Re: [Rift] RIFT

Antoni Przygienda <prz@juniper.net> Sat, 20 April 2019 16:58 UTC

Return-Path: <prz@juniper.net>
X-Original-To: rift@ietfa.amsl.com
Delivered-To: rift@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79D8512014C for <rift@ietfa.amsl.com>; Sat, 20 Apr 2019 09:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.338
X-Spam-Level:
X-Spam-Status: No, score=-1.338 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, KHOP_DYNAMIC=1.363, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Idk7nWEEqszO for <rift@ietfa.amsl.com>; Sat, 20 Apr 2019 09:58:02 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 24FCD12002E for <rift@ietf.org>; Sat, 20 Apr 2019 09:58:01 -0700 (PDT)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3KGsLe4014725; Sat, 20 Apr 2019 09:57:59 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=fNY+zY1B5OiFo82NgTlfxRZdG4VrWlwFE2B2cxqUo3w=; b=O6J0O+4CDnjDMV5QMQb825HOog22WR/kbKpEtm/7B+BDFuMB0yjuUxEpDF0SfITitnub zPeS6GjwlX522a6uEqqS8q76NWjHKLM5ELQg3r/XQuMOcVZ3Cm2KqNinbqJ3OIe5h3CR rKyHOY52/YSWRsz7qDb+Rzwc0jRmhtR9W7K7+0uY9zkPRTfT2tNl3kPQm37jAHsP25/M /kb61K7OWLZKfPfbSlo6wQh5cDAZjk9oUcXYjPw3Yqm9i9zzA1uXL8BY+Eih+i0KOiGL tz997PdiM+Th1lL+wV1My3dY12d5WBe2lvKDhBYyR1QDmwk3HahhCFKoqdPywrt4Sr3s RQ==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp2056.outbound.protection.outlook.com [104.47.40.56]) by mx0a-00273201.pphosted.com with ESMTP id 2s02em89g3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Sat, 20 Apr 2019 09:57:59 -0700
Received: from MWHPR05MB3279.namprd05.prod.outlook.com (10.173.230.18) by MWHPR05MB3263.namprd05.prod.outlook.com (10.173.230.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1835.6; Sat, 20 Apr 2019 16:57:56 +0000
Received: from MWHPR05MB3279.namprd05.prod.outlook.com ([fe80::c104:c5bd:b877:2202]) by MWHPR05MB3279.namprd05.prod.outlook.com ([fe80::c104:c5bd:b877:2202%10]) with mapi id 15.20.1835.007; Sat, 20 Apr 2019 16:57:56 +0000
From: Antoni Przygienda <prz@juniper.net>
To: Kris Price <kris@krisprice.nz>, Bruno Rijsman <brunorijsman@gmail.com>
CC: "rift@ietf.org" <rift@ietf.org>
Thread-Topic: RIFT
Thread-Index: AQHU8VRUPBOno7miBkKQqRko+b0GOKY4xxUkgAludgCAAAZsrYAAJfoAgAAiaQCAAsHNgIAACazQ
Date: Sat, 20 Apr 2019 16:57:56 +0000
Message-ID: <MWHPR05MB3279BEF36FCF955D93B90100AC200@MWHPR05MB3279.namprd05.prod.outlook.com>
References: <CACqcHa05D9mCNWPtkHMw4t-0opbz33PsnB9Ts=wadfM1UD4cNA@mail.gmail.com> <MWHPR05MB32798B45DD99D8ABF75B875AAC280@MWHPR05MB3279.namprd05.prod.outlook.com> <CACqcHa3TnRS76Rnr5Wkq4_L47i5ZQLQiZFy5aNt3zmTr487LrA@mail.gmail.com> <MWHPR05MB32798005D0A97DCC996CCB11AC260@MWHPR05MB3279.namprd05.prod.outlook.com> <CACqcHa1=iLcakOE-O1cWWHH+7qu0hvoaT5hq_5FfjcqNsi3MUw@mail.gmail.com> <8B6D2FC6-15D3-4133-AAB4-160E1D82A827@gmail.com>, <CACqcHa0-s6sP6YG7MVASByna_aqQ1SrsCnf00eJH-Q_z7U_LUw@mail.gmail.com>
