IPv6:2a00:1450:4010:c07::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8056A131517 for <ccamp@ietf.org>; Thu, 31 May 2018 12:04:11 -0700 (PDT)
Received: by mail-lf0-x235.google.com with SMTP id t134-v6so11275829lff.6 for <ccamp@ietf.org>; Thu, 31 May 2018 12:04:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wallan-se.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=Zv+mLnW1bFI2Dj615fJzTsjLNiZ3wb16yeUvF564sZs=; b=ZGv6fJXzBpeid/ElLQOQAKXvV2zCzUrhy6gqaIKdEisrOVkS8HA4Hmgge+dGcr3Dvt ZVCNOqBhkMcCG6NRJIlS5TMKn7BQ5p/0Yb2eEXk2BbsG2VenT5nfkWG9O0un+3au8yEL HrHASXZ6g6RpNLlDCyxOoJtM0/IVl/Ov8kA24i+fATtIK2NZrGkYJzY16zZeZDpzfI4j 2NC7vKgNUSJ+sFC6fmT2NLcNl0jMapQYsLKjc2jTJhIsYTOAfeaFPR6Lxi6uvjO4/5ix BgGne2JCSOLLmrgE2KC2040IDJIEstotTX2grmQXnegwSfu5R0tbqzWGjd0Po3y1z3SN 88ag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=Zv+mLnW1bFI2Dj615fJzTsjLNiZ3wb16yeUvF564sZs=; b=RRFg5UeOJezsvAOxqVc+lXCF/wGVT4AdegW8dG/jTRefeo6ODNn6eUENWsgKk7M/7l 8cN1vSplMtRSbHika+BmpZIpZ82slVECaO2b/J4r9hSVRC65iJbHC5Qsid39QhPC582O 116umdJqkcjz8iA/1fajumtdhLaNrImqcGAgff6SVf39M2qRHpAZlh+lo+CW/mKmffoy tu1aChN9sd+iOb9ykEnYf36h1pmGpqdwrx1ZsRs4nXENBDg2vfEQ0KA441hnru7FzdXP t0z/gqUyGBRGn54zqFBiUR7s9MyUiqYIb/IIeHWVFgPyNrZQQYJnP2de8u/NMLnkN1JE V84A==
X-Gm-Message-State: ALKqPwdd2FzL89HB4kXg9IfZNds6L7UWBp1P4A2QSPjxC5t2Oqn/D/bO UBUok+jb/6HRY/+ielS3sh8yEYTJn7o=
X-Google-Smtp-Source: ADUXVKLksODpVZ4yptGUkog+ypXWOZQYyBY8yv8WZrMMSVFFTGYxDdiC6EaR0Zmbi5ikl6NornilCQ==
X-Received: by 2002:a2e:9095:: with SMTP id l21-v6mr6275519ljg.58.1527793449560; Thu, 31 May 2018 12:04:09 -0700 (PDT)
Received: from [172.20.10.2] (host-217-214-148-159.mobileonline.telia.com. [217.214.148.159]) by smtp.gmail.com with ESMTPSA id o8-v6sm3294381ljh.67.2018.05.31.12.04.07 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 31 May 2018 12:04:08 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_15105D92-9B68-4BC3-BD68-5AD5C8D9E34D"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: stefan vallin <stefan@wallan.se>
In-Reply-To: <BD6D193629F47C479266C0985F16AAC7F07058E9@ex-mb1.corp.adtran.com>
Date: Thu, 31 May 2018 21:02:46 +0200
Cc: Common Control and Measurement Plane Discussion List <ccamp@ietf.org>
Message-Id: <7906650D-4E83-4386-AA08-43B120CD6866@wallan.se>
References: <D174588E-1233-4B53-B5BB-D29DE14B3888@wallan.se> <BD6D193629F47C479266C0985F16AAC7F07058E9@ex-mb1.corp.adtran.com>
To: NICK HANCOCK <nick.hancock@adtran.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ccamp/X2t9Ytd3ReaD9fqE8uSYpMBn_dg>
Subject: Re: [CCAMP] Alarm Module work
X-BeenThere: ccamp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussion list for the CCAMP working group <ccamp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ccamp>, <mailto:ccamp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ccamp/>
List-Post: <mailto:ccamp@ietf.org>
List-Help: <mailto:ccamp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ccamp>, <mailto:ccamp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 May 2018 19:04:23 -0000

Hi Nick!
Thanks for your comments, really appreciated!

