►
From YouTube: CNCF SIG Observability 2020-06-09
Description
CNCF SIG Observability 2020-06-09
A
A
A
A
B
B
C
C
C
C
C
C
C
Everyone
should
feel
more
than
welcome
to
raise
objections
or
anything
at
any
time,
no
matter.
If
this
is
your
first
call
or
your
tenth
call
on
this
call,
you
should
feel
comfortable
actually
putting
your
your
comment
or
your
name
or
your
images.
That
being
said,
I'll
try
and
make
it
quick,
so
yeah
should
we
can
screen
share
if
you
want
that
actually
makes
sense.
C
C
C
Let's
walk
through
it
as
per
last
time.
We
know
that
Thanos
is
self-governing.
We
know
that
there
is
a
provision
in
place
to
limit
takeover
exams
by
a
single
company.
We
know
that
silence
has
a
code
of
conduct
should
I
open
it,
or
is
everyone
happy
with
just
acknowledging
that
this
is
the
case?
What
I
just
talked
about
good,
so
someone
put
in
the
comment
section
for
me.
Thank
you.
C
F
C
C
C
C
That
is
a
duplicate
question
which
we
need
to
attach
to
TOC
to
to
change
the
template
same
here.
That's
also
dupe
and
same
here,
that's
also
good,
so
we
will
be
walking
through
those
in
a
second
the
question.
If
it's
useful
for
cloud
native
deployments,
I
think
we
can
agree
with
this.
Of
course,
it's
obviously
following
the
parameters
and
that's
the
kubernetes
way
of
doing
things
and
if
affinity
for
our
CTF
wants
to
operate.
I
would
also
agree
with
this,
as
it's
literally
the
police's
way
of
operating
just
with
objects
to
an
outro
screen.
C
C
Denote
reliability
concerns,
or
should
we
just
like
so
now
we
come
to
a
large
section,
so
quick
show
of
hands
or
or
two
people
want
to
read
this,
so
we
can
just
pause
for
like
two
or
three
minutes,
and
everyone
can
read
through
this,
or
do
you
just
want
to
walk
through
this
it
at
paste?
Oh,
that's!
Fine
by
me,
I
just
want
to
to
feel.
F
C
D
C
B
C
C
Very
good
next
section
is
about
usefulness
in
cloud
native
deployment
and
to
a
degree
of
being
architectured
in
a
cloud
native
style,
which
is
one
of
the
questions
which
we've
also
seen
improvement,
suggestions
from
the
sick,
I
daresay
yeah
I
read
through
it,
I
was
happy
with
replies.
Anyone
else
with
comments
rewriting
this
section.
C
C
C
B
C
Very
good
next
one
it's
about
healthiness
of
comatose
and
maintain
ours.
Looking
at
the
numbers.
Obviously
Red
Hat
invests
most,
but
there
is
a
healthy,
a
healthy
distribution
of
contributors.
So,
in
my
opinion
we
can
make
the
same
call
for
consensus.
Sic
observability,
exactly
with
the
section
above
all
agreed
any
disagreements.
C
C
C
C
C
C
Yeah
for
for
basically
the
whole
section,
in
fact
that
infrastructure
management
and
such
is
outside
of,
in
my
opinion,
completely
acceptable
and
not
putting
any
any
non-primitive
services
carry
mechanisms
on
top
within
the
context
of
thermos.
It's
also
fully
acceptable,
especially
due
to
the
overlap,
which
would
mean
that,
if
Thanos
needed
anything
more,
the
project
itself
would
be
more
than
capable
of
implementing
anything
missing
with
increases
upstream
and
then
basically
and
use
it
also
completely
fine.
C
C
C
Very
nice
failure
modes
and,
if
they're
being
understood,
I
read
through
it,
I'm
happy
with
with
everything
which
which
I
saw,
but
this
is
actually
one
of
the
most
interesting
sections.
So
again,
if
you
have
any
comments,
any
concerns,
if
you
want
to
take
some
time
to
actually
read
through
it,
it's
all
fine
you're,
more
than
welcome
to
just
just
say
so,
and.
E
But
I
think
it's
probably
out
of
scope
for
the
specific
question,
but
I'm
curious.
If
there
is
either
are
these
things
that
are
tested
for
in
terms
of
regression
but
but
again,
I,
don't
I,
don't
want
to
torpedo
or
anything
like.
