►
From YouTube: 2020-04-06 :: Ceph Orchestration Meeting
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
C
D
E
D
Okay,
that's
that
hey
everyone,
yeah
I,
have
a
look
at
the
again
now
and
that's
a
week
yesterday,
now
last
week
we
had
to
sift
the
word
up.
A
summit
yeah
just
have
a
look
at
the
other
pet.
If
you
have
any
questions,
feel
free
to
return
Oh
as
we've
discussed
D
as
a
pair
didn't
see,
yes,
I,
don't
think
it
just
make
sense.
D
D
D
That's
okay!
Yes,
no,
maybe
no
answer
is
supposed
to
be.
Yes,
I
was
the
replacement
just
for
last
week
we
wanted
to
discuss
with
your
Dro
with
your
replacement,
Google
document.
C
I
mean
the
whole
OSI
replacement.
Topic
covers
a
lot
of
different
features
that
are
not
necessarily
exclusive
for
OSI
replacement,
but
that
is
the
whole
preview
thing
that
we
have
open
for
requests
for,
and
that
is
basically
also
all
Steve
removal,
because
it's
damaged
shares
like
99%
of
the
code
path,
and
then
there
is
a
lot
of
subvolume
related
things,
especially
about
consistently
recreating
the
same:
the
same
settings
so
idempotency,
first
volume
and
also
availability
detection
of
drives
using
cell
volume
and
I
think.
C
So,
if
you
scroll
down
a
document,
there
are
a
lot
of
tracker
issues:
they're,
probably
not
even
completed
anymore,
but
there
are
a
lot
of
new
features,
slash
back
reports
that
I
created
regarding
that
topic
and
I'm,
just
slowly
going
over
them
and
implementing
such
fixing.
Those
in
order
to
have
the
OSI
replacement
a
bit
more
user-friendly
I
would
say
because
I
don't
know
if
I
should
I
go
into
more
detail,
why
this
is
a
bit
more
complicated
thing
than
it
was
before,
or
we
would
just
like
to
read.
The
document
ask
different
questions.
C
D
D
B
D
D
A
I
guess
might
discuss
this
a
little
bit.
The
idea
is
that
we
want
to
make
it
as
easy
as
possible
to
develop
self
with
civilian
and
ideally
at
that
have
development
environment
working
as
quickly
as
possible
without
needing
to
copy
at
so
many
files,
as
you
would,
if
you're
doing
say
at
full,
make
install
or
full
package
install.
A
So
there
are
a
couple
approaches
that
I
was
experimenting
with
begins,
I'm,
serious,
original
seepage
kind
of
take
so
existing
such
container
image,
and
then
this
copies,
the
necessary
binaries
and
libraries
from
your
local
build
environment
build
tree
into
the
damage.
This
is
nice
and
that
it's
fully
contained
inside
that
container
so
that
you
can
copy
it
around
and
make
sure
looking
stupid
tree
without
a
back
in
the
container.
But
it
does
take
a
bit
of
a
good
time
to
do
that
and
sits
a
roughly
two
gigs
to
be
copied
each
time.
A
Another
approach
I
was
looking
at
was
trying
to
make
the
container
more
immutable
and
replacing
all
the
files
files
with
some
links
to
a
volume
that
you
imagined
in
the
container,
which
is
your
build
tree.
That
is
the
advantage
of
needing
no
painters
to
the
build
image.
You
spin
up
a
new
container
instant
instantly,
but
it
would
require
I
think
some
pages
to
sofyan
to
include
that
image
in
a
development
environment,
and
it
doesn't
mean
that
the
development
environment
is
a
little
bit
different
from
a
and
user
environment.
A
D
Regarding
the
unprivileged
mode
right
now
we
have
a
lot
of
hard-coded
paths
to
system
D
to
various
paths
in
in
slash
user,
slash
flower,
for
example,
so
in
general
I
think
it's
it's
possible
to
do
that,
especially
as
if
a
das
part
man
provides
a
and
a
way
to
run.
Containers
is
known
route
and
as
far
as
I
know
also
system.
D
provides
the
user
instance
where
users
can
create
the
units
for
for
the
user
as
well,
so
no
I
think
it's
possible,
but
what?
What
about
hostnet.
E
D
Okay,
yeah:
what
about
hosting
networking.
A
D
Yeah,
the
the
thing
is
that
kubernetes
makes
use
of
a
software-defined
network
and
safe
ADM
does
not
spin
up
a
server.
Definitely
so
the
the
only
option
for
safe
IDM
has
to
use
not
working
right.
D
A
I
guess
I'm
not
sure
there
are
the
requirements
here
if
if
that
does
required
being
route
or
you
can
simply
use
the
cup
or
it's
above
a
thousand
24,
etc
avoid
that
occur
where
the
repairman's
coming
from
really
it
sounds
like
there
were
other
changes
for
safe
ATM
to
run
as
none
really
like.
You
mentioned
the
paths,
a.
D
B
A
D
D
A
D
A
Guess,
there's
some
other
generic
questions
about
to
continue
environments
that
I'm
curious?
If
you
guys
know
what
the
answer
to
with
this
kind
of
setup,
I
guess.
Well,
maybe
lots
if
I
can
do
this
point.
If
you
won't
only
have
one
immutable
image,
but
you
can't
tend
to
run
some
kind
of
like
pruning
of
old
any
deputies
periodically
or
something
that
like
ICT
started
created
you
itself.