Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

"Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com> Thu, 12 November 2020 23:12 UTC

Return-Path: <andrew.stone@nokia.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD56A3A0EC5 for <spring@ietfa.amsl.com>; Thu, 12 Nov 2020 15:12:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yrt2bpV0TvgO for <spring@ietfa.amsl.com>; Thu, 12 Nov 2020 15:12:11 -0800 (PST)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2110.outbound.protection.outlook.com [40.107.236.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A7593A0EC3 for <spring@ietf.org>; Thu, 12 Nov 2020 15:12:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dvO0DfTLlW2Zsu3DkVOcGzxxQ7o9WXQZisSr9LPIXH5EWEd4LiuAb5ceUk1jn+2eZsOQRijSTPGsD2Pfk9eZrClK057eQw5q3bxc9Kk7Tq/b/sMx2cKcYd81xZagh8V41iDVbZHA7JxGrhFao2oUbQ+kyHmnA8T52RDIM3DQNdM8xDv2O6X0vRdXDuSKTpjGKLSq5DKKDj9mckqWSdtIJG1YJ7a7uZykySD9OobNkaWIoBg4VAxN6UN3McF4JBYEWLV9bBKkHuMHETpAeHrsY00UplFb4d5q7xPT33p5nODQEjxTOK/4QCRIQXO1Dypd9hF1ArbNZ9Wdpls9oxZylA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2bNRsl2uvjxNMxuuIrbfckcHjF5Lnqe8PbspjimKA3E=; b=WYLlKAUiftptJCXzfjNU19XlHMWbBDASVKufdqyRicaRHEjWWpff/JnqlcCzl/1gg85e79NZj+1lSrhXiwmhkDQA3yAfSAnz0h9ritLisiFoW42KuNhdFgoqcgAF+fqWjm9H++8MLadx5voE9YmAe/6IffYl66lBvihNxRm9W676Et/YD/941gbPGEB3chqc9aYnINdlvmSM2A7qcVaKrHVZnes+qlE47+jLdQviLQUU1GhSqHxJeMplDsJ6tIFn85ka+M1m/36Whe66H0MInbl+f0oHxeYI7PF42E//sg6IVfX+mCVDu6lp12oadE0uEPDM3W5vH4XHFFnEmI4NeQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2bNRsl2uvjxNMxuuIrbfckcHjF5Lnqe8PbspjimKA3E=; b=tS+8s0V2/tLiz4J7IYlYJ8EhDMvCoXj1FLyUmT88I9UHVGGPOgdZ7XRL2HGTeeNYPNpn+yLv/Vm43spPI6Sx13aQGjw8frC6e5iwPDAQa4KiTgej/43jSQtO7RkcNQgyf5FOlTrCaxuzx643/2H/cHEs1ta33n11AvpR/lS5GX0=
Received: from DM6PR08MB4393.namprd08.prod.outlook.com (2603:10b6:5:a2::21) by DM6PR08MB6170.namprd08.prod.outlook.com (2603:10b6:5:159::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.29; Thu, 12 Nov 2020 23:12:07 +0000
Received: from DM6PR08MB4393.namprd08.prod.outlook.com ([fe80::755b:419f:e52f:c424]) by DM6PR08MB4393.namprd08.prod.outlook.com ([fe80::755b:419f:e52f:c424%6]) with mapi id 15.20.3541.025; Thu, 12 Nov 2020 23:12:07 +0000
From: "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>
To: Tarek Saad <tsaad.net@gmail.com>, "Ketan Talaulikar (ketant)" <ketant=40cisco.com@dmarc.ietf.org>, Vishnu Pavan Beeram <vishnupavan@gmail.com>
CC: "spring@ietf.org" <spring@ietf.org>
Thread-Topic: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt
Thread-Index: AQHWsLM70syLdU1bpku3yUTxttqV3Km0BkEAgAwnQoCAAQLIAIAAlKsAgACQY4CAAPaaAIABpNyA///scgA=
Date: Thu, 12 Nov 2020 23:12:07 +0000
