►
From YouTube: Antrea Community Meeting 01/18/2022
Description
Antrea Community Meeting, January 18th 2022
A
So
good
morning,
good
afternoon
or
good
evening,
I
think
we
can
consider
this
the
first
distance
of
the
anterior
community
meeting
for
year
2022.
As
you
probably
know,
we
had
a
very
short
meeting
on
january
4th.
But
as
there
was
no
topic
on
the
agenda,
the
meeting
was
cut
kind
of
short
immediately
and
therefore
this
is
our
first
real
meeting
of
the
year.
Today
is
january
wednesday,
the
19th,
of
course,
if
you
are
in
the
united
states,
you're
still
in
the
past,
it's
still
tuesday
january
18th.
A
For
you
and
in
the
agenda
for
today
we
have
a
discussion
of
the
multivillian
implementation
for
entry,
album
that
will
be
led
by
run
and
then
open
discussion,
and
I
think
that's
all
for
my
introduction
and
therefore
I
will
leave
it
to
run
for
presenting
the
design.
B
Okay,
today,
I
will
introduce
the
multiple
vlan
support
with
a
flashlight
for
you
and
okay.
Let's
start
first
I'll
introduce
about
the
flex
by
pam
anchor
previously
uses
the
node.ipam,
also
also
with
a
host
local
plug-in
by
default.
This
method
will
allocate
a
cider
per
node.
C
B
B
We
support
users
to
specify
ipv4
and
ip
for
port
and
server
set
and
deployment.
B
Here
is
a
ip4
example
for
the
new
multiple
vlan
support,
so
we
extend
the
the
ip
ranges
item
with
a
vlan,
so
users
can
specify
the
vlan
for
each
accurate
and
the
default
is
zero,
as
as
we
currently
do
not
have
have
the
vlans
for
ipv
ip
renders.
B
And
here
is
a
obs
in
os
flow,
enhanced
enhancement
in
android
1.4,
with
flexible
ipad,
with
the
flashlight
enabled
we
need
to
bridge
the
uplink
to
the
ovs
bridge,
which
the
first
name
is
br
int,
and
we
also
need
to
configure
the
node
ip
to
the
bridge
port,
which,
which
will
have
the
same
name
with
the
os
bridge
and
also
the
andrea
gw0,
and
the
existing
port
will
not
be
affected
and
for
the
new
port
which
named
entry
ipam
port.
B
And
for
entry
1.6,
we
need
to
add
the
multiple
vlan
support,
so
we,
firstly,
we
need
to
set
the
existing
port
as
the
access
mode
and
with
vlan
0,
but
we
can
also
keep
keep
it
in
trunk
mode
this
if
we
keep
it
in
in
trunk
mode.
It
is
friendly
for
the
upgrade
scenario,
because
we
don't
need
to
change
the
existing
part
mode.
B
B
B
Next
is
os
flow
tables
enhancement
because
entrance
uses
os
table
10110
as
the
output
table
to
output
packet
to
os
ports
and
if
we
want
to
add
the
multiple
vlan
support
since
obs
won't
process
vlan
tag
automatically.
If
we
specify
the
output
port,
we
need
to
add
a
new
table
to
process
this
network
before
the
output
table.
B
B
And
if
the,
if
the
import
is
trunk
and
the
output
part
is
accessible,
we
need
to
pop
the
villain
head
and
for
the
normal
action,
such
as
the
broadcast.
B
Such
as
off
request,
we
don't
need
to
do
any
additional
process
for
the
vlan
type.
Obs
will
set
it
automatically
when
action
is
normal.
B
We
need
to
set
the
go
to
table
action
from
the
output
to
the
vlan
table
and
we
add
some
flows
in
vlan
tables
to
process
it
such
as
this.
If
the
import
is
uplink
and
we
we
can,
we
can
believe
the
output
part
is
not
uplink,
so
it
is
a
access
part,
so
we
can
just
pop
vlan
and
if
the
import
is
a
ipam,
vlan
port
and
the
register,
one
is
which,
which
stores
the
the
output
part
number
and
the
three
means
the
output
is
uplink.
