Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt

Kanwar Singh <kanwar@nuagenetworks.net> Fri, 28 February 2014 02:26 UTC

Return-Path: <kanwar@nuagenetworks.net>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A2F41A06A2 for <l2vpn@ietfa.amsl.com>; Thu, 27 Feb 2014 18:26:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level:
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dYZY5qGUJIxk for <l2vpn@ietfa.amsl.com>; Thu, 27 Feb 2014 18:26:00 -0800 (PST)
Received: from mail-oa0-f50.google.com (mail-oa0-f50.google.com [209.85.219.50]) by ietfa.amsl.com (Postfix) with ESMTP id 43EF31A02C2 for <l2vpn@ietf.org>; Thu, 27 Feb 2014 18:26:00 -0800 (PST)
Received: by mail-oa0-f50.google.com with SMTP id i11so3421029oag.23 for <l2vpn@ietf.org>; Thu, 27 Feb 2014 18:25:58 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=WXjhIq6YSg1bSizd9YrXW4Id3ObFYSHoI1cKkplSb7k=; b=kTvI6g9ZueDS+OlQrVyxFHKPsRa8AN3EwWJb1kVH4SZgtZkedfIjhnhxVROCQNgHSw 0ptZcE+NT3zcA2OinzK8JhIOP5zfQ4dIH/8rpNmWlnFzWrfgSHGt4vYz0OMqGEWCrype +UzTpjNPjPwS2e2H8sVrFkY3S0550P6FwklBy8FhlJqLfM2qA6I1n3ptW9XOW3QjTRw/ g9jwR41IliEjdaDGUpKlkpn8YN9G27mbzfI/G9ImCMcljByv7SQ0RYlYif1ff9Jxk89P nyZ8acpfRIeX9q/uoQjr188cxG32xSGXeLzBEsvEA0FPIKgV8mO9HRzP5UAHw907y9oH tz2A==
X-Gm-Message-State: ALoCoQmfsHF727yoOsRgImY9s4WtCSRSl5FuCRE15myPGbXKb0Vg8dcvhFPPqE327T4lhREDmSWF
MIME-Version: 1.0
X-Received: by 10.60.51.230 with SMTP id n6mr205589oeo.35.1393554358293; Thu, 27 Feb 2014 18:25:58 -0800 (PST)
Received: by 10.76.169.7 with HTTP; Thu, 27 Feb 2014 18:25:58 -0800 (PST)
In-Reply-To: <4A6CE49E6084B141B15C0713B8993F281BFCD485@SJEXCHMB12.corp.ad.broadcom.com>
References: <CAPCgso32vYqPEq4upa1FG78quZwBOJpzsCSCYTX2R7XgHzLiNA@mail.gmail.com> <B23247FA-7CED-4F78-8858-076CA83F613C@broadcom.com> <CF351FD5.B21EA%wim.henderickx@alcatel-lucent.com> <D26A6EDE-42D3-45A6-8FFC-3B1850433722@lucidvision.com> <CF34C0FC.7D7B%alohiya@juniper.net> <4A6CE49E6084B141B15C0713B8993F281BFCD485@SJEXCHMB12.corp.ad.broadcom.com>
Date: Thu, 27 Feb 2014 18:25:58 -0800
Message-ID: <CAPCgso0O4n+4cZvbc4Mb_CSoDgYnUMG2axVM9K9nA4jpVy2Qhw@mail.gmail.com>
Subject: Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
From: Kanwar Singh <kanwar@nuagenetworks.net>
To: Shahram Davari <davari@broadcom.com>
Content-Type: multipart/alternative; boundary=001a11c30c7c806d8d04f36e2839
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/b_INIWupdvzs5rLOGXonNY4hq34
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Pradeep Jain <pradeep@nuagenetworks.net>, Vinay Bannai <vbannai@paypal.com>, Ravi Shekhar <rshekhar@juniper.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2014 02:26:05 -0000

Hi Shahram,



Regarding BFD for Inner IP, it seems you are suggesting that BFD needs to
be running in between two End-System(s) (i.e. Guest VM/Tenant) using the
Overlay. But, Cloud providers would  not necessarily want to rely on
applications running in Guest OS/Tenant  to verify connectivity of their
Networks. In-fact, in most cases Cloud Providers won't even have access to
Guest / Tenant VMs to launch such applications.



Thanks,

Kanwar


On Thu, Feb 27, 2014 at 11:19 AM, Shahram Davari <davari@broadcom.com>wrote;wrote:

