Re: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02

"Evans, John" <jevanamz@amazon.co.uk> Wed, 31 January 2024 12:25 UTC

Return-Path: <prvs=7530fcfd6=jevanamz@amazon.co.uk>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00890C15108C for <opsawg@ietfa.amsl.com>; Wed, 31 Jan 2024 04:25:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.394
X-Spam-Level:
X-Spam-Status: No, score=-4.394 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazon.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1xtD2yHBC5oN for <opsawg@ietfa.amsl.com>; Wed, 31 Jan 2024 04:25:37 -0800 (PST)
Received: from smtp-fw-9106.amazon.com (smtp-fw-9106.amazon.com [207.171.188.206]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F94DC14F70A for <opsawg@ietf.org>; Wed, 31 Jan 2024 04:25:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.co.uk; i=@amazon.co.uk; q=dns/txt; s=amazon201209; t=1706703937; x=1738239937; h=from:to:subject:date:message-id:content-id:mime-version: content-transfer-encoding; bh=USgwr4lL9LbXKK7aMKJTKJmlCx7c+izTopg9U5vh7aw=; b=F4CJRCJTh+QsoCS8+RHKatO+cLrb+2CTMXwjlbxyyr1UF6SZqPCDjH3N HM0MZ5QMVQ6K4k/7yJa2rg7M1Pmnd8ZQQkIAED7v2zW1oqD+MhP8goD/i MtYh8D+8ER7hdN8BCDzCekOKFizM42XdGjMMyANRlA2sa9+5DVV04sW6g c=;
X-IronPort-AV: E=Sophos;i="6.05,231,1701129600"; d="scan'208";a="701061019"
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO smtpout.prod.us-west-2.prod.farcaster.email.amazon.dev) ([10.25.36.210]) by smtp-border-fw-9106.sea19.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jan 2024 12:25:30 +0000
Received: from EX19MTAEUB002.ant.amazon.com [10.0.10.100:28140] by smtpin.naws.eu-west-1.prod.farcaster.email.amazon.dev [10.0.14.129:2525] with esmtp (Farcaster) id 6824b6bc-d711-4b93-9123-dacc8fff0173; Wed, 31 Jan 2024 12:25:29 +0000 (UTC)
X-Farcaster-Flow-ID: 6824b6bc-d711-4b93-9123-dacc8fff0173
Received: from EX19D015EUB004.ant.amazon.com (10.252.51.13) by EX19MTAEUB002.ant.amazon.com (10.252.51.59) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 31 Jan 2024 12:25:28 +0000
Received: from EX19D015EUB003.ant.amazon.com (10.252.51.113) by EX19D015EUB004.ant.amazon.com (10.252.51.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 31 Jan 2024 12:25:28 +0000
Received: from EX19D015EUB003.ant.amazon.com ([fe80::c0b7:2320:49e3:8444]) by EX19D015EUB003.ant.amazon.com ([fe80::c0b7:2320:49e3:8444%3]) with mapi id 15.02.1118.040; Wed, 31 Jan 2024 12:25:28 +0000
From: "Evans, John" <jevanamz@amazon.co.uk>
To: Qin Wu <bill.wu=40huawei.com@dmarc.ietf.org>, "Evans, John" <jevanamz=40amazon.co.uk@dmarc.ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, OPSAWG <opsawg@ietf.org>
Thread-Topic: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02
Thread-Index: AQHaVECTjgfQdUvPe0K6xYoHYsZCxQ==
Date: Wed, 31 Jan 2024 12:25:28 +0000
Message-ID: <8DEADC54-65C5-44AC-A0B9-371742C7322B@amazon.co.uk>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.80.23121017
x-originating-ip: [10.252.50.216]
Content-Type: text/plain; charset="utf-8"
Content-ID: <A4081CC0142703449CDCB87712C35EF8@amazon.com>
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/NX6J8mp9M_JMFxnllJuo2hCR8G8>
Subject: Re: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jan 2024 12:25:41 -0000

Hi Qin,

> [Qin Wu] Maybe a new section can be added to clarify the relation with RFC8343.

