►
From YouTube: CNCF SIG Network 2020-09-17
Description
CNCF SIG Network 2020-09-17
A
B
B
B
C
B
D
B
Sorry
too
many
things
going
on,
we've
got
yeah,
I
think
so.
We've
got
some
follow-up
items
from
the
work
streams
that
were
introduced
last
week
or
the
last
time
we
met
a
couple
of
individuals
that
that
I
expect
to
see
on
the
call
to
to
talk
through
two
of
these.
B
So
michelle
nerali
and
nick
jackson
are
two
folks
that
I'm
hoping
will
show
up
in
the
next
minute.
So
we
can.
B
C
I
have
a
tiny,
tiny
thing
housekeeping
note.
Zoom
is
about
to
start
gatekeeping
meetings
on
passcodes,
it
seems
like
we
are
going
to
roll
with
the
universal
passcode
of
five
sevens
and
I
will
be
updating.
All
of
our
calendar
invites
next
week.
This
comes
out
the
27th,
so.
A
Apparently,
you
can
also
embed
it
in
the
url,
which
is
which
I
find
hysterical,
because
it
renders
the
entire
exercise
utterly
pointless,
but
there
we
are.
C
No
comment:
I'm
going
to
be
updating
all
the
calendar
invites
if
you
get
locked
out
of
the
room,
it's
going
to
be
on
the
public
cncf
calendar,
either
this
week
or
next
week
and
I'll
be
kind
of
lying
in
wait
to
let
people
in
if
they
get
locked
out.
A
A
C
Yeah
but
we've
we've
decided
that
a
universal
passcode
is
the
best
way
to
go
around
this.
So
here
we
are.
A
B
All
right
very
good:
well,
let's,
let's
get
started,
let
me
share
the
meeting
rants
just
to
make
this
a
little
more
interactive,
so
good,
so
we've
got
ed
is
here:
amy
is
here
thomas
is
here
josh
abhishek
matt,
and
did
you
think
I
called
everyone's
name
very
good
josh
and
is
it
thomas
or
tomas.
B
Good
deal
very
nice
very
nice
to
have
you
yash
and
tomas
thanks
for
coming
thanks
for
coming.
We
just
by
way
of
introducing
for
you
part
of
today's
agenda,
and
that
is
to
follow
up
on
some
work
stream
items
that
are
within
the
service
mesh
working
group.
The
service
mesh
working
group,
the
slides
and
charter
for
it
are,
can
be
seen
here
and
the
cncfc
networks
charter
is
broader
than
a
service
mesh
focus.
B
But
we've
had
we've
got
sort
of
enough
people
here
that
are
have
their
current
focus,
oriented
towards
service
meshes
and
there's
enough
to
do
there
that
there's
a
working
group,
that's
spun
up
and
in
lieu
of
other,
more
pressing
concerns
with
different
projects,
we're
using
this
time
to
advance
some
of
the
initiatives
within
the
service
mesh
working
group.
B
There
are
about
four
initiatives
within
that
group
right
now.
We
just
as
a
brief
recap
for
everyone.
There's
a
bit
about
one
initiative
about
service,
mesh
interface,
conformance
or
smi,
conformance
for
those
that
were
like
paying
really
really
really
close
attention.
I
think
yesterday,
maybe
the
day
before
yeah,
I
think
it
was
yesterday
or
tuesday
there's
a
little
bit
of
a
leak.
It
feels
like
a
leak
of
a
new,
yet
another
service
mesh,
that's
being
announced,
and-
and
this
is
one
that's
been
in
the
works
for
a
while.
B
I
hesitate
to
name
it
because
it
feels
like
it
was
an
accidental
announcement
and
but
this
particular
service
mesh.
It
uses
smi
entirely
as
its
rest
api,
or
rather
it
uses
yeah.
Its
implementation
is
done
through
smi
and
that's
the
only
interface
that
it
has,
and
so
I
highlight
it
just
as
another
another
example
of
some
of
the
steam
building
behind
smi.
B
Another
one
is
with
part
of
the
envoy
project,
the
the
nighthawk
load
generator
and
trying
to
help.
Try
to
you
know
trying
to
make
do
some
analysis
around
the
just.
What
happens
when
you
have
load
generators
distributed
and
coalescing
they're,
you
know
doing
statistical
analysis
coalescing
those
results
examining
things
in
a
distributed
world,
then.
The
fourth
aspect
to
our
to
this
working
group
is
a
bit
about
service
mesh
patterns
and
so
depending
upon
who
else
shows
up
today
we
might
actually
get
to
those
patterns
so.
B
B
Using
the
topic,
and
maybe
on
record,
to
answer
a
recent
question
that
michelle
had
had
not
that
not
that
we
need
to
be
on
record,
but
so
one
of
these
initiatives
is
smi
conformance
the
more
service
meshes
that
are
out
there.
The
more
that
people
projects
might
like
to
confirm
sort
of
officially
that
they're
that
they
are,
in
conformance
with
the
apis,
that
smi
sets
forth
to
perform
this
type
of
conformance.
B
Most
of
the
tests
end
up
needing
really
end-to-end
tests,
which
means
there's
a
fair
bit
of
provisioning
and
like
environmental
provisioning
of
the
service
mesh
of
the
configuration
of
the
mesh
of
a
sample
workload
of
load
to
be
generated
for
that
workload
if
necessary,
and
then
to
you,
know,
assert
that
a
particular
behavior
would
have
happened
and
to
validate
that
behavior,
and
so
there's
a
lot
of
it's
kind
of
a
lot
of
tooling,
and
so
the
service
mesh
management,
plane,
meshery,
is,
is
what's
being
used
to
help
run
or
orchestrate
those
tests.
B
This
particular
piece
of
work
has
been
well
something
that
was
established
as
a
goal
about
a
year
ago,
last
october,
and
a
couple
of
bright
students
have
worked
on
this
for
a
few
months
and
then
they
sort
of
handed
it
off
to
a
couple
of
other
bright
students
and
and
we're
essentially
at
a
place
in
which
this
this
initiative
is
the
the
tooling
is
essentially
there
that
there's
mesherie
as
a
tool
supports
eight
different
service
meshes
today.
Some
of
the
later
ones
that
it
supports,
are
open
service.
B
Mesh
kuma
are
kind
of
prominent
examples
of
two
service
meshes
that
claim
support
for
smi,
and
there
are
two
examples
of
service
meshes
that
you
can
use
meshri
to
validate
smi
with
today,
there's
kind
of
a
lot
to
not
not
a
lot,
but
there's
a
few
concerns
specific
to
how
you
would
do
conformance
testing
or
in
this
way.
One
is
that
you
know
similar
to
there
being.
B
I
forget
like
at
one
point:
there
was
80
something
kubernetes
distributions,
maybe
there's
more
or
less
now
I
don't
know,
but
to
be
able
to
claim
that
you
are
that
the
software
that
you're
shipping
is
in
fact
kubernetes.
It
needs
to
adhere
to
and
behave
again.
You
know
in
accordance
with
the
signature
of
kubernetes
apis
and
so,
and
so
you
know
in
the
same
fashion,
should
a
service
mesh
claim
conformance
with
smi.
It
should
behave
and
respond
in
accordance
with
that
specification,
and
so
that's
what
this
this
initiative
is
about.
B
So
if,
as
each
individual
service
mesh
project
and
as
just
service
mesh
users
are
able
to
perform
validation,
it's
it's
important
consideration
that
one
to
acknowledge
that
not
all
service
meshes
intend
to
fully
deliver
on
smi's
specifications
some
of
its
specifications
they
just
don't
ever
intend
to
to
have
that
capability.
