►
From YouTube: cf-for-k8s SIG [June 2020]
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
Well,
here
we
go
so
efficient,
Thanks,
so
official
welcome
to
this
week's
foundry,
who,
when
it
is
especially
interested,
call
I
think
this
one
has
a
bit
of
a
history
attached
to
it.
You
might
have
realized
that
we
had
to
cancel
actually
the
last
two
calls-
and
this
was
I
would
say
partially
due
to
question
round
like
what
did
people
actually
vote
for,
and
they
said
they
wanted
to
get
an
ireenie
update.
That
was
one
part
of
the
question
and
then
I
think
that
kind
of
went
in
a
couple
of
directions.
A
A
We
have
two
colleagues
from
from
suzer
who
are
going
to
talk
about
specific
topics
in
the
area
of
cube
CF,
which
probably
also
makes
sense
in
like
the
brother
CF
phone
on
kubernetes
space,
so
that
being
the
intro
I
would
actually
hand
over
to
couch.
Okay,
okay,
as
I
said
talk
about
like
I,
really
specific,
so
I
think
people
in
in
the
poll
basically
says.
They
also
want
to
hear
like
what
what
the
ireenie
team
has
has
learned
during
by
building
ireenie
itself,
cetera
cetera,
but
I
understood.
B
Thank
you.
First
of
all,
can
anyone
hear
me
good,
because
I
always
have
trouble
with
this
at
Cisco
Thanks
burnt,
yeah,
yes,
I,
don't
have
any
slides,
prepared,
I'm,
just
gonna
share
my
screen
do
a
quick
demo
and
guess
and
I
guess
who
just
have
a
like
you're
in
a
session
afterwards.
I'll
also
talk
about
our
current
work
like
interesting
things
that
we're
doing
at
the
moment
and
things
that
we'll
like,
we
hope,
come
soon.
B
Alright,
ok,
so
I,
don't
know
like
how
familiar
with
irony
Harini
is
the
next
generation
runtime
for
call
foundry
to
like.
Basically,
our
goal
is
to
be
a
feature
parity
with
diego,
but
to
run
on
two
varieties.
So
basically,
it's
fairly
similar.
The
gwelf
controller
is
our
main
consumer
in
the
CF
world.
It's
going
to
like
whenever
someone
does
a
CF
push,
the
gold
controller
will
go
out
to
arena
via
HTTP
and
then
arena
will
make
the
app
run
on
Cuban
ranges
and
I'm
going
to
demo
that
right
now,
I
have
targeted
a
cluster
here.
B
It's
okay,
now
one
of
our
def
clusters
with
a
fairly
like
latest
and
greatest
arena
version,
and
this
is
deployed
a
little
deployment
with
CF
or
gates
like
we,
we've
been
working
with
SEF
for
a
long
time.
We've
recently
moved
to
share
four
gates
in
our
pipelines
and
we've
also
tried
cube
CF.
This
specific
one
is
running
on
cfirkus
gates.
As
you
can
see
from
the
like
layout
of
the
cluster,
we
have
the
CF
system,
namespace
we're
like
Iranian
the
whole
of
cloud
foundry
lives.
We
have
the
CF
work
vaults
in
the
staging,
so
split.
B
This
come
over
here
a
little
bit
and
do
some
watch
commands
I'm,
going
to
be
watching
specific
namespaces
like
most
importantly,
CF
workloads,
where
Irina
is
going
to
be
shading
the
ports
and,
like
stateful
sense,
equivalent
subjects
backing
the
application
and
also
I'm
going
to
watch
the
staging
pane
space
like
on
a
CF.
We
were
also
responsible.
The
arena
team
was
also
responsible
for
spinning
up
the
staging
job,
but
on
several
gates
were
using
capac.
But
anyway,
let's
watch
the
thing
in
progress.
B
See
a
for
Claud
staging
watch
for
all
resources,
I'm
going
to
push
an
app,
that's
called
catnip.
This
is
one
of
the
few
that
a
tree
is
working
with
several
gates
at
this
stage,
because
I
think
Ruby
is
still
not
done
in
the
gate
back
like
they
don't
have
a
proper
who
built
back
so
most
of
our
apps,
not
really
working,
but
this
one
will
do
and.
B
This
should,
and
it
first
creates
a
service.
This
is
not
something
that
every
need
as
a
but
I
think
that
working
does
that.
