[OPSAWG] AD Review of draft-ietf-opsawg-service-assurance-architecture-09
"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 17 October 2022 11:59 UTC
Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 128CBC152562; Mon, 17 Oct 2022 04:59:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.608
X-Spam-Level:
X-Spam-Status: No, score=-14.608 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=VsCi1o+K; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=K9lnDMWK
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n6cLAc7aiYkK; Mon, 17 Oct 2022 04:59:47 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5D85C1524D7; Mon, 17 Oct 2022 04:59:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17038; q=dns/txt; s=iport; t=1666007987; x=1667217587; h=from:to:cc:subject:date:message-id: content-transfer-encoding:mime-version; bh=2XqzqvSSORHA9jgJfSgcG2/Evvr9PjGUZt7NdnjA9Q4=; b=VsCi1o+KxYusFxmOVpgO+ETeAqWbVdvBKmq2PSvnnPBGoy/BRVRqm4pM LSNOnSrK+Nxwh9bGLBhTABIgybRYHoDWJLRwWLHwGl3Fjcen8no7h/LDx RxtQlaV1qD3T1KbOyV31ecSi1rVMn3exsAP2+19s4dcWQtRzi+ammy2fe E=;
X-IPAS-Result: A0AzAgDiQk1jmIYNJK1aHgEBCxIMQIFEC4FTKih/WzpFiBoDhS+IGJBwiwKBLBSBEQNUCwEBAQ0BAUIEAQGBU4MyAoRsAiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEdGQUOECeFaAEMhkUWFRMGAQE3AREBGhsJQhcPAQQODRMHgluCbgMwAwGePQGBPwKKH3iBATOBAYIIAQEGBASFERiCOQmBPYMzi1GBVhyBSUSBFUOHIgEsAho9g1CCLoNhhgaKdoYFOANEHUADCzszGAMUAwUhBwMZDyMNDQQdDAMDBSUDAgIbBwICAwIGEwUCAk00CAQIBCskDwUCBy8FBC8CHgQFBhEIAhYCBgQEBAQVAhAIAggmFwcNBjMZAQVZDgkhHCgNBQYTAyBvBUIPKC9pEBscGweBDCooFQMEBAMCBhMDIgINKTEUBCkTDy0HI3EJAgMiagMDBCgsAwkgBBwHJSQ8B1g/AwIQIjwGAwkDAiRZgSUmBQMNFyUIBTcbBAg8AgUGUhICChEDEg8tSA9KPjkWBidFATYPDpxZAQ4sAS0GDwIwEwULBBQEBRIDETACWQpACA0EBx4CCgQkBgsGIYxhhSIdCAcJK5FVnVIKg2CZOIclFqgyXZcWIKIeCyaEXAIEAgQFAg4BAQaBYjqBW3AVO4JnURkPjiAHBQUICYEEAQeCRIpedTsCBgsBAQMJiXleAQE
IronPort-PHdr: A9a23:1k63xxET7XHbIvCg0efUBJ1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:c/q4Z6vLRE3DwAN4/pEicX9ScufnVGNeMUV32f8akzHdYApBsoF/q tZmKWvXPK6DMGqneIgga9u380MHsJWDn9EwGVc6/i1gQ38RgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgsA145IMsdoUg7wbRg2tc32YHR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0awAOih6Yno9Kl 8xfnp6AGSp0Y5TLsbFIO/VYO3kW0axu8bvDJz20ttaeihScNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vf7w616OrTpu1EnNsiKNXsOqsUu2prynfSCvNOrZXrEvmVuYQBtNs2rthDEsjzP edAUn1iXC3mchNmKFAyT6tryY9EgVGmI2EH9zp5v5Ef5HDIxRN++LngLNSTfcaFLe1ZhE+Wu ifH8nj3RxYCL9WAxn+e/2iyh+TC2CrgQ58IHbuz+7tjmlaTx3AeAwELT1b9qP29ok+zR9wZL FYbkhfCtoA78EitC9L6RRD9+STCtR8HUN0WGOo/gO2Q9kbKywTeX2kvXz8eU4M/puQ0dWwHi wKwmPq8UFSDr4apYX6a876Vqxa7Ni4UMXIOaEc4oe0tvoWLTGYb00+nczpzLEKmpoauQGivn VhmuAB71utN0p9Sv0mu1Qqf6w9AsKQlWeLcCu//d2ah4wURiGWNONHwsAOzARqt0O+korSpt XwAnY2V6/oDSMjX0ieMW+4KWrqu4p5p0QEwY3YyT/HNFBz0pBZPmLy8Bhkkey+F1e5fI1fUj Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPMYsJFLXons+ORPMt4wIrKTKufxgU Xt8WZv8ZUv29Yw8pNZLb75HiORylnxWKZ37FMqmp/hY7VZuTCfFFehaWLd/Rus496iD6B7E6 MpSMtDi9vmseLOWX8UjyqZKdQpiBSFiXfje8pULHsbdeVAOMD96VJfsLUYJJtYNc1J9zLmYp xlQmyZwlTLCuJEwAVnaNyEzNui0Bv6SbxsTZEQRALph4FB7Ca7H0UvVX8JfkWUPnAC78cNJc g==