So
it's
important
to
acknowledge
that
there's
a
difference
between
capability
and
compliance.
B
So
if
the
mesh
has
that
capability,
is
it
in
compliance
or
if
it
says
hey,
it's
never
going
to
have
it
then
that
that
probably
doesn't
you
know
it?
Doesn't
it's
not
failing
a
test,
because
the
test
is
inappropriate,
but
that's
kind
of
a
point
of
discussion.
I
think
something
that
probably
not
enough
eyes
have
been
on.
Let
me
call
upon
the
collective
minds
that
are
on
this
call
right
now
and
and
get
it
get
in
a
couple
of
opinions.
B
No
doubt
each
of
you
understood
the
difference
of
what
I
was
articulating
there,
but,
as
you
were,
to
look
at
a
report
that
says
these
service
meshes
are
in
compliance
or
not.
B
Does
it
also
make
sense
to
you
that
that
same
report
would
itemize
particular
apis
or
a
whole,
an
entire
api
that
a
mesh
will
never
be?
You
know
like?
Is
it
that
a
mesh
will
never
have
that
capability
like?
Is
it
possible
to
be
this?
Is
I
don't?
This
is
just
a
mind
exercise
for
everyone
on
here.
In
your
mind,
is
it
possible
to
be
compliant
with
the
specification
and
yet
not
implement
a
certain
percentage
of
it?
A
Yeah,
so,
traditionally
speaking,
if
someone
says
I
comply
with
mumble
mumble,
I
would
expect
whatever
mumble
mumble
is
specified
to
actually
work,
and
so,
if
you
have
sort
of
a
partial,
if
you
want
to
get
a
general
compliance
in
a
partial
way,
you
sort
of
need
some
way
to
talk
about
the
subsetting
in
a
sane
sense
right.
So
you
can
say:
okay,
we
support
smi
and
we
support.
You
know
profile
one
profile,
three
and
profile,
seven,
so
that
you
actually
can
understand
clearly
what's
being
done
and
that
it's
being
done.
B
Correctly
yeah,
I
agree:
here's
a
to
play
this
thought
out
or
to
see
if
this
makes
any
sense
to
be
able
to
so
some
service
meshes
have
part
and
parcel
to
their
design.
They
have
gateways
like
an
ingress
gateway
and
an
egress
gateway.
B
Others
don't
have
that
as
part
of
their
architecture,
they're
more
of
a
bring
your
own
gateway.
If
you
want
or
bring
your
own
your
ingress
and
so
to
them
an
smi
spec
that
you
know
calls
for
gateways
to
be
able
to
be
conv.
You
know
for
you
to
be
able
to
configure
a
gateway
in
such
a
way.
B
Do
you?
Is
it
still
like
just
a
sort
of
edit
in
accordance
with
what
you
were
saying
generally
like
it?
It
would
be
in
most
projects.
It
would
be
simplified
to
just
language
like
well,
assuming
that
they're
passing
that
service
mesh
is
passing
every
other
test
and
that
the
in
the
gateway
tests
made
up
30
of
the
spec.
A
Don't
think
the
percentage
tells
you
anything,
because
I
I
could
be
70
percent
compliant
in
in
the
way
you
just
described,
where
I
just
simply
aren't
I'm
not
implementing
a
gateway,
and
so
I'm
not
doing
that.
But
I
have
stellar
compliance
on
everything
I
do
implement
or
I
could
be
70
compliant
because
I'm
a
complete
show
and
there's
literally
no
way
to
distinguish
there.
It
may
be
useful
to
think
about
how
long-running
standards
have
dealt
with
some
of
this.
