►
Description
Ceph Day Germany
February 7, 2018
John Spay, Red Hat
A
B
So
having
in
the
presentation
about
listingbook
that
other
people
done
how
it
like
so
a
little
bit
about
what
I
learned
Alexia
and
that
is
how
she
integrates
them
into
container
orchestration
of
artists
and
how
that
relates
to
the
other
management,
we're
doing
so.
The
story
today
we
have,
except
is
a
little
bit
fraction
for
this
length.
B
The
distribution
using
our
pianist
is
also
problematic,
because
when
we
not
grace
that
clusters,
we
want
to
appraise
osp's
monitors
separately
in
a
particular
order
and
every
service
on
state.
She
has
to
be
exact
version
all
about
devices
so
difficult
like
say:
let's,
try,
upgrading
and
yes,
my
system
for
a
trade
of
guesses
for
another
class
system
and
the
top
of
the
excellence
or
installation
of
a
logical
set
of
tools.
You
also
generally
need
to
have
something
extra
to
do
some
monitoring
and
then
respond
to
that
monitoring.
So
the
service
is
applied.
B
It's
today
a
free
manual
process,
even
if
you're
using
the
best
tooling
available,
so
we're
very
interested
in
container
illustration
context
generally,
but
also
things
that
let
us
run
the
scalar
context,
the
popular
because
they
just
missed
everything.
Privately
you
take
your
application.
It'll
take
up.
All
the
products
are
instantly
fixed.
It's
a
old
indefinitely
suspect
right
life,
never
losing
container
everything
already,
and
you
know
my
parents.
People
were
these
benefits
because
they
are
set
in
reality.
B
Kubernetes
and
other
similar
tools
are
just
tools,
so
they
implement
the
ability
to
remotely
executed
things
on
cluster
a
service.
They
give
you
some
extras
in
terms
that
detective
reports,
normal
devices,
are
available
to
you
memory
and
they
promote
you
a
scheduler
unless
you
just
for
the
decision
of
our
pleasure
of
the
services
today,
when
you're
selling
people
have
long
conversations
about
which
service
joints
like
by
Evanescence
wish
Michael
my
archenemy's
and
listening
today.
B
B
Communities
with
what
we
would
write
ourselves
if
we
were
writing
asset
management
framework
or
orchestration
framework
from
scratch-
and
we
find
that's-
it
was
very
similar.
If
you
were
writing
something
custom,
we
would
want
to
be
able
to
individually
deployed
versions
of
software.
Specific
services,
not
system-wide
getting
running
pea-brain,
make
decisions
about
where
they
should
run
based
on
resources,
and
that's
pretty
much
what
you
imagine
is
so
doable
for
us.
B
We
still
have
to
write
a
business
launch,
a
graphical
user
interfaces
or
prevent
that
makes
sense,
but
it
was
like
it
would
be
directly
with
each
other,
so
every
started
to
have
abilities,
but
for
the
benefit
of
anyone,
that's
not
familiar
with
it.
It
is
able
to
hold
straighter
and
slightly
less
technical
properties
as
an
open-source
project.
We're
very
interested
in
had
likely
able
to
this.
How
is
the
ecosystem?
How
is
the
community
and
humanity
another
fantastic?
B
Has
huge
buyer
from
major
companies
and
is
a
sobering
healthy,
flourishing,
open
source
projects
that
makes
a
very
good
fit.
Yeah
is
also
to
have
a
usefully
extensible
API,
so
humility
is
built
to
be
attended
and
it
provides
automatic
missing
Sedona
by
the
way
it
doesn't
listen
about
the
budget.
Pukin.
C
B
Ease
it's
remarkably
efficient
in
terms
of
its
resource
consumption,
accommodation
of
of
the
Google
Data
Services
has
easy.
Services
on
basic
setup
can
be
closer
to
the
hundreds
of
megabytes
than
to
the
gigabytes
of
RAM.
Construction
is
very
efficiently
implemented
compared
to
and
I
think
it's
not
to
criticize
them.
In
fact,
but
something
like
bugs
back,
we
have,
we
were,
might
develop
express
databases,
it's
like
that.
Sometimes
consumer
people,
memory
of
you
would
like.
So
in
summary,
you,
like
humanities.
B
A
B
Specifically,
communities
and
it's
explosive:
this
helps
the
user
by
sending
the
command
it's
recently
accepted
by
the
public.
Computing
foundation
has
an
exception
level.
Protection
specifically
work,
it's
you
but
contain
a
glitch
which
will
take
to
be
broken
services
that
is
repelled,
but
also
set
services.
