►
From YouTube: Network Service Mesh WG - 2018-06-29
Description
Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io
Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects
A
B
C
B
I
think
we'll
have
time.
The
agenda
seems
a
little
shorter
than
last
week,
so
I
think
we
should
should
be
able
to
get
to
it.
Also
I
I
think
Prem
should
be
coming
back
as
soon
as
well.
At
once,
Prem
comes
back,
then
he'd
be
a
really
great
person
for
for
you
to
get
to
know
since
he's
doing
a
lot
of
the
use
case.
Documents
as
well,
so
just
just
for
your
information
I
know.
C
B
Ok,
so
starting
off
for
those
of
you
who
are
going
to
be
in
Vancouver
on
August
28th
for
the
opens
for
the
for
the
open
source
summit,
so
the
opens
our
summit
runs
from
Wednesday
to
Friday,
but
the
Monday
and
Tuesday
before
they're
running
workshops
and
on
the
Tuesday.
There
is
a
cloud
native
network
function
seminar
and
we
highly
encourage
anyone
who's
attending
the
open
source
summit.
If
you're
able
to
get
to
the
network
functions
seminar
to
to
sign
up,
and
so
the
way
that
you
sign
up
is
when
you
are
registering
for
the
summit.
B
It'll
ask
you
what
additional
workshops
you'd
like
to
attend
and
I
believe:
there's
no
cost
for
attending
the
cloud
native
network
function.
Seminar.
There
is
a
cost
for
some
of
the
ones
on
Monday,
but
the
Tuesday
cloud
native
Network,
one
is
should
not
have,
should
not
have
any
cost
to
it
and
that's
in
the
afternoon
who's.
D
B
The
that's
that's
in
the
meeting
notes.
You'll
see
that
it's
you
get
some
of
the
information
on
it,
I
believe
it's
ran
by
two
two
people,
so
one
of
them
is
Arpit
who
runs
the
the
Linux
Foundation
Network
group,
so
basically
like
their
umbrella
organization.
That
has
like
seven
projects
and
he's
he's
the
person
at
the
top
and
also
another
guy
named
Dan
cone.
B
E
C
B
F
B
B
E
B
Yeah
that
that's
further
down
the
agenda
so
we'll
definitely
get
to
that.
Okay.
So
next
question
is:
do
we
want
to
cancel
next
week's
meeting,
since
it
is
the
fourth
of
July
holiday
in
the
United
States?
So
for
for
reference?
The
fourth
of
July
is
on
the
Wednesday.
Our
meeting
is
is
on
the
Friday
American
time,
so.
A
A
E
B
A
G
B
E
B
A
B
B
E
What
do
you
think
for
mold
thing
for
us
to
become
system?
Should
we
be
a
signet
working
sub
project?
Should
we
be
a
working
group
and
so
we've
this
question
to
the
Signet
working
meeting
yesterday
and
it
was
pretty
forceful
that
he
felt
that
we
should
be
a
state
that
he's
working
group
which
I'm
completely
fine
with,
and
he
talked
me
through
a
little
bit
of
the
sort
of
where
do
we
go?
What
do
we
do?
You
know?
How
do
we
mesh
with
how
that
all
that
stuff
is
written
kind
of
thing
and
so
on?
E
My
to-do
list
is
to
sort
of
get
a
PR
going
where
we
could
that
we
could
basically
submit
in
order
to
get
that
wheel,
rolling
I'll,
probably
end
up
reaching
out
to
folks
on
the
network.
Networking
everything
is
that
every
service
mesh
mailing
list
just
to
give
you
guys
a
pointer
to
it.
So
you
can
comment
and
we
can
sort
of
get
it
converged
a
bit,
but
but
that's
actually
very
good
news.
So
you
becoming
a
formal
working
group.
B
B
B
We
better
understand
the
problems
work
out
where
our
holes
are,
and
so
this
so
there's
more
structure
that
would
get
put
on
we'd
have
to
work
in
with
with
their
release
schedules
and
and
pass
information
up
about
what
we're
doing
on
a
regular
basis
and
try
to
probably
relax
us
a
bit
for
us
because
of
how
new
it
is,
but
give
them
a
roadmap
and
they
ask
for
up
to
a
year.
But
where
will
we
be
in
the
air?
That's
a
pretty
open
question
at
this
point
and.
