110 likes | 118 Views
This document outlines the requirements for providing tracing and bypass functionality in an OPES (Open Pluggable Edge Services) system, including what can be bypassed and how tracing is implemented.
E N D
OPES processor and end points communicationsdraft-ietf-opes-end-comm-05 Abbie Barbir abbieb@nortelnetworks.com
Summary Tracing Bypass Progress from last meeting Some considerations Q&A Outline
Specify requirements for providing Tracing functionality in OPES Bypass Functionality What is Traceable/Bypass-able in an OPES Flow? Requirements for OPES System , Entities, Processors and Callout Servers OPES processor and end points communicationsSummary
OPES Tracing • OPES tracing • The inclusion of necessary information within a message in an OPES Flow that identify the collection of transformations or adaptations that have been performed on it before its delivery to an end point • Two use cases for a trace • Enables an end point to detect OPES processors • System administrator interprets OPES trace • Relayed to it by an end point as opaque data
OPES Bypass • OPES Bypass • The act of avoiding the invocation of a service that is identified by a URI within a message in an OPES Flow before its delivery to an end point • What can be bypassed in an OPES Flow? • OPES services • Some or all services • Bypass entities that perform the service • Need access to non-OPES content • What is non-OPES content • We do not define it • OPES System Dependent
Added new section on Bypass (Non-blocking) Fixed Must/Should/May Refined definitions Editorial fixes Issued WGLC Progress since last meeting
Some Considerations • At what requirement level should OPES System be traced? • At what requirement level should OPES processor be traced? • Do we trace the order of service invocations or service completions or something else? • Does bypass semantics mean "give OPES version if non-OPES is not available" or "give an error if non-OPES is not available“ • Affects bypass design/rules
Some Considerations • What can be bypassed? • What does it mean to bypass X? • Can processors be bypassed at all? • Do we allow trace manipulations? • Should we use a single HTTP header for all trace entries to preserve order? If yes, • how to distinguish one OPES system entries from another?
OPES Tracing Modified Message A + Trace Message A Recipient Sender OPES Notification • Basic Point • Done on per message Basis • In Band