[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Comments on Partial Locking -01
Hi,
"James Balestriere (jbalestr)" <jbalestr@cisco.com> wrote:
> To second some of Sharons items, the impression I got from the document
> was that
> configuration seems to be the only way resources on the box are
> created.
> We need to also consider hot insertion and removal of hardware.
> E.g. I lock an ethernet interface to get get exclusivity on the
> interface
> but someone physically removes the card. Is my lock persisted ?
> If that card is pushed back in what happens ? If a similar card is put
> in ?
> (e.g I pull out a 4 port card and put in an 8 port card)
I don't think this is different from how the global lock works. If I
lock the entire datastore, and someone removes a card, will the config
be altered?
> I also support Phil's concerns. Can I "read" a config when someone has
> locked
> a subtree ? The risk for me is I could extract a config which is in
> an intermediate state. We need some rules on reading such that I can
> only
> read a config which is in a know stable state (i.e. not locked)
The way it works right now is that you get what you ask for. If you
lock /foo, then read from /bar and change /foo according to what you
just read, then you may end up in an inconsistent state. If you want
to do this consistently, either grab the global lock, or lock /foo and
/bar.
/martin
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>