IETF YANG-Push · Intro

IETF YANG-Push, RFC 8639, RFC 8641 and RFC 9196 establishes an interoparable standard among YANG-Push publisher and receiver implementations for subscription and notification capability negotiation and subscription configuration and notification schema. Reducing the operators burden of maintaining multiple YANG data collections and transformations and enabling automated subscription deployment and transformation.

YANG-Push to Message Broker Integration Architecture, draft-ietf-nmop-yang-message-broker-integration, makes YANG notifications and YANG schema natively consumable in a Data Mesh enviroment. Enabling interoparable YANG integration into network observability real-time streaming applications.

This website aims to help YANG-Push implementors and operators by giving an overview on different standard documents and their features, in which minimal viable product which features are available, which minimal viable product has been implemented in which network operating systems and how they can be deployed the easiest in a network operator data mesh enviroment.

Latest News

Some parts of the YANG-Push specifications are still under development at IETF NETCONF and NMOP. In order to keep the implementors and operators up to date, regularly updates, changes are being summarized. Helping to keep track how the specification and implementations are changing and give guidance how you can get involved in the discussions.

¬ read more

How To Implement

There are several documents from IETF NETCONF and NMOP working groups to be considered for implementation. In an agile incremental driven development fashion, features from these documents are being categorized in releases to help the implementor to align with the operators needs. In MVP 1 release the focus is to establish a working data processing pipeline. While in MVP 2, features which help to scale and secure are being introduced. And in MVP 3, features to optimize, further scale, are being added.

¬ read more

How To Deploy

There are several open and closed sourced implementations available. To ease the network operators deployments, the available implementations are being listed, functionalities are being described, configurations are exampled and with deployment guides complimented.

¬ read more