Re: [i2rs] I-D Action: draft-keyupate-i2rs-bgp-usecases-02.txt

Dean Bogdanovic <deanb@juniper.net> Sat, 07 June 2014 01:51 UTC

Return-Path: <deanb@juniper.net>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2F231A02B5 for <i2rs@ietfa.amsl.com>; Fri, 6 Jun 2014 18:51:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.302
X-Spam-Level:
X-Spam-Status: No, score=-1.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_15=0.6, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vTEfjbIvhwhB for <i2rs@ietfa.amsl.com>; Fri, 6 Jun 2014 18:51:01 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1lp0144.outbound.protection.outlook.com [207.46.163.144]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50C591A02AC for <i2rs@ietf.org>; Fri, 6 Jun 2014 18:51:00 -0700 (PDT)
Received: from BN1PR05MB424.namprd05.prod.outlook.com (10.141.58.148) by BN1PR05MB439.namprd05.prod.outlook.com (10.141.58.22) with Microsoft SMTP Server (TLS) id 15.0.954.9; Sat, 7 Jun 2014 01:50:52 +0000
Received: from BN1PR05MB424.namprd05.prod.outlook.com ([169.254.8.141]) by BN1PR05MB424.namprd05.prod.outlook.com ([169.254.8.141]) with mapi id 15.00.0954.000; Sat, 7 Jun 2014 01:50:51 +0000
From: Dean Bogdanovic <deanb@juniper.net>
To: Susan Hares <shares@ndzh.com>
Thread-Topic: [i2rs] I-D Action: draft-keyupate-i2rs-bgp-usecases-02.txt
Thread-Index: AQHPgcJPUJvejJP5KkGEiMWG5tf2EJtkkEsAgABSAIA=
Date: Sat, 07 Jun 2014 01:50:50 +0000
Message-ID: <DCD1F3B3-1AFD-4A82-BC4C-B607842F37E5@juniper.net>
References: <20140604174423.25048.19110.idtracker@ietfa.amsl.com> <005101cf8025$b7cc2b70$27648250$@ndzh.com> <010001cf8099$1c8ba860$4001a8c0@gateway.2wire.net> <004301cf809a$c5d6a090$5183e1b0$@ndzh.com> <8368317D-0E4F-4D6A-8B5C-9366E0F5FC1C@juniper.net> <005b01cf81c9$e8d8ddd0$ba8a9970$@ndzh.com>
In-Reply-To: <005b01cf81c9$e8d8ddd0$ba8a9970$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.1510)
x-originating-ip: [66.129.241.10]
x-microsoft-antispam: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID:
x-forefront-prvs: 0235CBE7D0
x-forefront-antispam-report: SFV:NSPM; SFS:(6009001)(428001)(377424004)(199002)(189002)(24454002)(51704005)(377454003)(13464003)(15202345003)(76176999)(66066001)(50986999)(87936001)(20776003)(93886002)(104166001)(33656002)(62966002)(76482001)(77156001)(85852003)(77982001)(31966008)(93916002)(79102001)(74662001)(36756003)(74502001)(81342001)(46102001)(86362001)(81542001)(89996001)(57306001)(99396002)(83716003)(82746002)(83072002)(83322001)(101416001)(64706001)(21056001)(80022001)(19580395003)(19580405001)(99286001)(4396001)(2656002)(92566001)(15975445006)(50226001)(87286001)(92726001)(104396001); DIR:OUT; SFP:; SCL:1; SRVR:BN1PR05MB439; H:BN1PR05MB424.namprd05.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (: juniper.net does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=deanb@juniper.net;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <998FA48A8AC7B14C95FA7AC7DAAFF908@namprd05.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
Archived-At: http://mailarchive.ietf.org/arch/msg/i2rs/ElbI4vmXV78HuoiTgfk6S4eGJfg
Cc: "<i2rs@ietf.org>" <i2rs@ietf.org>, Susan Hares <skh@ndzh.com>, "<rex@cisco.com>" <rex@cisco.com>, "t.petch" <ietfc@btconnect.com>, "Keyur Patel (keyupate)" <keyupate@cisco.com>, Hannes Gredler <hannes@juniper.net>, Russ White <russw@riw.us>
Subject: Re: [i2rs] I-D Action: draft-keyupate-i2rs-bgp-usecases-02.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Jun 2014 01:51:03 -0000