B
B
And
also,
we
still
have
some
open
items
open
items
for
this.
For
this
change
first
is
frederick's
name.
We
we
already
have
the
and
trap
ham
fresher
gate,
but
if
we
need
to,
if
we
want
to
add
another
con
config
config
to
switch
on
or
off
the
multiple
vlan
support,
we
we
need
to
cut
decide
a
new,
a
new
configuration,
and
the
second
item
is
I
mentioned
about.
B
D
Hi
line
thanks
for
sharing
and
for
the
open
questions
I
think
for
the
first
one.
Do
we
really
need
another
feature
kit
to
enable
this
multiple
reliance
support?
Could
we
just.
D
When
there
is
when,
when,
when
users
specify
or
we
learn
for
a
poor,
then
we
will
behave
differently.
D
B
It's
okay,
but
if,
if
we,
if
we
use
this
method,
I
think
the
it
is
better
to
use
existing
transport
for
the
second
of
patterns.
D
B
Yeah,
I
think
we
we
can
keep
this
part
in
in
in
this
graph
graph.
The
vlan
zero
access
part
can
can
be
the
trunk
part
with
all
vlans
villas.
B
D
A
Hello
ron,
there
is
something
that
I
did
not
understand
about
the
flaws.
Can
you
go
back
to
slide?
Eight,
the
one
with
the
flows,
the
second
floor,
the
one
that
applies,
the
the
tag
you
see
that
it
captures
a
it
says
import
and
that's
you
know,
that's
the
por,
the
pod
port,
which
is
supposed
to
be
target
and
then
registry,
one
zero
extreme
means
uplink.
B
Yeah,
the
red
register,
one
will
store
the
output
part
number,
so
you
can
also
you
can
see.
We.
We
have
the
output
this
flow
in
in
output
table.
We
output
to
register
one.
A
I
see
no,
no
that's.
This
is
clear,
it's
just
that
we
are
matching,
therefore,
on
traffic,
that
is
a
from
the
pod
port
to
the
uplink
board,
and
we
apply
the
vlan
tag
to
the
traffic.
Is
that
correct.
B
Yes,
because
this
all
the
packet
inside
obs,
don't
have
the
villain
hack.
A
No,
I
understand
this,
I'm
trying
to
figure
out
what
is
the
expected
behavior
for
vlan
traffic
between
two
pods
that
have
are
supposed
to
be
on
the
same
vlan,
which
are
on
the
same
on
the
same
host.
Do
we
send
it
to
the
physical
network
in
any
case,
or
in
that
case,
do
will
we
forward
the
traffic
locally
on
open
switch.
B
So
we
can
a
because
the
if
a
packet
from
if
a
package
from
a
vlan
part,
we
cannot
get
the
vlan
tags
inside
obs,
okay,
okay,
but
if,
if
a
packet
with
wieland
has
is
from
a
trunk
part,
we
can
get
the
villain.
A
I
understand
I
understand
now,
I'm
just
asking
this.
You
know
to
sorry
if
this
is
a
stupid
question,
so
this
means
that
we
are
not
able
to
tag
the
traffic
if
the
traffic
is
supposed
to
be
local
in
the
same
in
the
same
open
with
which
instance.
So
if
you
have
two
pods
on
the
same
vlan
on
same
open
with
which
distance
the
traffic
will
be
forwarded,
let's
say
using
normal
forwarding
rules,
but
it
will
not
be.
It
will
not
have
a
vlan
tag.
Is
that
correct.
B
A
Okay,
so
summarizing,
let's
assume,
let's
now
think
about
a
different
scenario
where
you
have
two
pods
on
the
same
open
with
which
instance,
which
belong
to
different
two
different
vlans.
Let's
say
one
is
vlan
100
and
the
other
one
is
vlan
101.
A
B
A
A
B
And
for
this
scenario,
I
prefer
users
to
add
a
additional
network
policy
for
this.
A
Okay,
I
mean
I
I
understand-
I
understand
where
you're
coming
from
it's
just
that
probably
and
yes,
if
the
other
network
policies
they
will
achieve
the
same
result
is
just
probably
that
this
is
something
that
probably
at
least
we
want
to
document,
as
it
might
not
be
obvious
to
users.
