It is unclear that the YANG model is only for the collector part of syslog.
Section 1
What is the target system ? At first reading, it seems to be the collector
system, if so, should the I-D be consistent in vocabulary ?
Section 5.1
While I am not a YANG expert, isn't it weird to replicate the facility-filter
under console, remote, and file ? Or is it just a caveat of the tree diagram
when it expands the facility-filter grouping several times ?
Would it be possible to import TLS and authentication from other YANG models ?
From Eric:
Abstract and title
It is unclear that the YANG model is only for the collector part of syslog.
Section 1
What is the
target system
? At first reading, it seems to be the collector system, if so, should the I-D be consistent in vocabulary ?Section 5.1
While I am not a YANG expert, isn't it weird to replicate the facility-filter under console, remote, and file ? Or is it just a caveat of the tree diagram when it expands the facility-filter grouping several times ?
Would it be possible to import TLS and authentication from other YANG models ?