Hi, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. The summary of the review is Ready with nits, but I am not an expert in this area, so please take this comments as questions that came to me while reading the document. Introduction: [...] The performance of VPN services is associated with the performance changes of the underlay networks that carries VPN services. For example, link delay between PE and P It seems to me that is the first time these acronyms are introduced - same with CE. devices and packet loss status on Layer 2 and Layer 3 interfaces connecting PEs and CEs directly impact VPN service performance. Additionally, the integration of Layer 2/Layer 3 VPN performance and network performance data enables the orchestrator to subscribe uniformly. I do not understand "subscribe uniformly". My impression is that here the orchestrator is responsible to enforce some network performances, and depending on the performance to meet, it will choose one configuration or the other. Does the use of one configuration versus the other is seen as a subscription ? If that is correct, this sounds like a cooperation between various actor. If so, that surprises me. Therefore, this document defines a YANG module for both network and VPN service performance monitoring (PM). The module can be used to monitor and manage network performance on the topology level or the service topology between VPN sites. This document defines a base YANG data model for monitoring of network performance and VPN service performance. I have the impression the text above repeats the previous paragraph. [...] 3. Network and VPN Service Performance Monitoring Model Usage As shown in Figure 1, in the context of the layered model architecture described in [RFC8309], the network and VPN service performance monitoring (PM) model can be used to expose operational performance information to the layer above, e.g., to an orchestrator or other client application, via standard network management APIs. I am wondering if the client application is related to the Customer. I do not think so, but I might be wrong. I am wondering if that would make sense to have the client application being mentioned on the figure.