A
So
you
know
I
I
come
out
of
the
more
traditional
networking
world
and
you've
got
standards
like
bgp
that
have
literally
been
with
us
for
decades,
and
so,
if
you're
saying
okay
well,
I'm
complying
with
bgp
literally
that
never
means
that
you're
complying
with
100
of
the
rfcs,
because
no
one
is
what
you'll
talk
about,
is
sort
of
like
I'm
complying
with
this
or
that
you
get
sort
of
a
common
shell
of
them
that
most
people
comply
with
and
then
you're
like
well
and
I
comply
with
this
rfc
or
this
draft
which
brings
new
features
to
the
protocol.
A
Now,
there's
not
a
lot
of
mechanical
difference
between
somebody
introduced
to
something
new
to
the
smi
spec
versus
you.
Don't
support
gateways
in
both
cases.
You
need
some
reasonable
way
of
saying
very
succinctly
what
you
do
and
don't
support
so,
basically
saying
being
able
to
say
I
support
and
part
of
this
has
to
feedback
the
smi
community
right
about
how
they
classify
their
stuff
because
they're
the
ones
that
should
come
from
but
being
able
to
say.
I
have
a
hundred
percent
compliance
with
smi
core
and
I
have.
A
I
have
no
compliance
at
all
with
smi
gateway,
for
example.
Okay:
well,
clearly
you
don't
support
smi
gateway.
It
doesn't
mean
that
you're
screwing
it
up
you're,
just
not
even
trying-
and
that's
really
quite
different,
because
you
know
somebody
who
has
a
really
poor
compliance
score
on
something
they're
trying
to
do.
That
could
be
a
poor
indicator
in
general
of
software
quality,
whereas
you've
got
seller
really
really
stellar
compliance
scores
on
all
the
things
you
claim
to
be
compliance
compliant
on.
That's
quite
different.
B
It
pleases
me
to
hear
you
say
that
yeah,
because,
as
we
were
talking
over
it
initially,
I
was
a
had
brought
this.
This
up
was
to
really
sort
of
acknowledge
that
hey,
wouldn't
really
feel
fair
to
some
or
like
it's
not
it's
not
necessarily
about
fairness,
but
it
wouldn't.
It
would
feel
like
a
misrepresentation
that
they
would
that
a
given
mesh
might
have
a
stellar
implementation,
but
always
be
represented
as
a
70
pass
rate,
because
they.
A
Comparison
often
helps
like
if
you
want
to
talk
about
not
only
being
unuseful
to
users
but
unfair,
to
service
meshes
right
if
I'm
a
service
mesh
that
has
nailed
the
part
that
I'm
doing,
and
I
have
a
70
pass
rate,
but
I'm
doing
100
of
everything
I
set
out
to
do,
and
I'm
doing
it
correctly
to
have
someone
look
at
a
table
and
sort
by
pass
rate
and
see
a
service
mission
is
trying
to
do
everything
with
an
80
pass
rate
that
is
just
screwing
up,
left
right
and
center.
A
B
So
part
of
the
so
the
visualization
of
the
test
results
in
some
respects
or
like
whether
it's
visual
or
just
the
table
or
the
result
set
that
that
identifies
the
posture
of
a
given
mesh
according
to
the
specs
sounds
in
this
discussion
sounds
fairly
important
to
be
able
to
articulate
you
know.
B
So
there
are
four
smi
spec,
I'm
saying
some
things
that
some
of
you
know,
but
there's
four
smi
specs
these
simple
verbal
statements
or
high-level
descriptions
of
some
of
the
tests
that
will
be
asserted
and
verified.
Some
of
that
is,
like
you
know
you
do
a
traffic
split.
You
deploy
a
sample
app,
you
send!
You
generate
some
load,
you
you
validate,
that
of
the
100
requests
sent
that
50
were
that.
You
know
you
you're
doing
this.
B
End-To-End
verification
and
each
of
the
tests
are
given
then
a
unique
identifier,
and
so
I
get
the
the
thinking
here
is
that
the
result
the
table
that's
displayed
would
or
the
result
set
or
the
spreadsheet
or
whatever
that's
displayed
list
each
of
the
individual
test
identifiers
that
you
know
the
monikers
for
what
that
test
is
whether
or
not
the
and
the
thought
was
whether
or
not
the
mesh
is
capable
and
if
so,
what
what
their
status
is
in
terms
of
compliance-
and
I
don't
know
this
might
be
more
specific
than
it
needs
to
be.