It
is
your
agent
which
handles
connecting
kinetics,
contains
DSS
storage
by
imagining
audience
eating
body
and
a
central
component
called
the
operator,
and
so
the
operator
is
responsible
for
watching.
B
What's
in
the
etcd
configuration
database,
and
it's
synchronizing
that
to
the
snap
customer
so
to
respond
for
somebody,
even
that
was
too
great
a
sin.
As
file
system
music
wrote
the
way
they
do,
that
is
to
call
into
the
goo
CTL
online,
with
a
description
of
the
file
system
that
uploads
it
HTTP
database.
And
then
the
operator
sees
management
response
to
it
by
running
on
set
at
SMU
on
your
mother
sounds
a
little
bit
overkill
such
a
simple
example,
but
that's
the
that's
what
all
of
these!
B
So
that's
what
ends
up
being
the
effective
user
is
a
mess
Shahrukh
you're,
creating
on
cattle
files
that
describe
the
elements
in
your
system
and
blending
them
using
coop
CTL
creates
something
that's
used
throughout
or
possibly
tutorial.
If
you
go
to
Ritchie
to
rail,
about
obsessive
elements,
hangar
environments,
but
it
does
have
its
drawbacks.
Clearly,
it's
not
as
friendly
as
a
pointing
that
correctly
it's
an
isolated
handle
on
top
of
it.
Has
it's
smooth
expected
I
think
that
one
of
the
secrets,
a
technology,
will
ultimately
be
consumed
by
some
news.
B
There
are
some
examples
of
that
in
peanuts
or
the
kind
of
things
that
can
go
wrong
if
you
interact
with
the
system
by
directing
editing
stress
factors
that
initiative
accidentally
from
your
character
and
it
having
knock-on
effects
the
reason
this
is
a
big
deal.
Storage
that
is
context
in
general
is
the
inertia
of
data,
so
it
would
figure
Eight's
something
it
ever
like
how
we
might
service
shall
I
make.
The
statement
is
easy
to
all
that
people
put
their
hello
miles.
B
You
know
each
tree
and
the
imagination
obstruction
that
way
as
fantastic
a
great
technology
assignment,
but
it
doesn't
matter
well
to
storage,
because
if
you
edit
in
such
a
way
that
your
pool
no
longer
exists
and
you
will
operate
up-
interprets
that
I
say
ìlook,
you
removed
your
called
removable
file.
That
must
mean
I
should
program
itself,
I
see
Google
eat.
B
B
B
You
can't
expose
that
through
an
online
database
in
these
multi
comparison,
so
I
would
say
that
to
trench
Brooke
Brooke
is
a
very
interesting
project
and
it's
a
great
way
for
you
all
to
take
a
step
and
use
it
in
a
particular
environment
without
reinventing
the
wheel
by
coming
up
with
some
whole
new
storage
system
for
context.
But
what
I'm
saying
is
I
think
we
have
some
more
work
to
do
to
get
it
where
we
want
it,
so
just
to
firm
up
what
about
use,
which
basically
looks
like
on
left-hand
science
type
of
right.
B
This
is
the
example
documentation
of
the
race
except
class,
though
there's
racial
definition
to
the
reasoning.
Work
with
additional
definition
indicates
that
everything
else
is
just
a
ch2
t-bolts
work.
The
base
assumption
that
you
don't
want
to
be
migrated.
Configuration
of
your
system,
you
also
write
content,
write
applications.
You
want
stories
happening,
you
would
know
what
the
options
next
unit
access
to
them.
So
we
just
get
all
the
defaults
for
everything
and
then
you
load
it
into
a
cluster
with
you
see,
I'll
create
that
would
cluster.
B
B
So
this
is
my
answer
just
to
refresh
that
Manitoba,
it's
a
competitive
race,
it
hosts
about
Smyth
modules
and
if
it
is
helped
offensive
or
most
of
the
interesting
stuff
listing
these
micro
modules.
We
were
about
that
will
model
today
and
in
addition
to
the
kind
of
stuff
that
were
exists
in
open
ethic,
that
is
being
contributed.
As
we
listened
to
management,
we
also
like
cuneta
integration.
It's
a
great
place
to
make
suppose
that
stuff-
and
this
is
a
great
timing,
so
we're
all
very
happy.
That's
the
matter.
B
Guys
are
joining
Cal,
Street,
seven
projects,
and
it
happens
to
come
at
just
the
right
time
to
take
advantage
and
that
be
snap
to
expose
some
of
this
interest
in
you
functionality
a
square
operator,
the
oldest,
to
expose
it
accessible.