IronPort-HdrOrdr: A9a23:SPY/06Fv5umTvbMHpLqFUJHXdLJyesId70hD6qkvc3Jom52j+P xGws526fatskdqZJkh8erwXJVoMkmsiKKdhrNhd4tKPTOW81dASbsC0WKM+UyZJ8STzJ8+6U 4CSdkyNDSTNykAsS+S2mDReLxMoKjlzEnCv5a4854Zd3ASV0gW1XYeNu/0KDwSeCB2Qb4CUL aM7MtOoDStPV4NaN6gO3UDV+/f4/XWiZPPe3c9dlIawTjLqQntxK/xEhCe0BtbeShI260e/W /MlBG8zrm/ssu81gTX2wbonttrcZrau5V+7f63+4gowwbX+0WVjUNaKv+/VQUO0aCSAZAR4Z zxSlkbToBOAjjqDx2ISFPWqnbdOXAVmjjfIZvyuwq7nSQ/LwhKTfapzLgpDCfx+g4uuspx37 lM2H/cv51LDQnYlCC4/NTQUQp2/3DE10bKvNRj+0C3a7FuH4N5vMga5gdYAZ0AFCX15MQuF/ RvFtjV4LJTfUmBZ37Us2FzyJj0N05DViuuUwwHoIiYwjJWlHd2ww8Rw9EehG4J8NY4R4Nf7+ rJP6x0nPVFT9MQb6h6GOAdKPHHQ1DlUFbJKiafMF7nHKYINzbErIP2+qw84KWwdJkB3PIJ6e H8uZNjxBwPkm7VeL6zNcdwg2HwqU2GLETQ9v0=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.95,191,1661817600"; d="scan'208";a="947431"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Oct 2022 11:59:45 +0000
Received: from mail.cisco.com (xfe-aln-004.cisco.com [173.37.135.124]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 29HBxioh019175 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 17 Oct 2022 11:59:44 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15; Mon, 17 Oct 2022 06:59:43 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 17 Oct 2022 06:59:43 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hUk0D3ldqeYj463x+nxOEGFu8p4vY3PlooHv0xwPEvgE1EfDrfooa2pAcbsNZ54fqIdSrAuHgsxZwBYsX77OGa+AwcpuAdD7YJUzPQ0ZIbUKYOUmqeBHT+g/+lTz2FlSHwEEMpo/AclqK/Vrdifwsmg06ori0i88loqsOjB52F/JPxYj6rAI/NdMCxvrZFOBW0Wy6zrnpsP7DKNO6gmC7ChkGCQZ0BEE6Q+qdHRrKgQUaxQv/HFszQF2S3jWAm96A4ADZLDe0LIc32jelSSkUwyMIZNi9PIRoyzjAXyjxQPFzE4yCQb4yUUIC1CoYBkVr0AL2EWNDZooKUrDsI770g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=m2ii1GAP2aq6q8zOxnEedUWPKCpG9zVyCLOY5FFJjl4=; b=KU1YWeFkYTomhqbgLThAUYcOPfGdMqoCkfwXogO9Z4F/2Xz0D0TmJmWlNzUr76OsQOEDj4DAn8ehNguc1Sz0dDvBpSFCiWH3KPuMzwfx//sn6tHKJGlntr5NSRQ2gmv4ptXPAqMPi0cFESLQu+8QvpxL4R5Vkh0apB5dEL0woxOmeWmFfZagrroowEOhEQbUg1NjxzFTXFGGmS1ZWodDrQLAviny5Eg3Xybh+p575MncNq3My+ugAr6NE/NiPniVWgrT63x35QX8M8dc9/u+FnMJeA1a9e1/WB+awtnFZpMWMeBt/vuG2bUu5RQf7n0ZjJlvOxX4X2pWIttPIR2Nzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m2ii1GAP2aq6q8zOxnEedUWPKCpG9zVyCLOY5FFJjl4=; b=K9lnDMWKUawzYV3gSUn/3NkLOkP4XmiHJwkAIPDS65R/zLnTG0n6AcPkW2nVPsuOLtNEQ4thKCiPS/OjJFkYvqUPjmOVmv0f+y/MMR1kjU8jc2k/9/8W+9xg/zy9hlV6y9buFvR6LdCiUySbmUDrporGVog8qRj0rX5LTy7M1yQ=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by BN9PR11MB5241.namprd11.prod.outlook.com (2603:10b6:408:132::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5723.32; Mon, 17 Oct 2022 11:59:41 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::dccd:b45d:104b:851c%5]) with mapi id 15.20.5723.033; Mon, 17 Oct 2022 11:59:41 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-opsawg-service-assurance-architecture.all@ietf.org" <draft-ietf-opsawg-service-assurance-architecture.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: AD Review of draft-ietf-opsawg-service-assurance-architecture-09
Thread-Index: AdjiHyqh8m2sHTffRpWHVoPYBpGHvQ==
Date: Mon, 17 Oct 2022 11:59:40 +0000
Message-ID: <BY5PR11MB419690A9A776317FE36E3262B5299@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|BN9PR11MB5241:EE_
x-ms-office365-filtering-correlation-id: eba11efa-1676-42b8-42c4-08dab03712b2
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(396003)(346002)(366004)(376002)(39860400002)(136003)(451199015)(26005)(9686003)(7696005)(6506007)(33656002)(186003)(316002)(6916009)(450100002)(66476007)(64756008)(66446008)(66556008)(76116006)(66946007)(478600001)(71200400001)(83380400001)(38070700005)(55016003)(2906002)(66899015)(8676002)(86362001)(8936002)(122000001)(38100700002)(52536014)(41300700001)(30864003)(5660300002)(4326008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 