Re: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00

Phil Shafer <phil@juniper.net> Thu, 21 October 2010 18:08 UTC

Return-Path: <phil@juniper.net>
X-Original-To: netmod@core3.amsl.com
Delivered-To: netmod@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 298143A6923 for <netmod@core3.amsl.com>; Thu, 21 Oct 2010 11:08:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.584
X-Spam-Level:
X-Spam-Status: No, score=-6.584 tagged_above=-999 required=5 tests=[AWL=0.015, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BQPv11RIg4IN for <netmod@core3.amsl.com>; Thu, 21 Oct 2010 11:08:21 -0700 (PDT)
Received: from exprod7og125.obsmtp.com (exprod7og125.obsmtp.com [64.18.2.28]) by core3.amsl.com (Postfix) with ESMTP id AB2FC3A6452 for <netmod@ietf.org>; Thu, 21 Oct 2010 11:07:51 -0700 (PDT)
Received: from source ([66.129.224.36]) (using TLSv1) by exprod7ob125.postini.com ([64.18.6.12]) with SMTP ID DSNKTMCBx70WwnfjQt48SQyH/KjtTv9wLED1@postini.com; Thu, 21 Oct 2010 11:09:57 PDT
Received: from magenta.juniper.net (172.17.27.123) by P-EMHUB03-HQ.jnpr.net (172.24.192.33) with Microsoft SMTP Server (TLS) id 8.2.254.0; Thu, 21 Oct 2010 11:07:32 -0700
Received: from idle.juniper.net (idleski.juniper.net [172.25.4.26]) by magenta.juniper.net (8.11.3/8.11.3) with ESMTP id o9LI7VU18690; Thu, 21 Oct 2010 11:07:31 -0700 (PDT) (envelope-from phil@juniper.net)
Received: from idle.juniper.net (localhost [127.0.0.1]) by idle.juniper.net (8.14.3/8.14.3) with ESMTP id o9LHkamK042826; Thu, 21 Oct 2010 17:46:36 GMT (envelope-from phil@idle.juniper.net)
Message-ID: <201010211746.o9LHkamK042826@idle.juniper.net>
To: David Harrington <ietfdbh@comcast.net>
In-Reply-To: <D9517EE782D0430980284B65E0487973@23FX1C1>
Date: Thu, 21 Oct 2010 13:46:36 -0400
From: Phil Shafer <phil@juniper.net>
MIME-Version: 1.0
Content-Type: text/plain
Cc: 'Andy Bierman' <biermana@Brocade.com>, netmod@ietf.org
Subject: Re: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 18:08:22 -0000

"David Harrington" writes:
>So the operators explained that one of the major problems with the MIB
>approach is that the MIB data models did not allow configuring
>**everything** on a target device, whereas CLI gave them access to
>everything.

With NETCONF/YANG, the argument is a little different.  So let's
say I want to make an application to configure PWE tunnels thru my
network, and the standard defines 80% of what I need.  If I can use
NETCONF to access non-YANG-modeled data or proprietary YANG-modeled
data to get the other 20%, then I'm happy.  If I need to resort to
screen scraping to get to data, then I might as well use the screen
scraping method to get the whole kit-n-kaboodle.

>If YANG modeling is going to be more useful than MIB modeling, it has
>a long way to go to make everything on the box configurable using
>Netconf. Certainly some things might be more important than others,
>but I am with Juergen that individual YANG models are better than
>none. 

With NETCONF/YANG we have built a smaller hill, since the only
requirement is that the device expose all configuration via NETCONF,
which is required to have a functional NETCONF implementation.

Once that burden has been met, it works as an "escape hatch" for
data that is not YANG'd yet.  SNMP had no such mechanism, so the
fall back was screen scraping.

>If you want to prioritize IETF efforts at standardizing YANG models,
>then it would be wise to focus on widely-deployed IETF standard
>technologies that operators find fairly complex to configure. SNMP is
>one of the IETF standards that fit that description.

I've written some words recently about when automation is a win.
Here's a snippet:

-------

* Conditions for Automation

We've looked at a number of on-box features that make automation more
robust and reliable.  Let's look briefly at when automation can pay
maximum dividends.  When is automation and flow-through provisioning an
appropriate solution?  There are four qualities that a problem must
have to be a good candidate:

- complexity -- Is is a hard problem?
- frequency -- Do changes happen often?
- importance -- Will failures matter?
- scale -- Is the rate of change relatively high?

If the answer to these four is "yes", then the problem is a good
candidate and the cost of using automation will be paid for by the
increase in the robustness, ease of use, certainty, assurance, and
scaling that automation can provide.

A change that's needed once a year on ten boxes is likely not a
candidate, but one made once a month on a thousand boxes would be.  If
changes are complex, where a minor mistake is hard to diagnose, and it
has an impact on customer SLAs or has been a significant source of
network outages, the problem would be important enough to target for
automation.

The details of the formula may vary by provider, but the basic idea is
that went the cost of getting it wrong exceeds the cost of doing it
right, the right way should win.  Automation can provide concrete
benefits to network stability, customer satisfaction, and employee
productivity.

-------

So to my mind, SNMP does not hit any of these thresholds.  PWs
or BGPVPNs hit them all, so I think those are the problem
domains that will let YANG models shine.  If we could become
the standard configuration mechanism for "hot" technologies
like this, then we'll be livin' the dream.

>If you attend NANOG, a tremendous amount of discussion is about
>routing protocols like BGP, so that would also be a reasonable
>priority. Are the leading vendors of routing stacks active in netmod? 

BGP doesn't have the change rate that would make automation give a
reasonable yield.  On the other hand, BGP is well understood and
widely deployed, so perhaps as a "technology demonstration" it
would make sense.

Thanks,
 Phil