WG Review: Network Inventory YANG (ivy)

The IESG <iesg-secretary@ietf.org> Fri, 09 June 2023 22:56 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 87591C152F3C; Fri, 9 Jun 2023 15:56:45 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Review: Network Inventory YANG (ivy)
X-Test-IDTracker: no
X-IETF-IDTracker: 11.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Cc: inventory-yang@ietf.org
Reply-To: iesg@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <168635140554.61379.15330664327711584307@ietfa.amsl.com>
Date: Fri, 09 Jun 2023 15:56:45 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/hQqQk4f0g_zV9D9emXc8MKUUA90>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jun 2023 22:56:45 -0000

A new IETF WG has been proposed in the Operations and Management Area. The
IESG has not made any determination yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send your
comments to the IESG mailing list (iesg@ietf.org) by 2023-06-19.

Network Inventory YANG (ivy)
-----------------------------------------------------------------------
Current status: Proposed WG

Chairs:
  Daniele Ceccarelli <daniele.ietf@gmail.com>
  Qiufang Ma <maqiufang1@huawei.com>

Assigned Area Director:
  Robert Wilton <rwilton@cisco.com>

Operations and Management Area Directors:
  Warren Kumari <warren@kumari.net>
  Robert Wilton <rwilton@cisco.com>

Mailing list:
  Address: inventory-yang@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/inventory-yang
  Archive: https://mailarchive.ietf.org/arch/browse/inventory-yang/

Group page: https://datatracker.ietf.org/group/ivy/

Charter: https://datatracker.ietf.org/doc/charter-ietf-ivy/

Network inventory is a foundation for network management in all types
of networks: Network operators need to keep a record of what equipment
is planned and installed in their networks (including a variety of
information such as product name, vendor, product series, embedded
software, and hardware/software versions).  Network inventories may
be constructed from management system data to represent the expected
devices present in the network, and also be used to audit and catalog
what devices are discovered in the network, and to expose that
information in a consistent way.

The purpose of the IVY WG is to provide a venue for discussion of
inventory YANG models from across IETF Areas under a common umbrella
to facilitate distribution of the work, clarify the scope of each
model, and minimize overlap between them.  The Working Group may
also dispatch some inventory work towards Working Groups in the
Operations and Management Area as well as other Areas, if appropriate.

An objective of this effort is to derive common building-blocks for
inventory modeling that can be augmented, imported, or reused by other
IETF models. The WG will also identify a set of requirements and
guidelines to ensure consistency across models related to inventory.

The scope of the work extends to the inventory of network elements,
with a primary focus on those that operate at layers 0-3, and includes
both hardware and software inventory. Mapping the inventory models
that will be produced by the WG into existing IETF models (e.g.,
ietf-network-topology) is also in scope.

The Working Group will consider existing IETF work, including RFC 8348
and RFC 8345.

Work specifying the use of inventory content is outside the scope of
the Working Group, but informative examples describing how the
inventory data may be used is within scope.

The IVY WG will initially focus on developing a core network inventory
model that can be used as a foundation by other models to establish
technology-specific inventory models.  The following activities will
be used to help achieve this goal.  It is expected that many of these
items will not lead to the publication of RFCs, although
Internet-Drafts may be used to track discussions and establish
consensus:

  A. Terminology and Scope: Definition of the scope of inventory as
     well as a common architecture and terminology. An effort will be
     made to keep terminology aligned with, or mapped to,
     industry-wide activities including initiatives in the ITU-T, TMF,
     MEF, Openconfig, and ONF.

  B. Hardware/Software components including licenses: Hardware and
     Software component management to allow network operators to keep
     track of which physical/virtual devices are deployed in the
     network, including software and hardware versions as well as
     licenses/entitlement.

  C. Physical locations: Indicate the physical position of the network
     elements (such as, site, room, rack, shelf, slot) to provide
     precise location information.

  D. Multi-domain and multi-layer: Consistent representation and
     reporting of network inventory to maintain a centralized view of
     all network element component types across multiple network
     segments and layers of the underlying network under the same
     management and ownership.

  E. Mapping and correlation semantics: Correlating the inventory with
     existing IETF models e.g., topology, service attachment points
     (SAP), etc.

  F. Security and privacy issues: The information in a network
     inventory is highly sensitive as it potentially exposes critical
     information about the internal topology, characterization of the
     components that are used to build that topology, and precise
     device location information that could indirectly identify user
     locations.  Standard protocol mechanisms, e.g., the use of NACM
     [RFC 8341], are expected to be used to prevent unauthorized
     access.  However, the Working Group must consider whether
     additional security mechanisms (such as specific operational
     guidance, or data minimization of precise location data) are
     needed to protect this information from unauthorized access,
     manipulation, or the indirect exposition of private user
     identifying data.

Milestones:

  Oct 2023 - Adopt an Internet-Draft describing a core network inventory YANG
  data model that can be used as a foundation by other YANG models to
  establish technology-specific inventory models.

  Jul 2024 - Request publication of the below YANG data model.