rfc2982.txt

来自「RFC 的详细文档!」· 文本 代码 · 共 1,740 行 · 第 1/5 页

TXT
1,740
字号






Network Working Group                                       R. Kavasseri
Request for Comments: 2982                      (Editor of this version)
Category: Standards Track                                     B. Stewart
                                            (Author of previous version)
                                                     Cisco Systems, Inc.
                                                            October 2000


                 Distributed Management Expression MIB

Status of this Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2000).  All Rights Reserved.

Abstract

   This memo defines a portion of the Management Information Base (MIB)
   for use with network management protocols in the Internet community.
   In particular, it describes managed objects used for managing
   expressions of MIB objects.  The results of these expressions become
   MIB objects usable like any other MIB object, such as for the test
   condition for declaring an event.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119.

Table of Contents

   1 The SNMP Management Framework ...............................    2
   2 Overview ....................................................    3
   2.1 Usage .....................................................    4
   2.2 Persistence ...............................................    4
   2.3 Operation .................................................    4
   2.3.1 Sampling ................................................    5
   2.3.2 Wildcards ...............................................    5
   2.3.3 Evaluation ..............................................    5
   2.3.4 Value Identification ....................................    6
   2.4 Subsets ...................................................    6
   2.4.1 No Wildcards ............................................    6



Kavasseri & Stewart         Standards Track                     [Page 1]

RFC 2982         Distributed Management Expression MIB      October 2000


   2.4.2 No Deltas ...............................................    7
   2.5 Structure .................................................    7
   2.5.1 Resource ................................................    7
   2.5.2 Definition ..............................................    7
   2.5.3 Value ...................................................    8
   2.6 Examples ..................................................    8
   2.6.1 Wildcarding .............................................    8
   2.6.2 Calculation and Conditional .............................   10
   3 Definitions .................................................   12
   4 Intellectual Property .......................................   36
   5 Acknowledgements ............................................   37
   6 References ..................................................   37
   7 Security Considerations .....................................   38
   8 Author's Address ............................................   40
   9 Editor's Address ............................................   40
   10 Full Copyright Statement ...................................   41

1.  The SNMP Management Framework

   The SNMP Management Framework presently consists of five major
   components:

    o   An overall architecture, described in RFC 2571 [RFC2571].

    o   Mechanisms for describing and naming objects and events for the
        purpose of management.  The first version of this Structure of
        Management Information (SMI) is called SMIv1 and described in
        STD 16, RFC 1155 [RFC1155], STD 16, RFC 1212 [RFC1212] and RFC
        1215 [RFC1215].  The second version, called SMIv2, is described
        in STD 58, RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and
        STD 58, RFC 2580 [RFC2580].

    o   Message protocols for transferring management information.  The
        first version of the SNMP message protocol is called SNMPv1 and
        described in STD 15, RFC 1157 [RFC1157].  A second version of
        the SNMP message protocol, which is not an Internet standards
        track protocol, is called SNMPv2c and described in RFC 1901
        [RFC1901] and RFC 1906 [RFC1906].  The third version of the
        message protocol is called SNMPv3 and described in RFC 1906
        [RFC1906], RFC 2572 [RFC2572] and RFC 2574 [RFC2574].

    o   Protocol operations for accessing management information.  The
        first set of protocol operations and associated PDU formats is
        described in STD 15, RFC 1157 [RFC1157].  A second set of
        protocol operations and associated PDU formats is described in
        RFC 1905 [RFC1905].





Kavasseri & Stewart         Standards Track                     [Page 2]

RFC 2982         Distributed Management Expression MIB      October 2000


    o   A set of fundamental applications described in RFC 2573
        [RFC2573] and the view-based access control mechanism described
        in RFC 2575 [RFC2575].

   A more detailed introduction to the current SNMP Management Framework
   can be found in RFC 2570 [RFC2570].

   Managed objects are accessed via a virtual information store, termed
   the Management Information Base or MIB.  Objects in the MIB are
   defined using the mechanisms defined in the SMI.

   This memo specifies a MIB module that is compliant to the SMIv2.  A
   MIB conforming to the SMIv1 can be produced through the appropriate
   translations.  The resulting translated MIB must be semantically
   equivalent, except where objects or events are omitted because no
   translation is possible (use of Counter64).  Some machine readable
   information in SMIv2 will be converted into textual descriptions in
   SMIv1 during the translation process.  However, this loss of machine
   readable information is not considered to change the semantics of the
   MIB.

2.  Overview

   Users of MIBs often desire MIB objects that MIB designers have not
   provided.  Furthermore, such needs vary from one management
   philosophy to another.  Rather than fill more and more MIBs with
   standardized objects, the Expression MIB supports externally defined
   expressions of existing MIB objects.

   In the Expression MIB the results of an evaluated expression are MIB
   objects that may be used like any other MIB objects.  These custom-
   defined objects are thus usable anywhere any other MIB object can be
   used.  For example, they can be used by a management application
   directly or referenced from another MIB, such as the Event MIB
   [MIBEventMIB].  They can even be used by the Expression MIB itself,
   forming expressions of expressions.

   The Expression MIB is instrumentation for a relatively powerful,
   complex, high-level application, considerably different from simple
   instrumentation for a communication driver or a protocol.  The MIB is
   appropriate in a relatively powerful, resource-rich managed system
   and not necessarily in a severely limited environment.

   Nevertheless, due to dependencies from the Event MIB [RFC2981] and
   the need to support as low-end a system as possible, the Expression
   MIB can be somewhat stripped down for lower-power, lower-resource
   implementations, as described in the Subsets section, below.