E
B
D
F
E
B
B
E
E
B
So
I'm
gonna
stick
that
on
is
and
actually
I
Adam
ed
you're,
probably
the
only
one
present
that
has
access
to
it.
So.
E
B
E
E
B
We
do
have
a
set
of
script
script
files,
so
you
run
X
scripts
and
there's
a
there's,
a
build
and
so
on.
They
can
be
ran
that
will
they
will
initiate
at
all.
What
option
do
we
have,
though,
is
a
make
file,
is
probably
more
discoverable
like
pretty
much
every
custom
or
every
major
tool,
with
the
exception
of
go
idea
based
IDE
this,
how
to
properly
use
a
make
file.
B
So,
let's,
let's
go
in
add
one
and
it'll
just
be
a
big
file
that
calls
the
scripts
and
they
calls
the
build
script
and
that's
and
then
let's
leave
it
at
that
and
not
not
add
anything
else
to
it.
That
way,
people
can
do
like
made
a
made,
X
make
or
go
and
make
and
a
more
or
so
on
and
just
have
the
tool
tool
run
it
it
automatically
as
well.
I.
G
B
D
B
B
I
B
I
said
that
he
wanted
it
to
look
like
like
a
very
happy
penguin,
who
had
just
had
a
large
meal
of
his
favorite
fish,
and
so
but
you
look
at
it,
it's
like
you,
you
know,
Thursday
can
do
things,
it
represents
the
community.
So
we
want
something
that
represents
our
community
and
can
do
things
and
it's
active,
and
so,
but
also
you
know,
friendly.
F
B
B
B
B
G
G
You
know,
I'll
generate
a
pull
request
when
I
get
some
mine,
D
files
together,
I
just
got
text
files
all
over
the
place
at
the
moment
and
want
to
make
sure
I
can
reproduce
everything
in
my
VM
you
know
and
that
in
a
in
a
controlled
environment-
and
you
know
I'll
reach
out
to
you
and
others
when
I.
If
I
have
some
questions,
but
so
far
it's
just
you
know,
there's
a
there's,
a
lot
of
very
basic
startup
stuff.
That
seems
to
be
missing
and
they
think
documentation.
G
B
G
I'm
doing
that
I
have
some
changes
to
the
documents
to
that
as
I
found
mistakes,
not
mistakes,
but
the
things
that
have
changed
I
guess
since
the
document
was
written,
any
consistencies
with
file
names
and
things
like
that.
But
I
checked
that
I
fixed
in
my
local
versions
as
I
went
along
I
thought
that
might
be
part
of
the
effort,
but
yeah
absolutely
everybody
should
look
at
them
and
then
we'll
merge
all
the
changes.
G
J
Hey
can
y'all
hear
me.
Yes,
okay,
I
started
working
on
I
guess
the
the
document.
What
I
didn't
do
is
move
it
over
into
the
wiki
to
create
a
wiki
page
I
think
that
was
the
next
part
pulled
together.
Some
notes
on
how
the
cross
pod
CI
portion
could
help
and
with
some
of
the
testing
on
humanities
clusters
and
then
the
actual
CNN
project,
which
is
the
comparison
budget,
probably
two
pages
for
this:
a.
G
Question
if
I
could
interfere
where
we
want
to
maintain
some
wiki
pages,
I
I,
just
sort
of
was
under
the
assumption
that
everything
was
going
to
be
markdown,
maybe
I'm
confusing
that
with
discussions
and
other
groups,
but
just
a
question:
I
mean
that's.
What
I
was
having
assumed
with
my
stuff,
as
I
was
going
to
put
it
in
my
and
the
additional
markdown
file,
as
well
as
some
changes
in
existing
files
on
them.
So
wherever.
B
B
B
Okay,
yeah
and
the
only
the
only
downside
on
well
one
of
the
downsides
on
adding
it
into
the
docks.
Is
that
means
that
it's
the
hurdle
to
add
to
it
is
a
bit
higher,
but
that
that
might
that
might
be
okay,
if
it
enables
us
to
have
reviews.
So
I
have
to
think
about
think
about
that
as
well.
For
a
little
bit,
we'll
add
an
action
item
to
to
return
to
to
that
to
work
out
where
we
should,
where
we
should
place
these
documents
in
the
long
run.
So.
B
J
E
A
B
Content
is,
is
not
it's
not
really
the
problem
itself,
so
in
in
both
scenarios,
it'll
be
the
same
content.
It's
just
a
matter
of
words.