Remember
that
ste
that
ability
to
is
already
it's
like
that
manager.
We
do
call
out
to
your
operator
front,
step
manager
at
same
time.
We
don't
want
to
force
the
dashboard
user
interface
to
do
all
this
work
for
it
work.
B
A
B
Think
it
was
this
presentation
earlier
they
touched
on
the
importance
of
having
something
actually
set
in
your
system.
So
at
the
point
you
to
upgrade
maybe
was
taking
the
cluster
offline.
Who
manages
the
manager
yeah,
so
worker
can
play
that
role
as
the
thing
that
keeps
running
all
step
itself,
operated
with,
etc.
B
We
will
select
commonality
between
how
people
run
general-purpose,
set
clusters
opportunities
and
how
refuses
are
ready
to
stab
you
in
there
slightly
super
high
rent
up
way.
Let's
not
have
two
sets
and
there's
a
certain
expertise
is
up
that
we'd
like
to
keep
it
open.
So
the
way
it
about
stalking
song,
good,
netizens,
hangers,
the
overall
ignited
it
exposes
people
do
or
analgesic
usage
gap
is
a
very
useful
thing
actually
takes
them
into
different.
Using
these
people.
B
So
they
have
s
in
most
Montenegro,
so
Burke
apparently
wants
to
a
control
panel
that
pasta,
but
we
can
change
them.
So
the
certain
parts
of
the
definition
of
the
while
systems,
customers,
etcetera
it
broke
our
ocean
and
if
you
lose
mapped
word,
just
cannot
touch
that
the
example
and
I
like
to
use
it
for
pools
as
part
of
our
system.
So
rather
than
having
the
pools
listed
in
our
system,
is
have
class
system
as
expected
by
integrals
and
as
an
instruction
to
Brooke
to
say,
look
a
fascist
with
this.
Wherever
the
corner.
B
Don't
try
to
control
it.
If
they
have,
you
know
to
our
enemies
of
the
ability
to
do
that,
Sandy's
regulator,
but
to
create,
might
exploit
so
they're.
Creating
since
Lynne's
data
section
of
the
work
operator
there,
we
can
call
out
to
concept
manager
and
had
approached
with
the
protection
wall
thickness
of
the
migration
path.
So
any
somebody
has
had
a
first
exposure
detect
using
work
and
they
would
work
in
cluster
but
able
to
move
to
all
Chapel
this
environment.
You
could
do
some
of
the
things.
B
B
So
that's
sort
of
rough
rough
diagram
of
two
deliriously
happy
users
want
to
desert
that
work.
User
I
want
to
do
this
at
the
step
user
and
then
using
these
two
different
entry
points.
But
it's
all
coming
up
to
the
work
operator,
which
is
controlling
kubernetes
and
in
either
case
they
are
using
the
same
container
image
tool
text
at
the
livid
background
on
why
you
might
not
both
so
one
of
the
sort
of
catch
phrases
that
comes
up
sometimes
in
conversations
with
product
managers.
B
D
B
People
who
are
at
that
point
in
that
application
lifecycle,
because
that's
very,
must
get
covered,
but
at
the
same
time
it's
not
the
whole
story
and
what
we
can
accept
easiest
use.
We
should
fixity
things
like
wanting
to
use
up
if
there's
no
technical,
because
we
think
you're
right,
we
should
make
that
the
most.
We
fix
that
the
decision-making
about
what
kind
of
hard
way
what's
wrong,
how
you
got
to
configure
it?
How
available
you
need
your
system
to
be
what
abrasion
area
very
well.
B
If
you
want
to
use
that
kind
of
thing,
is
you
can
backed
by
people
as
their
systems
get
bigger
as
they
get
more
expensive?
An
analogy
is
when
you
deploy
an
application
on
Amazon
ec2
right.
Nobody
looks
too
closely
at
how
much
that
paid
per
hour,
for
that
has
some
instances
when
they
run
that
this
one
look
once
you
stand
up
once
you're
on
a
logical
organization,
go
into
production
and
will
suddenly
realize
you're
spending.
You
know
$10,000
at
below,
I
want
your
honesty.
B
You
saw
carrying
lots
about
optimizing
this
stuff
and
you
move
from
the
just
in
the
storage.
It
would
just
give
me
the
compute
frankly
minds
into
having
an
email
to
stack
users,
where
you
are
complaining
that
you're
not
getting
right
over
violence
of
your
disks
because
hanging
bench
month
of
impunity.