>  Anil,
>
>
>
> I don't agree. If you use for example BFD for inner IP, and if BFD says
> connectivity is OK, this implies that the Overlay connectivity is also OK,
> since BFD is inside the overlay.
>
> Also I am not sure why you are adding the VNI, VSID, etc in the message as
> TLV, since these value are already in the packet header.
>
>
>
> Thx
> Shahram
>
>
>
> *From:* L2vpn [mailto:l2vpn-bounces@ietf.org] *On Behalf Of *Anil Lohiya
> *Sent:* Thursday, February 27, 2014 10:19 AM
> *To:* Thomas Nadeau; Henderickx, Wim (Wim)
> *Cc:* l2vpn@ietf.org; Pradeep Jain; Vinay Bannai; Ravi Shekhar
> *Subject:* Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>
>
>
>
>
> Existing ping/traceroute mechanisms don't work in the virtualized
> environment e.g. ping may report that IP reachability between the ingress
> and egress tunnel endpoints is fine but the end systems (i.e. VM, physical
> server etc.) connectivity for a tenant could still be broken. This is
> because ping only verifies basic connectivity between two endpoints in the
> underlay but NOT in the context of overlay segments. Hence, we need
> debugging tools that work in the overlay environment. Think why there was a
> need to have lsp ping ... requirement with IP overlays is not much different.
>
>
>
> Question is not whether applications are resilient or not... One can not
> ignore the fact that operators have to think about having the right tools
> when that "inevitable" call  comes from their customer about deteriorating
> application performance or traffic blackhole and there are no tools today
> specific to overlay network debugging.
>
>
>
> - Anil
>
>
>
> *From: *Thomas Nadeau <tnadeau@lucidvision.com>
> *Date: *Thursday, February 27, 2014 8:05 AM
> *To: *"Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
> *Cc: *"l2vpn@ietf.org" <l2vpn@ietf.org>rg>, Pradeep Jain <
> pradeep@nuagenetworks.net>gt;, Vinay Bannai <vbannai@paypal.com>om>, Ravi
> Shekhar <rshekhar@juniper.net>
> *Subject: *Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>
>
>
>
>
> The question is, and perhaps the draft could explain this, is why existing
> tools a) are insufficient and b) cannot be modified.
>
> Operationally speaking, b is preferred if you ask me as learning a new
> tool/model for diagnosis and trouble-shooting is expensive and painful.
>
> For example, if we took the tact of reinventing say IP ping for every
> underlying transport, then we'd have 50 tools by now.
>
>
>
> --Tom
>
>
>
>
>
>
>
> On Feb 27, 2014:11:02 AM, at 11:02 AM, Henderickx, Wim (Wim) <
> wim.henderickx@alcatel-lucent.com> wrote:
>
>
>
>   Because we also need to trace L2 endpoints besides IP endpoint.
>
>
>
> *From: *Shahram Davari <davari@broadcom.com>
> *Date: *Thursday 27 February 2014 16:58
> *To: *Kanwar Singh <kanwar@nuagenetworks.net>
> *Cc: *"l2vpn@ietf.org" <l2vpn@ietf.org>rg>, Pradeep Jain <
> pradeep@nuagenetworks.net>gt;, Vinay Bannai <vbannai@paypal.com>om>, Ravi
> Shekhar <rshekhar@juniper.net>
> *Subject: *Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>
>
>
> Hi
>
>
>
> Why don't you use existing IP based OAM messages such as BFD, OWAMP,
> TWAMP, etc.
>
> Regards,
>
> Shahram
>
>
>
>
> On Feb 27, 2014, at 7:46 AM, "Kanwar Singh" <kanwar@nuagenetworks.net>
> wrote:
>
>  Dear All,
>
>
>
> We have submitted the below draft that proposes Generic OAM and Datapath
> Failure Detection Mechanism(s) for Overlay Networks.
>
>
>
> We would like to solicit inputs from the members of L2VPN WG.
>
>
>
> Please review the same and update us with your inputs/feedback.
>
>
>
> Warm Regards
>
> - Kanwar
>
>
>
>
>
> A new version of I-D, draft-jain-nvo3-overlay-oam-01.txt has been successfully submitted by Kanwar Singh and posted to the
>
> IETF repository.
>
> Name:           draft-jain-nvo3-overlay-oam
> Revision:       01
> Title:          Generic Overlay OAM and Datapath Failure Detection
> Document date:  2014-02-12
> Group:          Individual Submission
> Pages:          44
> URL:            http://www.ietf.org/internet-drafts/draft-jain-nvo3-overlay-oam-01.txt
> Status:         https://datatracker.ietf.org/doc/draft-jain-nvo3-overlay-oam/
> Htmlized:      http://tools.ietf.org/html/draft-jain-nvo3-overlay-oam-01
> Diff:              http://www.ietf.org/rfcdiff?url2=draft-jain-nvo3-overlay-oam-01
>
> Abstract:
>    This proposal describes a mechanism that can be used to detect Data
>    Path Failures of various overlay technologies as VXLAN, NVGRE,
>    MPLSoGRE and MPLSoUDP and verifying/sanity of their Control and Data
>    Plane for given Overlay Segment.  This document defines the following
>    for each of the above Overlay Technologies:
>
>    o  Encapsulation of OAM Packet, such that it has same Outer and
>       Overlay Header as any End-System's data going over the same
>       Overlay Segment.
>
>    o  The mechanism to trace the Underlay that is exercised by any
>       Overlay Segment.
>
>    o  Procedure to verify presence of any given Tenant VM or End-System
>       within a given Overlay Segment at Overlay End-Point.
>
>    Even though the present proposal addresses Overlay OAM for VXLAN,
>    NVGRE, MPLSoGRE and MPLSoUDP, but the procedures described are
>    generic enough to accommodate OAM for any other Overlay Technology.
>
>
>