0Q1EwWgDO0pNhulCsp6S+xfC2DbuOzlDYPtHgwx1u0B2Z1ZzI6SstQY3W+TePUtNiBmOOuU+RkgVKHlX3Mlvl0Y0i1LFB9BE9zbrOaZqucZpahqXWaNejrO8SkMRlDocqzwziagU7bxTCGdUSeWK8iIAN4yy7bagmRMWBXeQMX8gy7B3VwZGCB3hoNZ9W8QhvIypLaRE6dCrXa6CJet9NQPEid83saqYB9bwiVdyUXkK5bsIXBR8W0K1EbJhPmWl1io2MJN21bJ/OqD3gCVtCmPh3WKt6thlcspTwPAswYq7PzWneEbhr0QPxnlfAooOgZmFPVj04Ao6IRyR3EuO3XJkE938ZSEr+45or8C6C4pbkL3++77y+ypCgNqrZdo2WbyOSykctSxC6+WB7lrrlCBZI6why4+kNxc/p8Ax0SqDHMfpXJ1gOLt9WPO4t7UUokfD7DyaRemSsdbJ9SNKSY4uZqXshg3xMu4jtGk1mEnkSiuOhc/i9kaKUR0CaTVMZRPNt46RytJy21uSkiGQZUpBFDgnf8uryDrHm025HFdeqwlmQZuCkZGtx80i2Qr2UejH/5Gg8pI1Y3D/na5cYWhkdsRTRcV9zYXS0CVu7f91EQTheD0umHvQ+p4XgzfIqSefG2ZYTjvoUSLfNG/fZ9PV6E9Fas+CgKCpTzSJIwyRuuMo+SymPSSQMc+6Mr6RcJJ2l2ICnfqP+7z7oNLxhPGkoBTjzvnFMaMzgq27ew9J3KG0EKLWhjLNdyDB7+bWbhV44z2xOx+c30KuxV/Vc/blOnXVWuAfaEeQJdp2MySo8Q7wCWXv6sVQReG8M6GZr2NLJ9jWnTqp1FBXRenCKvT3goLN1lYloAkii6tfWw1JWv/Dyr1DIdzgT87Ihc+hWh3byfAb2J/F7N+xW/Gj7XBh3dv8EIVoY+wfrpKAk4ZyQgRDsl56DhDxypmNELjubHK2WNP4vQrVIjjbHxTxPAYRaYAl+O0IQl09uudtpvMQn0Jn4JfuXBTN6cB94cATSOcAVIWNmNEBjeRsFTtizqGl/88uCXT/FRpgCxOoKQnWTfNimYYPosv6G+Cu/YpONkzQSjqajiUQt+w3/9iW8kbTpHLzx0+UQ028601J8AmQrE0smgZhP3NbFo6Fe5dVAiQXXmnPVwQdwcbRoOJ06Ukne7JXpNhWtDXKRVmqj08QqlM4/o6AoJbwYhek30Ae1w2hw0xJ3F6dZHkFpLxqiZiQRJJwHybtxobhUoAuypRNIklEGNnz96VXFp8HX4m8iwGGNe7BLo9iFAxl8e5NOK4goB2kIBvSzUv8xtmKKYIO5iwGpQfzgGBrlQBTolrGi6X92QXPl07SIeQ3TtuwdgQEhzAoOKu0VxE/CsNV+bVrIedRE8HDWotAAVj7Du9MT2jW/brD03h/AUDbwTdHOMBOAhbhuCm29Dxp+EeUTtkCsMw9NDUwPfJeyv9D7bqsqtIMgC2/4xZfGqsTqh/7qsgraP2sgDic/7gGm88m1tQjupS0hi6Z6fe/xZoPdO6uo1MLUVV2Mp7IvNucPSQUHyBgugEmOjLovR2M++X1vQE=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eba11efa-1676-42b8-42c4-08dab03712b2
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Oct 2022 11:59:40.9240 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XYVXfIpVeHY3tB02HLCXZK4iKH8eeFhpNfa5P9OfiH1sQNYT+YynUzuh95FZyBEYL5amPgT8qswAbOVcU0ID7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR11MB5241
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.124, xfe-aln-004.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/SyZIcr6Ecyxoulqu7U8liSgTNYs>
Subject: [OPSAWG] AD Review of draft-ietf-opsawg-service-assurance-architecture-09
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2022 11:59:51 -0000
Hi authors, Here is my AD review of draft-ietf-opsawg-service-assurance-architecture-09. I would like to thank you and the WG for this document. I believe that this architecture document, and the corresponding YANG document, offer a good flexible basis to help with the full lifecycle monitoring of deployed services. Here are my comments which may help improve the document. Minor level comments: (1) p 3, sec 1. Introduction The assurance graph of a service is decomposed into components, which are then assured independently. The root of the assurance graph represents the service to assure, and its children represent components identified as its direct dependencies; each component can have dependencies as well. Components involved in the assurance graph of a service are called subservices. The SAIN orchestrator updates automatically the assurance graph when services are modified. I was wondering if you meant services or subservices in the last sentence? (2) p 3, sec 1. Introduction When a service is degraded, the SAIN architecture will highlight where in the assurance service graph to look, as opposed to going hop by hop to troubleshoot the issue. More precisely, the SAIN architecture will associate to each