But
here
in
the
lower
right
you
can
see
that
get
back
started
a
job
I
bought
actually
I,
don't
know
if
it's
keeper
and
his
job.
This
is
not
responsibility
of
fiorini,
so
we
can
see
it's
running
it's
in
it
containers
it's
staging
the
app
and
after
after
it
finishes
will
we
should
see
some
objects
being
created
in
the
upper
right,
which
is
pretty
much
the
safe
workloads
namespace.
B
B
B
I
had
like
I
was
in
a
scroll
view,
so
I
had
paused
the
watch
and
but
yeah
you
can
see
like
we,
we
basically
modify
the
replica
count
and
the
stage
was
set
and
it
creates
three
ports.
What's
interesting,
like
I
can
do
this
again
like
back
to
one
and
it's
going
to
set
the
replica
down
back
to
two
one,
and
it's
going
to
terminate
two
of
those
stateful
sets
what's
interesting
about
our
objects
is
that
they
have
some
annotations
with,
like
application,
data
can
quickly
show
you.
B
Biggest
one:
that's
what
we
update
when
we
scale
so
this
is.
This
is
pretty
much
like
the
basics
of.
What
really
does
something
we're
currently
doing
is
also
like.
This
was
the
recreation
of
eller
piece.
You
might
ask
what
about
tasks?
That's
something
we've
been
implementing
for
a
while.
It's
almost
done,
but
I
think
we're
waiting
on
a
copy
release
like
copy
shoot,
releasing
xkp
release
and
it
will
be
usable
for
now.
It's
only
implementing
ireenie
I
have
watched
this
cluster
and
I'll.
B
Try
to
show
you
what
a
how
we
run
a
task,
because
it's
you're
going
to
see
here
on
the
right.
It
will
result
in
not
you
know,
stateful
set,
but
in
a
cube
orientation
job,
which
is
the
cube
object
for
a
one-off.
So
if
we
try
to
run
a
task
for
the
oddball,
catnip
I'll
just
run
our
sleep
so
that
it
lingers
around.
So
we
can
see
it
because
there's
no
like
so
far.
This
is
the
only
way
that
we
can
see.
B
Then
you
can
see
we
have
a
job
here
and
it
results
in
another
pod.
So
it's
pretty
similar
to
the
airflow,
but
we're
just
creating
another
another
object.
There
is
also
an
updated
with
all
that
like
it,
you
can
correlate
between
these
pods
and
stateful
sets
and
jobs
because
they
have
the
CF
specific
annotations.
B
It's
pretty
similar,
it
has
the
cloud
foundry
upgrade
version
name
all
these
things,
and
here
you
can
see
that
it's
is
defined
the
container
with
a
sleep
in
it.
That's
what
we
requested.
So
this
is.
This
is
actually
pretty
much.
What
I
really
like
is
is
currently
an
abstraction
layer
that
more
or
less
more
or
less
Heights
the
kubernetes
world
from
coffee,
although
that's
also
about
change.
So
just
take
a
look
at
my
have
some
notes
around
here.
B
So
yeah
we're
currently
working
on
on
v3
tasks,
which
are
finished
in
the
range
light
almost
completely,
but
we
have
to
wait
for
for
recovery
release.
I
said
earlier
that
it
really
is
operating
in
a
single
namespace.
The
rename
space
with
chef
workloads
namespace
on
the
cluster.
That's
about
to
change.
We
are
about
to
introduce.
B
We
can
use,
we
can
better,
isolate
I
guess
we
can
better
isolate
the
apps
brink
on
gates
and
another
another
nice
thing
that
we're
working
on
is
a
C
or
D
API,
because
currently
arena
is
exposing
a
REST
API.
Just
simple
HTTP
server,
much
like
Diego
do
I
think
it
was
RPC,
but
it's
similar
and
then
Gulf
controller
has
point-to-point
communication
with
with
irony
sending
case,
T
requests.
We
want
expose
our
own
CDs,
which
is
pretty
cool
because
then
we'll
have.
B
This,
like
we'll,
have
more,
not
point
to
point
but
message
like
architecture
where
we
define
two
major
lr2
major
series
that
will
be
the
LLP
and
the
task
and
by
like
simply
creating
a
young
object
on
cube,
you
can
tell
you
need
to
materialize
that,
in
this
respect
is
main
space
and
I
can
actually
show
this
to
you
as
well.