We will explicitly call out the relationship to data models.

> the table in section 3 just provides model structure but doesn't specify parameters details.

Yes - agreed - we will expand on that 

> [Qin Wu] Sorry not to make me clear, I just feel the 9 rules you set in section 4.3 is more like you set requirements for
> packet discard reporting, to me, the rules are more something related to auto mitigation actions which is confusing.

Section 4.3 is the examples in 02:
https://datatracker.ietf.org/doc/html/draft-opsawg-evans-discardmodel-02#section-4.3

I'm assuming you mean the 11 rules in section 4.2?
https://datatracker.ietf.org/doc/html/draft-opsawg-evans-discardmodel-02#section-4.2

The rules here are intended to be with respect to packet loss reporting requirements rather than auto-mitigation actions.  Could you call out a specific example which is confusing?

Cheers

John


๏ปฟOn 31/01/2024, 11:57, "OPSAWG on behalf of Qin Wu" <opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org> on behalf of bill.wu=40huawei.com@dmarc.ietf.org <mailto:40huawei.com@dmarc.ietf.org>> wrote:


Hi, John:


> I am wondering whether this draft should update [RFC8343] to address such limitation.


Ultimately, I think we should update the corresponding data models to reflect whatever we agree in this draft, should we progress it. In this specific case, RFC8343 has reflected what is in RFC1213. Hence, our focus is first on standardising a framework for packet loss reporting. Once the information model is agreed, we can proceed to apply that to the corresponding data models, which we currently define as out of scope in section 1:
"There are multiple ways that this information model could be implemented (i.e., data models), including SNMP [RFC1157], NETCONF [RFC6241] / YANG [RFC7950], and IPFIX [RFC5153], but they are outside of the scope of this document."


I will update section 1 to reference RFC8343 in addition to RFC1213.


[Qin Wu] Maybe a new section can be added to clarify the relation with RFC8343. In addition, the table in section 3 just provides model structure but doesn't specify parameters details. Section 5 and section 6 of RFC3060 provide a good example on how these details can be specified.


> 6. Section 4.3 specific requirements rather than rules for packet loss
> reporting


I'm not sure what you mean here - could you please clarify your feedback?


[Qin Wu] Sorry not to make me clear, I just feel the 9 rules you set in section 4.3 is more like you set requirements for packet discard reporting, to me, the rules are more something related to auto mitigation actions which is confusing.
Also not sure you can enumerate all the rules in a single section?






On 31/01/2024, 08:06, "OPSAWG on behalf of Qin Wu" <opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org> <mailto:opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org>> on behalf of bill.wu=40huawei.com@dmarc.ietf.org <mailto:40huawei.com@dmarc.ietf.org> <mailto:40huawei.com@dmarc.ietf.org <mailto:40huawei.com@dmarc.ietf.org>>> wrote:




