NETMOD Working Group K. Watsen
Internet-Draft Juniper Networks
Intended status: Informational T. Nadeau
Expires: April 21, 2016 Brocade Networks
October 19, 2015

NETMOD Operational State Requirements
draft-ietf-netmod-opstate-reqs-00

Abstract

This document defines requirements for servers enabling better visibility and control over the server's operational state. To achieve this end, this document also defines terminology describing a conceptual model enabling the requirements to be expressed.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on April 21, 2016.

Copyright Notice

Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.


Table of Contents

1. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].

The term "server" is used throughout this document to refer to what is many times known as the "device", "system", or "network element". This definition is intended to be consistent with the term "server" defined in [RFC6241], Section 1.1, but free of any association to a particular protocol.

This document defines the following terms:

Applied Configuration:
This data represents the configuration state that the server is actually in. That is, the configuration state which is currently being used by server components (e.g., control plane daemons, operating system kernels, line cards).

Asynchronous Configuration Operation:
A configuration request to update the running configuration of a server that is applied asynchronously with respect to the client request. The server MUST update its intended configuration (see term) before replying to the client indicating whether the request will be processed. This reply to the client only indicates whether there are any errors in the original request. The server's applied configuration state (see term) is updated after the configuration change has been fully effected to all impacted components in the server. Once applied, there MUST be a mechanism for the client to determine when the request has completed processing and whether the intended config is now fully effective or there are any errors from applying the configuration change, which could be from an asynchronous notification or via a client operation.
Continue On Error:
Continue to process configuration data on error; error is recorded, and negative response is generated if any errors occur.
Derived State:
This data represents information which is generated as part of the server's own interactions. For example, derived state may consist of the results of protocol interactions (the negotiated duplex state of an Ethernet link), statistics (such as message queue depth), or counters (such as packet input or output bytes).
Intended Configuration:
This data represents the configuration state that the network operator intends the server to be in, and that has been accepted by the server as valid configuration.
Rollback On Error:
If an error condition occurs such that part of applying the configuration fails, the server will stop processing the configuration operation and restore the specified configuration to its complete state at the start of this configuration operation.
Synchronous Configuration Operation:
A configuration request to update the running configuration of a server that is applied synchronously with respect to the client request (i.e. a blocking call). The server MUST fully attempt to apply the configuration change to all impacted components in the server, updating both the server's intended and applied configuration (see terms), before replying to the client. The reply to the client indicates whether there are any errors in the request or errors from applying the configuration change.

2. Requirements

  1. Ability to interact with both intended and applied configuration
    1. The ability to ask the operational components of a server (e.g., line cards) for the configuration that they are currently using. This is the applied configuration (see term).
    2. Applied configuration is read-only
    3. The data model for the applied configuration is the same as the data model for the intended configuration (same leaves)
    4. When a configuration change for any intended configuration node has been successfully applied to the server (e.g. not failed, nor deferred due to absent hardware) then the existence and value of the corresponding applied configuration node must match the intended configuration node.

  2. Applied configuration as part of operational state
    1. The ability to retrieve the applied configuration and derived state nodes in a single protocol operation.

  3. Support for both synchronous and asynchronous configuration operations (see terms)
    1. A server may support only synchronous configuration operations, or only asynchronous configuration operations, or both synchronous and asynchronous configuration operations on a client-specified per-operation basis.
    2. Servers that support asynchronous configuration operations MAY also provide a verify operation that a client can request from the server to return information regarding the difference between the intended and applied configurations.
    3. The configuration protocol MUST specify how configuration errors are handled. Errors may be handled by "stop on error", "continue on error" or "rollback on error" semantics (see terms). Support for "rollback on error" SHOULD be provided.

  4. Separation of configuration and operational state data; ability to retrieve them and independently
    1. Be able to retrieve only the derived state aspects of operational state
    2. Be able to retrieve only the non-derived state aspects of operational state
    3. Be able to retrieve both the derived and non-derived state aspects of operational state together

  5. Ability to retrieve operational state corresponding only to derived values, statistics, etc.

  6. Ability to relate configuration with its corresponding operational state
    1. Ability to map intended config nodes to corresponding applied config nodes
    2. Ability to map intended config nodes to associated derived state nodes
    3. The mappings needs to be programmatically consumable

  7. Ability for distinct modules to leverage a common model-structure
    1. Focus on the IETF-defined modules, and ideally provides guidance to other SDOs
    2. Multiple domain-specific model-structure trees are okay
    3. Model-structures may be defined in multiple modules with distinct namespaces

3. Security Considerations

None

4. IANA Considerations

None

5. Acknowledgements

The authors would like to thank the following for contributing to this document (in alphabetic order): Acee Lindem, Andy Bierman, Anees Shaikh, Benoit Claise, Carl Moberg, Dan Romascanu, Dean Bogdanovic, Gert Grammel, Jonathan Hansford, Juergen Schoenwaelder, Lou Berger, Mahesh Jethanandani, Martin Bjorklund, Phil Shafer, Randy Presuhn, Rob Shakir, Robert Wilton, Sterne, Jason.

6. References

6.1. Normative References

[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997.

6.2. Informative References

[draft-openconfig-netmod-model-structure-00] Shaikh, A., Shakir, R., D'Souza, K. and L. Fang, "Operational Structure and Organization of YANG Models", Internet-Draft draft-openconfig-netmod-model-structure-00, 2015.
[draft-openconfig-netmod-opstate-01] Shakir, R., Shaikh, A. and M. Hines, "Consistent Modeling of Operational State Data in YANG", Internet-Draft draft-openconfig-netmod-opstate-01, 2015.
[RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J. and A. Bierman, "Network Configuration Protocol (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011.

Appendix A. Relation to Terms Defined in Other Drafts

The following terms were originally defined in [RFC6241], but since modified by the NETMOD WG:

The following terms were originally defined in [draft-openconfig-netmod-opstate-01], but since modified by the NETMOD WG:

Appendix B. Relation to Requirements in Other Drafts

The requirements in this document roughly map onto the requirements listed in [draft-openconfig-netmod-opstate-01] and [draft-openconfig-netmod-model-structure-00] as list below. Some liberty was taken to adjust the requirements based on what looked liked consensus from on list discussions:

  1. draft-openconfig-netmod-opstate-01, Section 3
  2. draft-openconfig-netmod-opstate-01, Section 4.1
  3. draft-openconfig-netmod-opstate-01, Section 4.2
  4. draft-openconfig-netmod-opstate-01, Section 4.3
  5. draft-openconfig-netmod-opstate-01, Section 4.4
  6. draft-openconfig-netmod-opstate-01, Section 4.5
  7. draft-openconfig-netmod-model-structure-00 (no section)

Appendix C. Open Issues

All issues with this draft are tracked using GitHub issues. Please see: https://github.com/netmod-wg/opstate-reqs/issues to see currently opened issues.

Authors' Addresses

Kent Watsen Juniper Networks EMail: kwatsen@juniper.net
Thomas Nadeau Brocade Networks EMail: tnadeau@lucidvision.com