I
have
prepared
some
like.
B
B
Right
one,
so
this
object
is
pretty
much
one
to
one
mapping
roughly
want
one
mapping
of
our
current
JSON
payload
that
the
call
control
is
sending
to
us.
It
has
the
cop
quit
the
app
name
resource
specifics,
like
disks
routes
and
so
on.
We
we
have
the
two
life
cycles,
which
is
like
built
back
in
docker
life
cycles,
and
the
most
interesting
part
of
the
resource
is
its
status,
where
we
will
be
keeping
information
about
all
its
instances
and
something
interesting
like
when
moving
to
sear.
B
These
will
have
to
rethink
some
some
parts
of
the
communication,
because
the
with
the
golf
controller,
because
currently
when
we
are
creating
a
task
it
while
controller,
sends
a
put
request.
We
create
the
task
and
then,
when
the
task
is
done,
we
call
back
to
the
quad
controller.
This
is
not
going
to
be
possible
with
with
you
like
that,
rather
than
that,
this
12
controller
will
have
to
create
that
CLG
and
watch
its
status.
B
For
example,
it
might
be
bending
running
failed
and
this
way
we
want,
we
want
to
reach
back
to
the
CC
anymore
say
at
this
task:
filter
this
lrp
crash,
but
the
12
controller
will
have
a
convergence
loop
or
something
like
that.
You'll
be
watching
for
our
resource,
and
we
think
this
will
be
a
way
more
kubernetes
native
way
of
doing
things
and
way
less
astonishing
fool
to
the
community
and
I
think
this
was
enough
words
I'm
sure
you
have
questions
afterwards.
B
So
without
further
ado,
let's
try
and
do
a
very
basic
demo
of
creating.
How
do
we
push
it
up
with
CDs?
First
of
all,
when,
when
we're
creating,
when
we're
grading
can
up
with
the
surgery,
we
were
grading
the
CLD,
the
LRP
in
some
specific
name
space,
and
this
name
space-
it
can
be
the
CF
or
close
name
space,
and
this
is
going
to
work,
but
it
can
be
any
other
name
space,
and
this
is
the
other
thing
that
I
mentioned.
B
We
are
trying
to
give
our
users
a
way
of
specifying
what's
their
name
space,
but
this
comes
with
a
bit
of
cost.
Currently,
the
safe
worth
of
the
space
is
generated
by
arena.
C
on
chart
it
is,
there
is
a
service
account
in
there.
There
is
a
role
binding.
Both
security
policies
created.
All
these
things
are
going
to
have
to
be
done
by
D
by
the
user.
B
Now,
because
this
is
their
namespace,
so
I
have
prepared
a
I
have
prepared
a
llamo
with
some
boilerplate
like
I'm,
creating
a
demo
namespace
I'm,
creating
a
service
account
and
binding
it
to
both
security
policies,
pretty
standard
stuff,
it's
letting
me
run
as
any
user
use,
some
new
IDs
and
so
on.
So
this
is
going
to
have
to
be
provided
by
a
user.
So,
let's
apply.
B
B
And
there
we
have
it
our
demo
namespace
with
all
the
things
in
there
that
we're
going
to
need,
and
then
we
have
a
lllp
llamo,
which
this
is
a
simple,
tiny
little
lrp.
Most
importantly,
you
can
see
there's
going
to
use
a
docker
lifecycle
to
run
a
docker
image.
This
should
also
be
able
to
work
with
with
a
standard
like
built
back
a
life
cycle
that
we
that
we
have
like.
We
are
setting
all
the
good
versions.
These
are
going
to
be
set
by
the
ground
controller
in
reality
and
yeah.
Pretty
basic.
B
Most
importantly,
number
of
instances
is
to
know
not
a
lot
of
cool
stuff
in
there
yet,
but
let's
try
to
apply
it
and
see.
What's
going
on,
let
me
I'd
like
to
need
the
workloads
anymore,
because
we
don't
have
we
don't
stage
docker
images
more,
basically,
so
yeah
that's
to
apply,
but
it's
important.
We
should
now
apply
in
the
demo
namespace,
so
keep
crypto
namespace
demo
apply
file,
LFE.
B
B
And
we
have
quite
similarly
like
quite
similar
to
the
CF
push.
We
have
a
stateful
circle
its
respective
to
two
ports.