Hi,
I have read the latest version of this draft and have the following comments:
1. what is the difference between packet loss and packet discard, it seems this two terms are used interchangeably in the draft, in some places packet discard reporting is used, while in some other places, packet loss reporting, which I think lack consistency. Suggest to introduce two terms defintiion in the terminology section.
2. Section 1, 1st paragraph said:
"
Router-reported packet loss is the most direct signal for network operations to identify customer impact from unintended packet loss.
"
I feel packet loss is just one of signals for network operators to identify customer impact? How about network latency, jitter?
3.Section 1, 2nd paragraph said:
"
The existing metrics for packet loss as defined in [RFC1213] - namely ifInDiscards, ifOutDiscards, ifInErrors, ifOutErrors - do not provide sufficient precision to be able to automatically identify the cause of the loss and mitigate the impact. From a network operators' perspective, ifindiscards can represent both intended packet loss (i.e., packets discarded due to policy) and unintended packet loss (e.g., packets dropped in error).
"
It looks not only metrics for packet loss defined in [RFC1213] has its limitation, but also YANG model for interface management defined in [RFC8343], I am wondering whether this draft should update [RFC8343] to address such limitation.
4. If my understanding is correct, the solution described in Section 2 include three key elements, packet loss, cause, and auto-mitigation actions the cause can be seen as trigger or condition, which will trigger different auto-mitigation actions, these concept is similar to ECA concept in (https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/ <https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/> <https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/> <https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/&gt;>) which include Event, condition and action three elements, when the event meets specific condition, e.g., packet loss is greater than specific threshold value, the action will be triggered, the action can be sending an notification, or sending a snapshot of device statistics.
Different from ECA, in this draft, auto-mitigation actions and cause is not modelled in the packet loss model, I am wondering how packet loss reporting trigger auto-mitigation action? Do you need to populate specific policy in the device, this policy will be associated with specific monitoring object such as "discards/error/l2/rx/", is such policy corresponding to specific python code, which can be excuted based on the logic described in the policy?
5. Section 4 defines a information model, I am wondering whether this packet discard model should augment interface YANG model defined in [RFC8343]?
For the current shape, I feel it lack sufficient details on the definition for each attributes.




6. Section 4.3 specific requirements rather than rules for packet loss reporting




7 Section 5, can we model both packet loss statistics and auto-mitigation action in the same model, similar to what ECA model is doing in draft-ietf-netmod-eca-policy.




-Qin
-----้‚ฎไปถๅŽŸไปถ-----
ๅ‘ไปถไบบ: OPSAWG [mailto:opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org> <mailto:opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org>>] ไปฃ่กจ Henk Birkholz
ๅ‘้€ๆ—ถ้—ด: 2024ๅนด1ๆœˆ17ๆ—ฅ 20:52
ๆ”ถไปถไบบ: OPSAWG <opsawg@ietf.org <mailto:opsawg@ietf.org> <mailto:opsawg@ietf.org <mailto:opsawg@ietf.org>>>
ไธป้ข˜: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02




Dear OPSAWG members,




this email starts a call for Working Group Adoption of




> https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.htm <https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.htm>
> <https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.ht <https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.ht>
> m>
> l




ending on Wednesday, January 31st.




As a reminder, this I-D describes an information model in support of automated network mitigation on what and how to report about unintentional packet discards/losses that can have an impact on service level objectives. Implementation of the informational model, which could manifest, e.g., via NETCONF/YANG, SNMP or IPFIX, is out-of-scope.




The chairs acknowledge feedback to and interest for the topic during the
IETF118 meeting and on the list after afterwards. We would like to gather feedback from the WG if there is interest to further contribute and review.




Please reply with your support and especially any substantive comments you may have.








For the OPSAWG co-chairs,




Henk




_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org <mailto:OPSAWG@ietf.org> <mailto:OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>> https://www.ietf.org/mailman/listinfo/opsawg <https://www.ietf.org/mailman/listinfo/opsawg> <https://www.ietf.org/mailman/listinfo/opsawg> <https://www.ietf.org/mailman/listinfo/opsawg&gt;>
_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org <mailto:OPSAWG@ietf.org> <mailto:OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>> https://www.ietf.org/mailman/listinfo/opsawg <https://www.ietf.org/mailman/listinfo/opsawg> <https://www.ietf.org/mailman/listinfo/opsawg> <https://www.ietf.org/mailman/listinfo/opsawg&gt;>












Amazon Data Services UK Limited. Registered in England and Wales with registration number 09959151 with its registered office at 1 Principal Place, Worship Street, London, EC2A 2FA, United Kingdom.




_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>
https://www.ietf.org/mailman/listinfo/opsawg <https://www.ietf.org/mailman/listinfo/opsawg>






Amazon Data Services UK Limited. Registered in England and Wales with registration number 09959151 with its registered office at 1 Principal Place, Worship Street, London, EC2A 2FA, United Kingdom.