They
may
think
that
hey,
I
just
configured
vlan
and
I'm
done.
E
E
E
I
mean
we
learn
time-based
forwarding
without
really
a
vlan
being
created,
but
if
it's
physical
network
with
vlan
and
probably
the
intention
just
to
put
the
pod
in
different
ways,
but
I'm
not
sure
it's
a
big
issue
or
not
south
korea,
probably
we
can
also
check
with
pms.
Yes
if
they
have
some
the.
A
Thing
is
that
the
thing
is
that
once
we
to
the
physical
network,
yes,
we
have
a
villain
isolation
inside
the
physical
network,
as
ron
said
inside
the
obs
to
ensure
isolation.
A
Inside
of
yes,
we
need
to
couple
that,
with
with
the
network
policies
now,
yes,
we
can
discuss
from
a
requirement
perspective
whether
we
want
to
give
let's
say
the
same
behavior,
that
user
will
normally
expect
with
the
vlans
or
whether,
instead
you
know,
we
think
that
it
is
okay
to
have
this
sort
of
peculiar
behavior,
and
then
it's
just
documented,
and
so
users
know
that
they
have
to
define
a
namespace
with
a
vlan
tag
and
additionally
also
configure
the
network
policy
for
isolation
yeah.
I
think
that
that
might
be
acceptable.
A
A
A
Okay.
So
thanks
a
lot
for
the
clarification,
so
my
other
question
is
on
slide
4
on
the
specification
and
it's
a
very
simple
question:
do
you
think
that
we
need
to
add
the
validation
or
admission
controllers
for
making
sure
that
vlans
are
unique,
that
you
know
no
two?
We
don't
have
two
name
species
using
the
same
villain.
B
D
For
the
question
starter
list,
the
how
how
to
for
water
traffic
inter
reliant,
but
when
the
pods
are
on
some
node,
I
think
maybe
we
we
could
add
a
configuration
just
like
the
mac
vlan
implementation,
that
there
are
two
modes
in
one
mode:
the
traffic,
the
in
intra
node
traffic
can
be
forwarded,
forwarded
directly
inside
the
ram
and
in
other
modes
all
traffic
will
be
transfer
will
be
forwarded
to
the
physical
network
and
then
back
to
the
way
I
am,
I
remember
they
are
called
bridge
mode
and
another
one
is
called
wii
pa
mode.
D
Yeah
yeah
sure
and
for
the
we
line
usage
I
see
that
we
have
to
pop
the
wheel
and
tag
and
attach
and
add
will
intact,
depending
on
where
the
traffic
comes
from
and
where
you'd
go.
E
B
D
So
so,
if
we
go
this
way,
do
we
really
need
to
change
the
access,
the
the
attribute
of
the
port
like
access
or
trunk,
or
we
could
just
use
use
open,
open
flow
to
control
the
forwarding?
Because
we
we
don't
we
when
we
don't
leverage
any
and
benefit
that.
D
D
Okay,
if
they
are
in
different
freelance,
it
will
acquire
the
giveaway.
So
the
request
will
go
out
we'll
go
to
the
trunk.
B
B
B
A
Okay,
good
thanks
for
all
the
clarifications
ron,
and
so
we
are
targeting
andrea
1.6
for
these
new
capabilities.
That's
correct!.
D
I
have
another
question:
how
many
open
flow
laws
is
expected
in
this?
We
learn
table,
I
mean
do,
do
you
need
a
one
flow
for
each
pair
or
four
ports
or.
D
B
D
Okay,
I
think
we
we
don't
need
that.
Okay,
can
I
take
your
answer
as
we
don't
need
a
flow
for
each
pair
of
port?
We
just
need
a
flow
for
each
port
and
each
trunk
pot
yeah.
Okay,
thanks.