Unfortunately,
does
the
only
thing
I
can
show
you
I
mean
if
we
edit
the
thing
I,
don't
think
I,
don't
think
we've
implemented
scaling
down.
Yet
if
I
did
there
appear,
nothing
will
happen
basically,
but
this
is.
This
is
how
we
envisioned
to
to
be
able
to
run
apps
in
the
future.
I
have
also
prepared
a
service,
because
I
have
now
bypass
the
cloud
controller
completely,
which
means
that
no
one
knows
about
my
app.
B
B
Exposing
the
8080
port
on
8080
and
it's
basically
bounce
to
my
app
via
these
specific
quit
labels.
Unfortunately,
this
is
only
internal
DNA,
so
if
I
want
to
hit
my
my
my
app
I
need
to
work
on
to
like
some
port,
because
this
is
not
it's
not
visible.
Outside
I,
don't
have
an
ingress
on
it
or
anything,
but
you
can.
Try
like
in
the
CF
system,
should
be
able
to
go
on
to
the
support
like
doesn't
really
matter
which
one
I
think
this
one
has
rush.
B
Put
the
name
of
day
in
a
solar
cell:
this
is
the
command
I
need
to
exec.
This
is
the
you
know
that
I've
exposed
anything
I'm,
not
Dora.
This
is
one
of
our
desktops
and
yeah.
This
is
this
is
prema
I
can
show
you
our
series,
it
might
be
interesting
for
you,
I
might
send
you
those
links.
There
is
a
Google
Doc
talking
about
some
design.
Aspects
of
our
series.
I
might
need
to
copy
this.
B
B
B
D
The
I
guess
probably
the
I,
already
forgot
two
other
questions.
I
was
going
to
ask,
but
the
last
question
I
had,
on
my
mind,
was
kind
of
it
was
a
bigger
picture
of
maybe
in
future
Cappy
being
driven
by
some
of
this
year,
Dee's
exposed
to
the
user.
Does
it
actually
make
sense
to
keep
that
separation
between
Cappy
and
Iranians
sounds
like
if
Irina
is
planning
to
go
into
the
CR
deal?
And
then
you
know,
there's
a
factory
day,
the
APF
boundaries
kubernetes,
and
so
it's
not
really
pluggable
anymore
right.
D
It's
like
it's
not
as
pluggable
as
like
the
G
I
go
back
and
right
because
Diego
isn't
talking
via
kubernetes
yeah
right.
So
what
is
the
you
know,
given
that
you
know?
Maybe
this
is
uneducated
perspective,
but
from
what
I
understand
adeney
is
just
spinning
up
stateful
sets
based
on
you
know
the
record
that
cappy
provides
it
is
there.
D
B
B
It's
like
a
message,
bus
where
you
put
seed
a
series
again
and
of
like
messages,
so
it
might
as
well
end
up
being
that,
but
I
guess
it's
probably
too
early
to
say
and
I
guess,
we'll
probably
see,
because
Kathy
has
other
things
to
do
like
I,
don't
like
keeping
the
model
and
creating
the
initiating
staging
and
orchestrating
all
that
things.
I'm,
not
sure.
If
combining
everything
like
if
if
copy
should
be
like
just
one
component,
that
does
almost
everything
but.
D
If
you
have
to
end
up
creating
those
theories
anywhere
right
and
I'm
guessing
there
isn't
really.
You
know
unless
unless
we
have
some
future
plans
to
make
the
app
make
up
the
more
complex
beyond
like
a
stateful
Sarason
or
maybe
a
deployment
right,
it
seems
like
a
pretty
heavy.
You
know
it
was
a
necessary
abstraction
when
we're
trying
to
let's
say
make
it
work
for
kubernetes
and
non
kubernetes
right.
But
if
we
are
going
into
the
kubernetes
api
land
then
feels
like
a
pretty
heavy
abstraction.
To
have
I
mean.
B
E
D
Well,
Cappy
holds
a
lot
of
other
stops
that
is
doing
right,
I
know,
I,
don't
I,
don't
imagine
it
going
away
anytime
too
soon
right,
and
so
it's
probably
unreasonable
to
expect
that
you
know
a
lot
of
the
logic
that
it
contains
will
be
shifted
into
it
in
your
right.
So
I.
Imagine
that
whatever
it
is
much
easier
to
pile
into
cabby,
I
I.
