►
From YouTube: CNCF Service Mesh Interface 2020-09-30
Description
CNCF Service Mesh Interface 2020-09-30
A
B
A
Oh
yeah
and
before
I
forget
yeah,
if
you
are
on
the
call,
please
go
ahead
and
add
yourself
to
the
attendees
list.
So
we
can
just
know
that
you
were.
A
A
Meetings
and
let's
get
into
it,
okay,
so
first
item
on
the
agenda,
this
is
going
to
be
from
patrice
to
speak
about
aligning
traffic
split
with
traffic
target
patrice.
What
was
yours.
B
That's
great
yes,
and
I
can
so
the
I
would
say
it's
it's
two
things.
One
thing
was
that
I
I
wanted
to
see
if
we
can
extend
the
the
traffic,
the
traffic
split
with
a
source,
but
before
that,
what
I
realized-
and
maybe
this
is
what
I
want
to
to
discuss
first-
is
that
the
traffic
target
is
referring
to
services,
the
traffic's
pla.
No
sorry,
the
traffic
target
is
referring
to
service
account.
B
The
traffic
split
is
referring
to
services,
and
the
traffic
matrix
is
referring,
for
instance,
off
pod,
and
they
all
do
that
with
with
in
a
different
manner
like
if
you
look
at
the
traffic
target.
The
way
you
refer
you
refer
to
to
services
via
this
under
this
destination
and
sources.
B
When
you
look
at
traffic
split,
the
only
thing
you
are
referring
is
to
service,
and
it
goes
directly
with
with
this
service
element
that
we
have
here
and
and
here
and
with
the
traffic
matrix
when
it
refers
to
a
pod.
You
see
that
it's
also
this
structure
of
kind
name
and
namespace,
but
this
time
under
a
resource
element.
B
So
and-
and
here
what
I
wanted
to
do-
is
to
extend
traffic
split,
but
before
extending
traffic
split,
I
wanted
to
know
if
it
would
be
not
a
good
idea
to
align
the
way
traffic
target
and
traffic
split
refers
to
other
objects.
Question.
B
B
C
B
Hello,
my
idea
is
that
I
I
kind
of
of
like
this,
this
kind
of
of
way
to
refer
to
another
object
where
you
specify
the
kind,
the
name
and
the
namespace.
B
So
basically,
what
I
would
do
is
to
use
it
for
the
traffic
split
in
the
same
way
that
it's
done
for
the
traffic
target
and
then
it
the
traffic
split,
will
look
like
something
like
like
this,
so
forget
about
the
source,
which
is
the
one
I
would
like
to
add.
If
we
look
at
the
traffic
split
today,
there
is
a
rule
and
a
destination
yeah.
B
You
see
here
this
one
is
without
any
rule,
unfortunately
and
destination,
and
instead
of
having
service
and
then
just
the
name
of
the
service
we
can
have
within
the
traffic
split
the
destination,
with
the
kind
service,
the
name
with
the
name
of
the
service
and
then
the
namespace.
B
Here
is
it
it's
not
about
functionality?
Yeah?
I
I
I
before
talking
about
functionality.
I
just
want
to
talk
about
alignment
of
the
the
structure.
Alignment
of
the
syntax.
E
Yeah
so
like
so
like
target,
has
source
destination
rules,
and
so
you're
kind
of
like
looking
at
maybe
having
the
same
pattern
in
split
for
it
to
be
like
more
intuitive.
Is
that
correct.
B
Yes,
that's
that's
also
one
of
my
goal,
but
before
that
the
very
first
thing
is
to
have
this
kind
name
kind
name,
namespace,
structure,.
E
B
D
B
B
E
D
That
means
so
wait
a
second
if
you,
if
we
allow
people
to
specify
name
spaces,
that
means
it's
across
namespaces
and
in
the
traffic
split
specification
we
have
specified
that
splitting
works
in
a
context
of
a
namespace,
not
across
namespaces.
You
cannot
talk
about
okay,
let's
change
some
type
without
referring
to
how
every
single
implementation
should
change,
because
that's
a
major
change
you
allow
splitting
across
namespaces.
B
Okay,
then,
let
me
let
me
rephrase
that
what
I
would
then
want
is
to
just
to
change
this
service
website
into
this
structure
and,
let's
forget
about
namespace,
if
it's
not
relevant
here,.
E
And
that's
kind
of
nice
because
then
you're
like
abstracting,
the
like
back
end
kinds,
and
so
we
basically
say
that
you
know
back
ends
are
kubernetes
services,
but
in
this
manner
it
would
make
the
spec
a
little
more
flexible
in.