> On 31 May 2018, at 18:24, NICK HANCOCK <nick.hancock@adtran.com> wrote:
> 
> Hi Stefan,
>  
> Thanks for sharing this for discussion.
>  
> I absolutely agree that it is most important that we can progress the YANG Alarm Module to RFC asap, so that support for it can begin to be implemented in the industry.
>  
>  
> 1) Extended notification filtering.
>  
> The introduction of ‘notify-security-level’ here has one drawback in that it is a global configuration applying to all alarm types and thus does not allow the behaviour to be assigned based on type of resource, such as interface or object. This does not allow you to suppress alarms below a certain severity for some interface types that are not so important, for example, but keep normal alarm behaviour for other more important interfaces. 
mmm, we could add resource and alarm type to notification filtering, but then we have alarm shelving and notification filtering as overlapping mechanisms.
I could argue that the manager/client could do the notification filtering.
My experience is that the severity level filtering is of less importance. You normally want to shelf based on resource and alarm type
>  
> Also just 'Crossing the specified level' may fulfil the desired behaviour for alarm types with a 1:1 mapping to severity level, but not for alarm types with severity life cycles. if the severity of the alarm continues to increase above the configured severity level, alarm notifications would also need to be sent.
That was the intention, will clarify.

> Consider the following example assuming the severity-level is set to ‘major’:
>            [(Time, severity, clear)]:
>            [(T1, major, -), (T2, critical, -), (T3, major, -), (T4, minor, -), (T5, major), (T6, major, clear)]
> I would expect alarm notifications at T1, T2, T3, and T6.
Adding some severity changes to your scenario
[(T1, major, -), (T2, critical, -), (T3, major, -), (T4, minor, -), (T5, warning), (T6, major), (T7, clear)]


Notifications will be sent at T1, T2, T3, T4, T6, T7

>  
> Changing this configuration to a choice does have its advantages, such as to allow the addition of other cases later or allow other SDOs or vendors to augment other cases.
> So maybe a pragmatic approach so as to not block progress of this draft could be to keep the choice format but omit the ‘notify-security-level’ for now and continue discussions.
Or keep it :)
>  
>  
> 2) Alarm Severity Assignment Profile
>  
> The proposed implementation provides the means to override severities for alarm types with severity life cycles, but at the same time the implementation is relatively simple.
> Also the use of a criteria to assign the severity to alarms – and I am assuming that it would work like for the shelf - allows resource-independent overriding of factory default severities through specification of an alarm-type only, but also to add additional overrides for specific resources. The only question is if there are multiple assignments that apply to a specific alarm instance which assignment should apply? For example, if I create an entry for 
> [(alarm-type-id, alarm-type-id-qualifier, resource, severity-level]
> [(los,,,major),(los,,”interface 1”, critical)]
> which severity assignment applies to interface 1? The more specific?
Good comment!
Priority order:
1) the more specific
  1.1) resource
  1.2) alarm type (remember hierarchical)
2) order in list

>  
> The implementation is also very specific to alarm severity assignment. The mechanism itself, though, is relatively generic, mapping information to alarms, in this case alarm severities. Other SDOs or vendors may wish to augment the list with other data nodes to use this mechanism to associate other data with alarm types and avoid having to implement multiple lists. So I believe that there would be a great advantage and added-value, if this list would be made more generic, such as renaming it to just ‘alarm-profile’, for example.
We are circling back and forth here.
The list has expressed the need to support ITU Alarm Severity Assignment Profile, this is exactly what the suggested model does.
>  
> And although it does fulfil the requirements of M.3100/M.3160,
as requested :)
> including the list within the module ietf-alarms-itu would basically restrict the use and possible extension of the ASAP to ITU requirements only.
Not sure what you mean with "restrict"

> Since possible augmentations could originate from requirements coming from other SDOs and vendors, it would IMHO not be prudent to include it in this module.
Nothing stops augmentations and additions of other features. Just felt there was a high pressure for ASAP which the suggestion captures.

