Hi GROW,
I've compiled a todo list to outline the next steps for the
draft-ietf-grow-bgp-session-culling document.
IXP Community feedback (possible action for Thomas, Yuya)
---------------------------------------------------------
After the initial version of this Internet-Draft was published, a few
IXPs have expressed interest in implementing the 'involuntary culling'
mechanism to reduce the negative impact of maintenance on their
platform. I hope we'll receive feedback from them on the readability and
structure of the document. As was stated before there are a number of
IXPs which have already implemented the mechanism, but they did that
before this document existed, I think feedback from new users will be
very valuable, so I'd like to try and collect some of that.
To shut or not to shut (possible action for Jen)
------------------------------------------------
Jen Linkova wanted to add text to offer an alternative to
administratively shutting down EBGP sessions: she advocated to withdraw
all routes & stop using received routes. Conceptually this would align
with simply removing policies associated with a EBGP peer before
commencing maintenance if the platform supports
draft-ietf-grow-bgp-reject.
While I look forward to a text proposal, I'm not sure if this should be
part of the BCP: the operator lacks visibility of the maintenance event
in their syslog (most implementions won't log that all routes were
withdrawn), and it precludes the use of draft-ietf-idr-shutdown to
inform others on what is going on.
Or perhaps this is a subjective matter driven by local considerations
and we should describe both approaches. If we describe both:
o how do we facilitate a newcomer reading the document, how to
decide which of the two to use?
o What terminology would we use to contrast from "Voluntary BGP
Session Teardown"?
o if you choose a deny-import/deny-export approach, shouldn't you
ideally start with a gshut 65535:0 approach and subsequently
withdraw, to prevent hyper local blackholing?
o What do other operators think about deny-import/deny-export rather
then shutting?
So... should this I-D include the method at all?
We can also accept that the BCP is to administratively shut, but that
some operators will have their own methods.
BGP g-shut (possible action for Bruno et al)
--------------------------------------------
Bruno promised a new, fresh version of draft-ietf-grow-bgp-gshut which
would focus on the rfc1997 well-known community 65535:0 - I would
appreciate if this is posted at some point so we can make an Informative
reference to a non-zombie draft. NTT (as2914) & Coloclue (as8283)
implemented experimental rfc1997 gshut support for customers and it
appears to work as advertise (no pun intended ;-).
Add examples for more platforms (everyone)
------------------------------------------
We're tracking examples of culling configs in this repository
https://github.com/bgp/bgp-session-culling-config-examples - if you see
a missing implementation and know how to configure involuntary culling,
please consider adding an example through a pull-request or an email to
the authors. Thanks!
Kind regards,
Job
_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow