Re: [I2rs-proto-dt] couple YANG details

"Susan Hares" <shares@ndzh.com> Thu, 29 October 2015 18:49 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs-proto-dt@ietfa.amsl.com
Delivered-To: i2rs-proto-dt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53D741A88EF for <i2rs-proto-dt@ietfa.amsl.com>; Thu, 29 Oct 2015 11:49:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level:
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dwsTsZSyjP7b for <i2rs-proto-dt@ietfa.amsl.com>; Thu, 29 Oct 2015 11:49:10 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93F381A88B9 for <i2rs-proto-dt@ietf.org>; Thu, 29 Oct 2015 11:49:09 -0700 (PDT)
X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=101.110.53.38;
From: "Susan Hares" <shares@ndzh.com>
To: "'Andy Bierman'" <andy@yumaworks.com>
References: <CABCOCHRRDZZZF1uj6UVDezmZzM3g8bEQiWTkyZKUPk6HL40fcg@mail.gmail.com> <CABCOCHSinfdgfxhg8Ly9ZDSDCvqi3xse+ZwAAQnYweEaMJ6j7w@mail.gmail.com> <20151023151945.GG26793@pfrc.org> <CABCOCHQb1MjX_8XpV1+2vOnEWO_VfNQoLi=jBizGov+Hz6saoA@mail.gmail.com> <033a01d10dd4$0e25ef50$2a71cdf0$@ndzh.com> <CABCOCHQok6Kx_=Y5eQ4sjK5O912EibPLXM0n_c4zFSbMs_Z-Gg@mail.gmail.com> <01f601d11180$eb2372b0$c16a5810$@ndzh.com> <CABCOCHSdHrKg2sUJTq=SOBk3OSP_8WmuHaJFK=iuvhrBMAtEcg@mail.gmail.com>
In-Reply-To: <CABCOCHSdHrKg2sUJTq=SOBk3OSP_8WmuHaJFK=iuvhrBMAtEcg@mail.gmail.com>
Date: Thu, 29 Oct 2015 14:49:01 -0400
Message-ID: <017a01d1127a$7b927180$72b75480$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_017B_01D11258.F486EC00"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQKMEsdjPzkqeQIW8vtZ5c+9e7UOnAHIfNVjAlWBtF4CQfRF0wKVc7koAjYgq24A30rvIAJi47GznJlbBbA=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs-proto-dt/juEXOhrp9dV809sBTNK4NMC3Q5E>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs-proto-dt@ietf.org
Subject: Re: [I2rs-proto-dt] couple YANG details
X-BeenThere: i2rs-proto-dt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: I2RS protocol design team <i2rs-proto-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs-proto-dt>, <mailto:i2rs-proto-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs-proto-dt/>
List-Post: <mailto:i2rs-proto-dt@ietf.org>
List-Help: <mailto:i2rs-proto-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs-proto-dt>, <mailto:i2rs-proto-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Oct 2015 18:49:12 -0000

Andy:  

 

I’d also like to understand the concepts of panes of glass versus sibling databases. 

 

Sue 

 

From: I2rs-proto-dt [mailto:i2rs-proto-dt-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Wednesday, October 28, 2015 12:21 PM
To: Susan Hares
Cc: Jeffrey Haas; i2rs-proto-dt@ietf.org
Subject: Re: [I2rs-proto-dt] couple YANG details

 

Hi,

 

I will be there Sat. night, so anytime from Sunday to Friday is OK

(except WG meetings I have to attend).

 

The YANG validation should fall out for free if the architecture

is good enough.  Something as simple as YANG "max-entries"

should be obvious, but that does not seem to be the case.

 

There was a slide from Jeff way back that had "running" and

"ephemeral" as "sibling datastores".  The intended config

was derived by the I2RS agent somehow.   This is how Phil described

the Junos implementation to me.  The router picks data from the

dynamic datastore to activate.  It is not a direct API to operational state.

 

Understanding the differences between panes of glass and sibling datastores

might be useful. Something to talk about next week.

 

 

Andy

 

 

 

On Wed, Oct 28, 2015 at 6:02 AM, Susan Hares <shares@ndzh.com>; wrote:

Andy: 

 

The two options were a choice – not both.  I’m not sure how to take the document toward this major change. I think I need in person time at IETF to talk about this. 

 

When do you arrive at Yokohama? 

 

Sue 

 

From: I2rs-proto-dt [mailto:i2rs-proto-dt-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Monday, October 26, 2015 4:18 PM
To: Susan Hares
Cc: Jeffrey Haas; i2rs-proto-dt@ietf.org
Subject: Re: [I2rs-proto-dt] couple YANG details

 

 

 

On Fri, Oct 23, 2015 at 1:47 PM, Susan Hares <shares@ndzh.com>; wrote:

Andy: 

 

Two options: 

1)      Ephemeral obeys the overall configuration, 

2)      Ephemeral sets its own ephemeral limit. 

 

 

It is not that clear what it means for both (1) and (2) to be true.

 

I am ready to give up on panes of glass.

Nobody is clear on the details of client-facing integration of running

and ephemeral datastores.

 

Instead, I think the ephemeral datastore should be completely separate

from the running datastore.  At boot-time, it is completely empty.

 

To override "next-hop",  the I2RS client has to provide all the ancestors,

and (at least) ancestor key leafs.  These data nodes will not be created automatically

or mirror running config automatically, or do anything at all automatically,

wrt/ the running datastore.

 

The router is responsible for reconciling the running and ephemeral datastores

to produce the current intended config.

 

A collision can only occur in the ephemeral datastore between the proposed edit

and the existing ephemeral datastore contents.

 

Running datastore validation and operation is completely untouched

and unaffected by the ephemeral datastore.   

 

Ephemeral datastore validation and operation is completely untouched

and unaffected by the running datastore.   

 

The client will not be able to derive the intended configuration by retrieving

both datastores and combining them. A special operation is probably

needed for that.

 

Validation on the ephemeral datastore is not really required, although

any deviation from the running datastore (especially pick and choose statements)

is likely to cause user astonishment.

 

IMO it is least astonishing to say the ephemeral datastore is not validated

at all, but the intended configuration in use by the agent SHOULD be valid

at all times.

 

 

Andy

 

 

 

 

If you do #2, then are you suggesting we put a limit in the original data model. 

 

Sue 

 

From: I2rs-proto-dt [mailto:i2rs-proto-dt-bounces@ietf.org] On Behalf Of Andy Bierman
Sent: Friday, October 23, 2015 11:29 AM
To: Jeffrey Haas
Cc: i2rs-proto-dt@ietf.org; Susan Hares
Subject: Re: [I2rs-proto-dt] couple YANG details

 

 

 

On Fri, Oct 23, 2015 at 8:19 AM, Jeffrey Haas <jhaas@pfrc.org>; wrote:

Andy,

On Wed, Oct 21, 2015 at 02:49:12PM -0700, Andy Bierman wrote:
> We need to figure out for each YANG constraint:
>  1) does it apply at all?
>  2) is it MUST, SHOULD, or MAY enforce?
>  3) Does the constraint apply the same in running vs. ephemeral?
>  4) Does the constraint apply to the combined panes of glass or
>      each pane independently?

I'm going to avoid answering your question to let you decide what this
functional requirement means:
Ephemeral nodes SHOULD NOT introduce their own constraints.
The presence of ephemeral nodes does not trump validation or constraints for
persistent state.

 

So if the YANG list has "max-elements 5",

and the config has 5 entries.  What happens when

5 or 10 entries are added in the ephemeral datastore?

 

 

-- Jeff

 

Andy