Kavasseri & Stewart         Standards Track                     [Page 3]

RFC 2982         Distributed Management Expression MIB      October 2000


   Implementation of the Expression MIB in a managed system led to the
   addition of objects that may not have been necessary in an
   application environment with complete knowledge of compiled MIB
   definitions.  This is appropriate since implementation must be
   possible within typical managed systems with some constraints on
   system resources.

2.1.  Usage

   On managed systems that can afford the overhead, the Expression MIB
   is a way to create new, customized MIB objects for monitoring.
   Although these can save some network traffic and overhead on
   management systems, that is often not a good tradeoff for objects
   that are simply to be recorded or displayed.

   An example of a use of the Expression MIB would be to provide custom
   objects for the Event MIB [RFC2981].  A complex expression can
   evaluate to a rate of flow or a boolean and thus be subject to
   testing as an event trigger, resulting in an SNMP notification.
   Without these capabilities such monitoring would be limited to the
   objects in predefined MIBs.  The Expression MIB thus supports
   powerful tools for the network manager faced with the monitoring of
   large, complex systems that can support a significant level of self
   management.

2.2.  Persistence

   Although like most MIBs this one has no explicit controls for the
   persistence of the values set in configuring an expression, a robust,
   polite implementation would certainly not force its managing
   applications to reconfigure it whenever it resets.

   Again, as with most MIBs, it is implementation specific how a system
   provides and manages such persistence.  To speculate, one could
   imagine, for example, that persistence depended on the context in
   which the expression was configured, or perhaps system-specific
   characteristics of the expression's owner.  Or perhaps everything in
   a MIB such as this one, which is clearly aimed at persistent
   configuration, is automatically part of a system's other persistent
   configuration.

2.3.  Operation

   Most of the operation of the MIB is described or implied in the
   object definitions but a few highlights bear mentioning here.






Kavasseri & Stewart         Standards Track                     [Page 4]

RFC 2982         Distributed Management Expression MIB      October 2000


2.3.1.  Sampling

   The MIB supports three types of object sampling for the MIB objects
   that make up the expression:  absolute, delta, and changed.

   Absolute samples are simply the value of the MIB object at the time
   it is sampled.

   Absolute samples are not sufficient for expressions of counters, as
   counters have meaning only as a delta (difference) from one sample to
   the next.  Thus objects may be sampled as deltas.  Delta sampling
   requires the application to maintain state for the value at the last
   sample, and to do continuous sampling whether or not anyone is
   looking at the results.  It thus creates constant overhead.

   Changed sampling is a simple fallout of delta sampling where rather
   than a difference the result is a boolean indicating whether or not
   the object changed value since the last sample.

2.3.2.  Wildcards

   Wildcards allow the application of a single expression to multiple
   instances of the same MIB object.  The definer of the expression
   indicates this choice and provides a partial object identifier, with
   some or all of the instance portion left off.  The application then
   does the equivalent of GetNext to obtain the object values, thus
   discovering the instances.

   All wildcarded objects in an expression must have the same semantics
   for the missing portion of their object identifiers.  Otherwise, any
   successful evaluation of the wildcarded expression would be the
   result of the accidental matching of the wildcarded portion of the
   object identifiers in the expression.  Such an evaluation will likely
   produce results which are not meaningful.

   The expression can be evaluated only for those instances where all
   the objects in the expression are available with the same value for
   the wildcarded portion of the instance.

2.3.3.  Evaluation

   There are two important aspects of evaluation that may not be
   obvious:  what objects and when.

   What objects get used in the evaluation depends on the type of
   request and whether or not the expression contains wildcarded
   objects.  If the request was a Get, that locks down the instances to




Kavasseri & Stewart         Standards Track                     [Page 5]

RFC 2982         Distributed Management Expression MIB      October 2000


   be used.  If the request was a GetNext or GetBulk, the application
   must work its way up to the next full set of objects for the
   expression.

   Evaluation of expressions happens at two possible times, depending on
   the sampling method (delta or absolute) used to evaluate the
   expression.

   If there are no delta or change values in an expression, the
   evaluation occurs on demand, i.e. when a requester attempts to read
   the value of the expression.  In this case all requesters get a
   freshly calculated value.

   For expressions with delta or change values, evaluation goes on
   continuously, every sample period.  In this case requesters get the
   value as of the last sample period.  For any given sample period of a
   given expression, only those instances exist that provided a full set
   of object values.  It may be possible that a delta expression which
   was evaluated successfully for one sample period may not be
   successfully evaluated in the next sample period.  This may, for
   example, be due to missing instances for some or all of the objects
   in the expression.  In such cases, the value from the previous sample
   period (with the successful evaluation) must not be carried forward
   to the next sample period (with the failed evaluation).

2.3.4.  Value Identification

   Values resulting from expression evaluation are identified with a
   combination of the object identifier (OID) for the data type from
   expValueTable (such as expValueCounter32Val), the expression owner,
   the expression name, and an OID fragment.

   The OID fragment is not an entire OID beginning with iso.dod.org
   (1.3.6).  Rather it begins with 0.0.  The remainder is either another
   0 when there is no wildcarding or the instance that satisfied the
   wildcard if there is wildcarding.

2.4.  Subsets

   To pare down the Expression MIBs complexity and use of resources an
   implementor can leave out various parts.

2.4.1.  No Wildcards

   Leaving out wildcarding significantly reduces the complexity of
   retrieving values to evaluate expressions and the processing required
   to do so.  Such an implementation would allow expressions made up of




Kavasseri & Stewart         Standards Track                     [Page 6]

RFC 2982         Distributed Management Expression MIB      October 2000


   individual MIB objects but would not be suitable for expressions
   applied across large tables as each instance in the table would
   require a separate expression definition.

   Furthermore it would not be suitable for tables with arbitrary,
   dynamic instances, as expressions definitions could not predict what

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?