Re: [Nmop] [Netmo] Initial topics and areas of work

Roland.Schott@telekom.de Thu, 22 February 2024 09:14 UTC

Return-Path: <Roland.Schott@telekom.de>
X-Original-To: nmop@ietfa.amsl.com
Delivered-To: nmop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CD79C151068 for <nmop@ietfa.amsl.com>; Thu, 22 Feb 2024 01:14:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id im362snMRcYo for <nmop@ietfa.amsl.com>; Thu, 22 Feb 2024 01:14:01 -0800 (PST)
Received: from mailout21.telekom.de (mailout21.telekom.de [194.25.225.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1110CC14F6E3 for <nmop@ietf.org>; Thu, 22 Feb 2024 01:14:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1708593241; x=1740129241; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=fos+N3NDPfGo4XJ/m5E8iWNZx2s4z6LUINPTHpHf8mo=; b=aa4CgeU8Q1LThw6q1B9BlXXIuv33DxyRGjOiOiMHnHZvlWnFUmf2TZ9K aeEsujPIiWiKLyXwovo7aPLJt0GMjH+6d7cn5jlLb3/IwV/ybLr1uKtg0 E5Xxuz5RF7x9pHWln+QFAgVHwOZMZe06vmGHHVOqS8c6jXEF8xibrfohl e1PDy9k7DEpIwafGu4QxQCralAHeP6h6cWQQS9jmtXwDLStYpTWP5tmyr 9+Tu+7qOCLgZFwNzqIFFJiHyRot/VA9753ZgOAC8qEvWUNBbf/3+rqvEU X8BR1VAaVYancuQgx9cY6onlKw2rAM06GkRLDgU/X9cIU+h90P6hpOjSq w==;
X-Mailbb-Crypt: true
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by MAILOUT21.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 22 Feb 2024 10:12:53 +0100
X-Mailbb-Crypt: true
Received: from edeprn.de.t-internal.com (HELO totemomail) ([10.125.18.42]) by QDEFCS.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 22 Feb 2024 10:12:54 +0100
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by totemomail (Totemo SMTP Server) with SMTP ID 66 for <nmop@ietf.org>; Thu, 22 Feb 2024 10:12:52 +0100 (CET)
IronPort-SDR: 65d71014_dsOut4bn1edNbY1BXq9zDyWMGqgLi2VJRncByOTkDZdU8Nz v3cqvTggPACHDYmpDis6JYO5a2SXr3uLegBfT7g==
X-IronPort-AV: E=Sophos;i="6.06,177,1705359600"; d="p7s'?scan'208,217";a="855056430"
X-Mailbb-Crypt: true
X-Mailbb-SentCrypt: true
X-MGA-submission: MDFSz3yWSDKknfY6aTICFI++ghtmwX7wH0cp8Ya+pLClTtH4Xn9wQNTeTl9F/AurB4af9XZBQHvh6lZzgpbvwQJGFidJRK2nLGGTmWtmf/hz7wtyY0ErFpYtj2K1kwTHsv8xg1kP4f4Whs7M4ZwuSuA6uvqx2UEJ9Kjl5kdjtmJFfw==
Received: from he104281.emea1.cds.t-internal.com ([10.169.119.195]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 22 Feb 2024 10:12:53 +0100
Received: from HE126310.emea1.cds.t-internal.com (10.169.119.207) by HE104281.emea1.cds.t-internal.com (10.169.119.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Thu, 22 Feb 2024 10:12:52 +0100
Received: from HE101393.emea1.cds.t-internal.com (10.169.119.197) by HE126310.emea1.cds.t-internal.com (10.169.119.207) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Thu, 22 Feb 2024 10:12:52 +0100
Received: from HE102779.emea1.cds.t-internal.com (10.171.40.45) by HE101393.emea1.cds.t-internal.com (10.169.119.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28 via Frontend Transport; Thu, 22 Feb 2024 10:12:52 +0100
