►
From YouTube: CNCF TOC Meeting 2020-11-03
Description
CNCF TOC Meeting 2020-11-03
A
A
A
B
D
B
B
F
B
Emily's
saying
it's
a
new
phishing
scam.
Well,
so
there
you
go
public
service
announcement.
Don't
click
on
google
drive
comments
unless
you
feel
confident
you
know
who's
made
them
all
right
taylor.
Do
you
want
to
start
sharing
the
the
slides
for
us.
F
B
Let's
skip
forward
to
yeah
the
agenda,
so
we
have
a
special
guest
today.
I
actually
think.
Maybe
we
should
try
and
do
the
sig
updates
bill
unless
you've
got
any
particular
time
constraints.
Should
we
do
the
sig
updates
first,
because
then
bill
mulligan's
going
to
talk
to
us
about
some
conformance
ideas,
and
I
think
maybe
that
will
have
more
discussion.
G
If
it's
possible,
I
would
prefer
to
go
first.
If
not,
I
can
also
go
second.
G
Cool
thank
you
and
liz
thanks
for
having
me
today.
In
case
you
guys
are
in
case
anyone
doesn't
know
me
I'm
bill
mulligan.
I
recently
joined
the
cncf,
so
hi
I'm
really
excited
to
work
with
all
the
smart
people
on
the
toc
and
in
the
wider
cncf
community,
and
now
I
guess
maybe
like
two
weeks
into
my
job.
G
I
get
to
do
my
first
presentation
for
the
wider
community
at
this
toc
meeting
around
one
of
the
initiatives
that
I'm
helping
and
would
like
to
kind
of
put
forward
as
an
idea
that
we'd
like
to
have
comment,
feedback
and
input
from
the
members
of
the
toc
and
so
a
little
bit
of
background
on
this
initiative.
What
I'm
going
to
be
kind
of
talking
about
is
the
cloud
native
network
function,
conformance
initiative
that
we're
interested
in
and
so
a
background
on
the
telco
industry.
In
case
anybody
isn't
familiar
is
originally.
G
What
is
conformant
kubernetes,
because
one
of
the
problems
that
we
saw
in
the
openstack
world
is
that
everybody
had
their
own
flavor
of
openstack
and
it
really
became.
Does
it
work
on
this
stack
or
does
it
work
on
this
stack
and
there
wasn't
a
lot
of
interoperability
between
a
lot
of
different
vendors
on
different
layers
of
the
ecosystem,
and
I
think
kubernetes
has
already
solved
a
lot
of
that.
G
Those
problems
with
the
kubernetes
conformance
program
at
the
infrastructure
layer,
and
so
now
what
we're
thinking
about
doing
is
applying
those
same
concepts
to
help
us
ensure
interoperability
also
at
the
application
layer
and
so
taylor
can
go
the
next
slide
or
I
don't
know
who's
running
it.
Sorry
or
can
I
can
I
control
the
slides
and
so
kind
of
what
we
saw
is
the
in
this
evolution
from
vnf,
so
virtualized
network
functions
to
cns
cloud
native
network
functions
is
originally
like.
G
It
was
just
vnf's
or
bare
metal
machines,
and
but
now,
as
we're
going
towards
the
cloud
native
world,
we
have
a
lot
more
moving
parts
in
there.
We
have
a
lot
more
brown
feel
and
legacy
from
things
that
are
running
all
the
way,
literally
down
to
like
copper,
wires,
all
the
way
up
to
containerized,
very
cloud
native
network
functions,
and
so
one
of
the
problems
that
we
see
is
it's
a
little
bit
of
a
oh
yeah.
G
So
this
manual
is
management
and
like
orchestration,
so
when
you're
actually
like
running
installing
upgrading
like
things
in
production,
so
if
you're
familiar
with
the
onapp
project,
that
does
management
and
orchestration
of
actually
applications
running,
and
so
one
thing
that
we
as
we're
moving
towards
cnfs
is
not
only
is
there
kind
of
like
green
field
cloud
native
cnfs
being
developed,
but
there's
also
brown
field.
Applications
too,
and
one
of
the
questions
that
I
think
is
is
especially
applicable
in
the
telco
domain,
but
also
across
wider
domains.
G
G
How
do
I
make
sure
that
they're
built
or
modernized
in
a
cloud-native
way
and
right
now,
I
think
we
all
kind
of
know
the
definition
from
that
the
toc
wrote
about
immutable
infrastructure,
microservices,
declarative
infrastructure
to
help
make
high-impact
changes
frequently
and
predictably,
with
minimal
toil,
but
that's
great
kind
of
like
as
a
two
second,
thirty
thousand
foot
like
view.
But
the
real
question
is,
is
how
do
we
actually
implement
those
best
practices
in
the
real
world?
So
next
slide.
Please.
G
So
what
actually
is
the
cnf
conformance
program
idea,
and
so
the
idea
is
to
help
telco
vendors
and
the
telco
industry
in
general
to
help
solve
some
of
these
problems
of
how
do
we
deliver
cloud
native
best
practices?