If,
like
down
the
line,
you
wanted
to
support
more
than
just
kubernetes
services.
B
Exactly
and
that's
what
has
been
really
nicely
put
for
the
traffic
target
that
for
the
moment,
the
only
kind
you
can
put
here,
a
service
account,
but
maybe
later
we
can
have
access
control
based
on
something
else
than
service
account.
E
E
And
it's
like
the
fee,
some
of
the
feedback
that
I've
gotten
is
also
like
people
get
confused
by
like
service,
just
like
this
notion
of
services
that
it
could
bring
any
services
can
be
something
else.
So
this
may.
This
would
make
it
a
little
more
explicit
and
and
like
make
it
consistent,
make
the
pattern
consistent
across
well.
B
That's
that's
what
I
was
looking
for,
and
I
don't
know
if
stefan
is
is
there,
but
I
I
also
looked
at
the
the
canary
crd
from
from
flagger
to
have
some
some
inspiration
from
other
crds
and
they
they.
They
are
also
you
using
this
kind
name
structure.
B
D
Wasn't
with
specifying
like
being
more
verbose
and
instead
of
saying
service,
name,
saying
something
like
kind
service
and
name.
My
my
problem
was
the
fact
that
if
we,
if
we
allow
specifying
a
namespace,
then
it
it
changes
everything
in
terms
of
how
you
actually
implement
it,
because
then
you
allow
traffic
splitting
across
namespaces,
which
is
okay.
B
B
Splits,
let
me
do
it
as
we
speak.
You
would
be
so
here
I
have
a
kind
of
name,
a
kind
of
name.
B
B
D
For
service
and
service
account
where
they
are
stable,
they
are
v1
but,
for
example,
in
flagger.
I
had
this
problem
when
I
built
flagger
deployment,
wasn't
on
apps
v1
right
and
it
was
important
when
the
deployment
was
upgraded
to
v1
flagger
to
know.
Okay.
Now
I
have
to
talk
to
a
different
api
version
and
if
we
are
thinking
in
the
future
to
allow
other
things
besides
a
kubernetes
service,
then
those
other
things
should
be
versioned.
B
D
Yeah,
I
put
it
required
because
yeah
I
migration
was
was
such
a
pain
and
I
decided
okay,
I
want
the
api
version
every
time,
so
I
don't
have
to
deal
with
with
api
discovery,
called
the
discovery
api
of
kubernetes
to
get
all
the
versions,
then
to
get
the
preferred
version,
I
mean
trim
down
the
api
calls.
Flagger
has
to
do
to
know
what
what
kind
of
version
it
has
to
deal
with.
A
Hey
we
got
mike,
I
see
your
hand
raised
you
want
to
chime
in
on
this.
F
Yes,
I
I
had
two
comments,
but
the
one
was
already
addressed.
I
think
the
other
one
besides
also
an
agreement,
definitely
makes
things
explicit.
The
defaults
are
defaulting
in
general,
confuses
especially
newer
users
very,
very
much,
but
one
thing
if
you
wish
a
meta
comment,
is
that
I
don't
know
if
everyone
is
familiar
with
how
things
work
in
iatf
like
rough
consensus
based
on
on
actual
implementation,
and
I'm
I'm
fully
aware
of
that.
F
We,
if
we
look
at
smi
and
everything
we
are
more
from
the
other
side,
we're
more
green
field
implementation
following,
but
as
we
see
more
implementations
and
and
good
folks
from
from
azure
spearheading
the
way
with
open
service
mesh
and
others
potentially
to
follow
the
more.
F
I
think
we
should
actually
be
implementation
driven
and
essentially
see
what
different
implementations
do
and
document
that,
and
you
know,
standardize
and
then
document
good
practices
amongst
that
to
to
ensure
interoperability
and-
and
I
think
you
you
also
mentioned-
or
will
raise
another
related
issue,
patrice
and-
and
I
have
essentially
the
same
comment
in
the
same
direction
there
right
it's
like:
let's,
let's
make
it
more
implementation,
that's
the
bottom
line.
F
Let's
make
it
more
implementation
driven,
so
you
you
just
stefan
just
gave
a
great
example
right.
You
you
gave
this
background,
the
the
reasoning
why
you
made
a
certain
field
required
right.
There
is
a
certain
thing
that
was
not
stable
at
the
point
in
time
and
in
order
to
force
it
in
order
to
make
it
clear
to
what
kind
of
version
you
are
you're
talking,
you
made
it
explicit.
F
You
require
the
version
so
that
it's
explicitly
there
and
there's
there's
no
issue
right
and
which
means
in
when,
when,
if
we
do
such
a
thing,
if
we
say
it
has
to
have
this
field-
and
these
are
the
expectations
it
is
implementation
driven
right,
it
is
driven
by
the
experience,
could
be
positive
or
negative
that
a
certain
implementer
made
in
this
case
hugh
stefan
right.
