Re: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02

"Evans, John" <jevanamz@amazon.co.uk> Wed, 31 January 2024 10:17 UTC

Return-Path: <prvs=7530fcfd6=jevanamz@amazon.co.uk>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EE90C1CAF42 for <opsawg@ietfa.amsl.com>; Wed, 31 Jan 2024 02:17:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazon.co.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jkkQ166RVbYM for <opsawg@ietfa.amsl.com>; Wed, 31 Jan 2024 02:17:31 -0800 (PST)
Received: from smtp-fw-52004.amazon.com (smtp-fw-52004.amazon.com [52.119.213.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 300EEC1CAF35 for <opsawg@ietf.org>; Wed, 31 Jan 2024 02:17:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.co.uk; i=@amazon.co.uk; q=dns/txt; s=amazon201209; t=1706696252; x=1738232252; h=from:to:subject:date:message-id:content-id:mime-version: content-transfer-encoding; bh=QNj970FtimN1EhhcUDJ/S7I67ONDjVvkHtLfSv6WuOg=; b=Rywe8GUsGQSIngoef41A77vQjlIRvQJkErvA7hyCs4tuKkEksNH5rEO0 zV/r75BCCEq7J+AyJQO1HojsrjKlmXrqcXULyQKptEmQ2asOp7PSILMoO Oq7UcIRXvvAumEBG/IprvIP9wJQz4N/wK91LmNxJsVUKlVL36xNG8P4kE A=;
X-IronPort-AV: E=Sophos;i="6.05,231,1701129600"; d="scan'208";a="181556870"
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO smtpout.prod.us-west-2.prod.farcaster.email.amazon.dev) ([10.43.8.2]) by smtp-border-fw-52004.iad7.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jan 2024 10:17:29 +0000
Received: from EX19MTAEUB001.ant.amazon.com [10.0.43.254:63667] by smtpin.naws.eu-west-1.prod.farcaster.email.amazon.dev [10.0.6.49:2525] with esmtp (Farcaster) id 2e6b22c1-f0af-48e7-b7b2-940579263177; Wed, 31 Jan 2024 10:17:27 +0000 (UTC)
X-Farcaster-Flow-ID: 2e6b22c1-f0af-48e7-b7b2-940579263177
Received: from EX19D015EUB002.ant.amazon.com (10.252.51.123) by EX19MTAEUB001.ant.amazon.com (10.252.51.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 31 Jan 2024 10:17:27 +0000
Received: from EX19D015EUB003.ant.amazon.com (10.252.51.113) by EX19D015EUB002.ant.amazon.com (10.252.51.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 31 Jan 2024 10:17:26 +0000
Received: from EX19D015EUB003.ant.amazon.com ([fe80::c0b7:2320:49e3:8444]) by EX19D015EUB003.ant.amazon.com ([fe80::c0b7:2320:49e3:8444%3]) with mapi id 15.02.1118.040; Wed, 31 Jan 2024 10:17:26 +0000
From: "Evans, John" <jevanamz@amazon.co.uk>
To: Qin Wu <bill.wu=40huawei.com@dmarc.ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, OPSAWG <opsawg@ietf.org>
Thread-Topic: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02
Thread-Index: AQHaVC6wjgfQdUvPe0K6xYoHYsZCxQ==
Date: Wed, 31 Jan 2024 10:17:26 +0000
Message-ID: <8DFD2709-1C0B-4505-BE5D-5366F8254281@amazon.co.uk>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.80.23121017
x-originating-ip: [10.252.51.69]
Content-Type: text/plain; charset="utf-8"
Content-ID: <DE40C42E911801469E86ED9D2A4D1EBF@amazon.com>
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/PkI8DsXYRMJcmlCbLPeMEDlGS7E>
Subject: Re: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jan 2024 10:17:32 -0000

Hi Qin,

Thank you for your feedback.