B
So
that's
why
the
diagram
has
to
happen,
smiling
Jesus,
so
you're
going
to
write
it
happy
in
smiling
because
it's
his
birthday,
it's
just
a
smaller
cluster.
He
had
over
the
major
storage
needs,
but
it's
probably
wanted,
and
the
government
left
is
have
been
smiling
because
he's
running
an
enterprise
system
and
he
had
the
opportunity
to
make
listed.
I
have
a
bigger
system.
Access
in
these
are
anyway
using
setback.
B
Completely
underlying
network,
so
these
lovely
40
gigabit
network
diagrams
people
ones
usually
something
to
settle
and
that's
you
know,
people
that
easily
transfer
containers
and
something
has
to
work.
So
actually,
you
know
know
what
the
name
of
the
container
it
is
looked
at
to
do
that.
It's
external
tools
continue
to
have
a
role.
B
They
don't
go
away,
but
it's
enabling
the
disposals
to
specialize
and
concentrate
on
doing
the
things
for
set,
constitute
yourself
doing
things,
you're
getting
Scott's,
say,
clients
and
that's
that
line
between
what,
like
all
that,
it's
done
to
learn
and
what
we
do
inside
separately,
patties
and
that's
not
exact
right.
So
you
do
things
like
having
it
still
do,
but
also
it's
not
as
good
as
you
can
kind
of
blend
tax.
It's
the
way
to,
however,
to
like
what
it's
to
do
automatic.
B
You
know
it's
talking
to
you,
salt,
but
it's
also
to
intercept
you
know
it's
yeah
I,
think
you
know,
different
vendors
might
go
different
ways
to
exactly
where
they
for
that
line.
So
this
is
will
be
very
forward-looking
muscle
space
in
this
blessed,
a
short
video
clip
of
me
in
my
office,
so
we're
currently
hack
number
to
make
some
of
the
stark
reality.
In
the
same
time,
hacking
asset
manager
to
put
these
pieces
together,
and
then
we
will
be
working.
E
B
Suppose
it's
a
various
user
community
help
people
reveal
I,
imagine
they'll,
be
a
certain
amount
of
negotiation
would
broke
about
how
much
complexity
we
introduce
I,
having
certain
components
be
optional,
so
we
don't
need
to
make
right
right.
You
know,
need
to
be
able
to
have
a
file
system
with
a
work,
management
pool
and
staff
management,
always
in
general
give
either
the
top
definitions.
The
cluster
that
you
define.
You
know,
which
is
which
clusters
are
work
managed,
which
won't
suspect
managed
to
abuse.
B
B
So
it's
already
on
the
way
to
heaven
consuming
my
own
custom-built
image,
but
the
upstream
set
rotate
an
image
which,
since
recently,
is
being
built
by
the
tech
community
passions
work
operators
so
that
we
can
access
it'll,
take
about
University
without
trying
to
manage
our
whole
system
and
some
more
house
you
think
through
they
will
work
to
be
that's
externally
right
for
a
physics
that
pasta
so
apparently
work
the
students.
B
A
B
D
B
Have
to
restrict
sorry
just
for
storage
sports,
all
we
would
have
to
massively
extend
service
area
of,
and
you
know,
there's
a
lot
more
price
answer
to
that
question.
That's
I
think
the
most
efficient
way
forward,
rather
than
building
out
a
whole
new
mr.
pace.
First
event:
consideration
concept
manager
just
do
those
things
well,
asset
manager
without.
B
C
B
B
Custom
model
things
like
migrating
from
fossil
to
restore
and
even
just
creating
high
speeds,
so
kubernetes
hassle
of
1.9
gives
us
device
protection.
It
implements
that
piece
where
it
lists
the
wall.
Prices
on
server
and
our
idea
of
creating
an
ISP
will
just
become
small
communities
to
schedule.
But
people
take
up
as
a
particular
location
in
the
cluster,
so
Elaine
is
sort
of
saves,
saves
us
from
how
to
choose
the
orchestrator
stay
out
of
this.
F
B
D
B
Yes,
sir
Brook
Brook
has
a
as
a
sort
of
open-ended
design.
It
does
currently
a
noticeable
set,
so
that
wasn't
necessarily
run
counter
to
using
intercept.
The
important
thing
is
that
there
is
one
authoritative
piece
of
code
that
we
write
knows
how
to
manage
several
centers
and
that's
you
know
a
modular
Brooke,
probably
the
wall,
Brooke
and
that's
equally
fine,
so
I
think
I
think
we're
in
a
good
place.