On Jun 6, 2014, at 4:57 PM, Susan Hares <shares@ndzh.com> wrote:

> Dean:
> 
> Thank you for the complete review of version 3.   Great review! 
> 
> On readability, Jeff Haas suggest putting all the requirements in the front.
> Would that make it better?  It's an easy switch (other than listening to
> Jeff say "I told you so").   
I don't like giving Jeff opportunity to use that sentence, but I'm in agreement with Jeff. Putting the requirement list upfront makes more sense and then you don't have to repeat the whole requirement, you can just list it.

> On configuration persistence, you are correct.
> My understanding of the feedback from the WG had been write from I2RS
> datastore to configuration datastore.  I will go back and review the posts
> from the WG and check with co-authors dynamic memory.  If the intent is
> empheral store, then we can use a variant of your text. 
OK
> 
> On REQ01/02 - (01) Read/write access  versus  (02) notification and REQ08/09
> - (08) Write versus (09) read/notify status --- I agree these could be
> combined if the WG desires or split on read/write versus notification. Do
> you have any preference? 
My preference would be read/notify and write. The reason is that read/notify are used for operational and analytic purposes and write is an action based on operational and analytical result.

> 
> On the danger of inserting flow specifications, you are right. However, see
> IDR's discussion flow specification for choices.  IDRs argues advanced
> features are like a rope, chair and whip - one can either hang oneself or
> tame a lion.  
or be mauled by the lion. I've seen so many times by giving the tools to the people, they shot themselves into the foot, so am careful about it. Just talking from experience.
> 
> Sue 
> 
> -----Original Message-----
> From: Dean Bogdanovic [mailto:deanb@juniper.net] 
> Sent: Friday, June 06, 2014 4:03 PM
> To: Susan Hares
> Cc: t.petch; <i2rs@ietf.org>; Keyur Patel (keyupate); Hannes Gredler; Russ
> White; Susan Hares; <rex@cisco.com>
> Subject: Re: [i2rs] I-D Action: draft-keyupate-i2rs-bgp-usecases-02.txt
> 
> Susan,
> 
> Many people don't know what NLRI abbreviation stands for (Network Layer
> Reachability Information , so writing it out first time would be a good
> idea. 
> 
> Throughout the text, the requirement number sequence is confusing until you
> get to the very and where all requirements are listed and then it makes
> sense.
> 
> REQ04: The ability to interact with various policies configured on
>      the forwarding devices, in order to inform the policies
>      implemented by the dynamic routing processes.  This interaction
>      should be through existing configuration mechanisms, such as
>      NETCONF, and should be recorded in the configuration of the local
>      device so operators are aware of the full policy implemented in
>      the network from the running configuration.
> It is not clear to me if your requirement is that dynamic protocols should
> impose persistent policies? It says it should be recorded in the
> configuration of the local device.
> 
> I agree that those policies should be visible to operators and other
> applications, but not sure if dynamic protocols should be allowed to
> implement persistent policies. IMO, those should be ephemeral policies.
> So maybe text should look like this
> This interaction should be through existing configuration mechanisms, such
> as NETCONF, and should be recorded in the running or ephemeral configuration
> of the local device so operators are aware of the full policy implemented in
> the network from the running configuration.
> 
> I'm trying to see major difference between REQ01/REQ02 and REQ08/REQ09?
> 
> In general I'm not sure if changing entries by dynamic protocol in RIB is a
> good idea. If you plan to change only what is configured on the local
> device, then that is OK, but if you start changing entries that are pushed
> from other devices in the network, the system would get unstable. And it
> looks to me that REQ09 would allow that.
> 
> Dean
> 
> 
> On Jun 5, 2014, at 4:47 AM, Susan Hares <shares@ndzh.com> wrote:
> 
>> Tom: 
>> 
>> I'm glad to change the citation in the abstract.    On the authors, this
