Re: [OPSAWG] VMM-MIB: Proposal: Joe -3 (Was Re: Comments on draft-asai-vmm-mib-04)

Joe Marcus Clarke <jclarke@cisco.com> Tue, 08 October 2013 18:11 UTC

Return-Path: <jclarke@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28B6521E8273 for <opsawg@ietfa.amsl.com>; Tue, 8 Oct 2013 11:11:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NNcE82An00l7 for <opsawg@ietfa.amsl.com>; Tue, 8 Oct 2013 11:11:06 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) by ietfa.amsl.com (Postfix) with ESMTP id 29B2621E8274 for <opsawg@ietf.org>; Tue, 8 Oct 2013 11:11:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4517; q=dns/txt; s=iport; t=1381255866; x=1382465466; h=message-id:date:from:mime-version:to:cc:subject: references:in-reply-to:content-transfer-encoding; bh=ofATYvwG4IX+jM9MAiIgEhgBQVoiEpZnjzkQlEi/1jY=; b=b21VKni2KfijuONJb7ZTknZNVYUZopthHv9YPzwLx7QyG+vr0rB/MEIj m9xqUCaBIzywUDm4zM3H7smO63dJjXwFvSmlIt+WKAgs/dCOe2nyeoblB 4aPGvG29iejEG526yM5hX5B0F+XnBmiie7XgdO476MM0XcSQKRwADketO 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AiAFAJhKVFKtJV2b/2dsb2JhbABWA4MHOIN6vTNKgSIWdIIlAQEBAwEBAQEeAUwKAQ4CCw4KAQMFFgoDAgkDAgECAQkMMAYNAQUCAQGHfAYMjGWbVwGSOQQEgSKMU4E5EAcRglaBPAOYAZIAgWaBWiCBNQ
X-IronPort-AV: E=Sophos;i="4.90,1057,1371081600"; d="scan'208";a="269407784"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-1.cisco.com with ESMTP; 08 Oct 2013 18:10:51 +0000
Received: from dhcp-10-150-54-156.cisco.com (dhcp-10-150-54-156.cisco.com [10.150.54.156]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r98IAouq031796; Tue, 8 Oct 2013 18:10:50 GMT
Message-ID: <52544AAA.9010200@cisco.com>
Date: Tue, 08 Oct 2013 14:10:50 -0400
From: Joe Marcus Clarke <jclarke@cisco.com>
Organization: Cisco Systems, Inc.
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.0
MIME-Version: 1.0
To: Hirochika Asai <panda@hongo.wide.ad.jp>
References: <521158A7.2090407@cisco.com> <1831198276.32845557.1376936766818.JavaMail.root@vmware.com> <20130819183443.GB477@elstar.local> <52128244.8060107@cisco.com> <20130820063754.GC1861@elstar.local> <5215067C.3040000@cisco.com> <4191F938-9BE8-4CD3-AB12-B709E57E04ED@hongo.wide.ad.jp>
In-Reply-To: <4191F938-9BE8-4CD3-AB12-B709E57E04ED@hongo.wide.ad.jp>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
Cc: opsawg@ietf.org
Subject: Re: [OPSAWG] VMM-MIB: Proposal: Joe -3 (Was Re: Comments on draft-asai-vmm-mib-04)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/opsawg>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Oct 2013 18:11:11 -0000

On 10/8/13 8:07 AM, Hirochika Asai wrote:
> Hi,
> 
> I'm working on revising our draft and updating our implementation
> now.  Here I'd like to go on this topic again because I found some
> points to be discussed.
> 
> According to this discussion, the MAX-ACCESS of vmMinCpuNumber etc.
> is left as read-write with "MUST NOT persist" sentence.

I believe that is what we arrived at.

