[OPSAWG] AD Review of draft-ietf-opsawg-service-assurance-architecture-09

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 17 October 2022 11:59 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 128CBC152562; Mon, 17 Oct 2022 04:59:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.608
X-Spam-Level:
X-Spam-Status: No, score=-14.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=VsCi1o+K; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=K9lnDMWK
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n6cLAc7aiYkK; Mon, 17 Oct 2022 04:59:47 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5D85C1524D7; Mon, 17 Oct 2022 04:59:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17038; q=dns/txt; s=iport; t=1666007987; x=1667217587; h=from:to:cc:subject:date:message-id: content-transfer-encoding:mime-version; bh=2XqzqvSSORHA9jgJfSgcG2/Evvr9PjGUZt7NdnjA9Q4=; b=VsCi1o+KxYusFxmOVpgO+ETeAqWbVdvBKmq2PSvnnPBGoy/BRVRqm4pM LSNOnSrK+Nxwh9bGLBhTABIgybRYHoDWJLRwWLHwGl3Fjcen8no7h/LDx RxtQlaV1qD3T1KbOyV31ecSi1rVMn3exsAP2+19s4dcWQtRzi+ammy2fe E=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:1k63xxET7XHbIvCg0efUBJ1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:c/q4Z6vLRE3DwAN4/pEicX9ScufnVGNeMUV32f8akzHdYApBsoF/q tZmKWvXPK6DMGqneIgga9u380MHsJWDn9EwGVc6/i1gQ38RgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgsA145IMsdoUg7wbRg2tc32YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0awAOih6Yno9Kl 8xfnp6AGSp0Y5TLsbFIO/VYO3kW0axu8bvDJz20ttaeihScNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vf7w616OrTpu1EnNsiKNXsOqsUu2prynfSCvNOrZXrEvmVuYQBtNs2rthDEsjzP edAUn1iXC3mchNmKFAyT6tryY9EgVGmI2EH9zp5v5Ef5HDIxRN++LngLNSTfcaFLe1ZhE+Wu ifH8nj3RxYCL9WAxn+e/2iyh+TC2CrgQ58IHbuz+7tjmlaTx3AeAwELT1b9qP29ok+zR9wZL FYbkhfCtoA78EitC9L6RRD9+STCtR8HUN0WGOo/gO2Q9kbKywTeX2kvXz8eU4M/puQ0dWwHi wKwmPq8UFSDr4apYX6a876Vqxa7Ni4UMXIOaEc4oe0tvoWLTGYb00+nczpzLEKmpoauQGivn VhmuAB71utN0p9Sv0mu1Qqf6w9AsKQlWeLcCu//d2ah4wURiGWNONHwsAOzARqt0O+korSpt XwAnY2V6/oDSMjX0ieMW+4KWrqu4p5p0QEwY3YyT/HNFBz0pBZPmLy8Bhkkey+F1e5fI1fUj Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPMYsJFLXons+ORPMt4wIrKTKufxgU Xt8WZv8ZUv29Yw8pNZLb75HiORylnxWKZ37FMqmp/hY7VZuTCfFFehaWLd/Rus496iD6B7E6 MpSMtDi9vmseLOWX8UjyqZKdQpiBSFiXfje8pULHsbdeVAOMD96VJfsLUYJJtYNc1J9zLmYp xlQmyZwlTLCuJEwAVnaNyEzNui0Bv6SbxsTZEQRALph4FB7Ca7H0UvVX8JfkWUPnAC78cNJc g==