B
A
A
A
Yeah
within
a
particular
shell
of
features,
percent
pass
rate
is
fantastic,
but
failure
to
support
a
feature
doesn't
strike
me
as
the
same
as
failure.
A
B
That's
helpful
yeah.
I
wish
I'm
an
smi
maintainer,
but
I'm
one
of
eight,
the
other
two
people
that
I
mentioned
were
would
have
been
three
of
eight
or
like
it
would
have
been.
This
is
that
this
is
a
fantastic
input
and
I'm
remiss
there
I'm
sad
that
there
aren't
a
couple
of
others
here
to
help
concrete.
B
Then
maybe
just
the
last
item
on
this
topic
of
smi
conformance
was
michelle
was
going
to
come
today
and-
and
I
think
was
for
the
first
time-
sort
of
earnestly
digging
into
trying
to
now
that
now
that
she
and
she
and
her
team
directly
represent
a
service
mesh,
was
coming
over
to
to
engage
and
identify
understand
whether
or
not
the
tests
that
are
defined
today
are
all
that
we
need,
and
they
are
they're
absolutely
not
like
the
the
team
of
open
source
contributors
that
have
that
has
put
this
together
has
only
taken
only
defined
a
certain
number
of
tests
like
it's.
B
We
really
need
the
rest
of
the
community
to
the
smi
community
to
articulate
what
those
tests
should
be,
and
so,
as
she's
looked
at
it,
she'd
ask
this
question
here
and
and
in
my
mind
I
think
the
essence
of
the
question
sort
of
comes
down
to
well
the
answer
that
many
of
these
tests,
like
a
traffic
split
test
to,
and
please
correct
me
if
I'm,
if
what
I'm
about
to
say,
if
anyone
sees
it
differently
like
to
validate
the
traffic
split
as
an
example
splitting
a
certain
percentage
of
requests
for
to
one,
you
know
endpoint
to
the
next
to
verify
that
a
given
service
mesh
you
know
implements
that
in
accordance
with
how
smi
has
defined
it.
B
B
B
The
the
nearest
related
project
to
this
smi
conformance
tool
is
sonaboy,
for
which
does
you
know,
conformance
testing
for
kubernetes,
and
it's
a
batch
base.
It's
a
different
different
system.
It
it
doesn't,
it
doesn't
have
all
the
same
complexities
that
running
services
and
sample
workloads
has.
B
Cool
so
anyway,
the
thought
that
my
perspective
is
that
yeah
you
need,
and
then
testing
and
and
michelle's
example
of
a
need
that
they
have
is
a
perfect
test
case.
So.
B
It
was
two
other
topics,
at
least
on
the
agenda,
as
it
is
right
now.
Let's,
given
that
nick
isn't
here,
let
because
he
was
gonna
lead
this
discussion
on
smp.
Let's
skip
over
to
this
third
one,
which
is
about
service
mesh
patterns,
identifying
patterns
and.
B
Helping
people
understand
them,
so
hopefully
everyone
is
able
to
open
the
link
in
case
you're,
not
able
to
see
it
very
well,
but
if
you
would
have
a
gander
and
and
have
a
comment
these
are.
These
patterns
are
broken
down
for
the
mo
broken
down
into
different
areas,
they're
not
identified
really
by
what
is
foundational
and
what
is
advanced.
B
Through
configuration,
and
so
that
that's
kind
of
what
this
this
group,
this
collection
is
about
this
next
one
is
just
you
know:
how
do
you
get
up
and
going
and
doing
it
either
locally
or
remotely
different
service
mesh
architectures,
a
popular
pattern
of
there
being
sidecar
proxies
being
used?