Message-ID: <F4D9D63A-3691-42C2-AB69-3FEE278B808E@nokia.com>
References: <160427863467.23607.17022367772306047140@ietfa.amsl.com> <MW3PR11MB4570D65A1973363A1A6EF7AEC1100@MW3PR11MB4570.namprd11.prod.outlook.com> <CA+YzgTuqyGvFzx_SBSxx-4y0e0d8FvMhcPzx9b5tzq3F5ayL0A@mail.gmail.com> <MW3PR11MB4570D601ADC0D8E24B6B2675C1E90@MW3PR11MB4570.namprd11.prod.outlook.com> <CA+YzgTsptfe7j83_A9G5v9PpkH-i5+CzgOKssuD=b6BXPxRqtg@mail.gmail.com> <MW3PR11MB45708212D3D166F34006C0C5C1E80@MW3PR11MB4570.namprd11.prod.outlook.com> <3E1EC667-7B17-45AC-9CDE-F121FB75F14B@nokia.com> <SN6PR1901MB2158E62ACC8F0645A3AE283BFCE70@SN6PR1901MB2158.namprd19.prod.outlook.com>
In-Reply-To: <SN6PR1901MB2158E62ACC8F0645A3AE283BFCE70@SN6PR1901MB2158.namprd19.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.43.20110804
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [135.245.20.11]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: af9d8072-14e3-4021-f41d-08d887606048
x-ms-traffictypediagnostic: DM6PR08MB6170:
x-microsoft-antispam-prvs: <DM6PR08MB61708A5BDF603EAD376646F691E70@DM6PR08MB6170.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: c3+mnaX5R+MHDO39v8QzAc4ogfLKcUXy/vhwS1mwZ/6r9b85ZBjB+V9Rq5e6xd1VK2jqoCu2LxeB0BD2IQZCRBDSFGyKgqiX88eSUucphn070/DSACT6DSeFEyi6FjSX5KBkjiAW29WIRGMZ39cyGStg3GJLiOqelZGBcrB9kmdl6NyH71xoIwSTl08obdF7PQpQnIo8AfErJZWrk9VzGgc0E2oAY9I3n+IgshRrv6GJ3WAzotVbvbySFjZ1/FeV02xpL/HtCpSNdByZN6+sXRNQNuflWS0tladcbZB3M54NqqcRV5SK+tLPtUuDznsdEC9/s84g2zbF29A07HPAcKW3THREiNekdfmA2l9Zw+F1jcNlhaiaokh3PQ229hT2+q/JnpsyhKb6vW7YsURwvg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4393.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(136003)(396003)(366004)(39860400002)(316002)(2906002)(966005)(8676002)(110136005)(16350225007)(478600001)(71200400001)(4326008)(6486002)(36756003)(6506007)(76116006)(8936002)(53546011)(6512007)(9326002)(33656002)(86362001)(30864003)(91956017)(83380400001)(2616005)(66574015)(5660300002)(66446008)(64756008)(66556008)(166002)(186003)(26005)(66476007)(66946007)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_F4D9D63A369142C2AB693FEE278B808Enokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR08MB4393.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: af9d8072-14e3-4021-f41d-08d887606048
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Nov 2020 23:12:07.3909 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EdvKbb1LBBZmrmH0Oc9/u9CThEB7iPGyJLeFd5aQFQ2HZTdlhjRY9seTzQ+UMToOhBDUPgDGQXhA1RilErzcRA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR08MB6170
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/Diw3ojPE-cyU4vJ_hN5pXPQxRQ0>
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2020 23:12:16 -0000