best regards Stefan
>  
> Best regards
> Nick
>  
>  
>  
> This message has been classified General Business by NICK HANCOCK on Thursday, 31 May 2018 at 18:24:19.
>  
>  <>From: CCAMP [mailto:ccamp-bounces@ietf.org <mailto:ccamp-bounces@ietf.org>] On Behalf Of stefan vallin
> Sent: Monday, May 28, 2018 2:12 PM
> To: Common Control and Measurement Plane Discussion List
> Subject: [CCAMP] Alarm Module work
>  
> Hi!
> Me and Martin are working on an updated version of the alarm module. Several smaller things pointed out by reviewers. Thank you all.
>  
> We would like to share 2 things for discussion:
> 1) Extended notification filtering
> 2) Alarm Severity Assignment Profile
>  
> We are now stretching the limit for being a first core module with only relevant features.
> At this point I think it is more important to start having implementation support rather than adding even more features which might scare people of from implementing it.
>  
>  
> 1) Extended notification filtering
> ========================
> See suggestion below, added the capability to filter on severity.
> We did not include resource filtering since that would be too much overlap with shelving.
>  
>       choice notify-status-changes {
>         description
>           "This leaf controls the notifications sent for alarm status
>            updates. There are three options:
>            1. notifications are sent for all updates, severity level
>               changes and alarm text changes
>            2. notifications are only sent for alarm raise and clear
>            3. notifications are sent for status changes equal to or
>               above the specified severity level. Clear notifications
>               shall always be sent
>               Notifications shall also be sent for state changes that
>               makes an alarm less severe than the specified level.
>            In option 3, assuming the severity level is set to major,
>            and that the alarm has the following state changes
>            [(Time, severity, clear)]:
>            [(T1, major, -), (T2, minor, -), (T3, warning, -),
>             (T4, minor, -), (T5, major), (T6, major, clear)]
>            In that case, notifications will be sent at
>            T1, T2, T5 and T6";
>         leaf notify-all-state-changes {
>           type empty;
>           description
>             "Send notifications for all status changes.";
>         }
>         leaf notify-raise-and-clear {
>           type empty;
>           description
>             "Send notifications only for raise, clear, and re-raise.
>              Notifications for severity level changes or alarm text
>              changes are not sent.";
>         }
>         leaf notify-severity-level {
>           type severity;
>           description
>             "Only send notifications for alarm state changes
>              crossing the specified level. Always send clear
>              notifications.";
>         }
>       }
>  
>  
>  
> 2) Alarm Severity Assignment Profile
> ============================
>  
> We have renamed ietf-alarms-x733 to ietf-alarms-itu since it now includes X.733 as well as M.3100/M.3160 features
>  
>   list alarm-severity-assignment-profile {
>       if-feature alarm-severity-assignment-profile;
>       key "alarm-type-id alarm-type-qualifier resource";
>       ordered-by user;
>       description
>         "If an alarm matches the criteria in one of the entries
>          in this list the configured severity levels shall be
>          used instead of the system default. Note well that the
>          mapping allows for several severity levels since this
>          alarm module uses a stateful alarm model where
>          the same alarm can have the following states:
>          [(warning, not cleared),(minor, not cleared),
>           (minor, cleared)]
>  
>          The configuration of this list shall update the
>          /al:alarms/al:alarm-inventory/al:alarm-type list so that a
>          client can always get a full picture of the possible alarms
>          by reading the alarm inventory. If an alarm matches several
>          entries in this list, the first match is used.";
>       reference
>         "M.3160/M.3100 Alarm Severity Assignment Profile, ASAP";
>       leaf alarm-type-id {
>         type al:alarm-type-id;
>         description
>           "The alarm type identifier to match for severity
>            assignment.";
>       }
>       leaf alarm-type-qualifier {
>         type string;
>         description
>           "A W3C regular expression that is used to match
>            an alarm type qualifier.";
>       }
>       leaf resource {
>         type al:resource-match;
>         description
>           "Specifies which resources to match for severity
>            assignment.";
>       }
>       leaf-list severity-levels {
>         type al:severity;
>         ordered-by user;
>         description
>           "Specifies the configured severity level(s) for the
>            matching alarm. If the alarm has several severity
>            levels the leaf-list shall be given in rising severity
>            order. The original M3100/M3160 ASAP function only
>            allows for a one-to-one mapping between alarm type and
>            severity but since the IETF alarm module supports stateful
>            alarms the mapping must allow for several severity levels.
>  
>            Assume a high-utilisation alarm type with two
>            thresholds with the system default severity levels of
>            threshold1 = warning and threshold2 = minor. Setting this
>            leaf-list to (minor, major) will assign the severity
>            levels threshold1 = minor and threshold2 = major";
>       }
>       leaf description {
>         type string;
>         mandatory true;
>         description
>           "A description of the alarm severity profile.";
>       }
>     }
>  
>  
> Stefan Vallin
> stefan@wallan.se <mailto:stefan@wallan.se>
> +46705233262