There
were
service
meshes
of
past,
and
current
service
meshes
that
also
use
a
node
agent
like
a
daemon
set
model.
B
B
So,
depending
upon
how
many
folks
get
engaged
and
how
much
time
there
is,
we
might
be
able
to
assist
in
pointing
people
to
resources
about
these
patterns
having
a
published
list
of
the
patterns
having
the
patterns
well
described,.
B
B
But
but
I
don't
think
we'll
jump
into
this,
the
discussion
that
we
were
going
to
have
just
because
nick
isn't
here
to
present
it
so
with
that,
are
there
other.
B
Topics
all
right,
amy
ambassadors,
due
diligence-
I
don't
think
matt's
on
the
call
yet
or
he.
C
Was
oh
yeah
still?
I
can
check
in
on
that.
We
have
a
call
next
week
where
we're
going
to
be
kind
of
discussing
like
how
to
better
scope
some
of
the
due
diligence
projects
for
people
that
are
coming
in
either
at
incubation
or
if
they
want
to
move
from
sandbox
to
incubation.
B
A
No
it's
a
little
bit
underway.
There
was.
There
was
a
there
were
several
months
and
then
the
the
talk
came
back
to
it
and
they
had
some
really
really
smart
questions,
some
of
which
you
just
kind
of
go.
I
feel
stupid
for
not
having
answered
that.
So,
for
example,
they
asked
what
versions
of
kubernetes
do
you
support
with
your
releases
and
we've
done
sort
of
very
broad
testing
across
different
kinds
of
environments,
various
public
clouds,
et
cetera.
A
So
I
I
went
back
through
on
that
question
and
actually
rear
nrci,
going
all
the
way
back
to
1.12
and
just
for
good
measure
going
all
the
way
forward
to
119,
and
we,
you
know
basically
in
the
course
of
that
found
all
that
was
always
well
across
that
range
and
got
that
up
on
the
release,
notes
pages
and
then
commented
to
do
that.
I've
still
got
a
few
more
questions.
They've
asked
for,
unfortunately,
to
really
do
a
good
job
of
answering
some
of
their
questions.
A
I'll
need
to
draw
some
pretty
pictures
because
they're
asking
about
things
like
you
know
what
new
features
came
in
here
and
I
can
do
sort
of
a
dry
bullet
list,
but
it's
not
going
to
help
the
the
talk.
I
don't
think
because
they're
not
day-to-day
in
the
mock
and
a
couple
of
pretty
pictures
actually
on
the
release
page.
You
should
make
that
really
clear.
So
that's
that's
kind
of
where
that
is
right
now,
so
I've
still
got
a
few
more
things
to
do.
E
Okay,
very
good
curious,
any
1.19,
not
1.9.
B
Oh
sorry,
yeah,
it's
all
good
any
questions
on
governance
or
in
and
around
governance,
not.
A
At
this
time,
no
they've
not
actually
asked
any
questions
on
that
at
this
time,
yep.
B
Well,
I'm
trying
to
I'm
trying
to
rack
my
brain:
do
we
have
other?
We
have
other
topics,
get
a
lot
of
other
projects,
the
there's
a
number
of
projects
that
I'm
not
able
to
keep
pace
with.
B
I
was
talking
to
a
google
summer
of
code
participant
that
just
got
done
working
on
some
machine
learning
in
core
dns
and
the
use
case
I
think,
was
about
just
kind
of
dns,
blacklisting,
dns
filtering
and
the
machine
learning
around
that
and,
for
my
part,
I
always
enjoy
hearing
about
interesting
projects
or
getting
updates
from
the
projects
within
the
sig.
B
Ken
ed
amy
do
we
is
that
is,
is
getting
report
you
know
is
get
is
having
some
of
the
you
know,
maintainer
from
each
group
from
each
project
present
once
once
a
year
twice
a
year,
not
to
put
a
burden
on
them,
but
just
inviting
them
to
do
so
as
a
forum
for
highlighting
meetups
yeah.