This
is
for
me
a
good
practice.
We
should
be
doing
that
rather
than
yeah.
I
like
it
like
this,
and
you
know,
bike
shedding
preferences
for
whatever
reasons
implementation.
D
Okay,
okay,
but
that
that
was
my
my
initial
thought
that
hey
we
should
we
like
michael
said:
let's:
let's
wait
for
someone
that
actually
has
a
solution,
that's
across
multiple
namespaces
and
they
want
to
implement
smi,
and
then
we
can
discuss
it
if
we
should
add
it
or
not.
But
since
there
is
no.
D
That
I
don't
think
we
should
have
it
in
there
having
the
kind
and
the
api
version
feels
feels
good
to
me.
F
And,
and
also
that
something
is
not
implemented,
we
call
it
in
amazon,
we
call
it
not
dogs,
not
whistling
or
dogs,
not
barking.
It's
also
a
signal
right,
it
says.
Maybe
it's
not
needed,
maybe
it's
something
we
should
review
at
regular,
cadence
and
drop,
because
nobody
is
implementing
it.
This
is
also
a
very
strong
signal
in
itself.
B
But
when
you
say
when
you
say
implement
it,
because
that
that
will
be
my
second
request
that
here
I
have
added
this,
this
source,
which
is
not
in
the
the
traffic
split
and
in
terms
of
implementation
of,
of
course,
there
is
not
an
implementation
that
supports
that
as
the
dsmi,
but
if
I
have
an
implementation
which
is
supporting
the
functionality,
but
without
the
smi
interface,
will
that
count
for
you.
D
B
D
Yeah
and
okay,
what
why
I
would
be
against
specifying
source
in
a
traffic
split
is
because
then
you'll
be
overlapping
with
a
traffic
target,
and
it
doesn't
make
sense.
In
my
mind,
I
mean
traffic
split.
Entire
traffic
target
should
work
together
with
traffic
speed.
You
say
I
want
traffic
to
be
routed
to
these
endpoints
and
with
traffic
target.
You
say,
okay,
but
this
traffic
can
only
come
from
these
sources
and
have
to
have
this
identity
and
have
to
match
the
caller
identity
and
so
on
right.
A
B
A
B
But
I
can
to
to
conclude:
I
can
come
with
a
pull
request
for
the
api
version,
kind
name
and
namespace,
if
applicable,
and
not
with
namespace
in
applicable,
not
changing
any
functionality.
A
I
guess
we're
still
talking
to
you
patrice.
You
want
to
talk
about
the
back
to
crds.
Should
they
move
to
the
s
my
spec
repo.
B
Okay,
but
maybe
we
can
have
this
one
at
the
at
the
end,
because
I
do
not
want
to.
A
Okay,
that's
fine
thanks!
Then
next
we
have
michelle.
Do
you
want
to
speak
about?
Can
we
make
the
focus
next
week's
call
smi
metrics.
E
Yeah,
I
feel
like
I
don't
know
if
that's
michael's
issue,
sorry,
if
I
accidentally
jump
to
you
but
yeah,
could
we
make
the
focus
of
next
week's
meeting
smi
metrics?
I
just
would
love
to
have
a
focused
conversation
on
that
if
it's
okay,
because
one
of
our
teammates
john
implemented
smi
metrics
in
osm-
and
he
has
like
a
bunch
of
lessons
to
learn
to
share-
and
I
think
it'd
be
nice
to
like-
have
just
a
concerted
effort.
But
it's
gonna
take
like
you
know
the
whole
time.
E
Yeah,
just
a
one-off,
focused
conversation
around
metrics,
just
because,
like
I
know
like
staphon
and
I
had
a
conversation
about
metrics,
I
know
linker
d
had
some
issues
with
ran
into
some
issues
with
us
implementing
us
my
metrics,
and
then
we
had
some
like
hurdles
too
so
it'd
be
really
great
for
us
to
have
like
a
more
in-depth
conversation
about
it.
I
we
can
do
that
in
two
forms.
E
F
I
I
would
I
would
like
if
there
is
a
vote
or
a
straw
struggle,
I
would
definitely
go
for
a
dedicated
additional
one
hour,
because
I
guess
the
30
minutes
won't
be
enough
to
go
in
depth
and
it
is
really
an
important
one.
So
I
would
certainly
volunteer
to
cover
an
hour
for
that.
If
there
are
others,
also
willing
to.