service a list of symptoms originating from specific subservices, corresponding to components of the network. These components are good candidates for explaining the source of a service degradation. Not only can this architecture help to correlate service degradation with network root cause/symptoms, but it can deduce from the assurance graph the number and type of services impacted by a component degradation/failure. This added value informs the operational team where to focus its attention for maximum return. Indeed, the operational team should focus his priority on the degrading/failing components impacting the highest number customers, especially the ones with the SLA contracts involving penalties in case of failure. Rather than "should focus", perhaps "may focus" or "are likely to focus". Also, his => their, number customers -> number of customers (3) p 4, sec 2. Terminology SAIN agent: A functional component that communicates with a device, a set of devices, or another agent to build an expression graph from a received assurance graph and perform the corresponding computation of the health status and symptoms. Perhaps consider whether stating that the SAIN agent could run directly on the device? Although I noted that this is described later in the document anyway. (4) p 5, sec 2. Terminology Metric: An information retrieved from the network running the assured service. Suggest An item of information retrieved, or a piece of data retrieved. (5) p 5, sec 2. Terminology Health score: Integer ranging from 0 to 100 indicating the health of a subservice. A score of 0 means that the subservice is broken, a score of 100 means that the subservice in question is operating as expected. I noted that neither the architecture nor the YANG talk about mapping discrete properties (e.g., interface up/down). I would intuitively think that these would map to a value of 100 and 0 respectively. Would it be helpful to add any text to describe how binary properties are handled? (6) p 6, sec 3. A Functional Architecture The goal of SAIN is to assure that service instances are operating as expected (i.e. the observed service is matching the expected service) and if not, to pinpoint what is wrong. More precisely, SAIN computes a score for each service instance and outputs symptoms explaining that score. Symptoms explain the score. The only valid situation where no symptoms are returned is when the score is maximal, indicating that no issues where detected for that service. The score augmented with the symptoms is called the health status. Symptoms explain the score seems to be a duplicate and can be removed. (7) p 6, sec 3. A Functional Architecture The SAIN architecture is a generic architecture, applicable to multiple environments (e.g. wireline, wireless), but also different domains (e.g. 5G network function virtualization (NFV) domain with a virtual infrastructure manager (VIM)), etc. And as already noted, for physical or virtual devices, as well as virtual functions. Thanks to the distributed graph design principle, graphs from different environments/orchestrator can be combined together. perhaps: combined together -> combined together for a given service. (8) p 7, sec 3. A Functional Architecture +-----------------+ | Service | | Orchestrator |<--------------------+ | | | +-----------------+ | | ^ | | | Network | | | Service | Feedback | | Instance | Loop | | Configuration | | | | | V | | +-----------------+ +-------------------+ | | SAIN | | SAIN | | | Orchestrator | | Collector | | +-----------------+ +-------------------+ | | ^ | Y| Configuration | Health Status | | (assurance graph) Y| (Score + Symptoms) | V | Streamed | +-------------------+ | via Telemetry | |+-------------------+ | | ||+-------------------+ | | +|| SAIN |---------+ | +| agent | | +-------------------+ | ^ ^ ^ | | | | | | | | Metric Collection V V V V +-------------------------------------------------------------+ | Network System | | | +-------------------------------------------------------------+ I was slightly surprised that there no line/arrow flowing from the SAIN Collector to the SAIN Orchestrator. Is it ever possible that the assurance graph could change dynamically, e.g., on the basis of moving to a backup path for a tunnel, could that then mean that different subservices are added into the assurance graph? Or would the expectation always be that these are known and setup statically. (9) p 8, sec 3.1. Inferring a Service Instance Configuration into an Assurance Graph * Subservices that are common to several service instances are reused for reducing the amount of computation needed. Is a subservice allowed to be decomposed into further subservices? (10) p 15, sec 3.2. Intent and Assurance Graph * Capturing the intent would start by detecting that the service instance is actually a tunnel between the two devices, and stating that this tunnel must be functional. This solution is minimally invasive as it does not require to modify nor know the service model. If the service model or network model is known by the SAIN orchestrator, it can be used to further capture the intent and include more information such as SLO. For instance, the latency and bandwidth requirements for the tunnel, if present in the service model SLO. What does this expand to? (11) p 16, sec 3.4. Building the Expression Graph from the Assurance Graph Impacting Dependency: Type of dependency whose score impacts the score of its parent subservice or service instance(s) in the assurance graph. The symptoms are taken into account in the parent service instance or subservice instance(s), as the impacting reasons. If a VPN service had a proscribed primary and backup path, and a node failed on the primary path then would you expect that to cause the health score for the service to decrease (even if there is no client visible impact)? (12) p 19, sec 3.7. Flexible Functional Architecture The SAIN architecture is flexible in terms of components. While the SAIN architecture in Figure 1 makes a distinction between two components, the SAIN configuration orchestrator and the SAIN orchestrator, Should this be SAIN orchestrator and the SAIN collector? Nit level comments: (13) p 1, sec 1. Introduction Service orchestrators use Network service YANG modules that will infer network-wide configuration and, therefore the invocation of the appropriate device modules (Section 3 of [RFC8969]). Knowing that a configuration is applied doesn't imply that the service is up and running as expected. For instance, the service might be degraded because of a failure in the network, the experience quality is distorted, or a service function may be reachable at the IP level but Suggest "the service quality may be degraded" instead of "the experience quality is distorted". (14) p 2, sec 1. Introduction Service orchestrators use Network service YANG modules