A
So
I
mean
my
experience
with
that
sort
of
thing
is
that
a
lot
of
it
comes
down
to
the
tone
of
the
tone
with
which
the
invitation's
extended
I've
seen
people
get
very
excited
about
hey.
You
know
we
have
a
venue
here.
We
wanted
to
offer
the
opportunity
for
you
to
come
in
on
the
cadence,
that's
comfortable
and
tell
us
about
your
progress
and
sort
of
spread.
The
word
a
little
bit.
That
invitation
goes
super
well.
A
C
Yeah
and
and
to
kind
of
kind
of
follow
along
with
that
one
thing
that
has
kind
of
changed
as
far
as
like
people
getting
talks
at
kubecon,
which
I
know
is
a
huge
thing:
we've
now
limited
projects
down
in
cigs
down
to
one
35-minute
session,
because,
frankly,
we're
hearing
from
like
community
feedback
that
there's
too
much
content,
and
it's
overwhelming
so
being
able
to
extend
the
opportunity
for
projects
to
be
able
to
come
and
showcase
their
work
in
another
format
that
still
is
available
to
all
to
be
able
to
come
and
participate
and
go
up
on
youtube
would
actually
be
quite
quite
welcome.
A
And
then
yeah
and
the
other,
the
other
piece
of
it
quite
frankly
is
cubecon
is
a
giant
bowl
of
content
all
at
once
and
that's
intensely
overwhelming,
but
the
oh
this
week
in
a
week
where
not
a
lot
else
has
happened
that
I've
noticed
going
by
that
I'm
going
to
invest
my
time
in
there
was
this
talk,
that's
been
given
or
had
been
given
last
week
on
this
topic
over
here.
That
looks
interesting.
That's
often
much
less
overwhelming
for
audiences
than
we
have
500
talks,
which
one
would
you
like
yeah.
B
And
ed,
you
are
you,
you
characterize
it
really
well
about
the
intent
of
what
I
was
asking,
which
is
mostly
just
like
my
goodness,
there's
a
lot
of
very
interesting
things
going
on
in
these
on
these
groups,
and-
and
I
don't
know
that
they
know
this
is
an
open
forum
to
you-
know
a
platform
to
elevate
their
works
and
to
get
some
feedback
on
their
works
and
well.
A
Again,
quite
honestly,
I
mean
I'm
literally
in
these
meetings
almost
every
time
and
it
would
never
have
occurred
to
me
to
come
and
do
that
here.
I
I
you
do
sometimes
get
this
thing
that
happens
with
people
and
it
varies
by
personality
where
it's
like.
Oh
the
sig
is
doing
important
stuff.
A
So
I
want
to
be
very
respectful
of
its
time
and
sort
of
treating
it
as
a
platform
to
promote
my
project
for
some
people
that
might
feel
forward,
not
everyone,
but
for
some
people,
and
so
just
the
the
you
know
like
I
said
I
think
the
well-toned
invitation
could
be
really
powerful.
B
Nice
yeah
good
yeah.
Actually
I
had
gotten
a
question
from
jim,
whose
last
name,
I
think
is
saint
lager
of
currently
of
intel.
He
was
he's
been
on.
These
calls.
A
few
different
times
has
asked
some
good
questions.
He'd
recently
asked
about
the
relationship
between
the
cncf
sig
network
and
it
wasn't
the
kubernetes
sig
network.
It
was
the
kubernetes.
A
B
And
so
that
was
a
good
reminder
to
me
that
that
to
to
to
what
you
just
said,
is
that
folks
don't
necessarily
know
that
this
is
an
open
venue
to
them
or
that
so
well,.