A
Perfect,
so
thanks
a
lot
ron
for
your
presentation,
we
are
looking
forward
to
the
to
the
prs
and
to
enable
this
feature
in
andrea
now,
moving
up
to
open
discussion,
I
believe
that
young
would
like
to
bring
up
an
interesting
problem
that
has
also
been
discussed
from
what
I
recall
in
the
sig
network
meeting,
and
that
also
applies
to
andrea
network
policies.
F
Yes,
I
am,
but
can
I
actually
share
my
screen
to
to
demonstrate
this
sure
sure
go
ahead?
Okay,
okay,
I'll
try
to
make
this
as
quick
as
possible.
So
essentially,
you
know
with
the
upstream
cluster
network
policy
discussions
we're
the
background.
Is
that
we're
trying
to
you
know
design
the
new
cluster
network
policy
api
for
the
upstream
kubernetes
and
in
terms
of
design
choices?
We
were
we're
in
current
encountering.
F
You
know
something
that
we
may
want
to
change
in
terms
of
the
current
network
policy
income,
api
specification.
So,
as
many
of
you
know
you
know,
in
the
current
network
policies
we
can
select
workloads
in
a
lot
of
different
fashions.
F
So,
for
example,
in
ingress
rules,
one
of
the
ways
to
select
workloads
is
using
namespace
vector,
which
you
know,
selects
all
the
workloads
and
namespaces
matching
one
label
and
the
other
way
is
paw
selector,
which
means
that,
regardless
of
namespace,
as
long
as
the
pod
matches
certain
labels,
those
parts
will
be
selected
now.
The
interesting
part
is
that
those
two
selectors
can
be
used
in
conjunction,
which
means
that
some
the
parts
needs
to
satisfy
both
conditions,
both
the
name,
space,
vector
condition
and
the
positive
vector
conditions
for
it
to
be
actually
selected
by
this.
F
You
know,
conjunctive
selection
mechanism,
so
though
this
was
working
in
network
policy
implementation,
but
there's
an
interesting
problem
brought
up
because
some
people
are
are
actually
trying
to
add
news
vectors
to
the
network
policy
peers,
for
example,
service
account
selector
right
so
consider
this
like.
I
wanted
to
select
service
account
possible
service,
certain
service
accounts
and
matching
namespace
selectors
blah
blah
blah,
and
people
are
saying
that
I
okay.
We
wanted
to
add
this
to
the
current
network
policy.
F
Why
can't?
We,
just
you
know,
throw
this
in
right,
because
it's
just
another
selector
and
we
can
do
some
sort
of
like
api
validation,
to
make
sure
that
you
know.
In
a
certain
period,
the
service
account
can
only
be
standalone
or
to
be
used
with
namespace
selector,
but
you
cannot
say
something
like
service
accounts,
vector
and
post
vector.
That's
just
not
about
it.
Why
can't
we
do
that
now?
F
The
the
problem
that
brought
up
with
this
is
that
people
realize
that,
for
old
c
and
nice
adding
this
kind
of
things
is
not
fail
closed.
It
will
fail
open
for
some
cases
so
consider,
let's
just
consider
entry
as
a
cni
right
when
and
share
receive
a
network
policy,
and
it
processes
it.
F
It
will
look
at
each
ingress
peer
in
this
case,
so
it
would
say,
as
as
long
as
I'm
sure
understands
there
are,
there
will
only
be
three
kind
of
cases.
One
is
this,
and
the
second
is
this,
and
the
third
case
is
this
right,
so
andre
doesn't
really
know
to
look
for
something
else.
F
So
entry
will
process
this
the
same
way
as
this,
because
entry
doesn't
actually
know
to
look
for
service
accounts
vector
that
just
doesn't
exist
for
as
far
as
the
cni,
though,
because
it's
an
upgraded
cni
and
that
creates
a
problem
because
in
the
actual
implementation
or
realization
of
obvious
flows
and
sure
will
just
push
down
the
addresses
matching
the
namespace
vector
but
disregard
this,
and
you
know
there
won't
be
any
errors
thrown
out,
because
entrad
doesn't
know
that
this
is
a
problem.
In
fact,
it
might
doesn't
even
know
at
all
that.