Hi Tarek,

Thanks for the comments. Small reply below.

Thanks
Andrew

From: Tarek Saad <tsaad.net@gmail.com>
Date: Thursday, November 12, 2020 at 2:22 PM
To: "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>, "Ketan Talaulikar (ketant)" <ketant=40cisco.com@dmarc.ietf.org>, Vishnu Pavan Beeram <vishnupavan@gmail.com>
Cc: "spring@ietf.org" <spring@ietf.org>
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

Hi all,

See inline for some comments..

From: spring <spring-bounces@ietf.org> on behalf of "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>
Date: Wednesday, November 11, 2020 at 6:16 PM
To: "Ketan Talaulikar (ketant)" <ketant=40cisco.com@dmarc.ietf.org>, Vishnu Pavan Beeram <vishnupavan@gmail.com>
Cc: "spring@ietf.org" <spring@ietf.org>
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

Hi Ketan, Pavan,

Good discussion. Just going to chip in some thoughts…

One of the elements I personally like of the SR Policy model is that many Candidate Paths may exist, but only one may be active and a candidate path contains 1 or many SID lists. It’s a simple parent/child - root/leaf tree with very clear rules within the SR policy context instance. From my point of view, what is being proposed in the -09 document still follows those rules and the general top-down tree behaviour. Despite the composite CP pointing to a different SR Policy, that SR Policy still follows all of the same rules top down in its own isolated context. Compare that to say, having a candidate path contain a child that points to other candidate paths within the same SR Policy context: within the same context a child is pointing to a sibling of its parent. The rules now have to bend slightly. As noted below, some of the rules around what is considered an active candidate path would need to change, since the constituents essentially are active (they’re installed) despite not being thought of as being active. Note that the proposed new text below says “The preference is ignored for each of the two constituent candidate paths" which is also a new rule, however one could perhaps work around that by just requiring the preference on the constituents be less preferred than any other standard or composite CP – but that raises its own troubles with multiple sources of provisioning – which leads to a rule asking to ignore the preference. In summary, from my p.o.v new rules in the hierarchy would need to be introduced.

Regarding steering into an SR Policy, yes, you burn colors in doing this (32bits...) and it would require deploying an entirely dedicated SR Policy construct, and run the risk of steering ‘other’ traffic into that policy. If this is a concern, would the composite SR Policies not be engineered in a way where the color block used is designed to not be used elsewhere in the network for other purposes?
[TS]: Today colors of SR Policies that are instantiated “on-demand” or instantiated via PCEP from a PCE are derived from the intent/service. With the hierarchical SR policies proposal, a PCE may need to instantiate the colored child SR policies on-demand too, but it is not clear where the colors of those child SR policies would be derived from. As Andrew suggests, a block of colors could be carved from every headend’s space -- specifically for this purpose and be managed by the PCE. Alternatively, one could consider creating such SR Policies with a special/reserved color that would simplify their creation. My understanding is that there are other cases where SR Policies may be instantiated (e.g. for tactical TE – e.g. on P nodes) that would not require color resolution, and creation of those could benefit from a reserved color too.


[Andrew] Good point indeed. The P node is what I was pointing at with the BSID example, where, for example, we’ll have to burn a color to deploy a SR Policy on a transit node when the consumer intent is simply for the BSID. That color selection would need to be considered ‘special’ and taken from a unique block if one wants to avoid using it for head-end steering on that P node.  Noting that color is part of what uniqueness, to define the “not for steering” behaviour, it would need to be a reserved block or bit encoded in color as opposed to a single special value. I’m not sure a special range needs to be IETF standardized or simply left to implementations/PCE / network design to allocate and enforce. It seems that the model to steer an SR Policy candidate path into another SR Policy with either color or the concept of a special color still seems feasible in the present document. It might be worth having text describing that a constituent candidate path may be used for steering on the headend, and if intention is to avoid that then the user/pce/network design should allocate a block of values for constituent candidate paths and select only from that block, not to be used on any other routes in the network.