In-Reply-To: <CACqcHa0-s6sP6YG7MVASByna_aqQ1SrsCnf00eJH-Q_z7U_LUw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [108.228.12.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d25b83f5-2ca5-4321-b681-08d6c5b1565d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(4618075)(2017052603328)(7193020); SRVR:MWHPR05MB3263;
x-ms-traffictypediagnostic: MWHPR05MB3263:
x-microsoft-antispam-prvs: <MWHPR05MB3263F86FF903E967601891C6AC200@MWHPR05MB3263.namprd05.prod.outlook.com>
x-forefront-prvs: 0013079544
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(396003)(346002)(366004)(136003)(39860400002)(189003)(199004)(26005)(6246003)(5660300002)(14454004)(93886005)(53546011)(71200400001)(3480700005)(33656002)(71190400001)(7116003)(4326008)(99286004)(6436002)(186003)(53936002)(86362001)(102836004)(66066001)(81156014)(7696005)(221733001)(74316002)(110136005)(8676002)(105004)(76176011)(76116006)(68736007)(256004)(64756008)(66446008)(9686003)(66556008)(66476007)(73956011)(66946007)(14444005)(2906002)(476003)(486006)(11346002)(446003)(316002)(19627405001)(7736002)(54896002)(6116002)(8936002)(3846002)(478600001)(25786009)(229853002)(55016002)(97736004)(66574012)(52536014)(6506007)(81166006); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR05MB3263; H:MWHPR05MB3279.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: aHNJx09ftExHiBeL19AEoXiB0zxO1z2qrcpV8AzEkCE0KAQfwCS6IwF20GeVKAq2dOUkwwam7I49jGn3FRCHOgwy/SjhquX6fdP9iwoUluKR8FmR2j2M7fTr+JX5DLxBnR5pd/GfPNJQwZ9t4/tk99wv5OWhoP3rerPpbuGwYuS97IbUdVtdGuJCUXb8zWdpCi3fDP0IksevM13P3v0G1UJ39B8iXmKok2yeZY//at6OuMKBer4ALgweDFfq7O0OEaUoHHx5/+uzs1Wrs+JWFohQbXLkJZ4FLgr+i+QIRfJl9gC5KqkKjDePE7sXprfHhqPzmfUXWoo5V/LjZHiinesnJB+DPpKqKjweEbXnxGkpeDYnBNoKENkjqmwG8wx6+e3m6qKQnEaIbeZgH+kgYiNRBX5en8HhQxvSCkI+L18=
Content-Type: multipart/alternative; boundary="_000_MWHPR05MB3279BEF36FCF955D93B90100AC200MWHPR05MB3279namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: d25b83f5-2ca5-4321-b681-08d6c5b1565d
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Apr 2019 16:57:56.6117 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR05MB3263
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-04-20_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904200128
Archived-At: <https://mailarchive.ietf.org/arch/msg/rift/GLmy84rFtgSdw3DkBlLbwjEnFqk>
Subject: Re: [Rift] RIFT
X-BeenThere: rift@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of Routing in Fat Trees <rift.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rift>, <mailto:rift-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rift/>
List-Post: <mailto:rift@ietf.org>
List-Help: <mailto:rift-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rift>, <mailto:rift-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Apr 2019 16:58:06 -0000