F
There's
a
field
called
service
consecutive
existing
in
the
in
the
new
now
policy
spec,
because
it
doesn't
know
to
look
for
it
so
to
to
to
summarize,
the
problem
is
that
oc
and
nice
may
enforce
the
new
api
network
policy
api
instances
wrong
without
any
warnings
or
errors
wrong,
and
this
is
what
we're
trying
to
avoid
in
the
upstream.
That's
why
you
know
in
the
in
the
upstream
discussions
when
people
are
trying
to
bring
service
account,
selectors
or
or
something
similar
into
current
network
policies.
F
The
short
answer
is
no,
because
you
cannot
do
that.
It
requires
us
to.
It
will
require
the
cni's
to
sort
of
like
do
some
sort
of
admission
control
for
the
network
policies
and
specifically
say
that
you
know
before
I
support
service
account
selector
in
my
reconsiders.
F
You
cannot
create
something
like
this,
which
is
not
ideal,
so
people
are
turning
into
something
like
network
policy
v2s
to
actually
throw
this
in,
and
you
know
members
in
the
sig
network
space,
specifically
tim
hawking,
when
we're
you
know
having
a
conversation
regarding
the
new
cmp
design,
they're
saying
that
this
is
a
mistake
we
made
in
the
in
the
when
designing
the
original
network
policy
for
kubernetes,
like
this
conjunction
of
selectors,
should
never
actually
have
existed
in
the
first
place.
F
A
better
way
to
do
this
is
to
be
extremely
verbal
and
specific
so
that,
instead
of
doing
namespace
vector,
we
needed
to
have
a
type
usually
maybe
called
namespace
and
sorry
endpod
selector
and
as
a
field
of
this
specific
struct,
it
will
have
a
namespace
selector
and
a
pod
selector
as
a
field.
F
So,
as
you
can
see,
there
is
a
lot
of
redundant
information,
because
here
you
will
say:
okay,
the
entire
struct
is
a
namespace
and
pass
vector
and
underneath
you
have
namespace
vector
empires
pause
vector.
So
this
feels
redundant.
But
what
what's
good
about
it
is
that
now
you
can
mandate
the
network
policy
peer
to
be
one
of
a
couple
of
kinds,
so
the
only
valid
kind
will
be
namespace
vector
all
paw
selector
or
this
namespace
and
pass
vector
or
whatever
the
other
combinations
that
we
support
in
the
future.
F
Now,
when
c-
and
I
look
at
this,
cni
should
look
for
a
specific
type.
For
example,
I
the
the
specific
type
being
like
enum,
that
it
is
already
supporting
it.
It's
either
namespace
vector
pod,
selector
or
namespace
and
pod
selector.
Now,
when
user
created
something
like
namespace
and
service
accounts,
vector
cnis
will
immediately
know
that
this
is
a
problem,
because
this
is
a
new
type
that
it
doesn't
really
know
about.
F
In
that
case,
it
can
draw
the
mirror
saying
that
hey,
I
don't
know
how
to
implement
this,
or
I
don't
know
how
to
realize
this
on
in
obs,
because
you're
using
a
new
ingress
period,
type
that
I
haven't
been
supporting
yet
so
so
this
is
the
sort
of
like
a
result
of
the
discussions
we
had
and
I
actually
was
talking
to
grayson
on.
You
know
his
pr
that
we
probably
wanted
to
incorporate
this
comment
into
some
of
the
new
designs.
F
We're
making
specifically
about
service
accounts,
so
right
now
in
the
service
account
api
design.
You
know
we're
a
lot
of
places
where
using
the
old
way
where,
when
we're
selecting
service
accounts,
we're
using
a
mixture
of
selectors,
for
example,
the
labels
vector
namespace
vector
ended
together
or
conjuncted
together
and
namespace
name,
which
is
another
way
of
selecting
this.
Now.
Instead
of
doing
something
like
this,
we
might
consider
doing
something
really
explicit
and
verbals
so
that
you
know
under
service
accounts.
F
We
strongly
type
the
the
kind
of
service
account
selection
mechanism
that
we
support
it's
either
a
namespace
name
or
a
namespace
label
and
service
account
label,
selector
or,
let's
say
namespace
label
and
service
account,
name
selector.
