[nmrg] Residual configurations

Dean Bogdanovic <dean@voltanet.io> Wed, 07 October 2020 16:26 UTC

Return-Path: <dean@voltanet.io>
X-Original-To: nmrg@ietfa.amsl.com
Delivered-To: nmrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D91333A0ACC for <nmrg@ietfa.amsl.com>; Wed, 7 Oct 2020 09:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.494
X-Spam-Level:
X-Spam-Status: No, score=-0.494 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_IMAGE_ONLY_28=1.404, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=voltanet-io.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrA4khBlD6rg for <nmrg@ietfa.amsl.com>; Wed, 7 Oct 2020 09:26:57 -0700 (PDT)
Received: from mail-qv1-xf34.google.com (mail-qv1-xf34.google.com [IPv6:2607:f8b0:4864:20::f34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E5593A0AD8 for <nmrg@irtf.org>; Wed, 7 Oct 2020 09:26:56 -0700 (PDT)
Received: by mail-qv1-xf34.google.com with SMTP id ev17so1476899qvb.3 for <nmrg@irtf.org>; Wed, 07 Oct 2020 09:26:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=voltanet-io.20150623.gappssmtp.com; s=20150623; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=BLfK+puXEPWDl90aYg9O7UjMxWL4hTKVmTsWx3Q1xgI=; b=GFVoLztqxGBKgt0dQpIt62gdxdBPwVW5RmhnIDm721lYZbMvWuAslNiz9BQqCsBD72 85DVLdtXO4hS0XOMA3RdLPw0PFVlYlLArNKquYEfV2H7g8yYKVAHkn7be+3UDRy3XEma DZixZJzHPPFEyu2Ltat22Pzi8382JSVOBTt7T62/J11iAl68RIKVSWeNKVWHDcy4W3yJ +HEHFLCSt2ftFZtUu0rCFNi8aWJv3r/jYANOxzNyhWBWGs1lAXy2V+DUqulvdCP5iiX3 wsJ478nI1O0Ze3RNTw41pIaRWV+xgQavNgyINkMeEd3iz+nk/nrOAPeeB3sOod6Vyxos 4isQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=BLfK+puXEPWDl90aYg9O7UjMxWL4hTKVmTsWx3Q1xgI=; b=MCwXFLh1KsOUoockQ1vo/zh6+8d/w1pnbWCioKL5Dl0fLWLO33i2T3uaclbtebhdjb 3k2KRyHdiS7TibTsok8mKhxYH3iEGJUDcezk9j2SUN7621LrLXC8bvIc9Xghn0sd7Vew XZLArz29epkNFfIuUDtJiAFqO3AGr4g/9ngP3okZCYkvY8yNbmHcbfPL1/mjxdzokhnj x5bWS0rcR3vzCFm4cOta4idUB+br4s3ym9IRFmrtR2Iuj8l2/cO2SsHW/OP8PeOGJUzQ 5vkjeYHi3/saEO/Hpa+aqdPE58hVtrV+so4FYEA8V5d2THQLkLEvijaBBLxzY5Zw7IaM kU5g==
X-Gm-Message-State: AOAM5331GhKtdP7joAHI2Ji+1djcg8AuxIGuLtWLJi3KYamMvqnLFWjM gVB0RbLvb4jNIZOi+qwNPyqcA9smZof1FA==
X-Google-Smtp-Source: ABdhPJwvs0trOnGqNohMQL6pGDBEra4Hc084PQRKo5WqLGJct/2yZyBcu4J8lkQ9cS6+D2Y5Yr11ig==
X-Received: by 2002:a0c:9a01:: with SMTP id p1mr3725286qvd.61.1602088014928; Wed, 07 Oct 2020 09:26:54 -0700 (PDT)
Received: from [192.168.0.121] (c-98-216-8-121.hsd1.ma.comcast.net. [98.216.8.121]) by smtp.gmail.com with ESMTPSA id k3sm1802630qtj.84.2020.10.07.09.26.52 for <nmrg@irtf.org> (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 07 Oct 2020 09:26:53 -0700 (PDT)
From: Dean Bogdanovic <dean@voltanet.io>
To: nmrg@irtf.org
Date: Wed, 07 Oct 2020 12:26:51 -0400
X-Mailer: MailMate (1.13.2r5673)
Message-ID: <EDD6C248-C2CD-4CC6-AA99-558C27ADD48C@voltanet.io>
MIME-Version: 1.0
Content-Type: multipart/related; boundary="=_MailMate_3EA25C04-BF09-46EA-AC4B-66875D3D5FB9_="
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/nmrg/dzk80-P7RRkzYcgT2z62ZL_XDX4>
Subject: [nmrg] Residual configurations
X-BeenThere: nmrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Management Research Group discussion list <nmrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nmrg>, <mailto:nmrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nmrg/>
List-Post: <mailto:nmrg@irtf.org>
List-Help: <mailto:nmrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nmrg>, <mailto:nmrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Oct 2020 16:26:59 -0000

Hi,

During last NMRG virtual meeting on Sep 25, we touched base about 
residual configuration issues in networks. Network device configurations 
are getting bigger and often operators don’t know why certain parts of 
the config are there. One such use case that contributes to config 
growth are debugging sessions. Network operator enters the device and 
starts editing configuration. After the debug session is over, it is not 
unusual for that debug config information to stay in the config 
indefinitely.
Some operators have created central databases that contain all the 
network configuration and act as systems of record. If anything is to 
persist in the network, it has to be entered in the central database, 
but there is still an issue between on device persisting configurations 
and central configuration database.
One of the ideas was to keep the persistent configuration at minimum on 
the device and in the central database. All network services are 
generated on demand and are ephemeral.
The network topology would look something like this

![](cid:8887D8AB-A749-439B-A836-16135E9D6EF9@voltanet.io "Screen Shot 
2020-10-07 at 12.07.41 PM.png")

 From physical perspective, there are two networks, an optical transport 
and a packet switched network. All devices receive basic connectivity 
configuration that (could) persists on the device, you can call them 
Level 1 virtual networks (maybe glorified management networks). Those 
networks provide most basic connectivity between devices within a single 
management domain. That information could be also provided via ZTP.
On top of each network higher level networks are overlaid. All the 
network configuration for higher level networks is ephemeral. The higher 
level networks can (IMO, should be) different management domains, which 
creates clear demarcation lines in the network provisioning data

Such approach would create a (small) well defined starting configuration 
with all other services built as part of higher level networks. The 
residual config problem would be limited to each domain and with higher 
level networks being ephemeral, it should be easily reprovisioned by 
replaying the provisioning information from a central location.

As said, this an interesting problem to me, as the residual configs also 
eat data plane resources, which are quite expensive.

Dean