Kris, negative disaggreagtion is used if and only if

a) fabric has mutliple planes
b) a node gets completely separated in terms of cross-sectional bandwidth from a plane, call that "fallen leafs"

Negative disaggregation is transitive only to the level where the breakage is healed

Sections 5.2.5.2, 6.5 explains that all in nice details and specs out the mechanisms necessary. All in protocol since a bit now ...

thanks

--- tony
________________________________
From: Kris Price <kris@krisprice.nz>
Sent: Saturday, April 20, 2019 9:16 AM
To: Bruno Rijsman
Cc: Antoni Przygienda; rift@ietf.org
Subject: Re: RIFT

Hi Bruno,

Not sure if I followed negative disaggregation correctly. Is this used
at levels below the top of fabric or was it something that was
discussed as a possibility?

Cheers
Kris

On Thu, Apr 18, 2019 at 6:10 PM Bruno Rijsman <brunorijsman@gmail.com> wrote:
>
> Kris,
>
> What is your opinion is on negative aggregation as a solution for the transient incast-like congestion after a failure with positive disaggregation?
>
> — Bruno
>
> > On Apr 18, 2019, at 5:07 PM, Kris Price <kris@krisprice.nz> wrote:
> >
> > Hey Tony, inline:
> >
> > [snip]
> >> On the rings: Ahh! I get it, okay that makes it better. I was also
> >> wondering if some kind of designated 'S-TIE' reflector / virtual links
> >> / or explicitly configured multi-hop adjacencies solution could be
> >> used (the issue being one of how do you route these packets between
> >> the peers without needing to do something like source route multiple
> >> hops southbound before being default routed northbound).
> >>
> >> good, I know it takes bit to grok the stuff. We did the best we could with ASCII and language but the concepts need some chewing for sure, even if you have been around big fabrics for a bit ;-) So, nothing like route reflectors and so on, within a plane normal south reflection takes care of sync'ing up all you need, outside the plane the ring takes care of sync'ing up planes (for flooding horizontal links below ToF are south and @ ToF level north basically and with that you have all the topology to figure out negative disaggregation.  I explicitly killed any "virtual link" suggestions, I went through this particular hell in my life more than once and don't want to visit it anymore ;-) ...
> >
> > [KP]: I'm a bit skeptical of buy in to rings as a solution, but if you
> > have customer's buying into that then that's cool. (I omitted
> > describing the physical *shudder* when I wrote "virtual links" ;-))
> >
> > [snip]
> >> It seems this would arise frequently at the bottom two tiers of the
> >> network. Any loss of any single link to any rack (tier 0) would result
> >> in all other nodes at tier 1 disaggregating the prefix(es) for that
> >> rack and causing the potential transient incast-like congestion. I'm a
> >> bit concerned that this may be a noticeable event in some cases (e.g.
> >> a storage row/cluster or maybe where RoCE is in use), and one that
> >> would be fairly annoying to debug and remedy post transition to RIFT
> >> if you didn't foresee it and have the tools (knobs) in place to
> >> prevent it from happening without a PR and s/w upgrade.
> >>
> >> yepp, you call the spade but you're a bit too pesimistic me thinks. Let's assume 2 ToRs dual-homing a rack or couple racks of servers. if you loose a link in a multi-homed server you basically end up having the other ToR de-aggregating just this server prefix to other servers (even if you run some kubernetes @ scale you may have 100 prefixes or so I'd say, I can't imagine a server hosting thousands really) ... Then, if you think about the ToRs on top of PoD then it's not as bad as you think. If you loose a single ToR in a PoD towards a spine (I'm loose with terminology here) then you will NOT see disaggregation as long the other ToRs in the PoD are still connected to the PoD. Draw pictures & run the public consumption package ;-)  More interesting discussions are bandwdith balancing on link losses (which I think we solved well northbound) and whether it even should be done southbound since notion of "available bandwidth southbound" is confounding ... Spec doesn't forbid it (the beauty of loop-free valley-free routing that gives you insane amount of lee-way how you choose to forward) BTW if somone is smart enough to figure that out ;-) ...
