►
From YouTube: Network Service Mesh Meeting - 2019-04-24
Description
Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io
Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference features presentations from developers and end users of Kubernetes, Prometheus, Envoy, and all of the other CNCF-hosted projects
B
B
B
B
A
We
have
this
QuickStart
guide
and
I.
Think
it's
actually
quite
data
at
this
point
you
know
I
I
know
we
have
Doc's
on
the
home
Trent
stuff,
but
I
don't
think
we
have
the
helm,
Trek
stuff
in
this
talk,
so
yeah
I
think
we
probably
do
want
to
update
this.
It's
also
sort
of
a
grid
centric
and
we
actually
have
support
now
for
most
of
the
public
clouds,
so
works
in
GK
and
PWS
well,
actually,
GK
as
a
where
and
EWS
shortly
where
we
think
we
figured
out
the
last
bug.
There
I
mean.
C
A
C
A
B
B
Could
be
have
the
helm,
information
and
potentially
links
to
all
of
the
other
guides
that
are,
how
do
you?
How
do
you
set
up
a
double
us
as
your
gke
and
those
could
be
links
from
the
main
guide
and
then
the
rest
is
run
helm
to
get
this
going
on
your
own
kubernetes?
So
if
you
don't
have
that,
then
you
can
do
these
other
things
just
ripping
that
easy
through.
A
All
of
this
stuff
at
this
point
and
I
bet
you
that
I
could
make
this
work
with
that
Liffey
with
a
trick.
Something
like
the
following
right
now:
Annette
Luffy
has
a
sub
module
for
the
theme
right,
but
I
could
probably
get
to
get
it
to
work
with
a
sub
module
for
the
docs
directory
and
when
the
checkout
gets
done,
the
you
know
Mel.
If
he
builds
up
the
docs
and
then
when
you,
then
you,
when
you
update
the
documentation,
the
network
service,
mesh
repo,
you
wouldn't
have
to
copy
all
the
documentation
over.
D
B
A
A
A
A
A
Probably
one
of
the
things
we
want
to
try
and
do
as
part
of
the
release
is,
is
have
people
go
through
and
test
the
documentation,
meaning
go
through
and
try
following
it,
because
that
ends
up
being
a
huge
deal.
My
my
experience,
runningbacks
myself,
is
I've,
never
had
documentation
that
I
wrote
actually
work.
The
first
time
I
tried
to
follow
it
ever
and
once
it's
been
around
a
little
while
than
documentation
tends
to
get
stale.
C
C
C
A
A
A
B
A
Basically,
there's
gotta
be
a
client,
an
endpoint
to
form
a
connection,
so
a
client
and
an
endpoint,
and
eventually,
when
you
set
up
your
actual
pipelines,
it'll
just
be
the
same
code.
It's
just
both
the
client
and
an
endpoint
right.
It
waits
for
someone
to
connect
it
and
it
connects
out
to
the
next
one
in
the
pipeline.
B
A
C
B
A
The
way
I
would
do
it
if
I
were
doing
it
is
I
would
create
a
simple
endpoint.
That
is
also
that
is
also
capable
to
being
a
client
I,
wouldn't
change
the
connections
quite
the
way
that
we've
got
another
past.
That
was
good
for
the
firewall.
I
literally,
have
it
so
that
you
write
the
one
endpoint
they
can
accept
incoming
connections
and
route
them,
and
that
can
make
outgoing
connections
and
handle
whatever
IPAM
thing
you're
doing
right,
and
so,
when
the
new
input
comes
up,
it
goes
and
asks
for
whatever
network
service.
A
A
Oh
yeah
Oh,
your
endpoint
that
has
to
know
is:
it
is
advertising
service
foo,
it
is
requesting
service
foo,
and
so
it
comes
up
at
request,
service
foo
and
it
advertises
service
foo
and
you
know
built
the
whole.
How
do
we
train
them
together?
That's
all
done
by
network
service
mission.
They
never
serve
as
much
policy
to
compose
them.