IronPort-HdrOrdr: A9a23:SPY/06Fv5umTvbMHpLqFUJHXdLJyesId70hD6qkvc3Jom52j+P xGws526fatskdqZJkh8erwXJVoMkmsiKKdhrNhd4tKPTOW81dASbsC0WKM+UyZJ8STzJ8+6U 4CSdkyNDSTNykAsS+S2mDReLxMoKjlzEnCv5a4854Zd3ASV0gW1XYeNu/0KDwSeCB2Qb4CUL aM7MtOoDStPV4NaN6gO3UDV+/f4/XWiZPPe3c9dlIawTjLqQntxK/xEhCe0BtbeShI260e/W /MlBG8zrm/ssu81gTX2wbonttrcZrau5V+7f63+4gowwbX+0WVjUNaKv+/VQUO0aCSAZAR4Z zxSlkbToBOAjjqDx2ISFPWqnbdOXAVmjjfIZvyuwq7nSQ/LwhKTfapzLgpDCfx+g4uuspx37 lM2H/cv51LDQnYlCC4/NTQUQp2/3DE10bKvNRj+0C3a7FuH4N5vMga5gdYAZ0AFCX15MQuF/ RvFtjV4LJTfUmBZ37Us2FzyJj0N05DViuuUwwHoIiYwjJWlHd2ww8Rw9EehG4J8NY4R4Nf7+ rJP6x0nPVFT9MQb6h6GOAdKPHHQ1DlUFbJKiafMF7nHKYINzbErIP2+qw84KWwdJkB3PIJ6e H8uZNjxBwPkm7VeL6zNcdwg2HwqU2GLETQ9v0=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.95,191,1661817600"; d="scan'208";a="947431"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Oct 2022 11:59:45 +0000
Received: from mail.cisco.com (xfe-aln-004.cisco.com [173.37.135.124]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 29HBxioh019175 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 17 Oct 2022 11:59:44 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15; Mon, 17 Oct 2022 06:59:43 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 17 Oct 2022 06:59:43 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hUk0D3ldqeYj463x+nxOEGFu8p4vY3PlooHv0xwPEvgE1EfDrfooa2pAcbsNZ54fqIdSrAuHgsxZwBYsX77OGa+AwcpuAdD7YJUzPQ0ZIbUKYOUmqeBHT+g/+lTz2FlSHwEEMpo/AclqK/Vrdifwsmg06ori0i88loqsOjB52F/JPxYj6rAI/NdMCxvrZFOBW0Wy6zrnpsP7DKNO6gmC7ChkGCQZ0BEE6Q+qdHRrKgQUaxQv/HFszQF2S3jWAm96A4ADZLDe0LIc32jelSSkUwyMIZNi9PIRoyzjAXyjxQPFzE4yCQb4yUUIC1CoYBkVr0AL2EWNDZooKUrDsI770g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=m2ii1GAP2aq6q8zOxnEedUWPKCpG9zVyCLOY5FFJjl4=; b=KU1YWeFkYTomhqbgLThAUYcOPfGdMqoCkfwXogO9Z4F/2Xz0D0TmJmWlNzUr76OsQOEDj4DAn8ehNguc1Sz0dDvBpSFCiWH3KPuMzwfx//sn6tHKJGlntr5NSRQ2gmv4ptXPAqMPi0cFESLQu+8QvpxL4R5Vkh0apB5dEL0woxOmeWmFfZagrroowEOhEQbUg1NjxzFTXFGGmS1ZWodDrQLAviny5Eg3Xybh+p575MncNq3My+ugAr6NE/NiPniVWgrT63x35QX8M8dc9/u+FnMJeA1a9e1/WB+awtnFZpMWMeBt/vuG2bUu5RQf7n0ZjJlvOxX4X2pWIttPIR2Nzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m2ii1GAP2aq6q8zOxnEedUWPKCpG9zVyCLOY5FFJjl4=; b=K9lnDMWKUawzYV3gSUn/3NkLOkP4XmiHJwkAIPDS65R/zLnTG0n6AcPkW2nVPsuOLtNEQ4thKCiPS/OjJFkYvqUPjmOVmv0f+y/MMR1kjU8jc2k/9/8W+9xg/zy9hlV6y9buFvR6LdCiUySbmUDrporGVog8qRj0rX5LTy7M1yQ=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by BN9PR11MB5241.namprd11.prod.outlook.com (2603:10b6:408:132::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.32; Mon, 17 Oct 2022 11:59:41 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c%5]) with mapi id 15.20.5723.033; Mon, 17 Oct 2022 11:59:41 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-opsawg-service-assurance-architecture.all@ietf.org" <draft-ietf-opsawg-service-assurance-architecture.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: AD Review of draft-ietf-opsawg-service-assurance-architecture-09