What's
the
correlation
between
these
failure
modes?
What's
something
that
would
be
caught
by
automation,
I.
D
Mean
please
torpedo
things
like
this
is
how
we
can
learn
and
get
have
some
feedback
like
yeah
I
can,
since
she
say
that
we
try
to
test
against
those
definitely
and
especially
in
terms
of
regressions.
We
immediately
kind
of
create
the
test
if
we
found
some
certain
back.
That
is
happening
that
we
fix
just
to
make
sure
we're
not
kind
of
repeating
that
pattern
now
for
this
I
think
for
especially
for
those
distributed
system
fail
overs
it.
It
is
more.
D
There
is
little
area
for
improvement
to
get
more
testing,
and
particularly,
we
are
thinking
about
the
receive
component
which
is
replicated,
and
you
know
everything
has
to
be
reliable-
that
if
one
note
is
down,
the
replication
will
recover.
You
know,
and-
and
and
this
this
note
will
be
joined
again
if
it's
up
and
for
those
things
we
recently
think
about,
you
know
kind
of
have
some
Jetson
style
testing.
Are
you
aware
of
jettison
this
like
a
nice
project
for
that
fault
injection
in
different
areas?
D
F
C
C
E
E
C
G
Important
holes
hi,
like
sorry
I,
joined
the
kool-aid,
but
I
think
we
should
also
highlight
on
the
security
side
some
of
the
trade-offs
that
were
made
I
think.
F
C
C
I
mean
this
question
is
kind
of
weird
cuz.
Obviously
the
people
who
wrote
those
documents
are
the
only
ones
who
are
qualified
to
actually
judge
the
answer.
So
I
dare
say
it's
not
a
very
good
question,
but
that
being
said
within
the
scope
of
what
we
can
do
within
a
document
to
review
and
I'm,
not
implying
that
there
are
any
holes
which
have
been
tested
over
I'm.
Just
saying,
I
can't
I,
don't
feel
I
aim
to
do
due
diligence
on
this
beyond
trusting
the
people
involved
yet
called
for
consensus.
F
C
G
F
Abuse
that
it's
a
bit
hard
because
we
rely
on
proxies
right.
So
basically,
if
you
can
abuse
trick
proxy
into
doing
something,
then
yes
like
like
now.
If
your
proxy
is
behaving
well,
which
is
outside
of
our
scope,
then
now
basically
parks
ban
you
from
like
sending
traffic
to
Thomas
right.
So
that
would
be
like
really
hard.
Unless,
like
I,
don't
know
it's
I,
guess
you
got
some
kind
of
you
know
we
don't
do
like
query,
parsing
or
some
kind
of
like
you
know,
basically
like
sequel
injection
type
of
things,
which
I
think
it's
really.
F
D
G
D
Yeah
but
like
in
fact,
you
can
make
profuse
multi-tenant
as
well.
Things
of
this
and
I
agree
it's
well
technically
less
secure
than
in
process
authentication
and
like
multi-tenancy,
so
you
need
to
kind
of
secure
your
container,
your
you
know,
runtime
environment.
So
definitely
that's
a
that's
some
trade-off
here
that
maybe
we
should
point
but
definitely
doable
as
well.
I
want
to
mention
also
that
CN
CF
offers
ask
some
security
out
it.
So
hopefully
we
can
can't
have
another
kind
of
very
deep
look
on
that.
C
B
D
D
C
Spoiled
by
the
pro
style
guide,
you
know
Tom
hates
me
for
saying
this,
but
it's
a
really
nice,
oh
yeah
I
know
you
have
a
style
guide
in
there
like
it.
So,
within
the
context
of
this
document,
I
would
go
to
just
the
same
call
for
consensus
that
SiC
observability
is
happy
with
section
all
agreed.
Any
disagreements.
C
Yet
within
the
context
of
this,
so
maybe
at
this
order,
can
you
do
that
yeah?
It
doesn't
need
to
be
now
course
again.
It's
just
edit
more
but
I.
Personally
I
thought
it
was
missing
that
that
you
rely
in
large
part
on
on
a
distinct
project,
which
normally
is
this
thing,
even
though
it
will
never
die
verge
of
so
same
call
for
consensus,
sick
observer,
please
have
sick.