C
C
If
that
is
the
point
that
I
could
imagine,
a
world
word
like
copy,
creates
an
app
C
or
D,
and
there
is
networking
picking
picking
it
up
to
configure
the
network
for
that
app
and
report
as
a
condition
when
networking
is
set
up
that
ireenie
uses
that
same
CID
picks
it
up
starts
the
stateful
sad
reports.
The
status
and
copy
does
other
things
too.
I
could
have
managed
something
like
that.
Instead
of
having
like
a
whole
bunch
of
C
or
DS
like
at
least
one
/
CF
component
yeah.
D
Because
if
Kathy,
eventually,
you
know
enables
like,
if
it
adds
the
first
Class
C
Rd
user
experience,
that
will
be
like,
let's
say,
called
app
or
something
like
that
right,
yeah,
and
at
that
point
you
know
how
many
you
know
how
many
CR
IDs
that
that
actually
need
to
need
to
involve
right.
It
depends
I
could
I.
C
Could
imagine
that
it's
just
one
that
it's
just
one
for
that
one
and
that
other
components
just
pick
it
up
report
conditions
if
they
are
ready,
but
that
still
the
copy
team
doesn't
want
to
own
a
decision
like?
Are
we
using
stateful
sets
or
deployments
or
is?
There
is
some
justification
for
even
a
middle
ground,
because
we
don't
want
stateful
sets
but
still
need
something
from
that.
So
all
these
decisions-
I'm,
not
the
copy
team,
actually
wants
to
own
them.
So.
B
There
are
things
like
setting
can
virus
like
there
is
a
contract
in
ViCAP.
You
want
to
own
that,
like
I,
mean
I'm
pretty
in
line
with
what
I
just
said,
like
that's
what
I've
been
by
saying
message
like
architecture,
it
might
be
just
one
searly,
although
I
think
it
might
be
more
than
one,
because
it
would
be
a
hell
of
a
synergy
too
many
details.
Why
not
like?
B
Why
imagine
a
world
where
CFC
like
race
acidity,
then
copy
watches
that
CD
does
some
other
see
all
these
chain
reaction,
things
that
we're
used
to
seeing
in
kubernetes
like?
Why
do
you
need
a
stateful
set
when
you
can
just
create
replica
set
I
mean
it's
adding
a
tiny
bit
of
functionality
and
that's
I
think
that's
similar.
B
C
E
B
D
B
D
B
It
might
be
useful
to
have
some
discussion
because
we're
not
too
we're
not
too
sure
about
all
the
different.
You
know
different
use
cases
we
have
with
sidecars
it's
a
bit
fuzzy
for
for
us,
so
it
might
we
might
reach
reach
out
for,
like
you
have
some
questions.
I
mean
definitely
ask
in
the
channel
because
it
might
give
us
some
ideas.
B
D
I
was
like
I
was
mostly
interested
in
the
invoice.
Id
card
said
that
you
know
the
task
can
be
doing
useful
things
and
talking
to
the
applications
or
whatever
that
can
be
secured.
Somehow
I
didn't
have
anything
else
in
mind
for
sidecars,
but
that
add
another
separates
question
/
note:
I
have
as
I
notice
that
the
lrp
contained
M,
section
and
M
section
I
imagine
would
hold
some
sensitive
data.
Are
you
all
planning
to
make
it
referenceable
to
a
secret.
B
D
B
Something
else
that
we're
working
on
currently
is
redefining
the
whole
surface
area
for
arena,
because
you
know
it
we're
currently
releasing
a
film
chart
and
we're
pretty
close
to
deprecating
that,
if
not
deprecated,
that
already
we
want
to
start
shipping
just
a
static
set
of
GMOs
with
a
config
map.
So,
basically,
in
order
to
deploy
Rini,
it
will
be
way
easier.
You'll
be
able
to
just
keep
go
to
apply.
B
Of
course
you
have
to
provide
some
secrets
like,
for
example,
the
cloud
controller
secrets,
the
key
and
the
served
in
the
CA,
and
things
like
that
will
need
to
be
provided
by
convention
rather
than
templating
and
in
the
config
map.
You'll
be
able
to
tweak
all
sorts
of
useful
things,
and
this
will
make
it.
We
think
very
easy
for
people
to
just
like
try
the
thing
out
and
of
course
it
doesn't.
It
doesn't
make
like
using
quite
a
teacup
he'll
and
other
things.