Where
should
the
documentation
live
actually
be
part
of
the
part
of
the
main
repo
itself
and
part
of
the
idea?
Was
that
there's
some
information?
That
is
that
it
doesn't
really
matter
what
version
it
is
you're
using
oh
yeah.
G
B
B
B
D
F
B
E
B
So,
let's
we
had
an
action
item
as
well
for
people
to
look
at
getting
involved
with
the
pod
to
NSF.
Api
I
won't
discuss
that
in
detail
at
this
particular
point
other
than
to
say
that
we
have
something
that's
been
merged,
and
that
is
its.
What
is
there
is
not
set
in
concrete,
so
based
on
the
use
cases,
we
really.
F
B
B
The
we
also
added
an
object
store
so
that
the
Sierra
T
objects
have
a
place
to
actually
stay
and
live,
and
there's
been
improvements
on
on
our
logging.
So
we're
moving
towards
at
this
point,
we're
moving
towards
log
risks
and
having
a
produce
I
believe
the
plan
is
to
have
it
produce
Jason
log
files
that
can
be
ingested
by.
F
I
have
a
question
about
the
logger.
Sorry
in
to
interrupt
you
I
mean.
Maybe
it's
just
lack
of
my
knowledge,
but
I
mean
one
of
the
reason
why
I
never
used
web
browsers
because
I
never
managed
to
get
in
the
message
which
generates
the
line
number
from
the
source
core
like
when
you
debug
and
it's
it's.
It's
less
convenient
with
the
joke.
When
you
get
a
message
with
the
name
of
the
source
file
and
the
line
number
where
that
message
was
generated,.
E
Essentially,
a
JavaScript
like
block
or
source
or
whatever
you
choose
to
call
it
that
contains
that
value.
So,
when
you're
dealing
with
something
that
is,
you
know
you
as
a
group
of
saying
JavaScript,
aware
of
JavaScript,
aware
of
log
digesters
of
various
sorts,
they
you
can
pull
more
easily.
You
definitely
do
that.
E
F
B
B
B
We
are,
we
are
also
adding
config
config
map
parsing
code,
so
basically
could
take.
Map
is
a
configuration
that's
stored
within
Koopman
kubernetes
and
that
informations
pushed
into
the
container
and
we're
parsing
parsing
of
that,
and
so
on.
The
agenda
for
the
next
week
is
well
depends
on
so
we
had
kubernetes
1.11
that
was
recently
released,
so
we've
also
are
getting
things
set
up
for
that
migration.
So,
when
client
go
cut
the
cuts,
a
branch,
then
we're
also
going
to
be
moving
the
project
to
to
1.11.
B
B
C
C
C
Okay,
so
I
think
I've
been
on
one
of
the
calls
here,
a
while
back
and
I
got
distracted
and
I'm
back
and
hopefully,
I
won't
get
distracted
again,
but
I
looked
at
the
slides.
Add
that
I
think
you
put
together
or
whoever
and
specifically
the
that
this
limited
CNF
this
between
bridge
case
and
as
I'm
a
bit
allergic
to
l2
I
thought
why
don't
I?
C
Look
at
Ikey
I
also
looked
at
the
use
cases
document,
but
I
I
realized
that
I'm
a
bit
behind
so
I'm
going
to
apply
a
catch-up
and
if
what
this
following
four
slides,
if
they
are
basically
me,
it
mean
that
I'm
barking
up
the
wrong
tree,
just
just
feel
free
to
shut
me
down
at
any
time.
I
have
used
the
slides
referred
to
and
I
just
you
know,
replies
Alto
semantics
with
ipv6
and
ipv4
and
I
called
it
virtual
routing
and
forwarding
vrf.
C
Not
this
not
a
distributed,
router,
not
a
virtual
Rooter,
but
I
just
you
know
I
used
at
night.
So
if
you
are
familiar
with
the
slides
that
I
referred
to
earlier,
and
you
should
be
the
digital
bridge,
then
your
brains
must
be
now
also
very
familiar
with
the
calligraphy
used
on
those
slides.
So
thank
you.
It
and
the
the
problem
is
very
simple.
C
You
know
throughout
the
decision
bridge
is
just
that
the
pots
don't
want
to
connect
over
the
l2
bridge
network,
so
the
submitted
bridge
networks
or
emulated
lands,
but
they
like
to
connect
it
to
get
connected
over
this
rooted,
verbs
and
I'm,
not
calling
it
a
VPN,
because
the
the
routing
plane
the
control
plane
in
network
control
plane,
you
think,
is
not
part
of
this
use
case.