Observability
is
happy
with
the
section
above
all
agreed
any
disagreements.
C
C
C
E
E
E
C
E
E
Everybody
seems
to
be
using
that,
but
I
haven't
looked
at
that
on
specifically
like
if
I
won't,
you
know
again,
or
they
make
Forks
of
this
and
running
with
my
own
kind
of
actions
in
my
own
circle,
CI
account
I'm,
assuming
that
that's
possible
to
do
it's
not
hidden
away
or
buried
in
a
private
way
and
other
ways,
architected
that
that's
not
doable.
It's.
F
E
If
there
were
a
mechanism
for
me
to
report
those
results
back
to
the
community,
I
would
love
to
do
so
and
and
and
just
in
the
spirit
of
like
accepting
contributions,
not
just
for
code
but
also
for
testing
cycles.
You
know
there
could
be
lots
of
folks
in
the
community
that
they
wanted
to
do
that
so
again,
I,
don't
I,
don't
think
this
is
anything
that
needs
to
hold
up
moving
into
incubation,
but
as
feedback
for
the
project.
E
E
E
Yeah
I've
found
in
the
past
that
complexity,
the
work
is
more
on.
What
do
you
do
with
all
the
results?
I
could
and
again
I
want
to
put
a
barrier
to
entry
to
get
into
incubation
to
solve
that
problem.
I
think
it's
CN
CF
wide.
You
know
if
we
could,
if
we
could
come
up
with
some
way
to
do
that
or
see
if
other
SIG's
have
already
sorted
this.
E
You
know,
for
example,
and
again
this
is
about
Cortexiphan
O's,
but
as
we
roll
to
production
with
with
cortex,
we'll
have
a
whole
separate
staging
environment
that
replicates
our
production
environment
running
ahead
right,
so
that
might
be
a
different
set
of
workloads
and
stuff
that
I'll
have
test
results
for
that
I'd
be
happy
to
put
back
to
the
community
so
yeah,
but
again
I.
Don't
want
to
I've
already
taken
up
too
much
time,
because
for
this
document,
I'm
happy
with.
C
Very
good
licensing,
it's
apache2,
sic
observable
he's
happy
with
the
section,
above
all
of
it,
kinda
obvious,
yet
wanted
to
make
it
explicit,
recommended
operational
models.
That's
also
fine,
in
my
opinion,
that
section
but
again
speak
up.
If
not
called
for
consensus
sake.
Observability
is
happy
with
the
section
above
all
agreed
any
disagreements.
C
E
Oh
I'm,
sorry,
my
audio
list
and
I
had
a
distraction
on
the
previous
one
with
how
we
operate
it.
I
see
that
there's
JSON
it
is
that
the
is
that
the
recommended
way
to
deploy
those
or
is
there
helm
or
other
mechanisms
as
well
or
are
those
kind
of
treated
outside
that
then
I
was
project
and
are
like
I
could
go,
look
I'm
listening,
there's
a
helmet
art
somewhere
is
that
is
that
not
sanctioned
or
maintained
or.
F
So
yeah,
right
now,
home
chaps
are
basically
community
driven
and
I
think
there
are
like
two
or
three
people
which
are
currently
collaborating
and
basically
working
on
to
match
our
into
tennis
community
people.
None
of
anything
ours
actually
use
home.
So
that's
why
we
don't
have
home
charts
right
now,
basically
maintainer
supportive,
but
we
will
shot.
We
have
one
which,
which
is
in
like
tano's
community
organization,
and
there
people
will
be
able
to
actually
use
basically
community
maintained
home
repository.
Also
there
is
customized
versions
and
yeah.
D
D
F
D
D
What
you
already
have
your
best,
your
best
practice
right,
provillus
use,
customized,
we
use
JSON
it,
and
sometimes
you
know
operator,
because
we
get
to
know
separators
as
well
from
different
kind
of
people,
so
I
I
want
to
kind
of
make
sure
we
are
on
the
same
page
that
we
are
trying
to
move
this
outside
into
community,
however
help
and
make
sure
it's.
It
has
best
practices,
but
we
want
to
collaborate
with
the
community
instead
of
having
this
very
not
controlled
by
us.
D
E
C
C
So
the
questionnaire
I
was
happy
with
with
what
was
in
there.
Are
there
any
concerns?