B
F
F
This
is
something
I
think
by
the
way
product
manager
on
the
logging
side
of
things
uncie
F
for
Kate's.
For
a
little
bit
of
context.
We
care
about
some
of
that
meta
data
to
make
sure
that
information
is
correctly
annotated,
as
it
goes
through
our
own
logging
system,
and
we
would
be
very
interested
I
can,
oh,
if
the
format
of
that
changed,
being
able
to
update
things
on
our
end
and
be
able
to
react
to
any
of
those
changes
coming
in
from
ireenie.
F
B
C
C
C
F
Because
for
us
we
don't
have
a
strong
opinion
about
the
format
of
these
like,
like
there's
community
conventions.
I
think
that
Dimitri
is
hinting
at
the
like,
so
they
contain
underscores
is
anything
we
just
care
what
they
are
right
and
if
they
change
you
know,
in
order
to
kind
of
match
with
those
conventions,
then
just
having
some
way
to
stay
up
to
date.
On
that
or
other
relevant
changes
like,
for
instance,
we
might
have
some
dependency
on
the
name
of
like
container
names
coming
from
ireenie,
and
things
like
that.
Well,.
B
B
If
you
discover
I
guess
you
should
just
discover
those
today
I
guess
that's
what
you're
probably
doing
in
the
future,
though,
when
we're
going
to
sear
these
I
would
imagine
that
they'll
be
carry
or
carried
over
from
the
CD,
and
the
CD
will
be
the
API,
so
I
guess
it
will
be
in
the
readme
and
it
would
be,
it
would
be
quite
visible.
I
would
imagine
I
mean
that's
just
my
personal
opinion.
I
haven't
had
such
discussions
in
the
team
for
sure
that's
something
I.
D
I
would
add
to
that.
Is
that
a
lot
of
times
the
the
metadata
passed
in
labels
and
annotations
right
is
part
of
your
API.
So,
even
when
you
all
move
over
to
CDs,
you
know
there
are
patterns
with,
indicates
community
right
where,
like
it's
expected,
that
the
pods
show
up
with
particular,
you
know
labels
right
and
so,
if
I
would
actually
argue
that
this
kind
of
thing
should
be
included
in
the
release
notes
because
you,
the
external
contract,
you
know
with
the
user.
This.
C
B
B
F
I
think
one
particular
pattern
here
that
there's
a
lot
of
similarity.
These
kind
of
questions
is
having
to
do
with,
say
the
format
and
labels
on
metrics
coming
out
of
these
various
components.
That's
something
that
you
know
there
can
gradually
accrete
a
number
of
downstream
dependencies
on,
and
so
it's
often
asked
that,
like
hey,
you're,
gonna
change,
the
name
of
this
metric
or
the
label
of
this
other
metric,
like
just
letting
folks
know
so
they
have
time
to
adjust.
B
F
Think
I
just
asked
you
if
there
are
changes
that
are
coming
downstream
to
parts
these
annotations
or
labels
that
feel
relevant
to
mention
that
in
the
release
notes,
don't
help
us
out
a
lot
just
so
we
don't
have
to
be
like.
Oh
man,
ireenie
version
this
shipped
and
now
things
are
broken
and
we
don't
know
why.
Yeah.
B
F
F
F
F
B
B
B
B
C
Like
the
idea,
like
I
like
that,
like
that
the
the
time
Jules
mentioned
it
in
the
industry
call
that
this
is
how
he
imagines
it,
like
some
house
like
templating,
similarly
to
using
mocks
in
tests
like
when
you
start
using
mocks
and
tests,
nobody
using
you
can
get
out
of
the
smoking
hell
and
similarly
with
templating
right
once
you
start
templating.
All
the
upper
layers
need
to
use
that
templating
and
if
you
just
provide
that
the
upper
layers
can
do
whatever
they
want.
Like.
B
It's
an
old
idea.
This
convention
over
configuration
they'll,
definitely
be
some
convention
introduced
because
there's
no
way
around
that,
but
I
guess,
given
that
we
have
serious
and
a
config
map,
is
more
likely
something
like
a
fluid
CD
like
any
surgery
you
want,
and
we
can.
We
can
watch
that
and
reflect
those
changes,
or
this
can
be
our
main
configuration
point.