that will infer network-wide configuration and, therefore the invocation of the appropriate device modules (Section 3 of [RFC8969]). Knowing that a configuration is applied doesn't imply that the service is up and running as expected. For instance, the service might be degraded because of a failure in the network, the experience quality is distorted, or a service function may be reachable at the IP level but does not provide its intended function. Thus, the network operator must monitor the service operational data at the same time as the configuration (Section 3.3 of [RFC8969]). To feed that task, the industry has been standardizing on telemetry to push network element performance information. Suggest: service operational data -> service's operational data. (15) p 2, sec 1. Introduction A network administrator needs to monitor their network and services as a whole, independently of the management protocols. With different protocols come different data models, and different ways to model the same type of information. When network administrators deal with multiple management protocols, the network management entities have to perform the difficult and time-consuming job of mapping data models: e.g. the model used for configuration with the model used for monitoring when separate models or protocols are used. This problem is compounded by a large, disparate set of data sources (MIB modules, YANG models [RFC7950], IPFIX information elements [RFC7011], syslog plain text [RFC5424], TACACS+ [RFC8907], RADIUS [RFC2865], etc.). In order to avoid this data model mapping, the industry converged on model-driven telemetry to stream the service operational data, reusing the YANG models used for configuration. Model-driven telemetry greatly facilitates the notion of closed-loop automation whereby events/status from the network drive remediation changes back into the network. e.g. => e.g.., I also suggest: "whereby events/status from the" -> "whereby events and updated operational state streamed from the" (16) p 6, sec 3. A Functional Architecture The goal of SAIN is to assure that service instances are operating as expected (i.e. the observed service is matching the expected service) and if not, to pinpoint what is wrong. More precisely, SAIN computes a score for each service instance and outputs symptoms explaining that score. Symptoms explain the score. The only valid situation where no symptoms are returned is when the score is maximal, indicating that no issues where detected for that service. The score augmented with the symptoms is called the health status. Nit, i.e. => i.e., (17) p 8, sec 3.1. Inferring a Service Instance Configuration into an Assurance Graph Possibly "Translating" rather than "Inferring"? (18) p 20, sec 3.7. Flexible Functional Architecture And finally, the SAIN architecture is flexible in terms of what it monitors. Most, if not all examples, in this document refer to physical components but this is not a constrain. Indeed, the assurance of virtual components would follow the same principles and an assurance graph composed of virtualized components (or a mix of virtualized and physical ones) is well possible within this architecture. constrain -> constraint. well possible -> very possible. Nits grammar checks from automated tool, some may not be valid ... Spellings: under-maintenace, Grammar Warnings: Section: 1, draft text: However some already defined services