Thread-Index: AdjiHyqh8m2sHTffRpWHVoPYBpGHvQ==
Date: Mon, 17 Oct 2022 11:59:40 +0000
Message-ID: <BY5PR11MB419690A9A776317FE36E3262B5299@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|BN9PR11MB5241:EE_
x-ms-office365-filtering-correlation-id: eba11efa-1676-42b8-42c4-08dab03712b2
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: qa7NPaU/a1PqKsm9XbiomWcoPzlBwcMoAevVV3CXmMX4Zsa5CCpIK3d3y/MNpj+k4q5inKCzcFBFBNTQ7PZ6xL6Tyj/T+eP8ksrUGVGInJF1WsFma1HHAhKtHjSQUEDnv3M5EOuGySQ1t1uHiNK/a1yMnHZBA0MQv9roVBOMXqENF91kM6IWMcCJxOOEvxXqm+7+aAkGfi+1BntBnSjuIfeWQ4mpAQXE9BNBMpVrfIT8DdbhbENq0lPQCccwxtLCtIyVOQ4nOnD39WsgWVDumNnyRoZAa09PePs1rAaCZEJkDltrei6ls4vmtRG/E3GWntH+plGovFo7cVRxuFf0XVkHXk+KUOkVvkoOqqIUcmETadKpTp+zfIdatt7ZufJEnFdt1KM8KtELL8kBb1bB0F6uC/UmOOC218zBo2Vczgbk00Jp8AYEDXsVtb8gfRvMNegLNyt08ojbnURTtnHsatgH6EejOaTxs2Nshx3QOxg8XOt6K6W13JHoebk6uDktJGcouCgW08L6/T7eQjz+LCGopPdrLwJfaiCF/vHzvYTMoN5xvsjSp7piuRfr5Xd8VmIbVOYZ+7lAq0vC4JW94O7onNE/65WraAPnuWYnTWscPE+3hgj5b4s9fWlNqq8xtUMRLvhjH7g7KIVFVP5d/FklTdfnzIZUGrUCT7guww7I/4QwIPJM2s6jZ0fMsu6fblideDC2OoQD04egEHu27P8Fa1A7MaNCT1MT+gynNx2E6ZBJFYAu+bXGtN7/BSoHCZ/pxMwYFj9awQByKM5mmg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(396003)(346002)(366004)(376002)(39860400002)(136003)(451199015)(26005)(9686003)(7696005)(6506007)(33656002)(186003)(316002)(6916009)(450100002)(66476007)(64756008)(66446008)(66556008)(76116006)(66946007)(478600001)(71200400001)(83380400001)(38070700005)(55016003)(2906002)(66899015)(8676002)(86362001)(8936002)(122000001)(38100700002)(52536014)(41300700001)(30864003)(5660300002)(4326008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eba11efa-1676-42b8-42c4-08dab03712b2
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2022 11:59:40.9240 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XYVXfIpVeHY3tB02HLCXZK4iKH8eeFhpNfa5P9OfiH1sQNYT+YynUzuh95FZyBEYL5amPgT8qswAbOVcU0ID7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR11MB5241
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.124, xfe-aln-004.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/SyZIcr6Ecyxoulqu7U8liSgTNYs>
Subject: [OPSAWG] AD Review of draft-ietf-opsawg-service-assurance-architecture-09
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2022 11:59:51 -0000