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.168) by O365mail10.telekom.de (172.30.0.242) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Thu, 22 Feb 2024 10:12:51 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WVv98NBYLSRRco6efY+DW2PjZZ2aC24nzvLyqgYt555NgsJ25a0xr66pBuQKK0zQ56BSDiKNvukOrkvvZa+5iNDIKRiYzheAmQNYcjRjHYrTh/T6/9bTdsrLBEvtkbnKaRHXNGsZpx4Y+eeCUCVgAKxPNx0ps/dJSTaqQgBaQ9CyiHMB2NKcoMKCZJw0R/HeKImzHsmR3L7cX/v78zbdfNp+IqVosJ8HjWpzz33MGKdUDX6KO2c70WXkG2mx+tRF3nz0mMyD9bbvUt1Acs7qc6XpMhd1wGkcXJSVEu21i+eD2sclpKD8TpeAg5NpVm0Q/xT44FPu7gPAcGVS+81ZjQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ddbO0P8NKr+er8sMMXCxgU83B0wz0Ka6UYnd6roAmyA=; b=IxBrVC1ZVZZStIZni0xB/dveZtNw96Yxe0gkLFTnHwPpnHlRis5Urk638gp2opDnK6W5rCwZcDU387HsXyUjXGaZLOHe350gM0zMol0pMskzf/P9s9tyOHM67fKaSiSwK01dT2hsUO1JDDvI+FUScv8LZUTdfo756lP9yNl4El+h2rUF46qOZwzVaCD3c3gSjAkUaL4wWjMaN2XB4mSv6jZYzGjXXIc43og3beQwaq8EhbQo6WosSGfwBkRkrbj3C5fja/Y0OvTx9eUX2fRfL6+tkOP3VqhPF0k6tGp17LRhEN80gSi/ua36rH8FXcduahMMPGsJM4YprdWYMzwXBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:90::9) by BE1P281MB2563.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:6e::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.39; Thu, 22 Feb 2024 09:12:47 +0000
Received: from FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM ([fe80::5a8:4201:e879:a48]) by FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM ([fe80::5a8:4201:e879:a48%6]) with mapi id 15.20.7316.023; Thu, 22 Feb 2024 09:12:47 +0000
From: Roland.Schott@telekom.de
To: nmop@ietf.org
Thread-Topic: [Netmo] Initial topics and areas of work
Thread-Index: AQHaZPogvchXNWID/0atdyiyANHUCbEWFFWg
Date: Thu, 22 Feb 2024 09:12:47 +0000
Message-ID: <FR2P281MB17979D17CF2546A21B8EE9DB87562@FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM>
References: <FR2P281MB1797F2CE3710E7967BBAC892878BA@FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM> <e25b3df6bb28471eaedd8f1003ca3d2c@swisscom.com> <BE1P281MB179458FC7621C322D79780F587572@BE1P281MB1794.DEUP281.PROD.OUTLOOK.COM>
In-Reply-To: <BE1P281MB179458FC7621C322D79780F587572@BE1P281MB1794.DEUP281.PROD.OUTLOOK.COM>
Accept-Language: en-US, de-DE
Content-Language: de-DE
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: FR2P281MB1797:EE_|BE1P281MB2563:EE_
x-ms-office365-filtering-correlation-id: e5d52b6b-0161-40b9-6478-08dc3386701c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(230273577357003)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="2.16.840.1.101.3.4.2.1"; boundary="----=_NextPart_000_000B_01DA6577.A13CF050"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB1797.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: e5d52b6b-0161-40b9-6478-08dc3386701c
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Feb 2024 09:12:47.8668 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fH0Jk8O9q8sT7qsvIpJe8h2QAPOTKwhtmiJd41Dg3KKZbhI15PtkEEj5pKPrzbhgK+KRNCyuBtZehc9dHuLXywMlvMWRwXiRkyEaGCItonM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BE1P281MB2563
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/nmop/xkjfVWQFJNRfUA52dE7JySavq44>
Subject: Re: [Nmop] [Netmo] Initial topics and areas of work
X-BeenThere: nmop@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Network Management Operations \(NMOP\) Working Group" <nmop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nmop>, <mailto:nmop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmop/>
List-Post: <mailto:nmop@ietf.org>
List-Help: <mailto:nmop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nmop>, <mailto:nmop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2024 09:14:06 -0000