F
A
All
right,
thanks
for
chilling
next
mh9
any
plans
for
extending
please
confess.
F
I
would
slightly
so
that's
mine
and
which
one
is
short
for.
F
B
B
Yes,
so,
unfortunately
I
was
not
there
last
time,
but
I
I
watched
the
recording.
It
was
quite
frustrating
to
watch
the
recording
and
not
being
able
to
talk
at
the
same
time
the
the
this
year.
I
was
thinking
that
that
crd
is
a
good
way
to
convey
a
spec
express
as
crds,
so
I'm
I'm
still
not
understanding
why
those
crds
are
not
into
the
smi
spec
repo.
D
Yeah,
so
we
we
should
be
switching
to
the
controller
runtime
library.
So
when
we
change
the
api,
then
we
change
the
sdk
and
part
of
the
sdk
release.
We
automatically
generate
the
crd,
validation,
yaml
and
yeah
with
the
github
action.
We
can
actually
copy
that
the
yaml
spec
that
contains
all
the
api
validation
to
the
spec
ripple.
D
Okay,
should
be
fairly
fairly
easy.
We
do
that
in
in
in
the
flux,
cd
org
we
copy
all
the
crd
specs
from
everywhere.
We
transform
them
in
a
nice
markdown
format,
and
then
we
publish
them
on
our
dock
site,
which
is
yet
another
repo.
D
E
All
right,
so
we
need
to
like,
would
you
mind,
opening
an
issue
on
the
sdk,
reba,
okay,
cool
and
then
we'll
also
need
an
issue
on
the
smi
spec
repo.
B
D
Yeah-
and
we
avoid
several
things
so
in
the
past,
we
we
modified
something
in
the
sdk.
Let's
say
we
made
the
fill
required,
but
we
forgot
to
do
it
in
the
crd
ammo,
because
we
we
don't
automatically
generate
it.
We
made
it
by
hand,
we
made
the
release,
then
someone
noticed
and
we
went
back
to
the
other
release
and
so
on.
Having
this
thing,
automated
means
that
the
sdk,
which
comes
as
as
a
follow-up
to
the
to
the
spec
release,
then
the
sdk
will
generate
the
cid
and
the
cid
as
as
the
spam.
B
A
B
A
D
Yeah,
so
there
is
a
poor
request.
I
made
long
time
ago
around
modifying
the
the
routes
and
traffic
target.
I
invite
people
to
comment
on
it.
D
There
are
some
limitations,
maybe
we
are
okay
with
it
and
more
cheat
as
it
is
and
iterate
over,
but
I
don't
think
the
we
we
signal
the
right
stuff
by
having
that
four
months
in
there.
E
Yes,
it's
spell
yeah,
we
can.
We
can
get
that
offline.
E
All
right,
you
have
two
lgtms,
but
patrice
has
a
comment
as
well,
so
we
can
address
that.
Oh,
but
I
think
we
need
to
core
maintain
our
lgtms.
B
Right,
as
the
stefan
mentioned,
my
my
command
is
something
that
can
come
afterwards.
I
think
it's
indeed
better.
That's
that
you,
you
merge
and,
and
then
we
carry
on
rather
than
leaving
the
the
things
open
too
long.
D
Yeah
I
mean
I
feel,
like
it's
an
advanced
one
of
what
we
currently
have.
D
If
your
service
has
exposes
different
type
of
traffic
like
udp
and
tcp,
both
of
them,
you
cannot
create
a
specific
rule
for
only
udp
and
so
on,
but
I
feel
like
this
is
an
extreme
edge
case
and
adding
ports
instead
of
just
one,
makes
the
the
whole
spec
way
easier
to
adopt,
because
right
now
in
the
current
state,
if
you
have
two
ports,
you
have
to
create
two
separate
traffic
target
objects
instead
of
having
one
with
an
array
of
ports.
D
So
I
feel
that
the
change,
even
if
it
has
some
limitations,
it's
better
that
what
we
had
before.
If
we,
if
we
merge,
if
we
merge
this,
I
will
not
make
an
smi
spec
release.
I
would
also
rename
the
traffic
target
and
then
do
a
release
like
initial
proposal
to
rename
it.
I
think
it's
it
should
it's
it's
a
it's
a
good
proposal
to.
E
A
Okay,
all
right
that'll
wrap
us
up.
Let's
see
next
meeting
well,
the
next
communion
community
meeting
that'll
happen
on
the
14th.
I
think
we
will
have
the
discussion
just
next
week
about
the
spec
for
the
traffic
split.
Is
that
correct.
A
A
That
was
next
week
for
that
spec
discussion
and
the
week
after
the
14th
for
the
next
community
call.
Thank
you.