blob: b3c62652242a6ca4f8e4b0eea23918d1f15ee0e5 [file] [log] [blame]
//
// ============LICENSE_START=======================================================
// Copyright (C) 2016-2018 Ericsson. All rights reserved.
// ================================================================================
// This file is licensed under the CREATIVE COMMONS ATTRIBUTION 4.0 INTERNATIONAL LICENSE
// Full license text at https://creativecommons.org/licenses/by/4.0/legalcode
//
// SPDX-License-Identifier: CC-BY-4.0
// ============LICENSE_END=========================================================
//
// @author Sven van der Meer (sven.van.der.meer@ericsson.com)
//
== APEX Policy Matrix
APEX offers a lot of flexibility for defining, deploying, and executing policies.
Based on a theoretic model, it supports virtually any policy model and allows to translate legacy policies into the APEX execution format.
However, the most important aspect for using APEX is to decide what policy is needed, what underlying policy concepts should be used, and how the decision logic should be realized.
Once these aspects are decided, APEX can be used to execute the policies.
If the policy evolves, say from a simple decision table to a fully adaptable policy, only the policy definition requires change.
APEX supports all of that.
The figure below shows a (non-exhaustive) matrix, which will help to decide what policy is required to solve your problem.
Read the matrix from left to right choosing one cell in each column.
.APEX Policy Matrix
image::apex-intro/ApexPolicyMatrix.png[APEX Policy Matrix]
The policy can support one of a number of stimuli with an associated purpose/model of the policy, for instance:
* Configuration, i.e. what should happen.
An example is an event that states an intended network configuration and the policy should provide the detailed actions for it.
The policy can be realized for instance as an obligation policy, a promise or an intent.
* Report, i.e. something did happen.
An example is an event about an error or fault and the policy needs to repair that problem.
The policy would usually be an obligation, utility function, or goal policy.
* Monitoring, i.e. something does happen.
An example is a notification about certain network conditions, to which the policy might (or might not) react.
The policy will mitigate the monitored events or permit (deny) related actions as an obligation or authorization.
* Analysis, i.e. why did something happen.
An example is an analytic component sends insights of a situation requiring a policy to act on it.
The policy can solve the problem, escalate it, or delegate it as a refrain or delegation policy.
* Prediction, i.e. what will happen next.
An example are events that a policy uses to predict a future network condition.
The policy can prevent or enforce the prediction as an adaptive policy, a utility function, or a goal.
* Feedback, i.e. why did something happen or not happen.
Similar to analysis, but here the feedback will be in the input event and the policy needs to something with that information.
Feedback can be related to history or experience, for instance a previous policy execution.
The policy needs to be context-aware or be a meta-policy.
Once the purpose of the policy is decided, the next step is to look into what context information the policy will require to do its job.
This can range from very simple to a lot of different information, for instance:
* No context, nothing but a trigger event, e.g. a string or a number, is required
* Event context, the incoming event provides all information (more than a string or number) for the policy
* Policy context (read only), the policy has access to additional information related to its class but cannot change/alter them
* Policy context (read and write), the policy has access to additional information related to its class and can alter this information (for instance to record historic information)
* Global context (read only), the policy has access to additional information of any kind but cannot change/alter them
* Global context (read and write), the policy the policy has access to additional information of any kind and can alter this information (for instance to record historic information)
The next step is to decide how the policy should do its job, i.e. what flavor it has, how many states are needed, and how many tasks.
There are many possible combinations, for instance:
* Simple / God: a simple policy with 1 state and 1 task, which is doing everything for the decision-making.
This is the ideal policy for simple situation, e.g. deciding on configuration parameters or simple access control.
* Simple sequence: a simple policy with a number of states each having a single task.
This is a very good policy for simple decision-making with different steps.
For instance, a classic action policy (ECA) would have 3 states (E, C, and A) with some logic (1 task) in each state.
* Simple selective: a policy with 1 state but more than one task.
Here, the appropriate task (and it's logic) will be selected at execution time.
This policy is very good for dealing with similar (or the same) situation in different contexts.
For instance, the tasks can be related to available external software, or to current work load on the compute node, or to time of day.
* Selective: any number of states having any number of tasks (usually more than 1 task).
This is a combination of the two policies above, for instance an ECA policy with more than one task in E, C, and A.
* Classic directed: a policy with more than one state, each having one task, but a non-sequential execution.
This means that the sequence of the states is not pre-defined in the policy (as would be for all cases above) but calculated at runtime.
This can be good to realize decision trees based on contextual information.
* Super Adaptive: using the full potential of the APEX policy model, states and tasks and state execution are fully flexible and calculated at runtime (per policy execution).
This policy is very close to a general programming system (with only a few limitations), but can solve very hard problems.
The final step is to select a response that the policy creates.
Possible responses have been discussed in the literature for a very long time.
A few examples are:
* Obligation (deontic for what should happen)
* Authorization (e.g. for rule-based or other access control or security systems)
* Intent (instead of providing detailed actions the response is an intent statement and a further system processes that)
* Delegation (hand the problem over to someone else, possibly with some information or instructions)
* Fail / Error (the policy has encountered a problem, and reports it)
* Feedback (why did the policy make a certain decision)