B
B
B
I'll
send
it
to
links
one
about
our
current
initial,
like
proposition
for
the
CD
API
tasks
and
LR
piece
and
one
about
the
Elm
glass
deployment,
because
I
think
these
are
important
topics
and
people
might
want
to
have
a
deeper
look
just
to
disclaimer.
These
are
just
initial
things:
nothing
set
in
stone
there.
So
definitely
a
comment
and
get
feedback
like
Charlotte,
Channel
and
so
on.
E
One
question:
so
if
you
don't
provide
ham
shots
anymore,
how
do
people
know
what
they
have
to
put
in
the
secrets?
The
that
you
need
to
create
right
because
I
mean
ahem
chart
some,
it's
just
a
bunch
of
template's
right.
You
can
ignore
it
and
you
can
write
the
objects
on
your
own.
It
serves
a
little
bit
as
documentation
if
you
don't
want
to
use
it.
E
So
now
you
don't
even
do
the
ham
chart
which
I
can
understand
it's
kind
of
it's
a
user
facing
thing,
and
if
you
want
to
concentrate
on
your
software
it
can
be
a
nuisance
to
keep
it
right
and
to
provide
it
to
users.
But
now
you
don't
have
to
hand
shot
anymore,
so
you
have
to
document
what
has
to
go
into
these
manually,
created
conflicts
and
secrets
and
certificates
that
sound
some
like
a
lot
more
work.
Then
you
know
just
putting
some
files
on
the
template
directory.
B
Well,
it
will
be,
it
will
be
just
some
convention.
We
hope
that
it
will
not
be
that
much
like
things
like
the
smoke
of
got
the
cloud
controller
certificates.
You'll,
probably
anyway,
need
to
specify
in
the
values
files
in
the
column.
So
we
hope
it
won't
be
that
bad
for
the
end-user
plus
I
mean
every
anyone
can
write
their
own
template.
It's
not.
You
know
it's
not
forbidden
to
do
that.
You
can
just
like
take
our
deployment.
You
also
parameterize
them
if
that's
more
convenient
for
you,
but
we
think
it
will
generally
make
it
easier.
B
Actually,
it
will
be
definitely
already
documented.
This
will
be
kind
of
the
contract.
Now
that
we
don't
have
templates,
the
input
parameters
will
be
documented.
I
think
it
will
be
mainly
secrets
if
you're
interested
take
a
look
at
the
dock
when
burn
sends
the
links.
If
you
have
some
specific
worries,
just
just
write
a
comment
in
the
talk
or
like
I
think
it's
a
github
readme,
this
particular
one,
but
you
can
always
write
in
the
channel,
will
be
will
be
glad
to
like.
We
will
have
to
have
a
discussion
about
this.
E
A
B
A
tough
one
actually
delighted
to
just
just
out
doing
just
deployments,
but
I
think
there
are
people.
We
have
had
some
issues
about
people
doing
some
migrations
who
really
want
to
have
instance
ordering
which
seems
like
it
was
a
wrong
idea
because
I
don't
know
like
how
do
you
guarantee
that
instance,
one
didn't
get
recreated
and
stuff
like
that?
I
mean
it's
kind
of
dumb
to
be
talking
about
instance,
you
want
to
when
you're
talking
about
a
cloud,
but
people
are
depending
on
these.
These
have
been
documented.
B
B
Honestly,
I
don't
quite
know,
but
there
are,
as
I
may,
as
I
mentioned,
these
cloud
connectors,
which
lookup
those
virus
and
it's
it's
quite
annoying,
because
kubernetes
injects,
like
the
stateful
set
controller,
injects
the
name
of
the
of
the
boat
like
your
ID
number,
but
it
doesn't
give
you
the
number
separately,
so
it's
kind
of
a
pain
to
support
those
use
cases.
But
given
that
there's
been
issues,
we
don't
think
it
would
be
nice
like
drop
that.
B
A
Make
sense,
Thanks
and
I
think
we're
at
the
top
of
the
hour,
so
I
would
say.
Thank
you
very
much
to
to
be
okay
for
demo
and
answering
all
the
questions
that
came
up.
I.
Guess
if
there's
more
questions,
you
know
how
how
to
fight
the
folks,
let's
check
ireenie
slack
channel,
I
I
guess,
is
the
main
channel
too
to
give
additional
feedback
and
with
that
I'd
say.
Thank
you
very
much
to
everybody
for
attending
and
we'll
talk
again
next
time
see.