> 1. what is the difference between packet loss and packet discard, it seems this two terms are used interchangeably in the draft, in some places
> packet discard reporting is used, while in some other places, packet loss reporting, which I think lack consistency. Suggest to introduce two
> terms definition in the terminology section.

This text is currently at the bottom of section 1 (Introduction); I agree that it's not sufficient - will clarify and move to  section 2 (Terminology):
"The terms 'packet drop' and 'discard' are considered equivalent and are used interchangeably in this document."

> 2. Section 1, 1st paragraph said:
> "Router-reported packet loss is the most direct signal for network operations to identify customer impact from unintended packet loss."
> I feel packet loss is just one of signals for network operators to identify customer impact? How about network latency, jitter?

We're not suggesting here that packet loss is the only form of customer impact, but rather than router reported packet loss is most direct signal of the customer impact which is due to unintended packet loss.  We will clarify the text.

> I am wondering whether this draft should update [RFC8343] to address such limitation.

Ultimately, I think we should update the corresponding data models to reflect whatever we agree in this draft, should we progress it.  In this specific case, RFC8343 has reflected what is in RFC1213. Hence, our focus is first on standardising a framework for packet loss reporting.  Once the information model is agreed, we can proceed to apply that to the corresponding data models, which we currently define as out of scope in section 1:
"There are multiple ways that this information model could be implemented (i.e., data models), including SNMP [RFC1157], NETCONF [RFC6241] / YANG [RFC7950], and IPFIX [RFC5153], but they are outside of the scope of this document."

I will update section 1 to reference RFC8343 in addition to RFC1213.

> 4. If my understanding is correct, the solution described in Section 2 include three key elements, packet loss, cause, and auto-mitigation actions
...
> I am wondering how packet loss reporting trigger auto-mitigation action? Do you need to populate specific policy in the device, this policy
> will be associated with specific monitoring object such as "discards/error/l2/rx/", is such policy corresponding to specific python code, which
> can be excuted based on the logic described in the policy?

The table in section 5 is an example; the intent here was to ensure that the packet loss reporting classification was fit for the purpose of determining the appropriate auto-mitigation action to take, i.e. working backwards from the outcome we are trying to achieve.   The lack of a standardised classification scheme and clear semantics for packet loss reporting is a real pain point for network operators today.  Hence, whilst we could expand the scope of this document, I think it's better to keep how the actions are modelled, triggered and implemented out of scope of this document, in the interest gaining consensus on the information model for packet loss reporting.  This leaves scope to address them in follow-on work.

Related current text in section 1: "This document considers only the signals that may trigger automated mitigation plans and not how they are defined or executed."

> 5. Section 4 defines a information model, I am wondering whether this packet discard model should augment interface YANG model defined in [RFC8343]?

Please see earlier answer on RFC8343.

> 6. Section 4.3 specific requirements rather than rules for packet loss reporting

I'm not sure what you mean here - could you please clarify your feedback?

 > 7 Section 5, can we model both packet loss statistics and auto-mitigation action in the same model, similar to what ECA model is doing in draft-ietf-netmod-eca-policy.

I think it's better to keep how the actions are modelled, triggered and implemented out of scope of this document and focus on gaining consensus on the information model for packet loss reporting first.

Cheers

John


๏ปฟOn 31/01/2024, 08:06, "OPSAWG on behalf of Qin Wu" <opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org> on behalf of bill.wu=40huawei.com@dmarc.ietf.org <mailto:40huawei.com@dmarc.ietf.org>> wrote:


