[i2rs] Shepherd review of draft-ietf-i2rs-traceability-04.txt

"Susan Hares" <shares@ndzh.com> Thu, 17 December 2015 19:58 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCBA1B3047; Thu, 17 Dec 2015 11:58:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level:
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7YhuSU7zGVad; Thu, 17 Dec 2015 11:58:17 -0800 (PST)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D95DE1B305C; Thu, 17 Dec 2015 11:58:16 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177;
From: Susan Hares <shares@ndzh.com>
To: i2rs@ietf.org, draft-ietf-i2rs-traceability@ietf.org
Date: Thu, 17 Dec 2015 14:58:20 -0500
Message-ID: <012201d13905$47882720$d6987560$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0123_01D138DB.5EB6B300"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdE4/dFd0pZUuw5KStiXQLMkLq8/+g==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/FNQxoCHlzNpG-SElhZUUNKjaMD8>
Cc: "'Carlos Pignataro (cpignata)'" <cpignata@cisco.com>, 'Joe Clarke' <jclarke@cisco.com>, "'Gonzalo Salgueiro (gsalguei)'" <gsalguei@cisco.com>
Subject: [i2rs] Shepherd review of draft-ietf-i2rs-traceability-04.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Dec 2015 19:58:19 -0000

Joe, Carlos, Gonzalo: 

 

The is a Shepherd’s review of your document.  

 

Status: Needs Minor Changes, mostly editorial. Details are below.  

 

Let me know if you have any questions.  If you could get to these minor editorial changes this week, I would like to see if I can get Directorate Reviews over the next 3 weeks. 

 

Sue Hares 

 

===============

 

Technical changes:

1)      Remove section 5.4 – I2RS trace Log Extensibility and Optional fields 

 

Reason: In the document it is a TBD. If we need to extend these we will revise the traceability requirements and framework.

2)      Section 7.4.2/&.4.3 uses section 6.7 for notification pub/sub 

 

The sections in the I2RS architecture document have changed. Please change this document. 

 

3)      Section 7.4.3 – the draft [I-D.camwinget-i2rs-pubsub-sec] is no longer active.   Please determine if this work is included in the  <https://datatracker.ietf.org/doc/draft-ietf-i2rs-security-environment-reqs/> draft-ietf-i2rs-security-environment-reqs-00  or draft-ietf-i2rs-protocol-security-requirements <https://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements> . 

 

If not, please determine if changes can be made to these documents, or

If we need to re-investigate making draft-camwinget-i2rs-pubsub-sec document an I2RS document. 

 

Editorial changes: 

 

1:  Page 4.  

Lists in section 4 – I suggest for list below you use “;” instead of “.” for ease of reading and grammatical correctness. 

 

  o  Automated event correlation, trend analysis, and anomaly

      detection.

 

   o  Trace log storage for offline (manual or tools) analysis.

 

   o  Improved accounting of routing system operations.

 

   o  Standardized structured data format for writing common tools.

 

   o  Common reference for automated testing and incident reporting.

 

   o  Real-time monitoring and troubleshooting.

 

   o  Enhanced network audit, management and forensic analysis

      capabilities.

 

2) Section 5.1 paragraph 1

 

s/highlighted herein/ to / in this section./ 

 

3) Figure 1: 

 

  Operation +

                Op Data 

                  V  

 

The “V” seems to not lead anyplace.  Probably needs to be deleted or fixed. 

 

4: Section 5.2 

 

    Request Timestamp: 

      The specific time, adhering to [RFC3339 <https://tools.ietf.org/html/rfc3339> ] format,
      at which the I2RS operation was received by the Agent.
 
   Result Timestamp:   
      The specific time, adhering to [RFC3339] format,
      at which the I2RS operation was completed by the Agent.

 

Proposed fix: Alternate for both timestamps 

The specific time at which the I2RS operation was received by the Agent.  The time is passed in the [RFC3339] format.

 

 

5: Change the RIB-Info model to draft-ietf-i2rs-rib-info-model in the text below. 

 

      Result Code:   This field holds the result of the operation.  In the

      case of RIB operations, this MUST be the return code as specified

      in Section 4 of [I-D.nitinb-i2rs-rib-info-model].  The operation

      may not complete with a result code in the case of a timeout.  If

      the operation fails to complete, it MUST still log the attempted

      operation with an appropriate result code (e.g., a result code

      indicating a timeout).

 

6:  Section 7.2, p. 9  

From 

/Another noteworthy consideration is that Client requests may not always be processed synchronously or within a bounded time/ 

To: 

/ Client requests may not always be processed synchronously or within a bounded time/

 

7. Section 7.2, p. 10, first full paragraph 

From 

/Section 7.3 talks about rotating the trace log in order to/.

To 

/Section 7.3 discusses rotating the trace log in order to /