Hi authors,

Here is my AD review of draft-ietf-opsawg-service-assurance-architecture-09.  I would like to thank you and the WG for this document.  I believe that this architecture document, and the corresponding YANG document, offer a good flexible basis to help with the full lifecycle monitoring of deployed services.

Here are my comments which may help improve the document.


Minor level comments:

(1) p 3, sec 1.  Introduction

   The assurance graph of a service is decomposed into components, which
   are then assured independently.  The root of the assurance graph
   represents the service to assure, and its children represent
   components identified as its direct dependencies; each component can
   have dependencies as well.  Components involved in the assurance
   graph of a service are called subservices.  The SAIN orchestrator
   updates automatically the assurance graph when services are modified.

I was wondering if you meant services or subservices in the last sentence?


(2) p 3, sec 1.  Introduction

   When a service is degraded, the SAIN architecture will highlight
   where in the assurance service graph to look, as opposed to going hop
   by hop to troubleshoot the issue.  More precisely, the SAIN
   architecture will associate to each service a list of symptoms
   originating from specific subservices, corresponding to components of
   the network.  These components are good candidates for explaining the
   source of a service degradation.  Not only can this architecture help
   to correlate service degradation with network root cause/symptoms,
   but it can deduce from the assurance graph the number and type of
   services impacted by a component degradation/failure.  This added
   value informs the operational team where to focus its attention for
   maximum return.  Indeed, the operational team should focus his
   priority on the degrading/failing components impacting the highest
   number customers, especially the ones with the SLA contracts
   involving penalties in case of failure.

Rather than "should focus", perhaps "may focus" or "are likely to focus".  Also, his => their, number customers -> number of customers


(3) p 4, sec 2.  Terminology

   SAIN agent: A functional component that communicates with a device, a
   set of devices, or another agent to build an expression graph from a
   received assurance graph and perform the corresponding computation of
   the health status and symptoms.

Perhaps consider whether stating that the SAIN agent could run directly on the device?  Although I noted that this is described later in the document anyway.


(4) p 5, sec 2.  Terminology

   Metric: An information retrieved from the network running the assured
   service.

Suggest An item of information retrieved, or a piece of data retrieved.


(5) p 5, sec 2.  Terminology

   Health score: Integer ranging from 0 to 100 indicating the health of
   a subservice.  A score of 0 means that the subservice is broken, a
   score of 100 means that the subservice in question is operating as
   expected.

I noted that neither the architecture nor the YANG talk about mapping discrete properties (e.g., interface up/down). I would intuitively think that these would map to a value of 100 and 0 respectively.  Would it be helpful to add any text to describe how binary properties are handled?


(6) p 6, sec 3.  A Functional Architecture

   The goal of SAIN is to assure that service instances are operating as
   expected (i.e. the observed service is matching the expected service)
   and if not, to pinpoint what is wrong.  More precisely, SAIN computes
   a score for each service instance and outputs symptoms explaining
   that score.  Symptoms explain the score.  The only valid situation
   where no symptoms are returned is when the score is maximal,
   indicating that no issues where detected for that service.  The score
   augmented with the symptoms is called the health status.

Symptoms explain the score seems to be a duplicate and can be removed.


(7) p 6, sec 3.  A Functional Architecture

   The SAIN architecture is a generic architecture, applicable to
   multiple environments (e.g. wireline, wireless), but also different
   domains (e.g. 5G network function virtualization (NFV) domain with a
   virtual infrastructure manager (VIM)), etc.  And as already noted,
   for physical or virtual devices, as well as virtual functions.
   Thanks to the distributed graph design principle, graphs from
   different environments/orchestrator can be combined together.

perhaps: combined together -> combined together for a given service.


(8) p 7, sec 3.  A Functional Architecture

          +-----------------+
          | Service         |
          | Orchestrator    |<--------------------+
          |                 |                     |
          +-----------------+                     |
             |            ^                       |
             |            | Network               |
             |            | Service               | Feedback
             |            | Instance              | Loop
             |            | Configuration         |
             |            |                       |
             |            V                       |
             |        +-----------------+       +-------------------+
             |        | SAIN            |       | SAIN              |
             |        | Orchestrator    |       | Collector         |
             |        +-----------------+       +-------------------+
             |            |                        ^
             |           Y| Configuration          | Health Status
             |            | (assurance graph)     Y| (Score + Symptoms)
             |            V                        | Streamed
             |     +-------------------+           | via Telemetry
             |     |+-------------------+          |
             |     ||+-------------------+         |
             |     +|| SAIN              |---------+
             |      +| agent             |
             |       +-------------------+
             |               ^ ^ ^
             |               | | |
             |               | | |  Metric Collection
             V               V V V
         +-------------------------------------------------------------+
         |           Network System                                    |
         |                                                             |
         +-------------------------------------------------------------+

I was slightly surprised that there no line/arrow flowing from the SAIN Collector to the SAIN Orchestrator.  Is it ever possible that the assurance graph could change dynamically, e.g., on the basis of moving to a backup path for a tunnel, could that then mean that different subservices are added into the assurance graph?  Or would the expectation always be that these are known and setup statically.