It's
actually
orthogonal
to
it.
It's
it's
really
connectivity
of
the
the
pots
to
the
to
the
IP
forwarding
instances
whether
they
are
public
or
private,
doesn't
really
matter.
C
They
are
clearly
you
know,
logically,
isolated
and
and
the
way
the
this
distributed
thing
is
implemented
is
also
you
know,
using
some
sort
of
IP
tunneling
and
like
in
the
in
the
case
of
a
disputed
bridge.
The
excellent
was
preferred
to
and
and
other
tunneling
technology
is
here.
You
know
a
vehicle
on
GPE,
which
is
a
new
draft
that
is
going
through
the
IETF
and
basically
adding
the
the
protocol
field
in
the
DX
on
header
and
so
forth,
as
the
X
on
GP
or
GRE,
or
some
other.
C
C
Everything
else
stays
the
same
and
in
terms
of
the
a
disability
plantation
we
can
have.
One
can
have
those
VR
of
0
pots
living
on
notes,
and
then
they,
you
know,
connect
by
magic
and
one.
You
know
for
the
data
point
perspective
could
be
the
excellency
PE
tunnels
between
each
other.
In
terms
of
you
know,
the
address
addressing
IP,
addressing
management
and
IP
address
provision
and
into
the
the
pots
that
are
requesting
the
service,
as
well
as
a
routing
part,
is
orthogonal
and
out
of
scope,
Addison
cool.
E
I
should
work,
I
mean,
should
work
just
fine.
Obviously,
it's
up
to
whoever
is
deploying
the
bureau
serial
pawns
to
figure
out
how
they
want
to
get
reps,
and
things
like
that.
You
know
just
like
it's
up
to
whoever
would
deploy
a
beer
0pi,
how
they
want
to
get.
You
know
what
they
want
to
do
about
things
like
ARP
and
and
broadcasts
and
bridge
tables
right.
D
D
C
H
E
C
So
I
fully
agree
and
in
fact,
for
this
specific
case
say
with
ipv6.
Basically,
here
of
zero
port
will
emit
an
RA
to
to
the
connected
pots
and
and
and
then
use
the
the
array
based
address
allocation
to
to
allocate
addresses.
So
if
that's,
okay,
with
with
a
group
here,
I'm
very
happy
to
die
to
the
a
bit
deeper
I'll
try
to
avoid
the
HCP
for
now
at
least
and
local
12
degree,
we
can
use
an
existing.
You
know
well-known
and
standard
IP
v6
mechanics
to
handle
this
specific
problem.
So.
C
C
H
C
H
D
H
C
E
I
would
say
there
there's
there's
the
civil
case,
there's
easy
case
in
my
mind.
There
may
be
other
cases
right,
I,
don't
think
of
everything
but
case
in
my
mind,
I
think
what
you're
getting
at
is.
Where
do
we
get
the
IP
that's
used
for
the
tunnel
here
right?
Where
do
we
get
the
tunnel
at
I
pee?
The.
E
E
E
So
in
the
mechanical
sense,
I
would
expect,
for
example,
if
you
are
setting
up
the
criminal
news
network-
and
you
have
a
kid
or
you
have
a
date
of
playing-
you
might
want
to
set
aside
some
number
of
those.
You
know
some
address
for
tunneling.
That's
one
possibility
the
other
thing
that
I
think
is
interesting,
because
it's
semantically
meaningful
is,
you
can
imagine
a
situation
where
you
need
to
be
tunneling
via
a
network
service
right.
So,
for
example,
imagine
that
I
have
Radio
Network
right.
E
I
have
physical
mixed
connected
to
the
radio
network,
and
the
network
service
have
been
trying
to
reach
is
actually
only
reachable
via
the
radio
network
network
service
right.
So
that's
a
little
more
complicated
scenario.
I
haven't
thought
it
all
the
way
through
I
am
aware
of
it.
Does
that
make
sense,
yeah.
G
But
the
way
I,
think
of
this-
and
maybe
I'm
I'm
wrong
here-
is
that
this
this
vrf
is
really
as
magic
explained,
is
really
agnostic
to
what
the
tunneling
mechanism
is
and
the
way
I
thought
of
it
is
that
the
tunneling
mechanism
is
or
the
tunneling
underlay
is
actually
another
negotiation
with
the
network
service
manager
and
another
provided
function
that
will
set
up
that
tunneling
network
and
that,
in
turn,
will
know
about
the
ID.
