Re: [netmod] Y34 - root node

Robert Wilton <rwilton@cisco.com> Fri, 21 August 2015 12:07 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E98F1A6EF0 for <netmod@ietfa.amsl.com>; Fri, 21 Aug 2015 05:07:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 53AjvD2gkRtC for <netmod@ietfa.amsl.com>; Fri, 21 Aug 2015 05:07:45 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 758FB1A0127 for <netmod@ietf.org>; Fri, 21 Aug 2015 05:07:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5693; q=dns/txt; s=iport; t=1440158866; x=1441368466; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=iPuAGR+LV3B3VguNTdNZ3gVEGuULe9rQZmZQfm+VkOA=; b=YKWBN5Skitl6uPJCVOPKXqmHJcjIuh2PlOpv7MZNfVbJHkXjJw4k+eO9 rFsDL/Pi+aWMn44OUnqd08SrmZfemyvp77l1vjuEsyY5/sIJDkQsY0F5R c8Q8jty8Kk2b94ukKQnYekmpXdzjZ9hiydRUdGrjSpgbBGJwzf0Pf3McP g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CbBAAuFNdV/xbLJq1dhFjFXAKBdREBAQEBAQEBgQqEIwEBAQMBOEABEAsOCgkWDwkDAgECAUUGDQYCAQGIIgjPEgEBAQEBAQEBAQEBAQEBAQEBAQEZi1OEP0sHhCwBBIxliEeMb4FKhyeNZYNpJoN+PTOBByWBIAEBAQ
X-IronPort-AV: E=Sophos;i="5.15,721,1432598400"; d="scan'208";a="611088046"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP; 21 Aug 2015 12:07:44 +0000
Received: from [10.63.23.86] (dhcp-ensft1-uk-vla370-10-63-23-86.cisco.com [10.63.23.86]) by aer-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t7LC7giM028808; Fri, 21 Aug 2015 12:07:42 GMT
To: Martin Bjorklund <mbj@tail-f.com>
References: <55D45CAF.2070605@cisco.com> <20150819.132555.871710491924929960.mbj@tail-f.com> <CABCOCHRgAHah6_f1qZkPs0_v8Cj6NA5TKokb_RtUv+XWNOocFA@mail.gmail.com> <20150820.101533.1535137181522006328.mbj@tail-f.com>
From: Robert Wilton <rwilton@cisco.com>
Message-ID: <55D7148C.6090508@cisco.com>
Date: Fri, 21 Aug 2015 13:07:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0
MIME-Version: 1.0
In-Reply-To: <20150820.101533.1535137181522006328.mbj@tail-f.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/netmod/LmIaVEhScnJy-14kx2TLM2OJRXM>
Cc: netmod@ietf.org
Subject: Re: [netmod] Y34 - root node
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Aug 2015 12:07:50 -0000