(9) p 8, sec 3.1.  Inferring a Service Instance Configuration into an Assurance Graph

   *  Subservices that are common to several service instances are
      reused for reducing the amount of computation needed.

Is a subservice allowed to be decomposed into further subservices?


(10) p 15, sec 3.2.  Intent and Assurance Graph

   *  Capturing the intent would start by detecting that the service
      instance is actually a tunnel between the two devices, and stating
      that this tunnel must be functional.  This solution is minimally
      invasive as it does not require to modify nor know the service
      model.  If the service model or network model is known by the SAIN
      orchestrator, it can be used to further capture the intent and
      include more information such as SLO.  For instance, the latency
      and bandwidth requirements for the tunnel, if present in the
      service model

SLO.  What does this expand to?


(11) p 16, sec 3.4.  Building the Expression Graph from the Assurance Graph

      Impacting Dependency: Type of dependency whose score impacts the
      score of its parent subservice or service instance(s) in the
      assurance graph.  The symptoms are taken into account in the
      parent service instance or subservice instance(s), as the
      impacting reasons.

If a VPN service had a proscribed primary and backup path, and a node failed on the primary path then would you expect that to cause the health score for the service to decrease (even if there is no client visible impact)?


(12) p 19, sec 3.7.  Flexible Functional Architecture

   The SAIN architecture is flexible in terms of components.  While the
   SAIN architecture in Figure 1 makes a distinction between two
   components, the SAIN configuration orchestrator and the SAIN
   orchestrator,

Should this be SAIN orchestrator and the SAIN collector?



Nit level comments:

(13) p 1, sec 1.  Introduction

   Service orchestrators use Network service YANG modules that will
   infer network-wide configuration and, therefore the invocation of the
   appropriate device modules (Section 3 of [RFC8969]).  Knowing that a
   configuration is applied doesn't imply that the service is up and
   running as expected.  For instance, the service might be degraded
   because of a failure in the network, the experience quality is
   distorted, or a service function may be reachable at the IP level but

Suggest "the service quality may be degraded" instead of "the experience quality is distorted".


(14) p 2, sec 1.  Introduction

   Service orchestrators use Network service YANG modules that will
   infer network-wide configuration and, therefore the invocation of the
   appropriate device modules (Section 3 of [RFC8969]).  Knowing that a
   configuration is applied doesn't imply that the service is up and
   running as expected.  For instance, the service might be degraded
   because of a failure in the network, the experience quality is
   distorted, or a service function may be reachable at the IP level but
   does not provide its intended function.  Thus, the network operator
   must monitor the service operational data at the same time as the
   configuration (Section 3.3 of [RFC8969]).  To feed that task, the
   industry has been standardizing on telemetry to push network element
   performance information.

Suggest: service operational data -> service's operational data.


(15) p 2, sec 1.  Introduction

   A network administrator needs to monitor their network and services
   as a whole, independently of the management protocols.  With
   different protocols come different data models, and different ways to
   model the same type of information.  When network administrators deal
   with multiple management protocols, the network management entities
   have to perform the difficult and time-consuming job of mapping data
   models: e.g. the model used for configuration with the model used for
   monitoring when separate models or protocols are used.  This problem
   is compounded by a large, disparate set of data sources (MIB modules,
   YANG models [RFC7950], IPFIX information elements [RFC7011], syslog
   plain text [RFC5424], TACACS+ [RFC8907], RADIUS [RFC2865], etc.).  In
   order to avoid this data model mapping, the industry converged on
   model-driven telemetry to stream the service operational data,
   reusing the YANG models used for configuration.  Model-driven
   telemetry greatly facilitates the notion of closed-loop automation
   whereby events/status from the network drive remediation changes back
   into the network.

e.g. => e.g.., I also suggest: "whereby events/status from the" -> "whereby events and updated operational state streamed from the"


(16) p 6, sec 3.  A Functional Architecture

   The goal of SAIN is to assure that service instances are operating as
   expected (i.e. the observed service is matching the expected service)
   and if not, to pinpoint what is wrong.  More precisely, SAIN computes
   a score for each service instance and outputs symptoms explaining
   that score.  Symptoms explain the score.  The only valid situation
   where no symptoms are returned is when the score is maximal,
   indicating that no issues where detected for that service.  The score
   augmented with the symptoms is called the health status.