> >
> > [KP]: You're not the first to describe me as a pessimist. :-) I don't
> > follow the 2x ToRs and multi-homed servers part, I haven't seen that
> > used in a very long time, and granted I've been out of the game for a
> > bit but is anyone still multihoming servers at scale? Maybe certain
> > enterprise use cases, but they're not pushing the boundaries of scale
> > so don't need the aggregation anyway.
> >
> > [KP]: A top of rack switch ("tier-1" lets say) may be connected to 8
> > or 16 switches (or more) northbound (naturally let's call that next
> > tier "tier-2"). If any single link between a tier-1 and tier-2 switch
> > goes down (let's say between tier-1-1 and tier-2-1), all other nodes
> > in tier-2 (that is tier-2-2, tier-2-3, to tier-2-n) will determine
> > that tier-2-1 no longer has southbound reachability for tier-1-1's
> > prefixes and that they each need to disagregate these to prevent
> > tier-1-2..n from sending any traffic for tier-1-1 via tier-2-1 (which
> > would then need to forward up to tier-3 and back down).
> >
> > [KP]: With positive disagregation we can introduce transient
> > congestion if there's a lot of traffic from tier-1-2..n to tier-1-1
> > because a switch may get the prefix from one upstream node first and
> > install that before getting it from the remaining upstream nodes. (So
> > we could for a brief instant go from 8 paths ECMP to 1 path then back
> > up to 7 paths.) On the other hand if all prefixes are disaggregated,
> > and when the link between tier-1-1 and tier-2-1 fails, tier-2-1 is now
> > only announcing a withdraw for the affected prefixes to tier-1-2..n,
> > we can avoid generating this temporary incast-like scenario by design.
> >
> > [KP]: It's a preference for more deterministic behavior of the fabric
> > over less deterministic behavior.
> >
> >> Should
> >> implementations have a conscious solution in advance for this, and
> >> what's the best way to ensure that? The 'always-disaggregate' knob is
> >> one. Another might be something like a 'min-next-hops' option where
> >> the local RIFT instance on tier 0 won't install a prefix unless it has
> >> received it from a minimum number of up streams
> >>
> >> The always disaggregate knob is something you can do per level if you desire but it's basically a big hammer buying you much bigger blast radius in normal operation. And if you pull RIFT onto servers in multi-plane fabrics your FIB may blow up if you do that (unless we think server adapters with 2M FIB size, probably ain't gonna happen ;-).
> >
> > [KP]: Blast radius doesn't seem bigger to me. FIB explosion is a
> > design consideration for anyone before thinking about routes from
> > servers. At a small number selectively it's fine and practiced, e.g.
> > advertising prefixes from servers that are doing software load
> > balancing.
> >
> > [KP]: But advertising them say for every VM so you can move VMs
> > anywhere... that's still going to have impacts on your network design.
> > With FIB sizes as they are these days most people below the top 5 (or
> > so) are going to be fine. And anyone in the top 5 (or so) are still
> > going to be running into trouble. And if you do something like use the
> > same switch for top of rack layer as at further layers in the Clos,
> > then this RIFT scaling feature doesn't apply to you anyway as you have
> > the same FIB size at all tiers.
> >
> > [KP]: In any case disaggregation at the bottom two tiers where this is
> > much more likely to be a problem, still permits aggregation higher.
> >
> >> The other idea I don't grok, you have to explain in more detail.
> >
> > [KP]: As an alternative to disaggregation and announcing a withdraw
> > when the link between tier-1-1 and tier-2-1 goes down. It could be
> > that we have all the RIFT instances on tier-1 configured to know that
> > they should not install a prefix *unless* they have seen it advertised
> > from some minimum number of tier-2 nodes. E.g. if there are 8 tier-2
> > nodes, we might set that to say 4. Now we somewhat avoid the incast
> > scenario where the switch installs the disaggregated prefix with one
> > next hop into it's FIB. Instead it'll wait until it has a minimum of
> > four next-hops. (This is spit balling, it may open other problems.)
> >
> > Cheers :-)
> > Kris
>