might have been designed using a different approach. Warning: Did you forget a comma after a conjunctive/linking adverb? Suggested change: "However," Section: 2, draft text: SAIN collector: A functional component that fetches or receives the computer-consumable output of the SAIN agent(s) and process it locally (including displaying it in a user friendly form). Warning: This word is normally spelled with hyphen. Suggested change: "user-friendly" Section: 3, draft text: Thanks to the distributed graph design principle, graphs from different environments/orchestrator can be combined together. Warning: 'combined together' is redundant. Use combined Suggested change: "combined" Section: 3.2, draft text: This solution is minimally invasive as it does not require to modify nor know the service model. Warning: Did you mean modifying? Or maybe you should add a pronoun? In active voice, 'require' + 'to' takes an object, usually a pronoun. Suggested change: "modifying" Section: 3.4, draft text: Subservices shall be not be dependent on the protocol used to retrieve the metrics. Warning: Consider using a past participle here: been. Suggested change: "been" Section: 3.4, draft text: In order to keep subservices independent from metric collection method, or, expressed differently, to support multiple combinations of platforms, OSes, and even vendors, the architecture introduces the concept of "metric engine". Warning: The usual collocation for "independent" is "of" not "from". Did you mean independent of? Suggested change: "independent of" Section: 3.7, draft text: Examples includes a DHCP server on a Linux server, a data plane, an IPFIX export, etc. Warning: Possible agreement error. Suggested change: "Example includes" Section: 3.7, draft text: Exactly like a DHCP server/data plane/IPFIX export can be considered as subservices for a device, exactly like a routing instance can be considered as a subservice for a L3VPN, exactly like a tunnel can considered as a subservice for an application in the cloud. Warning: The modal verb 'can' requires the verb's base form. Suggested change: "consider" Section: 3.7, draft text: Most, if not all examples, in this document refer to physical components but this is not a constrain. Warning: The word 'constrain' is a verb. Did you mean the noun constraint? Suggested change: "constraint" Section: 3.8, draft text: Therefore, the SAIN agent contains a YANG object specifying the date and time at which the symptoms history starts for the subservice instances. Warning: Apostrophe might be missing. Suggested change: "symptoms'" Section: 3.9, draft text: Therefore an assurance graph version must be maintained, along with the date and time of its last generation. Warning: Did you forget a comma after a conjunctive/linking adverb? Suggested change: "Therefore," Section: 4, draft text: If a closed loop system relies on this architecture then the well known issue of those system also applies, i.e., a lying device or compromised agent could trigger partial reconfiguration of the service or network. Warning: Did you mean this system or those systems? Suggested change: "this system" Section: 4, draft text: The SAIN architecture neither augments or reduces this risk. Warning: Use nor with neither. Suggested change: "nor" Regards, Rob
- [OPSAWG] AD Review of draft-ietf-opsawg-service-a… Rob Wilton (rwilton)
- Re: [OPSAWG] AD Review of draft-ietf-opsawg-servi… Jean Quilbeuf