Any
comments
regarding
this
questionnaire
beyond
what
Micah
put
in
or
not
and
I
know,
it's
quite
quite
a
chunk.
We
can
also
take
some
time
to
read
it
if
people
want
to,
but
then
please
just
just
states
also
we
know
else
personally.
I
was
I
was
happy
with,
with
the
whole
thing.
C
F
C
Think
so,
okay,
so
I
mean
stuff
like
yeah
I
mean
I,
don't
see
answering
this
with
more
stuff
as
a
half
requirement
within
the
scope
of
this
call
of
agreeing
with
with
the
document.
But
more
steps
are
always
nice,
even
if
it's
just
for
sheer
vanity,
so
yeah
I
need
to
copy
this
same
call
for
consensus.
E
G
C
E
E
I'd
like
to
extend,
like
you,
know
again
a
warm
thank
you
for
the
authors
that
put
all
this
together.
You
know
the
level
of
detail
is
great.
You
know
it's
I
think
considered
me
it's
a
good
document
and
it's
a
good
example
like
the
cortex
one
was
on
on
this
and
then
and
again,
I.
Think
having
this
at
this
phase
will
make
subsequent
phases
easier.
E
I'm
fine
having
a
slightly
higher
bar
than
some
of
the
other
six
on
some
of
this,
because
this
feels
to
me
like
someone
new
to
the
project
that
says:
hey
West,
a
nose
can
actually
start
at
this
diligence
document
and
kind
of
very
quickly
have
a
good,
well-rounded
understanding
to
be
a
contributor
which,
to
me,
is
one
of
the
most
important
things
about
this,
and
this
TOC
can
also
spend
you
know
a
not
crazy
amount
of
time
to
quickly
be
able
to
evaluate
it
and
have
a
starting
point.
That's
informed
so
Thanks.
C
E
Also
before
word
before,
we're
done
just
well
this
so
time.
If
you
haven't
actually
put
your
attendance
and
oh
I,
see
most
people
about
anything
everyone,
I.
D
So
do
we
have
two
minutes
for
last
topic
on
the
agenda?
Yes,
alright!
So
let's
just
quickly
mention
what
this
is
about
and
we
can
expand
on
this
and
and
talk
more
like
in
two
weeks.
Essentially
the
idea,
if
they
click
the
link,
is
as
on
the
mailing
list,
and
the
idea
is
that
we
are
missing
the
connection
between
the
kind
of
metric
data
into
some
kind
of
analytic
use
case
right,
so
that
we
we
have
lots
of
nice
solutions
for
gathering
them
for
storing
long
term
storage
in
long
term
storage.
D
You
know
those
metrics,
we
have
court
externals
other
projects
and
we
want
to
make
use
analytic
use
of
this
data
right
and
and
maybe
switch
from
more
monitoring.
Real-Time
monitoring,
alerting
use
cases
to
also
include
maybe
some
hola,
and
you
know,
business
analytics
and
intelligence
I
think
there
is
a
missing
link
and
it's
super
hard
for
those
people
for
data
engineers
to
gather
efficiently
and
discover
the
data
that
we
have
in
metrics.
So
as
country
music,
ecosystem
I
would
love
to
explore.
D
You
know
possibilities
to
integrate
this
data
into
analytic
form,
so
I'm
looking
for
you
to
collaborate
and
for
us
together.
So
if
you
have
any
analytics
system
that
you
are
using
right
now
that
we
would
love
to
connect
with
your
metric
data,
for
example,
of
any
other
source,
just
please
mention
on
on,
for
example,
on
the
mailing
list
or
or
on
the
ticket,
also
join
us
on
slack
since
EF
analytics,
I,
just
created
kind
of
the
channel
we
kind
of
are
starting
to
have
some
technical
discussions.
D
E
Think,
given
the
Charter
that
we
all
kind
of
contributed
to
that,
certainly
in
scope,
resistance
activities,
I,
look
forward
to
talking
in
the
future,
but
we're
running
a
number
of
analytics
and
a
lot
backends
and
we're
doing
specifically
this
we've
started
and
we
have
some
plans.
In
our
case.
It's
a
snowflake,
my
sequel
and
click
house,
but
but
yeah
I
know
we're
pretty
short
on
time
now.
But
does
anyone
else
have
an
opinion?
I
mean
I.
Think
I
can
double
check.