Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - Topic: Ephemeral State Requirements

"Susan Hares" <shares@ndzh.com> Tue, 31 May 2016 15:12 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5675412B026 for <i2rs@ietfa.amsl.com>; Tue, 31 May 2016 08:12:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.738
X-Spam-Level: *
X-Spam-Status: No, score=1.738 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, RDNS_NONE=0.793] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A1a8MluZ8j3w for <i2rs@ietfa.amsl.com>; Tue, 31 May 2016 08:12:29 -0700 (PDT)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 046D112D5D2 for <i2rs@ietf.org>; Tue, 31 May 2016 08:12:19 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=174.124.182.128;
From: Susan Hares <shares@ndzh.com>
To: 'Juergen Schoenwaelder' <j.schoenwaelder@jacobs-university.de>
References: <000601d1bad5$70523090$50f691b0$@ndzh.com> <20160531063840.GA21289@elstar.local> <00d501d1bb45$0da83500$28f89f00$@ndzh.com> <20160531142540.GA22420@elstar.local>
In-Reply-To: <20160531142540.GA22420@elstar.local>
Date: Tue, 31 May 2016 11:12:13 -0400
Message-ID: <001401d1bb4e$cfaefd10$6f0cf730$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQJdaenpM7ljbP1C/TwjkI20GPnldwI0uYM8AiAGwTkCHPlBS56IL/WQ
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/gxlES-zn_qLR3atukuoljwWUlws>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, i2rs@ietf.org, 'Benoit Claise' <bclaise@cisco.com>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - Topic: Ephemeral State Requirements
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 May 2016 15:12:31 -0000

Juergen: 

Thank you for your quick response.  See my comments below.   I believe as
you said " I may be ignorant but we have to look at how things fit together"
- so I have provided more information.  I believe the I2RS model is
workable, and I look forward to your informed review of this information. 

Version -09 of Ephemeral-state is released to make it clear ephemeral state
has ephemeral configuration and ephemeral operational state.   Click below
for the draft:

https://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

Sue 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder
Sent: Tuesday, May 31, 2016 10:26 AM
To: Susan Hares
Cc: 'Jeffrey Haas'; i2rs@ietf.org; 'Benoit Claise'; 'Alia Atlas'
Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am
- Topic: Ephemeral State Requirements

On Tue, May 31, 2016 at 10:02:17AM -0400, Susan Hares wrote:
>> Juergen: 
>> 
>>  
>> 
>> Thank you for the second response.    The questions were on version 8 of
the
>> draft.  Jeff wanted to review version 8 before posting - so I delayed
>> posting of version 8 until this morning.    I've answered your questions
>> based on version 08. 
>> 
>> I think you understood that the ephemeral datastores defined by i2RS 
>> are not what you defined in draft-schoenw-netmod-revised-datastores-00:
>> 
>>    o  The model foresees ephemeral datastores that are by definition not
>>       part of the persistent configuration of a device.  These ephemeral
>>       datastores are considered to interact with the rest of the system
>>       like any other control-plane mechanisms (e.g., routing protocols,
>>       discovery protocols).  [XXX Note that this is different from what
>>       is described in some of the I2RS documents.  XXX]
>> 
>> The difference is that I2RS defines ephemeral configuration and 
>> ephemeral operational state.  You see this in all of the I2RS data 
>> modules.  I have augmented your diagram with the proposed I2RS datastore.
>> 
>> 
>>                     +------------+
>>                     | <intended> |  //  Subject to validation
>>                     | (ct, ro)   | //   e.g., missing resources or delays
>>                     +------------+   // Here I2RS ephemeral configuration
fits 
>>                           |         //  so missing resources/delays can
be handled
>>                           v
>>                     +------------+
>>                     | <applied>  |    - here I2RS defines ephemeral 
>>                     | (ct, ro)   |      configuration data store 
>>                     +------------+
>>                           |         // e.g., autodiscovery of values
>>                           v
>>           +--------------------------------+
>>           | <operational-state>            |<-- control plane and
>>           | (ct + cf, ro)                  |    ephemeral datastores

>> +--------------------------------------------------+
>> 
>> 
>> Your definitions ignored the WG requirements and the existing
discussions.
>> Is there a reason why?  I2RS follows the break between operational 
>> state and configuration data store.
>

>There needs to be _one_ architectural model. 
> I may be ignorant but we have to look at how things fit together. 
>What you are drawing is ignoring for instance the fact that <intended> is
the subject of configuration 
> validation while I2RS explicitly states that ephemeral is not part of
configuration validation. 
>So your model is not a workable solution either.

Not really, the ephemeral configuration is a part of the configuration
validation.  The ephemeral validates as either a stand-alone modules
(I2RS-RIB), or as a validation of an augmentation (see examples in the
interim presentation).  It is validated at the intended stage of
configuration.   Therefore, the proposal discussed by I2RS is workable. Your
opinion goes against years of NETCONF people suggesting to I2RS that
ephemeral configuration and ephemeral operational state is possible. 
  
>> o  configuration datastore: When modeled with YANG, a configuration
>>       datastore is realized as an instantiated data tree with
>>       configuration data.
>>  
>> o  Operational state data is a set of data that has been obtained by
>>       the system at runtime and influences the system's behavior similar
>>       to configuration data.  In contrast to configuration data,
>>       operational state is transient and modified by interactions with
>>       internal components or other systems via specialized protocols.
>>  
>> This document is proposed on May 12, 2016 and we have been working on 
>> I2RS for over 3 years.  You provided something that does not satisfy 
>> the requirements of the existing I2RS data models (prepared for over 18
months).
> 

> Which I2RS requirements? Please be specific. 
==================
Ephemeral-REQ-01 to Ephemeral-REQ-04 cover both configuration and
operational state.  If that's not clear, then I guess we need to add them.
Here's the Ephemeral-REQ-01 for version -09 of the text. 

    Ephemeral-REQ-01: I2RS requires ephemeral state; i.e. state that does
   not persist across reboots.  If state must be restored, it should be
   done solely by replay actions from the I2RS client via the I2RS
   agent.  Ephemeral state may consist of ephemeral configuration 
  or ephemeral operational state, or both.  
========
> There needs to be _one_ architectural model for all the datastores people
to introduce in various places 
> and it does not help to complain. 

One model for data stores people is reasonable.  However, your model does
not work for I2RS.  You have not explained why technically the i2RS model
does not work for you.  

>Please get down to the I2RS requirements that the above proposal does not
address. 
See Above.  

> Make a better proposal. Iterate. There have been quite a few calls related
to the intended and applied 
> data store discussions that are not taking place in I2RS land and as I
said above we need to come up with a 
> common architectural model.

Been iterating for a while in I2RS.   Love to hear technical reasons why the
ephemeral datastore architecture does not work for you.    

If mention a few NETCONF calls/ your individuals draft, you must compare it
against the i2RS WG 3 years plus  3 WG drafts to IESG (pub/sub,
traceability, protocol-security), and  2 in final review (protocol-security
environment, ephemeral state).  May I suggest suggesting your draft has
precedence or personal behaviors is not a fruitful discussion.  Let's keep
on the technical discussion. 


-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs