John Plocher writes:
> When the Explorer cases went thru, we debated this
> topic to death - and surmised that the only thing
> this kind of data could be predictably used for
> was collection for human perusal - any automated
> use would require interaction with the team(s) that
> created the kstats themselves to upgrade their
> stability levels.

If "for human eyes only" is the goal, then you can already do what
this project proposes, but with security, by "ssh hostname kstat".  If
you really don't care about security, enable rsh and use that.  :-/

I doubt that "for human eyes only" is the goal here, particularly with
the discussion in the original document about the Perl interfaces.
This sounds to me like a general-purpose remote access mechanism for
statistics, the kind that'll be baked into scripts and potentially
into complex monitoring applications.

It is indeed "simple" -- I'll grant the submitter that it's obviously
the simplest way to implement such a mechanism -- but it's
architecturally suspicious on the grounds that it's building atop an
interface in a way that the designers of that interface didn't
anticipate.  It's analogous to scraping messages out of syslog files.

The first time there's a bug fix that removes one of those kstats or
redefines it, the applications that are using that variable will fail.
We redefine these things all the time, and (like syslog messages)
they're not typically considered "interfaces" of the sort that are
architecturally controlled.  Incompatible changes happen in patches.

Do it if you want, I suppose, but building something that's going to
be reliable and not cause avoidable escalations means providing
suitably stable objects to access ... something like a MIB.  I don't
think this project (as defined) can do that.

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to