Regards,
Tarek



Is there not a different but kind of similar problem with Binding SIDs, in that they’re eligible for use by other consumers even if not directly intended? (although at least BSIDs are optional and not mandatory). In addition to the split TE cases, being able to have an SR Policy steer into another SR Policy might also have some value in a backup candidate scenario when one has multiple SR Policies with the same endpoint, but can share a common fallback/best effort candidate path. The entity (I'm thinking PCE) managing that would only need to maintain the fallback/best effort CP SID list(s), instead of one for each N * CPs.

Something I haven’t concluded to myself yet are questions such as:


1.       does having a candidate path steer into another SR Policy satisfy the ability to do various sub-path specific TE/constraint/object combinations sufficiently?

2.       is the model relatively straight forward to map into yang/bgp/pcep etc..?

3.       does using an additional SR Policy create too much overhead or state burn to configure, deploy, manage, track etc.. ?

Cheers
Andrew

From: spring <spring-bounces@ietf.org> on behalf of "Ketan Talaulikar (ketant)" <ketant=40cisco.com@dmarc.ietf.org>
Date: Tuesday, November 10, 2020 at 10:33 PM
To: Vishnu Pavan Beeram <vishnupavan@gmail.com>
Cc: "spring@ietf.org" <spring@ietf.org>
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

Hi Pavan,

Please check inline below.

From: Vishnu Pavan Beeram <vishnupavan@gmail.com>
Sent: 11 November 2020 00:26
To: Ketan Talaulikar (ketant) <ketant@cisco.com>
Cc: spring@ietf.org
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

Ketan, Hi!

Please see inline for responses (prefixed VPB).

Regards,
-Pavan

On Tue, Nov 10, 2020 at 4:04 AM Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>> wrote:
Hi Pavan,

Please check inline below.

From: Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>>
Sent: 10 November 2020 00:08
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>
Cc: spring@ietf.org<mailto:spring@ietf.org>
Subject: Re: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt

Ketan,

Much Thanks for taking a stab at addressing the composite candidate path use-case! We seem to be converging.
[KT] Thanks for that feedback and confirmation that the proposal in the draft does address the use-case. I believe we are now discussing the mechanics of how this is achieved within the current SR Policy framework.

However, I don’t understand why you need to use additional SR policies (and unnecessarily burn additional colors) to address this.
[KT] I do not follow what you mean by “burn additional colors”. Color is just a 32 bit number that indicates the “intent” and is not really a scarce resource. Assigning a color to “a composite intent” seems like a seamless way to integrate with existing mechanisms for Steering over SR Policies. This gives the flexibility for say some BGP services to be steered over the constituent explicit/dynamic intent while others can steer over a composite intent that includes those individual explicit/dynamic intents.

[VPB] The “flexibility” that you are referring to is undesirable for this use-case. For the traffic-split use-case, we don’t want any other services to be directly steered over the constituents when they are part of a composite candidate path.
[KT] I believe the use-case that you are referring to was for splitting some traffic for a service over a blue plane and the rest over a red plane. At the same time, there may be other services that utilize only a single plane. The flexibility that I was referring to was to enable/allow for either of the two scenarios and there may be other/more use-cases for which we need a more generic framework.

The current proposal in the draft would have been acceptable if the constituent SR Policies were uncolored – but that would violate the current rules imposed by the draft.


Why can’t the composite candidate path just be a grouping of explicit candidate paths and/or dynamic candidate paths?
[KT] This is because in the SR Policy framework, there is only a single active CP – it may be explicit or dynamic. Now we’ve added another Composite CP type to cover this specific use-case. Your proposal will result in 3 candidate paths being active within the same SR Policy – one each of the explicit and dynamic CP and then additionally the Composite CP. This breaks the existing rules for selection of CP based on preference and mechanisms like fallback between CPs. While the current proposal in the draft provides a way to address the new use-case with a backwards compatible extension to the SR Policy framework.

[VPB] The proposal in my previous email is backwards compatible and does not intend to break any existing rules for deeming a candidate path active. As per the rules that are outlined in Section 2.9, only the composite candidate path is “active” given its preference. The constituent candidate paths will never be active on their own. If it is necessary, we can add a statement in Section 2.9 to explicitly state that the candidate path selection criteria does not apply to the constituent candidate paths.
[KT] When a CP is “active” it is actually the one that is being used for forwarding.

Thanks,
Ketan


Thanks,
Ketan

Consider the following changes:

** Section 2.2
OLD:

   A composite candidate path acts as a container for grouping of SR

   Policies.  The composite candidate path construct enables combination

   of SR Policies, each with explicit candidate paths and/or dynamic

   candidate paths with potentially different optimization objectives

   and constraints, for a load-balanced steering of packet flows over

   its constituent SR Policies.  The following criteria apply for

   inclusion of constituent SR Policies using a composite candidate path

   under a parent SR Policy:



   o  the endpoints of the constituent SR Policies and the parent SR

      Policy MUST be identical



   o  The colors of each of the constituent SR Policies and the parent

      SR Policy MUST be different



   o  the constituent SR Policies MUST NOT use composite candidate paths



   Each constituent SR Policy of a composite candidate path is

   associated with a weight for load-balancing purposes (refer

   Section 2.11<https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-09#section-2.11> for details).  The default weight is 1.



NEW:

   A composite candidate path acts as a container for grouping of

   explicit candidate paths and/or dynamic candidate paths with

   potentially different optimization objectives and constraints.

   The composite candidate path construct enables load-balanced

   steering of packet-flows over a set of constituent candidate

   paths. The following criteria apply for constituent candidate

   paths under a composite candidate path:



   o  the preference of the constituent candidate path MUST be

      ignored.



   o  the constituent candidate path MUST NOT be a composite candidate

      path



   Each constituent candidate path of a composite candidate path is

   associated with a weight for load-balancing purposes (refer

   Section 2.11<https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-09#section-2.11> for details).  The default weight is 1.



**



** Section 2.11



OLD:
   When a composite candidate path is active, the fraction of flows
   steered into each constituent SR Policy is equal to the relative
   weight of each constituent SR Policy.  Further load balancing of
   flows steered into a constituent SR Policy is performed based on the
   weights of the Segment-List of the active candidate path of that
   constituent SR Policy.



NEW:
   When a composite candidate path is active, the fraction of flows
   steered into each constituent candidate path is equal to the relative
   weight of each constituent candidate path.  Further load balancing of
   flows steered into a constituent candidate path is performed based on
   the weights of each associated Segment-List.


**



** Section 2.13



OLD:
   The information model of SR Policy POL100 having a composite
   candidate path is the following:

   SR policy POL100 <headend = H1, color = 100, endpoint = E1>
        Candidate-path CP1 <protocol-origin = 20, originator =
   100:1.1.1.1, discriminator = 1>
            Preference 200
            Weight W1, SR policy <color = 1>
            Weight W2, SR policy <color = 2>

   The constituent SR Policies POL1 and POL2 have information model as
   described at the start of this section.  They are referenced only by
   color in the composite candidate path since their headend and
   endpoint are identical to the POL100.  The valid Segment-Lists of the
   active candidate path of POL1 and POL2 are installed in the
   forwarding.  Traffic steered on POL100 is flow-based hashed on POL1
   with a ratio W1/(W1+W2).  Within the POL1, the flow-based hashing
   over its Segment-Lists are performed as described earlier in this
   section.