So
any
kind
of
like
valid
combination
that
we
wanted
to
support
support.
We
laid
it
out
explicitly
so
that
you
know
people
know
that
which
kind
of
selection
mechanism
we're
using
and
by
doing
this
it
we
are
basically
future
proof
in
ourselves
and
any
new
selection
mechanism.
We
wanted
to
add
in
the
future.
F
We
can
be
sure
that
everything
that
the
new
things
are
fair
closed
for
all
all
the
implementations
and-
and
you
know
we
can
add
as
many
as
as
we
can
add
as
many
combinations
that
we
add
that
we
wanted
and
the
the
the
number
of
combinations
of
this
lecture
in
the
real
case
will
not
be
the
cartesian
product
of
all
the
selectors
out
there,
because
some
combinations
would
just
not
make
sense.
F
For
example,
paw
selector
with
ended
with
service
account
selector
doesn't
really
make
sense,
so
this
would
not
be
a
combination
that
we
support,
and
so
that's
why
we
won't
have
you
know
that
combination
as
a
type
here,
but
the
idea
is
that
you
know
any
combination
that
we
support.
We
sort
of
like
laid
it
out
so
that
when
we
define
the
open
api
validation
for
the
service
accounts,
we
can
say
the
the
service
account.
F
Specification
needs
to
be
one
of
namespace
name
or
namespace
label
and
service
account
label
selector
or
something
else
so
yeah.
This
is
this
is
this
is
the
the
problem
I'm
trying
to
present?
F
And
you
know
this
is
for
the
new
apis
that
we
are
designing,
but
my
my
my
feeling
is
that
in
the
best
case
scenario,
maybe
we
should
also
change
the
current
acm
ps,
where
we
have
the
pause,
vector
and
namespace
vector
conjuncted
in
you
know,
in
this
fashion,
maybe
we
wanted
to
change
them
as
well,
so
that
you
know
people
create
policies
not
like
this,
but
using
a
unified
struct
with
a
different
name,
but
I
admittedly
it
will
be.
F
You
know
a
real
headache
because
of
the
acn
piece
back
that
we
all
have
already
rolled
out
so
that,
if
we,
you
know,
don't
support
this
anymore,
then
it
would
be
a
huge
backward
compatibility
issues.
And
you
know
if
we
support
both
this.
This
kind
of
writing
and
the
other
writing.
It
will
also
be
really
confusing
to
people
so,
but
but
the
bottom
line
is
that
for
the
new
api
designs,
we're
trying
to
stuck
with
this
pattern
instead
of
the
the
old
ones.
D
Should
be
specified
ex
expensive
early,
but
my
question
is
whether
it
could
lead
to
too
many
strikes
similar
strikes
that
how
similar
fields,
for
example,
this
namespace
label
and
the
service
encounter
label
selector
and
the
namespace
and
the
port
they
will
say.
Could
we
use
some
unified
structure
to
represent
multiple
types?
For
example,
we
could
just
have
two
basic
types:
namespace
the
object,
selector
and
just
object
selector
and
for
the
formal
one
we
just
have
two
fields.
One
is
called
select
a
one
object,
selector
and
another
one
is
the
type
of
the
object.
F
F
So
it
will
be
a
little
bit
of
a
mind
twisting
for
people
to
you
know
when,
when
you
write
acmps,
you
select
workloads
in
in
one
sort
like
fashion,
and
when
you
write
about
service
accounts
in
a
cnp's,
then
you
need
to
write
it
in
entirely.
You
know
different
ways,
but
I
don't
know
it's
a.
It
might
not
be
a
problem,
but
yes,
I
think
that's
that's
a
good
proposal
that
we
can.
We
should
definitely
consider
as
well
we'll,
let's
see
I,
I
guess
I'll
I'll-
actually
point
it
to
grayson.
F
Who
is
also
on
the
call
to
do
some.
You
know
very
quick
evaluation
on
you
know.
If
you
know
the
one
approach
will
be
less
the
defining
less
drugs
than
the
other.
I
guess.