Hi Thomas,

 

thank you for your reply and the information links listed below.

I interpret your response that you are open regarding work on external
exposure and that it could help also in incident management.

 

Currently I am looking into the work being possibly made in other IETF WG
and 

topics that are worked out in other standardization bodies e.g., BBF.

I need to dive into this.

 

 

Best Regards

 

Roland

 

 

Von: Thomas.Graf@swisscom.com <mailto:Thomas.Graf@swisscom.com>
<Thomas.Graf@swisscom.com <mailto:Thomas.Graf@swisscom.com> > 
Gesendet: Donnerstag, 4. Januar 2024 11:45
An: Roland.Schott@telekom.de <mailto:Roland.Schott@telekom.de> ;
netmo@ietf.org <mailto:netmo@ietf.org> 
Betreff: Re: [Netmo] Initial topics and areas of work

 

Dear Roland,

 

To comment on (3) Anomaly detection and Incident management.

 

The Network Anomaly Detection part relates to the following work being
introduced at ANRW in IETF 117 and at IETF 118 at NMRG and IEPG.

 

https://hal.science/hal-04307611

https://datatracker.ietf.org/meeting/117/materials/slides-117-anrw-sessb-dai
sy-practical-anomaly-detection-in-large-bgpmpls-and-bgpsrv6-vpn-networks-00

https://datatracker.ietf.org/meeting/118/materials/slides-118-nmrg-semantic-
metadata-annotation-for-network-anomaly-detection-01

https://datatracker.ietf.org/doc/html/draft-netana-opsawg-nmrg-network-anoma
ly-semantics

 

We aim to align the ietf-incident-semantic-metadata.yang with
draft-feng-opsawg-incident-management.

 

Regarding (1) YANG Telemetry/Kafka integration. The following two links,
presented at IETF 116 IEPG and throughout side meeting between IETF 115 -
118  give a high level overview. I am working on a document describing the
use case, motivation and the relationship of the various netconf wg related
documents where incremental changes to YANG push and YANG library is being
addressed.

 

http://www.iepg.org/2023-03-26-ietf116/yang.pdf

https://github.com/network-analytics/draft-daisy-kafka-yang-integration/blob
/main/draft-daisy-kafka-yang-integration-05.md

 

Some more details also here:

https://github.com/network-analytics/draft-daisy-kafka-yang-integration/blob
/main/schema-registry-yangkit-integration-01.pdf

https://github.com/network-analytics/draft-daisy-kafka-yang-integration/blob
/main/yang-push-workflow-02.pdf

https://github.com/network-analytics/draft-daisy-kafka-yang-integration/blob
/main/Zhuoyao_final_thesis.pdf

https://github.com/network-analytics/draft-daisy-kafka-yang-integration/blob
/main/INF690_presentation.pdf

 

Regarding (6) An update of operator requirements on Network Mgmt
protocols/modelling within the IETF.  E.g., something like RFC 3535-bis.

https://datatracker.ietf.org/doc/html/draft-boucadair-nmop-rfc3535-20years-l
ater

 

I fully agree with your assessment that we network operators should review
RFC 3535 and assess the conclusions in 2003 when the document was produced
and update it. For me key here is the Data Mesh integration. 20 years ago
there were no requirements that semantics need to be preserved end to end to
enable an automated data processing chain. That's what we try to address
with (1). 

 

I also agree on your assessment that information and service yang modules,
that's what I believe you meant by external exposure, will be very relevant
to integrate network management systems seamlessly and more efficiently.

 

Best wishes

Thomas

 

From: Netmo <netmo-bounces@ietf.org <mailto:netmo-bounces@ietf.org> > On
Behalf Of Roland.Schott@telekom.de <mailto:Roland.Schott@telekom.de> 
Sent: Thursday, December 7, 2023 9:20 PM
To: netmo@ietf.org <mailto:netmo@ietf.org> 
Subject: Re: [Netmo] Initial topics and areas of work

 

	
Be aware: This is an external email.

 

Hi Luis, hi all,

 

I like the topic (3) Anomaly detection and Incident management thinking that
it is related to an automated incident management.

Regarding the topic of adding the exposure of network capabilities /
information as candidate topic, I support this idea.

Since the charter is currently under discussion this is a valid option to be
discussed on this list before the charter is finalized.

 

Additionally, I think one can distinguish internal and external exposure.
The mechanisms could be similar. Exposure of information to external 

is in my opinion a mean of network management and operation helping the
customer and its application as well as the network provider.

It could also play a role regarding building an informative digital map (4).

 

Regarding (6) An update of operator requirements on Network Mgmt
protocols/modelling within the IETF, isn't this a task that should be
checked anyway?

I have the impression that operators have requirements for strong automation
and need to run cloud native applications ideally with an autonomous
network.

Concerning this, I think a double check of additional or updated operator
requirements should be part of the work of this group.

 

 

Best Regards

 

Roland