Re: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00

Andy Bierman <biermana@Brocade.com> Thu, 21 October 2010 18:29 UTC

Return-Path: <biermana@Brocade.com>
X-Original-To: netmod@core3.amsl.com
Delivered-To: netmod@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 130D83A6A47 for <netmod@core3.amsl.com>; Thu, 21 Oct 2010 11:29:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.081
X-Spam-Level:
X-Spam-Status: No, score=-2.081 tagged_above=-999 required=5 tests=[AWL=0.184, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BuHi8GONQreL for <netmod@core3.amsl.com>; Thu, 21 Oct 2010 11:29:43 -0700 (PDT)
Received: from mx0a-000f0801.pphosted.com (mx0a-000f0801.pphosted.com [67.231.144.122]) by core3.amsl.com (Postfix) with ESMTP id E51AE3A67C2 for <netmod@ietf.org>; Thu, 21 Oct 2010 11:29:43 -0700 (PDT)
Received: from pps.filterd (m0000542 [127.0.0.1]) by mx0a-000f0801.pphosted.com (8.14.4/8.14.4) with SMTP id o9LIVEeC015010; Thu, 21 Oct 2010 11:31:19 -0700
Received: from hq1-exedge.brocade.com (hq1-exedge.brocade.com [144.49.141.11]) by mx0a-000f0801.pphosted.com with ESMTP id s2sd6r19w-46 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 21 Oct 2010 11:31:19 -0700
Received: from HQ1WP-EXHUB01.corp.brocade.com (10.70.36.14) by HQ1WP-EXEDGE02.corp.brocade.com (144.49.141.11) with Microsoft SMTP Server (TLS) id 8.2.254.0; Thu, 21 Oct 2010 11:35:31 -0700
Received: from HQ1-EXCH01.corp.brocade.com ([fe80::ed42:173e:fe7d:d0a6]) by HQ1WP-EXHUB01.corp.brocade.com ([::1]) with mapi; Thu, 21 Oct 2010 11:31:11 -0700
From: Andy Bierman <biermana@Brocade.com>
To: Phil Shafer <phil@juniper.net>, David Harrington <ietfdbh@comcast.net>
Date: Thu, 21 Oct 2010 11:31:10 -0700
Thread-Topic: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00
Thread-Index: ActxSyuzCkDJhWM6Rr6nJVXwaybuVQAAL6cw
Message-ID: <B11AB91666F22D498EEC66410EB3D3C4F412BEC784@HQ1-EXCH01.corp.brocade.com>
References: <D9517EE782D0430980284B65E0487973@23FX1C1> <201010211746.o9LHkamK042826@idle.juniper.net>
In-Reply-To: <201010211746.o9LHkamK042826@idle.juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2010-10-21_09:2010-10-21, 2010-10-21, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=5 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=6.0.2-1004200000 definitions=main-1010210145
X-Proofpoint-SSN: Sensitivity2
Cc: "netmod@ietf.org" <netmod@ietf.org>
Subject: Re: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2010 18:29:45 -0000

Hi Phil,

Your Conditions for Automation is excellent.
Can we get it on the NETCONF Wiki?
It would really help to remind people of the use cases.

Only the 'interfaces' work item meets your criteria.

The 'commonality' factor is independent of the automation factors.
Every protocol/service that has per-interface config is going to need
to identify the interface.  We cannot have more than 1 way to do this
in the standard.  We cannot leave it as a vendor detail.

IMO, NACM is a critical component related to your 'is it important' point.
Is it important to prevent malicious and/or unintended alteration of the
configuration?  Depends on the network, but generally this is important.

In order for NACM to be deployed, the standardization of 'users' must also
be done.  I think Juergen is right about putting that in its own document,
instead of NACM.  This is important config, even if NACM is not supported.

IMO, the 2 most valuable config modules would be bare-interfaces and
user login authentication.



Andy

-----Original Message-----
From: Phil Shafer [mailto:phil@juniper.net] 
Sent: Thursday, October 21, 2010 10:47 AM
To: David Harrington
Cc: 'Juergen Schoenwaelder'; 'Andy Bierman'; Andy Bierman; netmod@ietf.org
Subject: Re: [netmod] Fw: New Version Notification for draft-bjorklund-netmod-snmp-cfg-00 

"David Harrington" writes:
>So the operators explained that one of the major problems with the MIB
>approach is that the MIB data models did not allow configuring
>**everything** on a target device, whereas CLI gave them access to
>everything.

With NETCONF/YANG, the argument is a little different.  So let's
say I want to make an application to configure PWE tunnels thru my
network, and the standard defines 80% of what I need.  If I can use
NETCONF to access non-YANG-modeled data or proprietary YANG-modeled
data to get the other 20%, then I'm happy.  If I need to resort to
screen scraping to get to data, then I might as well use the screen
scraping method to get the whole kit-n-kaboodle.

>If YANG modeling is going to be more useful than MIB modeling, it has
>a long way to go to make everything on the box configurable using
>Netconf. Certainly some things might be more important than others,
>but I am with Juergen that individual YANG models are better than
>none. 

With NETCONF/YANG we have built a smaller hill, since the only
requirement is that the device expose all configuration via NETCONF,
which is required to have a functional NETCONF implementation.

Once that burden has been met, it works as an "escape hatch" for
data that is not YANG'd yet.  SNMP had no such mechanism, so the
fall back was screen scraping.

>If you want to prioritize IETF efforts at standardizing YANG models,
>then it would be wise to focus on widely-deployed IETF standard
>technologies that operators find fairly complex to configure. SNMP is
>one of the IETF standards that fit that description.

I've written some words recently about when automation is a win.
Here's a snippet:

-------

* Conditions for Automation

We've looked at a number of on-box features that make automation more
robust and reliable.  Let's look briefly at when automation can pay
maximum dividends.  When is automation and flow-through provisioning an
appropriate solution?  There are four qualities that a problem must
have to be a good candidate:

- complexity -- Is is a hard problem?
- frequency -- Do changes happen often?
- importance -- Will failures matter?
- scale -- Is the rate of change relatively high?

If the answer to these four is "yes", then the problem is a good
candidate and the cost of using automation will be paid for by the
increase in the robustness, ease of use, certainty, assurance, and
scaling that automation can provide.

A change that's needed once a year on ten boxes is likely not a
candidate, but one made once a month on a thousand boxes would be.  If
changes are complex, where a minor mistake is hard to diagnose, and it
has an impact on customer SLAs or has been a significant source of
network outages, the problem would be important enough to target for
automation.

The details of the formula may vary by provider, but the basic idea is
that went the cost of getting it wrong exceeds the cost of doing it
right, the right way should win.  Automation can provide concrete
benefits to network stability, customer satisfaction, and employee
productivity.

-------

So to my mind, SNMP does not hit any of these thresholds.  PWs
or BGPVPNs hit them all, so I think those are the problem
domains that will let YANG models shine.  If we could become
the standard configuration mechanism for "hot" technologies
like this, then we'll be livin' the dream.

>If you attend NANOG, a tremendous amount of discussion is about
>routing protocols like BGP, so that would also be a reasonable
>priority. Are the leading vendors of routing stacks active in netmod? 

BGP doesn't have the change rate that would make automation give a
reasonable yield.  On the other hand, BGP is well understood and
widely deployed, so perhaps as a "technology demonstration" it
would make sense.

Thanks,
 Phil