G
Yeah
from
my
understanding,
I
guess
maybe
for
service
account,
we
can
use
the
like
you
proposed
in
the
on
screen
in
the
comments
and
when
we,
if
we
want
to
like
use
this
kind
of
api
design
or
acnp
like
between
namespace
selector
and
the
pod
selector,
we
can
try
to
do
like
add
a
field
called
type.
It's
a
pod
or
it's
a
service
account
and
change.
The
service
account
api
design.
At
the
same
time,
you
know
if,
if,
if
that's,
if
that
kind
of
design
will
like
use
less
struct.
F
Now
the
the
problem
with,
as
I
mentioned,
the
problem
with
changing
the
current
way
of
defining,
acnp
or
amp,
is
that
you
know
we
needed
to
consider
upgrade
right.
So
so,
essentially
we
for
for
backward
compatibilities.
F
F
I
didn't
yeah
sure
I
think
I
think
I
think
it's
better
to
just
you
know,
put
this
idea
like
in
in
yamo.
I
guess
first
to
to
sort
of
like
evaluate
how
that
will
unfold
and
then
we'll
see.
A
Right
thanks
a
lot
for
bringing
this
up,
and
I
believe
that,
probably
as
a
the
outcome
of
this
conversation
is
that
as
anything
pertaining
epa
specs,
it
needs
more
conversation.
A
So
since
we
are
almost
top
of
the
hour,
perhaps
this
is
something
that
we
can
keep
discussing
in
the
next
community
meeting
and
it
might
help
providing
some
more
yaml
examples
and
also,
I
believe,
the
other
important
aspect
to
keeping
to
keep
in
check
is
potential
backward
compatibility
implications
and
figure
out
how
to
handle
those.
But
this
is
something
that
I
believe
we
can
address
in
the
next
community
meetings
meeting
in
two
weeks
time,
and
is
there
any
other
question
or
comment
regarding
what
has
just
discussed?
It's
been
discussed
regarding
selectors.
A
D
Maybe
I
could
give
a
quick
update
about
the
release,
progress
or
for
1.5
sure.
Currently,
a
major
code
change
have
been
made
merged,
except
the
except
pr
for
merging
the
multi
cluster
branch
to
main
branch.
So
I
would
appreciate
that
the
reviewers
or
for
the
that
branch
could
review
the
mod
pr
so
that
we
could
process
proceed.
D
The
release,
progress,
yeah
and
some
other
minor
appears,
as
as
they
are
pending
on
reviewing,
for
example,
the
talk
and
the
antenna
test
patches
for
new
features,
yeah,
that's
what
we
need
kindly
and
I
will
write
a
release
note.
Maybe
today,
and
hopefully
you
could
review
that
pr
tomorrow,
then
we
can
ensure
that
the
risk
can
go
out
this
week.
D
E
E
A
do
you
have
an
expected
deadline
if
we
want
to
release
anton.
C
E
Okay,
another
one
that
rci,
I
I
still
see
a
song
sometimes
frequently
fail
that
due
to
the
test
case
or
due
to
say
I
do,
do
you
see
the
same
thing
or
just
me
see
the
feeling.
E
For
example,
I
was
looking
at
the
pr
by
a
round
for
second
network.
I
saw
the
multiple
test
field.
Sometimes
the
integrand
has
failed.
Sometimes
the
entrant
has
failed.
D
Sometimes
the
integration
test
indeed
failed.
I
think
it
is
still
a
little
free
flake.
Today,
okay,.
E
D
A
Cool,
so
I
think
that
that
might
be
all
for
today's
meeting
and
I
would
like
to
thank
everyone
for
joining
this
call.
Most
importantly,
thanks
to
ron
for
presenting
the
new
design
for
multivitamin
and
many
thanks
for
yank
for
bringing
up
these
this
problem
with
the
syntax
network
policy,
api,
syntax
and
then
semantics-
and
I
guess
that's
all
for
today.
So
thanks
again
for
joining-
and
I
will
talk
to
you-
we
will
talk
again
in
two
weeks
time.
So
I
wish
everyone
a
good
morning
good
afternoon
good
evening
and
goodbye.