Hi,
I have read the latest version of this draft and have the following comments:
1. what is the difference between packet loss and packet discard, it seems this two terms are used interchangeably in the draft, in some places packet discard reporting is used, while in some other places, packet loss reporting, which I think lack consistency. Suggest to introduce two terms defintiion
in the terminology section.
2. Section 1, 1st paragraph said:
"
Router-reported packet loss is the most direct signal for network operations to identify customer impact from unintended packet loss.
"
I feel packet loss is just one of signals for network operators to identify customer impact? How about network latency, jitter?
3.Section 1, 2nd paragraph said:
"
The existing metrics for packet loss as defined in [RFC1213] - namely ifInDiscards, ifOutDiscards, ifInErrors, ifOutErrors - do not provide sufficient precision to be able to automatically identify the cause of the loss and mitigate the impact. From a network operators' perspective, ifindiscards can represent both intended packet loss (i.e., packets discarded due to policy) and unintended packet loss (e.g., packets dropped in error).
"
It looks not only metrics for packet loss defined in [RFC1213] has its limitation, but also YANG model for interface management defined in [RFC8343],
I am wondering whether this draft should update [RFC8343] to address such limitation.
4. If my understanding is correct, the solution described in Section 2 include three key elements, packet loss, cause, and auto-mitigation actions
the cause can be seen as trigger or condition, which will trigger different auto-mitigation actions, these concept is similar to ECA concept in (https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/ <https://datatracker.ietf.org/doc/draft-ietf-netmod-eca-policy/>) which include Event, condition and action three elements, when the event meets specific condition, e.g., packet loss is greater than specific threshold value,
the action will be triggered, the action can be sending an notification, or sending a snapshot of device statistics.
Different from ECA, in this draft, auto-mitigation actions and cause is not modelled in the packet loss model, I am wondering how packet loss reporting
trigger auto-mitigation action? Do you need to populate specific policy in the device, this policy will be associated with specific monitoring object such as "discards/error/l2/rx/", is such policy corresponding to specific python code, which can be excuted based on the logic described in the policy?
5. Section 4 defines a information model, I am wondering whether this packet discard model should augment interface YANG model defined in [RFC8343]?
For the current shape, I feel it lack sufficient details on the definition for each attributes.


6. Section 4.3 specific requirements rather than rules for packet loss reporting


7 Section 5, can we model both packet loss statistics and auto-mitigation action in the same model, similar to what ECA model is doing in draft-ietf-netmod-eca-policy.


-Qin
-----้‚ฎไปถๅŽŸไปถ-----
ๅ‘ไปถไบบ: OPSAWG [mailto:opsawg-bounces@ietf.org <mailto:opsawg-bounces@ietf.org>] ไปฃ่กจ Henk Birkholz
ๅ‘้€ๆ—ถ้—ด: 2024ๅนด1ๆœˆ17ๆ—ฅ 20:52
ๆ”ถไปถไบบ: OPSAWG <opsawg@ietf.org <mailto:opsawg@ietf.org>>
ไธป้ข˜: [OPSAWG] ๐Ÿ”” WG Adoption Call for draft-opsawg-evans-discardmodel-02


Dear OPSAWG members,


this email starts a call for Working Group Adoption of


> https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.htm <https://www.ietf.org/archive/id/draft-opsawg-evans-discardmodel-02.htm>
> l


ending on Wednesday, January 31st.


As a reminder, this I-D describes an information model in support of automated network mitigation on what and how to report about unintentional packet discards/losses that can have an impact on service level objectives. Implementation of the informational model, which could manifest, e.g., via NETCONF/YANG, SNMP or IPFIX, is out-of-scope.


The chairs acknowledge feedback to and interest for the topic during the
IETF118 meeting and on the list after afterwards. We would like to gather feedback from the WG if there is interest to further contribute and review.


Please reply with your support and especially any substantive comments you may have.




For the OPSAWG co-chairs,


Henk


_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>
https://www.ietf.org/mailman/listinfo/opsawg <https://www.ietf.org/mailman/listinfo/opsawg>
_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>
https://www.ietf.org/mailman/listinfo/opsawg <https://www.ietf.org/mailman/listinfo/opsawg>






Amazon Data Services UK Limited. Registered in England and Wales with registration number 09959151 with its registered office at 1 Principal Place, Worship Street, London, EC2A 2FA, United Kingdom.