Re: [Netconf] Subscription Use Cases
Martin Bjorklund <mbj@tail-f.com> Thu, 08 December 2016 09:07 UTC
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3E9D129692 for <netconf@ietfa.amsl.com>; Thu, 8 Dec 2016 01:07:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.797
X-Spam-Level:
X-Spam-Status: No, score=-4.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-2.896, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xQs_5fm1VHas for <netconf@ietfa.amsl.com>; Thu, 8 Dec 2016 01:07:49 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id C24C9124281 for <netconf@ietf.org>; Thu, 8 Dec 2016 01:07:49 -0800 (PST)
Received: from localhost (h-13-76.a165.priv.bahnhof.se [155.4.13.76]) by mail.tail-f.com (Postfix) with ESMTPSA id B504B1AE0118; Thu, 8 Dec 2016 10:07:45 +0100 (CET)
Date: Thu, 08 Dec 2016 10:07:45 +0100
Message-Id: <20161208.100745.1423954834248283961.mbj@tail-f.com>
To: evoit@cisco.com
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <e9128f79b8bc4923815e40510678c026@XCH-RTP-013.cisco.com>
References: <e9128f79b8bc4923815e40510678c026@XCH-RTP-013.cisco.com>
X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/GoFBb5TgNgOVv7dWJJzvPHYJHNQ>
Cc: netconf@ietf.org
Subject: Re: [Netconf] Subscription Use Cases
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Dec 2016 09:07:52 -0000
Hi, "Eric Voit (evoit)" <evoit@cisco.com> wrote: > Here are some more cases. Happy to talk more or demo if people are interested. I think Andy summarized the issue nicely earlier in this thread: What are the must-have, should-have, and nice-to-have features that are missing from RFC 5277? I think your requirements below are more like driving forces for YANG push, right? Is there any of these that affects the solution in RFC 5277? > (Category 1) Streaming Telemetry > > High volume set of objects pushed on a predictable schedule. > > (1a) Telemetry: Fast replication of YANG operational/config data > off-box for traffic or configuration analysis > > (1b) Multi operations reporting: Send a targeted subset > operational/config data to an Operations group not directly managing > device > > (Category 2) Distributed Eventing > > No need to repeatedly poll to see if targeted subsets of Network > Element config have changed. The latest is pushed as it happens. > > (2a) Integrity Verification: Push discovered changes in keys, > config, software hash as they happen. Application validates that > change is authorized. > > (2b) Eliminate Polling: NMS/controllers pushed config changes as > they occur in Network Elements (enabling real-time state > synchronization). > > (2c) IWAN: Changes in Operational Data drive network rebalancing for > optimized enterprise facilities usage > > (2d) Domain Policer: provide a single policed data rate across > multiple data centers or branch offices > > (2e) DDoS Protection: send suspect spikes of traffic across a set > devices to a scrubber > > > > (Category 3) Network as the Subscriber > > Distributed CPE, VMs, routers can subscribe to a fast changing > centralized configuration repository > > (3a) Perimeter & Internal Blocking: When vulnerabilities are > detected, ephemeral remediation policies are temporarily installed > across a domain of devices. > > (3b) Tunnel Endpoint Synch: Filtered subsets of centrally managed > tunnel Ethernet endpoints can be downloaded and coordinated across > edge devices to minimize effort in maintaining dynamic mesh > > (3c) Policy mirroring: Enables trusted or partially-trusted edge > devices to mirror the state of a central configuration repository /martin
- [Netconf] Subscription Use Cases (was RE: Still s… Eric Voit (evoit)
- Re: [Netconf] Subscription Use Cases Martin Bjorklund
- Re: [Netconf] Subscription Use Cases Eric Voit (evoit)
- Re: [Netconf] Subscription Use Cases Andy Bierman
- Re: [Netconf] Subscription Use Cases Martin Bjorklund
- Re: [Netconf] Subscription Use Cases Eric Voit (evoit)
- Re: [Netconf] Subscription Use Cases Martin Bjorklund
- Re: [Netconf] Subscription Use Cases Andy Bierman
- Re: [Netconf] Subscription Use Cases Martin Bjorklund
- Re: [Netconf] Subscription Use Cases Andy Bierman
- Re: [Netconf] Subscription Use Cases Andy Bierman
- Re: [Netconf] Subscription Use Cases ludwig
- Re: [Netconf] Subscription Use Cases Eric Voit (evoit)