> was
>> merge of two drafts. 
>> 
>> Sue
>> 
>> -----Original Message-----
>> From: t.petch [mailto:ietfc@btconnect.com]
>> Sent: Thursday, June 05, 2014 4:35 AM
>> To: Susan Hares; i2rs@ietf.org
>> Cc: 'Keyur Patel (keyupate)'; Hannes Gredler; Russ White; 'Susan 
>> Hares'; rex@cisco.com
>> Subject: Re: [i2rs] FW: I-D Action: 
>> draft-keyupate-i2rs-bgp-usecases-02.txt
>> 
>> Sue
>> 
>> Currently you have six authors which is too many for an RFC - someone's
>> got to go!   For me, this is not just an admin point - when commenting,
>> I like to have one or two names, no more, as the clear pen holders 
>> whom I can expect to act.  Too often, with so many names, everyone 
>> thinks that someone else will do something and nothing happens, so, in 
>> all seriousness, I oppose adoption until you sort this out amongst
> yourselves.
>> 
>> Note too that you have a citation in the Abstract, again not allowed - 
>> this can be surprising difficult to get round but get round it you, 
>> one or more thereof, must.
>> 
>> Tom Petch
>> 
>> 
>> ----- Original Message -----
>> From: "Susan Hares" <shares@ndzh.com>
>> To: <i2rs@ietf.org>
>> Cc: "'Keyur Patel (keyupate)'" <keyupate@cisco.com>; "Hannes Gredler"
>> <hannes@juniper.net>; "Russ White" <russw@riw.us>; "'Susan Hares'"
>> <skh@ndzh.com>; <rex@cisco.com>
>> Sent: Wednesday, June 04, 2014 7:49 PM
>> Subject: [i2rs] FW: I-D Action: 
>> draft-keyupate-i2rs-bgp-usecases-02.txt
>> 
>> 
>>> Jeff and Ed:
>>> 
>>> This updated draft has all the changes that Keyur Patel promised and
>> updates
>>> to the reference the current i2rs internet drafts.
>>> 
>>> Would you please do a Working Group adoption call?
>>> 
>>> Thank you,
>>> Sue Hares
>>> 
>>> 
>>> -----Original Message-----
>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of 
>>> internet-drafts@ietf.org
>>> Sent: Wednesday, June 04, 2014 1:44 PM
>>> To: i-d-announce@ietf.org
>>> Cc: i2rs@ietf.org
>>> Subject: [i2rs] I-D Action: draft-keyupate-i2rs-bgp-usecases-02.txt
>>> 
>>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts 
>>> directories.
>>> This draft is a work item of the Interface to the Routing System
>> Working
>>> Group of the IETF.
>>> 
>>>       Title           : Use Cases for an Interface to BGP Protocol
>>>       Authors         : Keyur Patel
>>>                         Rex Fernando
>>>                         Hannes Gredler
>>>                         Shane Amante
>>>                         Russ White
>>>                         Susan Hares
>>> Filename        : draft-keyupate-i2rs-bgp-usecases-02.txt
>>> Pages           : 17
>>> Date            : 2014-06-04
>>> 
>>> Abstract:
>>>  A network routing protocol like BGP is typically configured and
>>>  analyzed through some form of Command Line Interface (CLI) or
>>>  NETCONF.  These interactions to control BGP and diagnose its
>>>  operation encompass: configuration of protocol parameters, display
>> of
>>>  protocol data, setting of certain protocol state and debugging of
>> the
>>>  protocol.
>>> 
>>>  Interface to the Routing System's (I2RS) Programmatic interfaces,
>> as
>>>  defined in draft-ietf-i2rs-architecture, provides an alternate way
>> to
>>>  control and diagnose the operation of the BGP protocol.  I2RS may
>> be
>>>  used for the configuration, manipulation, analyzing or collecting
>> the
>>>  protocol data.  This document describes set of use cases for which
>>>  I2RS can be used for BGP protocol.  It is intended to provide a
>> base
>>>  for the solution draft describing a set of interfaces to the BGP
>>>  protocol.
>>> 
>>> 
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-keyupate-i2rs-bgp-usecases/
>>> 
>>> There's also a htmlized version available at:
>>> http://tools.ietf.org/html/draft-keyupate-i2rs-bgp-usecases-02
>>> 
>>> A diff from the previous version is available at:
>>> http://www.ietf.org/rfcdiff?url2=draft-keyupate-i2rs-bgp-usecases-02
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of
>> submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2rs
>>> 
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2rs
>>> 
>> 
>> 
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
> 
>