Re: [OPSAWG] Last Call: <draft-ietf-opsawg-service-assurance-yang-09.txt> (YANG Modules for Service Assurance) to Proposed Standard

tom petch <daedulus@btconnect.com> Mon, 12 December 2022 12:24 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 670FEC1522BD; Mon, 12 Dec 2022 04:24:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 09rYERMsmNoJ; Mon, 12 Dec 2022 04:24:46 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2099.outbound.protection.outlook.com [40.107.22.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C12A7C1522B3; Mon, 12 Dec 2022 04:24:42 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=X9vtkbbtMPXuy6yvBOBFdEcQzlZR3zQ6NEPUSrtGH/57ZBLoqXx1fX5Nl/Z1wG+QwIXgqb3te8NlciUvEokFAYq0SIotT3JlELtnMResKq+BckuLPgp2HI1Ww0RdtBV2mCzoWM6Weqz99URRwBIiMPuQw299Njd+rmKKdG+fbRiLs/DWNr1IUvStXMZKHRmiXARqUyqyn3GKTYydhvsgJ6Sj6MjdEWchjsWMO9Bx95aMlpispRFGIaQCwpDOoO4pjmRQqRbfgc9ROLYQX7fW7jtGbLTSYYPEQ1Q0+gXdLaC01Ks65Yg18GpPf1IWCttLOpelYzyR1gsgSPBTolE2FA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SPoEgdfZosRMprA959nn/VbO4snNtLkv19+AKsnYgxM=; b=eSurq2nbOMTwiIuBr+3qx1Qe+WskGdP9D5zBZgej01VXeGdMnl/ZFNW2lk3c2lZExud31XBx7oaFG5sSF+yXnyF5kz6Ct2uwoEhLncd7wvM8Xmo+ktOpQkjP5nnu0vzlbSgJtDOCu/b5qLsp1PpURnn4GCxwDlG1EOuqdXA6SeTlu7WvXwxDAGR8TQCA9NY4wN8Di8CM7Dgc0NE3hwm5x8Mx+Qh75/XV/KUQjgBboWO0eTb1+cCWv2KEurvZrwMWBBLhQR5WlfTYfQNuEEPMk5YOdiXOR1Jh98nuqWeCSw51ggY+3ZVlxb2BqaV1LBoAg8iE3Tu+jzwm/kbp0u9ZdQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SPoEgdfZosRMprA959nn/VbO4snNtLkv19+AKsnYgxM=; b=QldSuQokC8DkERREG6bLDomc4NsVVWlxjjSE8noiGQ4XGkQ7++OkL4Ql60YRtJ4tanG9BtjSzHZvkZTTNzaCajg0sz1rGlGZlql8wARmBw7BCQgWUOS4/Cyc9Tgjj/7JZ/6YelZBCGNErfDZhIHJZxv92SoqA3fOUHsmoxx4LgI=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8) by DU0PR07MB8907.eurprd07.prod.outlook.com (2603:10a6:10:323::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.19; Mon, 12 Dec 2022 12:24:39 +0000
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::80b3:2aca:f436:92e4]) by VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::80b3:2aca:f436:92e4%9]) with mapi id 15.20.5880.019; Mon, 12 Dec 2022 12:24:39 +0000
To: Jean Quilbeuf <jean.quilbeuf@huawei.com>, "last-call@ietf.org" <last-call@ietf.org>
References: <166790240143.63276.14419409073399632970@ietfa.amsl.com> <636B972B.4040406@btconnect.com> <68f505b0fbc4475abcae4988cf533934@huawei.com>
Cc: "draft-ietf-opsawg-service-assurance-yang@ietf.org" <draft-ietf-opsawg-service-assurance-yang@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>, "mcr@sandelman.ca" <mcr@sandelman.ca>
From: tom petch <daedulus@btconnect.com>
Message-ID: <63971D5F.8060602@btconnect.com>
Date: Mon, 12 Dec 2022 12:23:59 +0000
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <68f505b0fbc4475abcae4988cf533934@huawei.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: VI1PR07MB6704:EE_|DU0PR07MB8907:EE_
X-MS-Office365-Filtering-Correlation-Id: 0cc9888c-a664-45d8-ce46-08dadc3bd697
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR07MB6704.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(366004)(396003)(346002)(136003)(376002)(39860400002)(451199015)(478600001)(6666004)(966005)(6486002)(186003)(26005)(87266011)(52116002)(6506007)(53546011)(6512007)(316002)(5660300002)(2906002)(33656002)(4001150100001)(54906003)(66946007)(36756003)(4326008)(2616005)(110136005)(8676002)(66476007)(66556008)(8936002)(83380400001)(86362001)(41300700001)(38100700002)(38350700002)(82960400001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0cc9888c-a664-45d8-ce46-08dadc3bd697
X-MS-Exchange-CrossTenant-AuthSource: VI1PR07MB6704.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Dec 2022 12:24:38.9831 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: x6vOZlU004PwnBpCFvFlYsMD1SI6mUHnhd+kkj7WseyY5zOHwAkRV+CMINOJgB9+bIbnUMnsqPHU/pPJpiZMxQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR07MB8907
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/xn3k3tmLTB4HPR7GLKeMRm6TKCE>
Subject: Re: [OPSAWG] Last Call: <draft-ietf-opsawg-service-assurance-yang-09.txt> (YANG Modules for Service Assurance) to Proposed Standard
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Dec 2022 12:24:50 -0000

