Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - Topic: Ephemeral State Requirements

Joel Halpern Direct <jmh.direct@joelhalpern.com> Wed, 01 June 2016 13:31 UTC

Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1917C12D0B9 for <i2rs@ietfa.amsl.com>; Wed, 1 Jun 2016 06:31:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.722
X-Spam-Level:
X-Spam-Status: No, score=-2.722 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4NoZXrzLQSE for <i2rs@ietfa.amsl.com>; Wed, 1 Jun 2016 06:31:30 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C06A12D1E7 for <i2rs@ietf.org>; Wed, 1 Jun 2016 06:31:29 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4C6C41C06A8; Wed, 1 Jun 2016 06:31:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1464787889; bh=BVNgJCW+ZLZbxYwHfkowBmrqiDZab7I3t2egloBVHFI=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=gmiAP+88knGyRceVaJ4Cj04eA6zFZyMwJNQZDMXgJKKSFtG9T1M5keB5kwxsOfjDu yryJh/Sby+i9pmVXipQFRhPNstB6z6C/k3E5F3N4I0ekyN912qwSea8NDiboYDHXFY FfrsxzJhq+nlUEwmrhr6qw3O9itT31YzzOtaITis=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id C3CA41C043E; Wed, 1 Jun 2016 06:31:28 -0700 (PDT)
To: Susan Hares <shares@ndzh.com>
References: <000601d1bad5$70523090$50f691b0$@ndzh.com> <20160531063840.GA21289@elstar.local> <00d501d1bb45$0da83500$28f89f00$@ndzh.com> <20160531142540.GA22420@elstar.local> <001401d1bb4e$cfaefd10$6f0cf730$@ndzh.com> <20160531171304.GA22857@elstar.local> <004801d1bb72$d0129680$7037c380$@ndzh.com> <7026105d-6695-c001-ab91-a566bcf8405e@joelhalpern.com> <009101d1bbf6$08548200$18fd8600$@ndzh.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <8171687e-2d0d-ad19-a389-2ecd3788b7a2@joelhalpern.com>
Date: Wed, 01 Jun 2016 09:31:24 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:45.0) Gecko/20100101 Thunderbird/45.1.0
MIME-Version: 1.0
In-Reply-To: <009101d1bbf6$08548200$18fd8600$@ndzh.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/uJAhK9WBu-oEP-5z2JFpoGFTT7M>
Cc: i2rs@ietf.org
Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - Topic: Ephemeral State Requirements
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jun 2016 13:31:32 -0000

My question was not about whether I2RS operations and configuration can 
produce operational state.

Rther, the quesiton is whether this operational state is in any way 
different from all other operational state?
Operational state, by its nature, is never persisted in config.
Operational state, by its nature, comes and goes depending upon other 
aspects (you frequently can not get statistics on an interface that is 
not enabled.)

So I don't see anything special on the operational side that I2RS requires.

Yours,
Joel

On 6/1/16 7:09 AM, Susan Hares wrote:
> Joel:
>
> I am surprised you asked this question as you have followed the I2RS data
> modules.  Is this question rhetorical?
> Ephemeral operational state have three types:
>
> 1) results of rpc operations stored to respond to rpc actions
>
> I2RS-RIB-Data
> Rpcs:
>       +---x rib-add
>       |  +---w input
>       |  |  +---w rib-name        string
>       |  |  +---w rib-family      rib-family-def
>       |  |  +---w ip-rpf-check?   boolean
>       |  +--ro output
>       |     +--ro result uint32
>       |     +--ro reason? string
>
> 2) notification data stored
>
>
> I2RS-RIB-Data
>    notifications:
>       +---n nexthop-resolution-status-change
>       |  +--ro nexthop
> .....
>       +---n route-change
>          +--ro rib-name                 string
>          +--ro rib-family               rib-family-def
>          +--ro route-index              uint64
>
> 3) read-only status information
>
> See my presentation where the bgp-global-config - can be used by config or
> state.  It is ephemeral state augmenting these features.   Or see the L2
> topology module below.
>
> augment /nw:networks/nw:network/nw:node/nt:termination-point:
>    +--rw l2-termination-point-attributes
>       +--rw description?          string
>       +--rw maximum-frame-size?   uint32
>       +--rw (l2-termination-point-type)?
>       |  +--:(ethernet)
>       |  |  +--rw mac-address?          yang:mac-address
>       |  |  +--rw eth-encapsulation?    identityref
>       |  |  +--rw port-vlan-id?         vlan {VLAN}?
>       |  |  +--rw vlan-id-name* [vlan-id] {VLAN}?
>       |  |     +--rw vlan-id      vlan
>       |  |     +--rw vlan-name?   string
>       |  +--:(legacy)
>       |     +--rw encapsulation?        identityref
>       +--ro tp-state?             Enumeration
>
>
> Sue Hares
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Tuesday, May 31, 2016 4:10 PM
> To: Susan Hares
> Cc: i2rs@ietf.org
> Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am
> - Topic: Ephemeral State Requirements
>
> Can you clarify something for me?
> What is ephemeral operational state?
>
> The only thing I can think of is operational state like statistics related
> to ephemeral leaves or constructs?
> Is that what you mean by "ephemeral operational state"?
> The reason i ask is that such state does not seem to need any special
> handling or labeling.
>
> Yours,
> Joel
>
> On 5/31/16 3:29 PM, Susan Hares wrote:
>> Juergen:
>>
>>
>>> I understand YANG validation rules and I understand YANG's notion of
>> configuration datastores. I do not >think this matches your ephemeral
>> configuration validation.
>>
>> This does not provide a technical discussion of:
>> a) what you understand the ephemeral configuration validation rules to
>> be,
>> b) why you do not the model matches the configuration validation rules.
>>
>> 1 Data Model is a great idea for NETCONF/NETMOD.  However, it should
>> encompass
>>
>> Ephemeral data:== ephemeral state ::== Ephemeral configuration +
>> Ephemeral operational state
>>
>> Cheers,
>>
>> Sue
>