Hi Martin,

On 20/08/2015 09:15, Martin Bjorklund wrote:
> Andy Bierman <andy@yumaworks.com> wrote:
>> On Wed, Aug 19, 2015 at 4:25 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
>>
>>> Robert Wilton <rwilton@cisco.com> wrote:
>>>>
>>>> On 18/08/2015 18:22, Andy Bierman wrote:
>>>>> This is how languages like SMIv2 and YANG work.
>>>>> A conceptual object is given a permanent "home" within the tree of
>>>>> object identifiers.
>>>>> Moving data is very expensive, since any clients working with the old
>>>>> data
>>>>> will break as soon as the data is moved.
>>>>>
>>>>>   I am not convinced the IETF can or should come up with a set of
>>>>>   containers
>>>>> that covers every possible topic that can be modeled in YANG.
>>>> I mostly agree, but having some more structure/advice as to where to
>>>> place YANG modules may be helpful.  I'm thinking more along the lines
>>>> of broad categories rather than precise locations.
>>> +1
>>>
>>>>>      If someone wants to builds a YANG controller node that is managing
>>>>>      the configuration for a network of devices then wouldn't they want
>>>>>      a particular device's interface configuration to be located
>>>>>      somewhere like /network/device/<device-name>/interfaces/interface?
>>>>>      Ideally, they would be able to use the same YANG definitions that
>>>>>      are defined for /interfaces/ but root them relative to
>>>>>      /network/device/<device-name>/.
>>>>>
>>>>>
>>>>>
>>>>> Yes -- some of us (like Martin) have pointed this out many times.
>>>>> The "device" container on an NE does not help at all wrt/
>>>>> aggregation on a controller. "/device" or "/" work the same for this
>>>>> purpose.
>>> Actually, I would argue that / works better.  On the controller, you
>>> probably have a list of devices you control (this is how our NCS
>>> works, and how ODL works (I have been told)):
>>>
>>>    container devices {
>>>      list device {
>>>        key name;
>>>        // meta-info about the device goes here, things like
>>>        // ip-address, port, auth info...
>>>        container data {
>>>          // all models supported by the devices are "mounted" here
>>>        }
>>>      }
>>>    }
>>>
>>> So on the controller, the path to interface "eth0" on device "foo"
>>> would be:
>>>
>>>    /devices/device[name='foo']/data/interfaces/interface[name='eth0']
>>>
>>> if we also have a top-level "/device" container we'd have:
>>>
>>>    /devices/device[name='foo']/data/device/interfaces/interface[name='eth0']
>>>
>>>> What would the real resource location for
>>>> "/network/device/<device-name>/interfaces/interface" be?
>>> I don't think there is such a thing as a "real" location.  The path is
>>> scoped in the system you work with; in the controller it might be as I
>>> illustrated above, in the device it starts with /interfaces, but in a
>>> controller-of-controllers it might be:
>>>
>>>    /domains/domain[name='bar']/devices/device[name='foo']/data
>>>      /interfaces/interface[name='eth0']
>>>
>>> Currently we have a proprietary way of "relocating" YANG modules, and
>>> ODL has its "mount", and I think Andy has some other mechanism.  Maybe
>>> the time has come to standardize how mount works, and maybe then also
>>> standardize the list of devices in a controller model.
>>>
>>>
>> +1
>>
>> We just need to standardize a "docroot within a docroot".
>> This is not relocation of subtrees within the datastore, this is just
>> mounting
>> a datastore somewhere within a parent datastore.
>>
>> In YANG validation terms, you simply adjust the docroot to the nested mount
>> point,
>> and the replicated datastore can be used as if it were stand-alone.
>> This would allow any sort of encapsulation of datastores and not add any
>> data model complexity to devices which do not have virtual servers
>> (most of them).
> Compared to the mount draft, I would like to decouple the schema
> information from the instance population mechanism.  I.e., I'd like a
> mechanism that simply defines the schema, not necessarily how the data
> is populated (in the mount draft data was fetched from a remote
> server, but IMO that is just one of several use cases).
Yes, I agree that these could/should be decoupled.  Although I note that 
the mount draft does also allow for local mounts, although this does not 
seem to be intended to be the mainline case.

>
> I can think of two ways to do this.
>
> 1)  Your "ycx:root" statement.  This is open-ended, so we could do:
>
>        list logical-element {
>          key name;
>          leaf name { ... }
>          yang-root true;
>        }
>
>      From a schema perspective, any top-level node from any data model
>      could be used within the logical-element list.
>
> 2)  Cherry-picking:
>
>        list logical-element {
>          key name;
>          leaf name { ... }
>          mount if:interfaces;
>          mount sys:system;
>          ...
>        }
I think that that it makes the overall schema more useful if it 
explicitly states what schema is used for the mounted nodes, although 
possibly a wildcard mount could still be allowed.

I wasn't quite sure how it would work if you wanted to mount a schema 
that has augmentations.  Would you have to list all supported 
augmentations in the mount point as well?  Otherwise you wouldn't know 
what the full schema is.

Thanks,
Rob


>
> Or maybe combine them into one "mount" statement:
>
>     mount *;  // allow any top-level node
>     mount sys:system; // allow this specific top-level node
>
>
>
> /martin
>
>     
> .
>