A
C
A
C
A
A
B
Sounds
good
I'd
like
to
maybe
schedule
a
call
to
talk
about
that
and
potentially
have
a
even
simpler
test
case
that
builds
on
something
like
these
examples
and
then
make
sure
that
that's
fully
understood
before
implementing
it
with
the
set
up
and
mainly
I,
don't
want
to
get
I,
don't
want
to
have
to
worry
about
the
cluster
configuration
setup
tied
into
it.
So
then
we
can
say:
here's
it's
already
existing
and
then
all
we're
doing
is
building
these
endpoints
and
making
sure
they
work
and
understand.
B
Then
we
can
kind
of
go
backwards
and
say
here's
that
plugs
in
and
we
need
to
change
how
the
pipeline's
work
there's
a
lot
of
behavior.
That
was
there
that
was
manually
set
up
because
we
didn't
have
services
and
you
can
rip
a
lot
of
that
out
after
seeing
how
it
work.
Well,
the
example:
absolutely
you.
C
B
B
It
seems
like
we
could
end
up
with
potentially
expanding
on
the
examples
as
far
as
in
the
repo
based
on
what
we're
talking
about
here
and
then
that
will
lead
into
use
cases
on
the
CNF
test
bed,
which
is
somewhat
separate
but
they'll
help
each
other.
Is
there
anything
else
from
the
SDK
I
think
we're
saying
proofread
suggested
improvements,
that'll
be
there
and
then
also
testing
the
examples.
Anything
else
from
the
SDK.
D
D
C
B
D
A
C
D
C
A
D
A
B
B
D
D
B
A
A
D
Don't
we
boil
it
down
to
instead
of
having
to
what
is
that
assembly?
We
could
keep
some
of
the
verbage
that's
there,
but
perhaps
we
start
with
with
three
pictures.
One
of
them
is
like
what
is
that
of
them
and
it
could
be
Sara
asking
for
a
network
service
as
a
as
a
user
and
then
the
second.
The
image
could
be
the
operator
chain,
creating
the
defining.
What
Sara's
VPN
is
I
go
ask
for
this
firewall.
D
A
We
may
want
to
tie
some
of
that
to
the
zero
day
one
day
two.
Clearly
we
want
pictures
and
not
text
the
way
we
have
here,
but
I
also
like
anthropomorphizing
it
by
having
people
with
roles
right,
because
the
three
moles
you
just
described
and
it
shows
up
a
bit
easier
day.
One
day
two
is
kubernetes,
had
been
network
service
admin
and
developer
right,
yeah.
D
A
And
that's
absolute
true
and
I
mean
one
of
the
things
I've
learned
talking
bitter
price.
Folks
is
it
you
know
the
InfoSec
folks
at
enterprises.
They
actually
care
a
lot
about
two
things.
The
first
thing
is
securing
it,
but
the
second
thing
is
being
invisible
about
it
because
they've
come
to
realize
they
can't
hold
back
the
tide,
and
so
they
can't
make
everyone
come
and
supplicate
to
them
on
the
way
to
getting
that
their
work
done.
A
A
We've
got
three
personas
picture,
a
landing
site
page
where
you
have
little
little
images
for
each
of
three
personas
with
their
name
under
them,
and
they
drop
you
through
to
a
very
simple
statement
of
the
way
it
works
to
that
right.
So
you've
got
you
know,
Sarah
this
offered
eV
and
you
follow
through,
and
you
see
what
it
looks
like
to
her
you've
got.
A
You
know,
carnal
the
criminalities
admin
you
know
and
you've
got
nancy
the
the
networks
or
service
admin,
and
you
just
get
movie
pictures
for
each
of
them
and
you
drop
on
through,
and
you
see
the
version
of
this
of
their
story.
That
might
be
very,
very,
very
effective
and
we
might
even
consider
for
doing
that.
Fourth
persona,
which
is
the
the
vendor
who
wants
to
you,
know
someone
who
has
to
build
network
services.