Apache Mesos / Containerization Working Group

Add meeting Rate page Subscribe

Apache Mesos / Containerization Working Group

These are all the meetings we have in "Containerization Wor…" (part of the organization "Apache Mesos"). Click into individual meeting pages to watch the recording and search or read the transcript.

26 Jul 2018

  • 3 participants
  • 39 minutes
cluster
issue
kappamini
gpu
debugging
io
log
observed
bug
hosts
youtube image

12 Jul 2018

No description provided.
  • 8 participants
  • 1:05 hours
filtered
second
configuration
proxy
processes
privileges
fork
comm
linux
helpers
youtube image

28 Jun 2018

No description provided.
  • 3 participants
  • 14 minutes
host
provisioning
suggest
issue
launched
docker
gober
doctor
access
reconsidering
youtube image

14 Jun 2018

No description provided.
  • 5 participants
  • 45 minutes
configuration
cpu
subsystem
automatic
somatic
systems
control
processor
centos
hosts
youtube image

17 May 2018

No description provided.
  • 5 participants
  • 52 minutes
container
dev
implementation
launch
device
users
tooling
interface
issue
kvm
youtube image

3 May 2018

No description provided.
  • 6 participants
  • 59 minutes
docker
hdfs
turbo
setups
host
skins
hd
interface
vm
dfs
youtube image

5 Apr 2018

No description provided.
  • 4 participants
  • 1:05 hours
managed
discussed
approach
ownership
users
push
diligence
access
ongoing
problems
youtube image

8 Mar 2018

  • 7 participants
  • 1:06 hours
issue
demon
executed
takes
docker
present
mesa
watcher
message
backed
youtube image

22 Feb 2018

  • 6 participants
  • 54 minutes
functioning
interim
currently
backend
launch
control
computing
circa
issue
thinking
youtube image

8 Feb 2018

  • 8 participants
  • 1:04 hours
discussion
container
issue
finish
triage
stuff
regarding
reviewing
discussed
preparing
youtube image

25 Jan 2018

  • 5 participants
  • 47 minutes
planning
patches
launch
issue
finished
general
prioritization
tentative
gti
containers
youtube image

11 Jan 2018

  • 2 participants
  • 50 minutes
mount
si
supporting
storage
csi
lvm
provisioning
disk
interface
manage
youtube image

30 Nov 2017

  • 4 participants
  • 41 minutes
gce
provisioning
executor
container
protecting
debugging
launch
guys
users
authorization
youtube image

16 Nov 2017

  • 7 participants
  • 1:05 hours
user
naming
introduce
provisioner
tasks
hosts
james
usernames
interface
launch
youtube image

19 Oct 2017

  • 6 participants
  • 56 minutes
discusses
configuration
introduction
users
namespaces
adding
discussion
inside
space
understanding
youtube image

5 Oct 2017

  • 6 participants
  • 49 minutes
container
problems
docker
ongoing
space
provisioning
vessels
helper
message
discussed
youtube image

21 Sep 2017

  • 10 participants
  • 58 minutes
ram
launch
users
provisioned
riot
support
linux
chat
vm
stuff
youtube image

7 Sep 2017

  • 6 participants
  • 50 minutes
pam
discussed
workgroup
janice
comments
administrative
forking
hey
presentation
supporting
youtube image

24 Aug 2017

  • 9 participants
  • 56 minutes
container
launching
providers
demo
supervisor
containers
docker
containerized
introduce
interface
youtube image

10 Aug 2017

No description provided.
  • 7 participants
  • 53 minutes
planning
takes
patches
message
discussion
issue
sharing
features
launch
primo
youtube image

27 Jul 2017

  • 13 participants
  • 1:03 hours
users
containerization
initiative
discussion
maintain
hosts
user
governed
docker
implementing
youtube image

29 Jun 2017

https://docs.google.com/document/d/1z55a7tLZFoRWVuUxz1FZwgxkHeugtc2nHR89skFXSpU/edit?usp=sharing

Agenda/Notes:
[YanX, Jason, Gilbert] pre/post hook discussion
[YanX] preliminary doc about the problem and the thoughts
[Jie] sounds good. The key is to figure out the “context” where those commands will be executed. For instance, what namespaces (agent/container) the commands can assume? What cgroup those commands will be put into? What filesystem (agent/container) the command will assume?
[Jie] hooks within the container context can be done via a nested container by the executor?
[Jie] What’s the relationship between isolator container work? Will isolator container be sufficient for the use case?
[Jpeach] Linux capabilities enhancement, MESOS-7671
[Jpeach] Demo on the new linux capability improvement using mesos-execute
[Greg] Authorization on what capabilities a framework can grant a container?
[Jpeach] Host port isolation, MESOS-7675
[Jie] ephemeral port? Libprocess based executors are binding to a port that is not allocated by Mesos. Work around: only scan advertised ports (i.e., ‘port’ resources).
Status update
Planning spreadsheet
  • 8 participants
  • 1:03 hours
discussions
scheduled
morning
currently
chat
having
tentative
protocol
minutes
launch
youtube image

15 Jun 2017

Agenda/Notes:
Volume ownership/permission (Ilya)
[Jie] different types of volumes in Mesos
Sandbox
Host volume
Docker volume (external, dvdi based)
Persistent volume (local, or CSI based in the future)
[jpeach] We need to call out the semantics we want in the doc.
[jpeach] alternative: require that all containers that want to access the same volume are under the same user
[jie] setgid bits? Do we really need that?
[jpeach] should the ownership of the volume be allowed to be changed
[yanx] similar to jpeach’s comment, we can allow framework to specify the ownership of the persistent volume and the access control is up to the operator.
Action items:
Jie will schedule a meeting to discuss the semantics we want to support with relevant stakeholders

Status update
Planning spreadsheet
  • 7 participants
  • 56 minutes
containerization
permissions
volume
manage
sharing
users
vfs
ownership
containers
problems
youtube image

1 Jun 2017

No description provided.
  • 8 participants
  • 60 minutes
planning
discussed
cpus
thinking
proposals
containers
process
design
ahead
presentation
youtube image

18 May 2017

No description provided.
  • 15 participants
  • 1:02 hours
reviewing
helpers
discussion
workgroup
users
suggestions
coordinating
section
important
having
youtube image