NEW:
   The information model of SR Policy POL100 having a composite
   candidate path is the following:

   SR policy POL100 <headend = H1, color = 100, endpoint = E1>
        Candidate-path Comp-CP <protocol-origin = 20, originator =
   100:1.1.1.1, discriminator = 1>
            Preference 200
            Weight W1, Candidate-path CP1
            Weight W2, Candidate-path CP2
        Candidate-path CP1 <protocol-origin = 20, originator =
   100:1.1.1.1, discriminator = 2>
             Weight W11, SID-List1 <SID11...SID1i>
             Weight W12, SID-List2 <SID21...SID2j>
        Candidate-path CP2 <protocol-origin = 20, originator =
   100:1.1.1.1, discriminator = 3>
             Weight W21, SID-List3 <SID31...SID3i>
             Weight W22, SID-List4 <SID41...SID4j>

   Comp-CP is a composite candidate path with two constituents, CP1
   and CP2. The preference is ignored for each of the two constituent
   candidate paths. The valid Segment-Lists of the two constituent
   candidate paths are installed in the forwarding. Traffic steered
   on Comp-CP is flow-based hashed on to CP1 and CP2 with a ratio of
   W1/(W1+W2) and W2/(W1+W2) respectively. Within each constituent
   candidate path, the flow-based hashing over its Segment-Lists are
   performed as described earlier in this section.


**



** Section 5.3



OLD:
   A composite candidate path is specified as a group of its constituent
   SR Policies.

   A composite candidate path is valid when it has at least one valid
   constituent SR Policy.



NEW:
   A composite candidate path is specified as a group of its constituent
   candidate paths.

   A composite candidate path is valid when it has at least one valid
   constituent candidate path.


**



Regards,

-Pavan



On Sun, Nov 1, 2020 at 7:02 PM Ketan Talaulikar (ketant) <ketant=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Hello All,

We have just posted an update for the draft and following is the summary of changes:

1) Introduction of the Composite Candidate Path construct to address a pending comment from the WG (Ref : https://mailarchive.ietf.org/arch/msg/spring/fEqE5TOwdh2vEyFm_MEjiXyP2ws/ and https://mailarchive.ietf.org/arch/msg/spring/d9oSSbgp0jCExRx0SXyBY0CyqXU/)
2) Based on offline feedback received, updated SRv6 segment types to include optional SRv6 SID and behavior instead of the new type that was introduced for it in the v08.
3) Clarification of handling of colors and BGP multi-path scenarios based on offline feedback received.
4) Clarification on considerations for TI-LFA for SR Policy as discussed in the WG (Ref : https://mailarchive.ietf.org/arch/msg/spring/EV1ytUsd5ZgkMHDN0IvFhw9id40/)

Please let know your comments/feedback.

Thanks,
Ketan (on behalf of co-authors)

-----Original Message-----
From: spring <spring-bounces@ietf.org<mailto:spring-bounces@ietf.org>> On Behalf Of internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>
Sent: 02 November 2020 06:27
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
Cc: spring@ietf.org<mailto:spring@ietf.org>
Subject: [spring] I-D Action: draft-ietf-spring-segment-routing-policy-09.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Source Packet Routing in Networking WG of the IETF.

        Title           : Segment Routing Policy Architecture
        Authors         : Clarence Filsfils
                          Ketan Talaulikar
                          Daniel Voyer
                          Alex Bogdanov
                          Paul Mattes
        Filename        : draft-ietf-spring-segment-routing-policy-09.txt
        Pages           : 37
        Date            : 2020-11-01

Abstract:
   Segment Routing (SR) allows a headend node to steer a packet flow
   along any path.  Intermediate per-flow states are eliminated thanks
   to source routing.  The headend node steers a flow into an SR Policy.
   The header of a packet steered in an SR Policy is augmented with an
   ordered list of segments associated with that SR Policy.  This
   document details the concepts of SR Policy and steering into an SR
   Policy.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-spring-segment-routing-policy/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-09
https://datatracker.ietf.org/doc/html/draft-ietf-spring-segment-routing-policy-09

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-spring-segment-routing-policy-09


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org>.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring

_______________________________________________
spring mailing list
spring@ietf.org<mailto:spring@ietf.org>
https://www.ietf.org/mailman/listinfo/spring