Id
might
be.
C
B
B
C
G
That,
and
this
would
connect
the
pods.
The
pods
would
be
able
to
talk
to
each
other
and
some
of
the
the
gr
pcs.
If
the
remote
might
go
over
the
kubernetes
network.
I
know
here,
they're
saying
unix
sockets,
but
the
actual
data
plane
traffic
will
not
be
part
of
the
kubernetes
network.
That's
one
way
of
thinking
of
it
and
I
realized
that
in
the
network
working
group
there's
a
lot
of
people
working
on
multiple
address
spaces
and
Malta's
and
various
other
things
that
look
at
the
world
a
different
way.
H
I
think
it's
multiple
cases
here,
though,
because
I
think
you
can
have
the
ships
in
a
night
overlay
case
where
there's
two
address
spaces
and
to
your
case
where
the
management
network
is
kubernetes
and
then
those
are
the
expand
overlay,
that's
completely
isolated
and
for
some
use
cases
that
may
work
the
other
cases
where
you
need
to
bridge
from
the
network
service
mesh
into
kubernetes
some
note.
So
then
there
has
to
be
some
way
of
at
that
point.
Well,.
H
Or
something
and
then
there's
the
case
where
you
actually
want
to
have
an
overlay
network
but
use
kubernetes
to
be
nice,
address,
space
and
I.
Think
a
lot
of
this
is
going
to
depend
on
what
features
each
of
those
things
want
from
kubernetes
and
visibility
and
control
kubernetes
has
into
the
infrastructure
yeah.
B
B
So
as
long
as
there's
as
long
as
there's
no
collision
along
those
two
ranges,
if
you're
using
an
IP
network
in
your
network
service
mesh,
it
can
be
an
Canon
most
likely.
It
depends
on
altum.
Utley
depends
on
the
Sdn
that
you're
that
you're
using,
but
it
should
be
seen
as
an
independent
as
an
independent
construct
from
from
the
kubernetes
based
systems.
You
know,
Vic.
The
implementation
could
create
tunnels
through
through
kubernetes
IP
network,
like
that.
C
B
F
H
C
But
you
know
so
so
tell
me
if
I'm,
if
I'm
completely
wrong
here,
whether
it
is
you
know
at
mandated
or
not
if
it
is
a
de
facto
best
practice
or
de
facto
standard,
but
the
service
IP
that
the
pod
IP
range
never
makes
it
on
out
onto
the
wire
and
and
the
service
IP
range
in
most
cases
is
on
the
wire,
whether
it
is
a
publicly
reachable
wire
or
not.
It
is
living
on
the
physical
wire,
then
the
the
the
outer
address
space.
C
B
C
B
So
the
way,
the
way
that
it's
that
is
set
up
is
said
when
you
do
a
when
you
want
to
set
up
a
new
connection,
so
the
new
connection
would
go
over
a
UNIX
socket
to
the
network
service
mesh.
So
it
doesn't,
it
doesn't
ever
kind
of
it
doesn't
connect
to
a
traditional
kubernetes
service
and
in
that
sense
the
network
service
mesh
themselves
may
end
up
communicating
over
a
service
to
another
network
service
mesh
in
order
to
negotiate
a
tunnel.
But
that's
and.
G
F
B
Like
it
is,
you
know,
even
if
you
were
to
spin
up
a
pot
and
say
no
networking
and
then
you
were
to
then
drop
in
connections,
then
you
could
stick
something
intensive
and
a
1060
range.
So
so
there
there
is.
There
are
ways
to
to
make
that
happen,
but
yeah
in
general,
it's
the
it
is
primarily
to
keep
them,
keep
them
as
separate
as
possible,
and
we.
F
B
We
can
probably
just
pick
a
default
range
and
to
start
with,
because
that'd
be
an
implementation
detail
of
the
of
the
plug-in
itself
and
a
different
plug,
and
it's
implements
a
different
IP
range
could
set
it
add
the
more.
The
more
important
part
is
that
if
it's
important,
if
you're
doing
IP
tunneling
and
it's
an
important
feature,
the
most
important
part
is
that
we
we
have
a
way
to
so.