On 28/11/2022 12:28, Jean Quilbeuf wrote:
> Hi Tom,
> Thanks for your comments, we tried to address them (see below).
>
> The diff of the changes is here:           https://www.ietf.org/rfcdiff?url2=draft-ietf-opsawg-service-assurance-yang-10

I think that this still has some quirks.

In several places an unrestricted string is used as a key which means 
that the key can be 18446744073709551615 characters long.  Perhaps worth 
a mention in e.g. Security Considerations as an attack surface.

the description of container agents has a non-ASCII character in it

identifyin a routing protocol instance with an unrestricted string seems 
onerous

Tom Petch

>
> Best,
> Jean
>
>> -----Original Message-----
>> From: tom petch [mailto:daedulus@btconnect.com]
>> Sent: Wednesday 9 November 2022 12:04
>> To: last-call@ietf.org
>> Cc: draft-ietf-opsawg-service-assurance-yang@ietf.org; opsawg@ietf.org;
>> opsawg-chairs@ietf.org; mcr@sandelman.ca
>> Subject: Re: Last Call: <draft-ietf-opsawg-service-assurance-yang-09.txt>
>> (YANG Modules for Service Assurance) to Proposed Standard
>>
>> On 08/11/2022 10:13, The IESG wrote:
>>>
>>> The IESG has received a request from the Operations and Management
>>> Area Working Group WG (opsawg) to consider the following document: -
>>> 'YANG Modules for Service Assurance'
>>>     <draft-ietf-opsawg-service-assurance-yang-09.txt> as Proposed
>>> Standard
>>>
>>> The IESG plans to make a decision in the next few weeks, and solicits
>>> final comments on this action. Please send substantive comments to the
>>> last-call@ietf.org mailing lists by 2022-11-22. Exceptionally,
>>> comments may be sent to iesg@ietf.org instead. In either case, please
>>> retain the beginning of the Subject line to allow automated sorting.
>>
>> I have never seen a YANG module with so few references and the one and
>> only one there is is missing from the I-D Normative References.
>
> RFC6991 is now a normative reference.
>
>> I think at least there should be a reference to the companion Architecture
>> document and wonder if there is a non-IETF literature around for this topic
>> which could be referenced.
>
> There is a reference to the architecture document in version 09. Do you mean that we should reference it from the YANG model itself?
> For the non-IETF literature, this is covered by the architecture document which refers to https://doi.org/10.1016/B978-0-12-803773-7.00007-3  (I’ll add that URL to the next revision of the -architecture draft as it’s not straightforward to find the DOI link).
>
>> I was going to comment on the lack of explanation of what a type is but see
>> that as a weakness of the architecture and so have commented thereon on
>> that I-D, which could then be a further reference for this I-D.
>
> What we call "subservice type" is what you call "function" in your next comment. I have tried to clarify that in this draft as well.
>
>> My impression from Appendix B is that this could spawn a large number of
>> related YANG modules for different functions  such as 'device'.  A registry of
>> such functions giving a canonical set of names seems a likely need.  This I-D
>> could REQUIRE all such I-D to use a YANG prefix of sain-....
>
> I re-added an old section about Guidelines to add new types of subservices that covers this point.
>
>
>>     identity service-instance-type {
>>         "Identity representing a service instance."; service instance or service
>> instance type?
>
> Changed to:
>     "Specific type of subservice that represents a service
>        instance. Instance of this type will depend on other subservice
>        to build the top of the assurance graph."
>
>
>> XPath within a grouping without a prefix leaves me wondering if that prefix
>> will be needed e.g. by additional type modules.
>
> Indeed, pyang complains when trying to import the grouping. I inlined the symptoms grouping and precised that others groupings where not meant to be imported.
>
>> stop-date-time
>> What if the symptom is ongoing?
>
> Specified:
>           "Date and time at which the symptom stopped being
>                detected. must after the start-date-time. If the symptom
>                is ongoing, this field should not be populated." ;
>
>
>> 'must (be) after' could be a YANG constraint.
>
> Tried to do that but XPATH1.0 does not have date manipulation function. Maybe I missed something?
>
>>         leaf id {
>>           type string;
>>           description
>>             "Identifier of the subservice instance. Must be unique...
>> YANG string can be very, very long and can contain all sorts of characters.
>> This is a recurrent problem with YANG (which did not adopt the SMI
>> approach) and came up -again - on the Netmod list in October but without a
>> clear resolution IMHO, just that the current situation is ....
>> well, unsatisfactory.
>
> Agreed, however, I don’t see which restrictions we can safely take without being in the way of implementors.  Any leads?
>
>    typedef yang-identifier {
>           type string {
>             length "1..max";
>             pattern '[a-zA-Z_][a-zA-Z0-9\-_.]*';
>             pattern '.|..|[^xX].*|.[^mM].*|..[^lL].*';
>           }
>
>>         leaf label {