> 
> I think vmCurCpuNumber and vmCurMem are more operational parameters
> than vmMax* and vmMin*.  So shall we change the MAX-ACCESS of these
> two objects to read-write?  It depends on the hypervisor
> implementation whether these objects as well as vmMax* and vmMin*
> can be changed without persisted.  It also dependes on a guest OS
> whether vmCur* can be changed for running virtual machines.
> 
> Could you give us your comments on this?

I would be okay with that given my previous related comments and the
appropriate verbiage.

Joe

> 
> Thank you,
> Hirochika
> 
> 
> On Aug 22, 2013, at 3:27 AM, Joe Marcus Clarke <jclarke@cisco.com> wrote:
> 
>> On 8/20/13 2:37 AM, Juergen Schoenwaelder wrote:
>>> On Mon, Aug 19, 2013 at 04:38:28PM -0400, Joe Marcus Clarke wrote:
>>>>>
>>>>> We seem to agree on the general scope. Now we have to determine which
>>>>> objects reasonably have a MAX-ACCESS or read-write. For me, it seems
>>>>> that vmAutoStart likely should indeed be read-only. However, as far as
>>>>> I know, Xen allows to change vmMinCpuNumber, vmMaxCpuNumber, vmMinMem,
>>>>> and vmMaxMem at runtime without touching persistent config state.
>>>>
>>>> If the WG's intent is to leave them as RW (and I can see that certain
>>>> HV's allow this sans persistence), then there should be stronger
>>>> guidance (I think) that indicates that these are operational-only
>>>> objects and the new values should not be persisted.  But that may be too
>>>> messy.
>>
>> Sorry for the delay.  I've been in meetings this week.
>>
>>>
>>> There is already text like this:
>>>
>>>      Changes to this object may not persist across restarts of the
>>>      hypervisor.
>>>
>>> What is your proposal to make this clearer / stronger?
>>
>> This leaves it open to one persisting it.  You could use normative
>> language and say, MUST NOT persist...
>>
>>>
>>>> Is there a strong push from operators to toggle these values via SNMP?
>>>
>>> Remeber that this is a MAX-ACCESS. RFC 2578 section 7.3 says that it
>>> 'defines whether it makes "protocol sense" to read, write and/or
>>> create an instance of the object, or to include its value in a
>>> notification'. The compliance statement vmReadOnlyCompliances says
>>> that write access is not required to be implemented. I believe this is
>>> how we commonly do things in a MIB module - we allow read-write
>>> implementations but we do not require read-write implementations.
>>> Hence, I prefer to make no changes (except perhaps vmAutoStart but I
>>> need to check whether there are hypervisors that actually allow to
>>> change autostart behaviour of the running instance without touching
>>> persistent config - this might actually be possible).
>>
>> That's fair.  I was not aware of the ability to adjust VM CPU and memory
>> on the fly without touching the config.  That said, I struggle to
>> understand the use case of doing this via SNMP versus a more reliable API.
>>
>> I would also ask that some language be added to the compliance section
>> like you have in Section 3.2 about only implementing read-write if the
>> changes can be made dynamically and independent of the config.
>>
>> Joe
>>
>>>
>>> /js
>>>
>>
>>
>> -- 
>> Joe Marcus Clarke, CCIE #5384,         |          |
>> SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
>> Distinguished Services Engineer ..:|||||||||::|||||||||:..
>> Phone: +1 (919) 392-2867         c i s c o  S y s t e m s
>> Email: jclarke@cisco.com
>>
>> ----------------------------------------------------------------------------
>> _______________________________________________
>> OPSAWG mailing list
>> OPSAWG@ietf.org
>> https://www.ietf.org/mailman/listinfo/opsawg
>>
> 


-- 
Joe Marcus Clarke, CCIE #5384,         |          |
SCJP, SCSA, SCNA, SCSECA, VCP        |||||      |||||
Distinguished Services Engineer ..:|||||||||::|||||||||:..
Phone: +1 (919) 392-2867         c i s c o  S y s t e m s
Email: jclarke@cisco.com

----------------------------------------------------------------------------