You
configure
that
and
that's
one
of
things
that
we're
working
on
is
to
make
is
to
make
the
plugins
configurable.
C
B
B
The
part
that
I
mentioned
is
like,
where
we're
still
we're
still
building
up
the
initial
a
gives
you
it's
a
uniform
platform
for
such
a
thing
to
be
built
on,
so
we're
not
working
on
actively
on
that
specific
plugin
at
this
point,
but
we
one
of
the
primitives
that
it
will
definitely
need,
is
a
way
to
set
a
configuration
for
that
plugin
to
basically
tell
it
to
there's.
Also
another
thing
as
well.
B
The
NSM
itself
doesn't
really
care
about
what
IP
addresses
you
you
use.
So
one
one
thing
that
we've
spoken
about
is
letting
the
connections
themselves
negotiate
a
an
address,
and
so,
when
you
request
a
tunnel
or
when
you
request
a
service,
if
it
requires
an
IP
address
the
it's
possible
that
the
service
that's
providing,
that
functionality
may
have
the
most
context
and
could
provide
an
IP
for
for
downstream
to
use.
And
so
that's
that's
one
model
that
we're.
Also
that
we're
also
looking
at
as
well
is
so,
and
that's
in
that.
G
G
B
Try
to
be
I'll
try
to
be
accurate
as
possible,
so
right
now,
there's
no
tunnels
that
are
being
built
yet
because
we're
still
building
on
building
up
the
primitives
for
our
plugins.
So
right
now,
what
we're
doing
is
we're
building
a
where
we're
building
the
mechanism
that
will
allow
you
to
build
a
plugin.
So
that
includes
logging
infrastructure.
B
B
B
G
B
That's
the
current
model
that
word
that
we're
looking
at
is
just
to
allow
the
service
to
provide
that
information.
The
service
could
say,
users
use
this
IP
address,
and
so
then,
where
would
you
program
this
IP
address
or
the
range
of
IP
addresses
akyüz?
It
would
be
at
the
it
wouldn't
yet
the
plug-in
in
that
in
that
area,
and
another
interesting
thing
as
well
is
that
all
of
the
stuff
is
is
technically
point-to-point
and
so
depending
on
the
tunnel.
B
If
the
tunnel
itself
is
transient
and
doesn't
need
to
ever
be
seen,
then
it's
possible
that
that,
even
if
multiple
systems
end
up
reusing
the
same
ip
address
during
during
the
during
the
tunnels,
it's
possible
that
there'll
be
no
adverse
effect
depending
on
how
on
how
they
get
handed
out
and
and
how
the
negotiation
works.
So
just
as
an
interesting
side
effect,
but
yeah
in
in
general,
like
we,
we,
the
entity
that
has
the
most
information
as
to
whether
this
should
be
the
one
that
that
it
hands
it
out.
B
This
is
this
is
something
that
we're
you
know,
we're
we're.
We've
been
discussing
patterns
and
trying
to
work
out
like
which,
what
direction
that
we
should
head-
and
this
is
one
it's
not
the
only
pattern,
but
it's
it's
a
pattern
that
that
we
think
would
be
good
to
go
towards.
It
is
possible.
It
is
possible
that
someone
could
have
let
the
plug
in
that,
where
network
service,
which
actually
does
hold
that
information
and
instead
of
having
the
service
handle
the
configuration,
the
network
service
master
plugin
itself-
could
could
deal
with
it.
So
it
is.
B
Completely
agree,
and-
and
one
of
the
things
about
it
is
that
this
is
the
system
is
flexible
enough,
that,
if
like,
we
want
to
provide
good
patterns
or
be
able
to
follow
those
patterns
and
provide
good
templates
for
people
to
follow,
but
flexible
enough
that,
if
you
watched
you
break
out
of
the
box,
it
doesn't
stop
you
from
breaking
out
of
the
box,
but
it
should
make
common
use
cases
very
simple,
very
easy
to
follow.
Yes,.
H
B
C
B
C
So
but
I'm
going
to
approach
it
not
from
orchestration
perspective,
but
from
reporting
perspectives.
I
would
like
to
actually
leverage
all
the
hooks.
We
have
him
and
networking
specs
and
functionality
that
that
should
be
there
as
part
of
the
IP
stack
in
the
context
of
this,
this
video
vrf,
v4
and
v6
to
see
to
what
degree
this
could
be
eased
and
anyway.
Let
me
think
mother
thanks.