[i2rs] Shepherd review of draft-ietf-i2rs-traceability-04.txt
"Susan Hares" <shares@ndzh.com> Thu, 17 December 2015 19:58 UTC
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DCBA1B3047; Thu, 17 Dec 2015 11:58:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.054
X-Spam-Level:
X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7YhuSU7zGVad; Thu, 17 Dec 2015 11:58:17 -0800 (PST)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D95DE1B305C; Thu, 17 Dec 2015 11:58:16 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177;
From: Susan Hares <shares@ndzh.com>
To: i2rs@ietf.org, draft-ietf-i2rs-traceability@ietf.org
Date: Thu, 17 Dec 2015 14:58:20 -0500
Message-ID: <012201d13905$47882720$d6987560$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0123_01D138DB.5EB6B300"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AdE4/dFd0pZUuw5KStiXQLMkLq8/+g==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/FNQxoCHlzNpG-SElhZUUNKjaMD8>
Cc: "'Carlos Pignataro (cpignata)'" <cpignata@cisco.com>, 'Joe Clarke' <jclarke@cisco.com>, "'Gonzalo Salgueiro (gsalguei)'" <gsalguei@cisco.com>
Subject: [i2rs] Shepherd review of draft-ietf-i2rs-traceability-04.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Dec 2015 19:58:19 -0000
Joe, Carlos, Gonzalo: The is a Shepherd’s review of your document. Status: Needs Minor Changes, mostly editorial. Details are below. Let me know if you have any questions. If you could get to these minor editorial changes this week, I would like to see if I can get Directorate Reviews over the next 3 weeks. Sue Hares =============== Technical changes: 1) Remove section 5.4 – I2RS trace Log Extensibility and Optional fields Reason: In the document it is a TBD. If we need to extend these we will revise the traceability requirements and framework. 2) Section 7.4.2/&.4.3 uses section 6.7 for notification pub/sub The sections in the I2RS architecture document have changed. Please change this document. 3) Section 7.4.3 – the draft [I-D.camwinget-i2rs-pubsub-sec] is no longer active. Please determine if this work is included in the <https://datatracker.ietf.org/doc/draft-ietf-i2rs-security-environment-reqs/> draft-ietf-i2rs-security-environment-reqs-00 or draft-ietf-i2rs-protocol-security-requirements <https://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements> . If not, please determine if changes can be made to these documents, or If we need to re-investigate making draft-camwinget-i2rs-pubsub-sec document an I2RS document. Editorial changes: 1: Page 4. Lists in section 4 – I suggest for list below you use “;” instead of “.” for ease of reading and grammatical correctness. o Automated event correlation, trend analysis, and anomaly detection. o Trace log storage for offline (manual or tools) analysis. o Improved accounting of routing system operations. o Standardized structured data format for writing common tools. o Common reference for automated testing and incident reporting. o Real-time monitoring and troubleshooting. o Enhanced network audit, management and forensic analysis capabilities. 2) Section 5.1 paragraph 1 s/highlighted herein/ to / in this section./ 3) Figure 1: Operation + Op Data V The “V” seems to not lead anyplace. Probably needs to be deleted or fixed. 4: Section 5.2 Request Timestamp: The specific time, adhering to [RFC3339 <https://tools.ietf.org/html/rfc3339> ] format, at which the I2RS operation was received by the Agent. Result Timestamp: The specific time, adhering to [RFC3339] format, at which the I2RS operation was completed by the Agent. Proposed fix: Alternate for both timestamps The specific time at which the I2RS operation was received by the Agent. The time is passed in the [RFC3339] format. 5: Change the RIB-Info model to draft-ietf-i2rs-rib-info-model in the text below. Result Code: This field holds the result of the operation. In the case of RIB operations, this MUST be the return code as specified in Section 4 of [I-D.nitinb-i2rs-rib-info-model]. The operation may not complete with a result code in the case of a timeout. If the operation fails to complete, it MUST still log the attempted operation with an appropriate result code (e.g., a result code indicating a timeout). 6: Section 7.2, p. 9 From /Another noteworthy consideration is that Client requests may not always be processed synchronously or within a bounded time/ To: / Client requests may not always be processed synchronously or within a bounded time/ 7. Section 7.2, p. 10, first full paragraph From /Section 7.3 talks about rotating the trace log in order to/. To /Section 7.3 discusses rotating the trace log in order to /