[netmod] Consensus Call Note for Requirements

Nadeau Thomas <tnadeau@lucidvision.com> Thu, 10 September 2015 20:44 UTC

Return-Path: <tnadeau@lucidvision.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 201E81B6C07 for <netmod@ietfa.amsl.com>; Thu, 10 Sep 2015 13:44:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q7-HLVc84v0k for <netmod@ietfa.amsl.com>; Thu, 10 Sep 2015 13:44:35 -0700 (PDT)
Received: from lucidvision.com (lucidvision.com [64.71.170.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B92F1B640A for <netmod@ietf.org>; Thu, 10 Sep 2015 13:44:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lucidvision.com; s=default; t=1441917800; bh=6/dOjwOs1mNcryuwzrYcU3LF/rVEEFTxVlSDt1A+7C0=; h=From:Subject:Date:Cc:To; b=sQU9WDEIiTd0ZZEIucP2uc2X3uQf8vW6YdjsGTLNzxu98r0G6iuiyPxzYgfE6UomC j34pCBcbWhQetn27Bi+80cjorSvU8TX+PELKCGYB6NDcjvRWV9kc/rudFkju/oAG61 MftC9Kf8RlGUvqkXBVrFR6R+vq4O9PBnMmYKnNvM=
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=50.255.148.181;
From: Nadeau Thomas <tnadeau@lucidvision.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 10 Sep 2015 16:44:29 -0400
Message-Id: <25E74703-B15C-4CE1-8FE3-A35EE875507B@lucidvision.com>
To: netmod WG <netmod@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
X-Mailer: Apple Mail (2.2104)
X-Authenticated-User: tnadeau@lucidvision.com
X-Info: aspam skipped due to (g_smite_skip_relay)
X-Encryption: SSL encrypted
X-ShareWhite: 50.255.148.181
X-MyRbl: Color=Yellow Age=0 Spam=0 Notspam=32 Stars=0 Good=0 Friend=2 Surbl=0 Catch=0 r=0 ip=50.255.148.181
X-IP-stats: Notspam Incoming Last 0, First 118, in=1582, out=0, spam=0 Known=true ip=50.255.148.181
Archived-At: <http://mailarchive.ietf.org/arch/msg/netmod/PCTXrLCVtOZRsUlkNlk9mYhSrKA>
Cc: netmod-chairs@tools.ietf.org
Subject: [netmod] Consensus Call Note for Requirements
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Sep 2015 20:44:37 -0000

	This is an official NETMOD working group call for consensus around the requirements referenced 
below and discussed in detail at the interim meeting held Thursday, September 10, 2015. At that meeting, the
chairs went over each requirement in detail and called for any objections to each requirement (and sub-requirement). The question that was asked was “Are there any objections to requirement X in general meaning as it is currently written or with minor/editorial changes to how its written?” There were no objections to any of the requirements, as is detailed in the meeting minutes.  However, to confirm these statements the co-chairs are opening this question to the WG for period starting today, Thursday, September 10, 2015 at 5PM EST.  This period will close on Monday, September 14, 2015 at 5PM EST.  If you commented on the list previously, or at the meeting, there is no need to repeat yourself; we have your position on 

	We will make a call of consensus shortly thereafter. 

	For your reference, the requirements can be found at this URL:

http://etherpad.tools.ietf.org:9000/p/netmod-opstate-requirements

	but I will paste them into this message explicitly to be complete.

	—Tom (as co-chair)



Terminology

From: https://tools.ietf.org/html/draft-openconfig-netmod-opstate-01

  In order to understand the way in which a network operator or network
  management system may need to interact with a device, it is key to
  understand the different types of data that network elements may
  store or master:

  o  intended configuration - this data represents the state that the
     network operator intends the system to be in.  This data is
     colloquially referred to as the 'configuration' of the system.

  o  applied configuration - this data represents the state that the
     network element is actually in, i.e., that which is currently
     being run by particular software modules (e.g., the BGP daemon),
     or other systems within the device (e.g., a secondary control-
     plane, or line card).

  o  derived state - this data represents information which is
     generated as part of the system's own interactions.  For example,
     derived state may consist of the results of protocol interactions
     (the negotiated duplex state of an Ethernet link), statistics
     (such as message queue depth), or counters (such as packet input
     or output bytes).



1. Ability to interact with both intended and applied configuration

  a. The ability to ask the operational components of a system
      (e.g., line cards) for the configuration that they are currently
      using. This is the "applied configuration".

  b. applied configuration is read-only

  c. The data model for the applied configuration is the same as
      the data model for the intended configuration (same leaves)

  d. For asynchronous systems, when fully synchronized, the data
      in the applied configuration is the same as the data in the
      intended configuration.

2. Applied configuration as part of operational state

   a. the ability to retrieve the applied configuration and
       derived state nodes in a single protocol operation.


3. Support for both transactional, synchronous management
  systems as well as distributed, asynchronous management
  systems

   a. For asynchronous systems, the ability to request a protocol
       operation to not return (i.e. block) until the intended
       configuration has been fully synchronized.

   b. The protocol operation's response would indicate the result
        of the operation (success, failure, partial, etc.)


4. Separation of configuration and operational state data; ability
  to retrieve them independently

   a. be able to retrieve only the derived state aspects of operational state

   b. be able to retrieve only the non-derived state aspects of operational
       state


5. Ability to retrieve operational state corresponding only to
  derived values, statistics, etc.

   // this is a duplicate of # 4-a


6. Ability to relate configuration with its corresponding operational state

   a. ability to map intended config nodes to corresponding applied config nodes
   b. ability to map intended config nodes to associated derived state nodes
   c. The mappings needs to be programmatically consumable


7. Ability for distinct modules to leverage a common model-structure

 a. Scope is limited to IETF-defiend modules
 b. multiple domain-specific trees are okay
 c. multiple namespaces are okay