Nit, i.e. => i.e.,


(17) p 8, sec 3.1.  Inferring a Service Instance Configuration into an Assurance Graph

Possibly "Translating" rather than "Inferring"?


(18) p 20, sec 3.7.  Flexible Functional Architecture

   And finally, the SAIN architecture is flexible in terms of what it
   monitors.  Most, if not all examples, in this document refer to
   physical components but this is not a constrain.  Indeed, the
   assurance of virtual components would follow the same principles and
   an assurance graph composed of virtualized components (or a mix of
   virtualized and physical ones) is well possible within this
   architecture.

constrain -> constraint. well possible -> very possible.



Nits grammar checks from automated tool, some may not be valid ...

Spellings:
under-maintenace,

Grammar Warnings:
Section: 1, draft text:
However some already defined services might have been designed using a different approach. 
Warning:  Did you forget a comma after a conjunctive/linking adverb?
Suggested change:  "However,"

Section: 2, draft text:
 SAIN collector: A functional component that fetches or receives the computer-consumable output of the SAIN agent(s) and process it locally (including displaying it in a user friendly form). 
Warning:  This word is normally spelled with hyphen.
Suggested change:  "user-friendly"

Section: 3, draft text:
Thanks to the distributed graph design principle, graphs from different environments/orchestrator can be combined together. 
Warning:  'combined together' is redundant. Use combined
Suggested change:  "combined"

Section: 3.2, draft text:
This solution is minimally invasive as it does not require to modify nor know the service model. 
Warning:  Did you mean modifying? Or maybe you should add a pronoun? In active voice, 'require' + 'to' takes an object, usually a pronoun.
Suggested change:  "modifying"

Section: 3.4, draft text:
 Subservices shall be not be dependent on the protocol used to retrieve the metrics. 
Warning:  Consider using a past participle here: been.
Suggested change:  "been"

Section: 3.4, draft text:
 In order to keep subservices independent from metric collection method, or, expressed differently, to support multiple combinations of platforms, OSes, and even vendors, the architecture introduces the concept of "metric engine". 
Warning:  The usual collocation for "independent" is "of" not "from". Did you mean independent of?
Suggested change:  "independent of"

Section: 3.7, draft text:
Examples includes a DHCP server on a Linux server, a data plane, an IPFIX export, etc. 
Warning:  Possible agreement error.
Suggested change:  "Example includes"

Section: 3.7, draft text:
Exactly like a DHCP server/data plane/IPFIX export can be considered as subservices for a device, exactly like a routing instance can be considered as a subservice for a L3VPN, exactly like a tunnel can considered as a subservice for an application in the cloud. 
Warning:  The modal verb 'can' requires the verb's base form.
Suggested change:  "consider"

Section: 3.7, draft text:
Most, if not all examples, in this document refer to physical components but this is not a constrain. 
Warning:  The word 'constrain' is a verb. Did you mean the noun constraint?
Suggested change:  "constraint"

Section: 3.8, draft text:
 Therefore, the SAIN agent contains a YANG object specifying the date and time at which the symptoms history starts for the subservice instances. 
Warning:  Apostrophe might be missing.
Suggested change:  "symptoms'"

Section: 3.9, draft text:
Therefore an assurance graph version must be maintained, along with the date and time of its last generation. 
Warning:  Did you forget a comma after a conjunctive/linking adverb?
Suggested change:  "Therefore,"

Section: 4, draft text:
 If a closed loop system relies on this architecture then the well known issue of those system also applies, i.e., a lying device or compromised agent could trigger partial reconfiguration of the service or network. 
Warning:  Did you mean this system or those systems?
Suggested change:  "this system"

Section: 4, draft text:
The SAIN architecture neither augments or reduces this risk. 
Warning:  Use nor with neither.
Suggested change:  "nor"

Regards,
Rob