A
And
one
thing
I
don't
know
how
much
work
it
is,
that
might
be
helpful,
is
just
having
an
index
of
these
are
all
the
things
going
on
on
a
regular
basis
that
cncf's
networking
thinks
might
be
of
interest
to
people
who
are
interested
in
networking
in
the
cloud
native
space
right.
So
here's
the
relevant,
you
know,
meetings
that
are
happening
in
the
kubernetes
networking
singing
committee
space
and
here's
these
community
meetings
that
are
happening
for
these
communities
and
that
kind
of
thing
like
it's
sort
of
like.
A
I
really
love
the
cncf
landscape,
but
it
has
gotten
to
be
so
big
and
so
daunting
that
maybe
just
sort
of
like
a
smaller
scale-
hey
this
is
the
cnc
and
probably
not
as
graphically
designed.
This
is
the
cncfc
network's
notion
of
the
landscape
of
cloud
native
networking
that
might
be
interesting.
C
C
B
C
Hey,
I
have
suggested
something
and
you
can
take
it
as
you
want
to,
and
lee
I've
also
dropped
an
enthusiastic
yes
to
be
able
to
help
projects
come
on
over.
If
you
need
help
getting
in
touch
with
them,
I
am
happy
to
help.
Thank
you.
C
No,
the
suggestion
was,
if
you
wanted
to
look
at
a
landscape,
I'm
pretty
sure
that
sega
app
delivery
is
also
kind
of
running
down
the
same
path.
B
If
we
could
so
we're
going
to
be
giving
time
back,
but
before
we
do,
since
I
gotta
say
like
I,
my
I've,
my
hands
been
sort
of
shaking,
I
haven't
had
like
actual
human
contact
in
a
while.
I
didn't
get
my
cubecon
in,
and
so
I
gotta
be
friendly
and
social
a
bit
and
so
yosh
since
you're
on
the
call
and
thomas.
Do
you
guys
mind
introducing
I'd
love
to
get
to
know
you
some
and
just
what?
What
you're
into
what
your
focus
is?.
D
Yeah
sure
I
can
go
first,
so
I
work
in
vmware
and
I'm
working
on
the
kubernetes
on
these
peer
product
and
so
I've
actually.
So
this
is
just
a
way
for
me
to
keep
in
touch
with
what
you
guys
are
doing,
and
so
I've
just
been
attending
some
of
the
meetings.
So
this
is
just
me
or
looping
and
then
figuring
out
some
of
the
things
that
you
guys
are
working
on.
B
D
Right
for
me,
I
think
so
to
give
you
more
of
a
background,
I'm
working
on
the
cubelet
equivalent
team
we
have
in
so
we
we
run
equivalent
of
a
cubelet
or
a
virtual
cubelet
fork
on
esxi.
So
I'm
I'm
working
on
that
team.
So
a
lot
of
the
networking
is
a
bit
higher
layer
for
me,
but
I'm
just
interested
in
like
learning
about
it.
At
this
point.
B
Josh
something
else
to
maybe
click
on
and
spend
30
seconds
looking
at
is
this
there's
been
a
collection
of
folks
who've
been
working
on
helping
define
cloud
native
networking
and
some
of
its
concepts
and
principles,
and
it's
been
a
it's
a
resource
kind
of
it's
been
a
point
of
discussion
in
this
sig
in
the
past.
So
there's
a
link
there.
If
it's
and
then.
F
Thomas
sorry,
do
you
hear
me
yep?
Yes,
yes,
my
name
is
thomas,
I'm
a
staff
engineer
at
dynatrace
and
observing
the
company
I'm
dealing
almost
with
gardening
different
unity
stuff
and
have
a
strong
interest
in
networking.
So
I
worked
as
a
network
technician
about
10
or
20
years
ago.
B
B
All
right,
fair
enough,
very
good!
I'm
gonna
go
shake
down
michelle
and
nick
for
not
showing
up
today.
B
Other
than
that,
I
think
that
that's
a
wrap
see
everyone
in
a
couple
weeks.