>>           type string;
>>           config false;
>>           description
>>             "Label of the subservice, i.e., text describing what the
>>              subservice is to be displayed on a human interface.
>> Again, without constraint this could be a nonsense.  At least one AD is keen
>> on the I18N implications of display strings (which was an issue with I2NSF I-
>> D).
>
> We put the following to avoid the language tag issues:
>          "  It is not intended for random end users but for
>             network/system/software engineers that are able to interpret
>             it. Therefore, no mechanism for language tagging is needed.";"
>
> In general, do you have an suggestions on how to solve the unrestricted string issue?
>
>>
>>           leaf contact {
>>             type string;
>> Here there is some guidance but only as to the semantics - I suspect guidance
>> on the length and character set e.g. would be useful.
>>
>
> Unrestricted string
>
>>             leaf service {
>>               type string;
>> ...
>>             }
>>             leaf instance-name {
>>               type string;
>> Again unqualified string
>
> Unrestricted string
>
>>
>>         leaf service {
>>           type leafref {
>>             path "/subservices/subservice/service-instance-parameter/"
>>                + "service";
>>           }
>>           description
>>             "Name of the service type.";
>> The more I read the more confused I become.  'service' has just been
>> defined as the name of the service; how can it be 'service type' here?
>> As I have said, the use of 'type' in general needs more attention.
>
> Updated the descriptions of this part of the YANG module to remove "type".
>
>>         list instances {
>>           key "name";
>>           description
>>             "Instances of the parent service type. The list must contain
>>              an entry for every instance of the parent service.";
>>           leaf name {
>>             type leafref {
>>               path
>>                 "/subservices/subservice/service-instance-parameter/"
>>               + "instance-name";
>> Another string as a key; vide supra.
>
>
>>              identifier (device id, hostname, management IP) depends
>> Is that an e.g. or an i.e.?
>
> Added an e.g.
>
>>
>> s.5.3
>>            leaf interface {
>>              type string;
>>              mandatory true;
>>              description
>>                "Name of the interface.";
>> As above, unconstricted string.  This could be a leafref in order to
>> reference the YANG interface module; most RFC do just that.
>
> I would love to have a leafref, however don’t forget that the NETCONF server being configured runs on the SAIN agent, which might not be the device. Also not all devices support ietf-interfaces (assuming that’s the one you refer to). So which YANG model do we do the leafref to?
>
> Let’s assume we add the leafref to ietf-interfaces (interfaces/interface/name), then when adding an interface subservice into the SAIN agent, we must refer to an interface that exists in the agent configuration.
>
> I see two possible implementations here:
> 1 - ietf-interfaces is not bound to anything on the agent side, just open for configuration. In that case, adding an interface subservice will only be accepted if an interface of that name is defined on the agent. Since ietf-interfaces does not put any restriction on the name (type: string), we can add any name we want, so equivalent to what we have currently, just more annoying to configure.
> 2 - ietf-interfaces is mirroring what we have on the devices monitored by the agent. That means mapping whatever YANG model/SNMP MIB/show command the devices supports to ietf-interfaces.
> Problem 1: an agent can monitor several devices so we need to augment/mount the ietf-interfaces to specify to which device the interface belongs.
> Problem 2: we introduce a mandatory mapping to ietf-interfaces, which requires some implementation effort, especially if the assurance frameworks relies internally on another model
>
> Referencing leaves that are not in the YANG context (i.e. imported modules) is a well-known YANG problem.
>
>> Tom Petch
>>
>>> Abstract
>>>
>>>
>>>      This document specifies YANG modules for representing assurance
>>>      graphs.  These graphs represent the assurance of a given service by
>>>      decomposing it into atomic assurance elements called subservices.  A
>>>      companion document, Service Assurance for Intent-based Networking
>>>      Architecture, presents an architecture for implementing the assurance
>>>      of such services.
>>>
>>>      The YANG data models in this document conforms to the Network
>>>      Management Datastore Architecture (NMDA) defined in RFC 8342.
>>>
>>>
>>>
>>>
>>> The file can be obtained via
>>> https://datatracker.ietf.org/doc/draft-ietf-opsawg-service-assurance-
>> yang/
>>>
>>>
>>> The following IPR Declarations may be related to this I-D:
>>>
>>>      https://datatracker.ietf.org/ipr/3859/
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> IETF-Announce mailing list
>>> IETF-Announce@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ietf-announce
>>> .
>>>