Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FAC Object Creation per Policy #1185

Open
martinhannigan opened this issue Jun 9, 2022 · 26 comments
Open

FAC Object Creation per Policy #1185

martinhannigan opened this issue Jun 9, 2022 · 26 comments
Assignees
Labels
Milestone

Comments

@martinhannigan
Copy link

Is your feature request related to a problem? Please describe.

The AC has too much work. Less DeskPro tickets means more time to spend with family. Or on other DeskPro tickets.

Who is affected by the problem?

Users and Admin Committee volunteers.

What is the impact?

A faster turn around on FAC object creation. Less work for the AC. Immediate use by the community.

Are there security concerns?

Unlikely.

Are there privacy concerns?

Unlikely.

Describe the solution you'd like

The FAQ object process is here: https://bit.ly/39ljjkX

If process step 2 is TRUE, then proceed to immediately create object and bypass human intervention.

Do you think this feature will require a formal design?

Yes, there is logic.

Describe alternatives you've considered

There are none.

What is the proposed priority?

Routine.

Provide a rationale for any/all of the above

Automation is good. Customer service is good. Continous and rapid expansion of interconnection opportunity and creating more options (competition, price pressures) good.

Additional context

None

fac-object-approval-process

@martinhannigan martinhannigan self-assigned this Jun 9, 2022
@martinhannigan martinhannigan changed the title Automation of FAC Object Creation FAC Object Creation per Policy Jun 10, 2022
@martinhannigan martinhannigan added this to the 1 Decide milestone Jun 10, 2022
@mcmanuss8
Copy link
Contributor

+1

@grizz
Copy link
Member

grizz commented Jul 7, 2022

+1 assuming policy matches the flowchart

@arnoldnipper
Copy link
Contributor

+1

@martinhannigan
Copy link
Author

martinhannigan commented Mar 29, 2023 via email

@grizz
Copy link
Member

grizz commented Apr 4, 2023

Hijacking this issue based on in person discussion with @peterhelmenstine et al.

If an organization has 0 other facilities, they need to have a website and list 3 ASNs at their facility before it can be added to the approval queue.

@peeringdb/pc please +1 this amendment :)

@martinhannigan
Copy link
Author

martinhannigan commented Apr 4, 2023 via email

@arnoldnipper
Copy link
Contributor

arnoldnipper commented Apr 4, 2023

If an organization has 0 other facilities, they need to have a website and list 3 ASNs at their facility before it can be added to the approval queue.

We should stick to the policy document. If an organization has 0 other facilities, they need endorsements from at least three parties afair. Hence, -1 to your proposal.

Here is the outline of the attestation process mentioned above.

attestation-subprocess

@peterhelmenstine
Copy link

I think I mentioned 2 ASNs. If two ASNs meet somewhere that could be a facility no? This bypasses the need for a website.

@arnoldnipper
Copy link
Contributor

arnoldnipper commented Apr 4, 2023

I think I mentioned 2 ASNs. If two ASNs meet somewhere that could be a facility no? This bypasses the need for a website.

The policy documents says that 3 users must attest. Please let stick to the document which was approved by the board. No more discussions :)

@martinhannigan
Copy link
Author

martinhannigan commented Apr 4, 2023 via email

@arnoldnipper
Copy link
Contributor

So more thought IMHO needed.

No more thoughts needed. We have a policy document which has consensus. Let's just implement what it says.

@martinhannigan
Copy link
Author

martinhannigan commented Apr 5, 2023 via email

@arnoldnipper
Copy link
Contributor

Just to make sure which document we are talking about. Admin Committee Guidelines and Criteria for Approving Networks, IXPs, and Facilities

We still need to add a chapter for carrier, @job and @mustangthz

@peterhelmenstine
Copy link

peterhelmenstine commented Apr 5, 2023 via email

@grizz grizz modified the milestones: 2 Consensus Reached, 1 Decide Apr 14, 2023
@grizz
Copy link
Member

grizz commented Apr 14, 2023

@leovegoda please add this to the agenda of our next call

@martinhannigan
Copy link
Author

Perhaps I issed something. Are the assignees supposed to also set flags to move to implementation? We should put this on agenda for next call to clarity and either close or flag for implementation. @peeringdb/pc

@martinhannigan
Copy link
Author

Where is this?

@leovegoda
Copy link
Contributor

It's still in Decide. Would you like it added to the agenda on the next @peeringdb/pc meeting?

@martinhannigan
Copy link
Author

It' a board issue. I had earlier tagged it board. Doesn't seem like any new reason to change that. I will re-tag.

@mustangthz
Copy link

mustangthz commented Nov 26, 2023 via email

@martinhannigan
Copy link
Author

@mustangthz I think it makes sense to work this into #1408 if the PC agrees.

@martinhannigan
Copy link
Author

Expect to merge with 1408 and its a policy issue. Perhaps solvable with PC consensus on next call.

@martinhannigan
Copy link
Author

There is support for this, but its effectively asking that set policy be enforced. This is an internal political issue for the board to decide. #1408 has its origins in issues that have been created by the lack of transparency and automation. Closing this as similar to #1408 which the discussion there should provide ample opportunity to resolve.

@mustangthz
Copy link

mustangthz commented Dec 6, 2023 via email

@leovegoda
Copy link
Contributor

@martinhannigan Did you mean to close this issue?

@martinhannigan martinhannigan reopened this Dec 7, 2023
@martinhannigan
Copy link
Author

martinhannigan commented Dec 7, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

7 participants