G
How
do
we
ensure
interoperability
between
all
the
different
vendor
stocks
and
how
do
we
make
sure
that
we
can
develop
new
applications
in
a
cloud-native
way,
and
so
what
we
want
to
do
is
to
create
a
program
similar
to
the
certified
kubernetes
program
that
allows
us
to
take
what
we
know
we
can
say
this
is
a
certified
kubernetes
distribution
to
actually
help
us
declare
what
actually
is
cloud
native
at
the
application
layer.
How
do
we
put
those
cloud
native
practices,
cognitive,
best
practices
actually
into
applications?
G
So
next
slide,
please,
and
so
the
real
question
is
this
has
been
kind
of
like
around
for
a
while,
and
why
is
this
super
important
to
help
out
this
industry
today,
and
why
am
I
bringing
it
forward
to
you
today?
Well
this?
This
actually
is
not
something
that's
in
the
future.
This
is
actually
that
is
becoming
a
pressing
need
for
the
telcos
today.
G
G
Please-
and
this
isn't
just
something
that's
in
like
testing
or
development
over
50
of
those
telcos
are
already
in
production
today
with
kubernetes,
and
the
slide
I
didn't
include
is
they
expect
by
next
summer
next
june,
which
is
really,
if
you
think
about
it,
only
what
like
eight
months
away
over
50
of
them,
expect
to
be
in
large
production.
So
this
isn't
something
that's
just
a
pilot.
It's
really
running
at
a
large
scale
which,
if
you
think
about
the
telco
industry,
they
don't
do
anything
small.
G
You
know
you
start
counting
in
the
tens
of
thousands
or
hundreds
of
thousands.
So
next
slide.
Please-
and
I
think
the
most
interesting
thing
about
this
is
in
the
telco
domain.
They're
running
both
like
the
actual
network
and
more
like
I
t
like
workloads,
but
it's
not
just
the
stateless
like
web
applications
that
kubernetes
originally
began
with,
but
it's
actually
running
the
core
network
functions.
G
So
if
I
picked
up
a
phone,
my
phone
and
called
liz
today
that
connection
could
be
running
over
kubernetes
right
now,
and
so
I
think
it
really
is
important
to
be
able
to
help
move
the
telco
really
world
industry
into
a
more
cloud-native
way
and
help
them
kind
of
like
build
these
best
practices
as
they're
trying
to
modernize
their
infrastructure.
So
next
slide,
please
and
so
yeah.
If
I
can
have
this
one,
please
thanks.
No,
the
the
goals,
one
yeah,
and
so
that's
really
at
a
high
level.
G
What
the
cnn
of
conformance
program
like
kind
of
our
goal,
is
it's
really
like
help?
Companies
better
understand
what
cloud
native
means
for
telecommunications
workload
in
the
same
way
that
we're
defining
at
the
infrastructure
level
like
what
kubernetes
means
we
want
to
be
able
to
help
companies
at
the
application
level
understand
what
actually
cloud
native
means
so
next
slide.
G
So
our
idea
right
now
is
in
the
program
structure
to
create
kind
of
like
two
different
parts.
So
one
is
a
cnf
working
group
that
will
define
the
definitions
of
cloud
native
and
the
process
of
kind
of
like
certifying
cnfs,
and
the
second
part
is
actually
like
a
test
suite
initiative
which
provides
the
actual
like
tests
and
frameworks.
G
So
if
I'm
a
developer
at
company
x-
and
I
want
to
like
build
a
new
cnf
or
a
cloud
native
network
function
and
test
out,
it
actually
is
cloud
native-
I
can
go
download
the
test
suite
like
run
it
against
my
application
and
say
like
yes,
it
is
cloud
native
or
it
isn't
or
like.
These
are
the
things
that
I
can
improve
on
or
if
I'm
looking
to
modernize
an
application,
I
can
do
the
exact
same
thing.
So
next
slide,
please.
G
So
what
we
really
see
ourselves.
I
think,
if
you
look
read
the
the
first
line
of
the
slide,
we
really
see
ourselves
as
the
upstream
definition
for
other
industry
work
groups
to
be
able
to
use
in
their
downstream
implementations
reference
arc,
architectures
and
standards
to
be
able
to
like
implement
like
specific,
like
telco
stacks.
G
Now
we're
not
trying
to
define
like
a
specific
taco
stock
or
like
specific
telco
like
applications,
we're
really
trying
to
help
them
understand,
and
this
is
where
I
think
the
experience
and
the
expertise
of
the
cncf
really
becomes
important
here
is
that
we
understand
like
what
cloud
native
is
and
being
able
to
provide
kind
of
like
that
horizontal,
like
definition
of
what
cloud
native
is
across
the
industry,
which
can
then
be
used
in
like
further
downstream
initiatives,
and
so
some
of
the
people
that
we've
spoken
to
who
are
already
interested
in
using
this
are
groups
like
cntt
ovp,
so
cntt
is
the
cloud
infrastructure,
telco
task
force,
defining
a
reference
architecture
for
the
the
telco
industry
based
on
kubernetes
ovp
is
the
opnfv
verification
program
which
provides
a
badging
program
around
network
functions
to
ensure
interoperability
between
different
vendors
infrastructures
and
network
applications.
G
In
addition
to
those
industries
like
outside
of
the
cncf,
we
also
see
a
lot
of
ways
to
collaborate
with
many
of
the
cncf
and
kubernetes
working
groups,
including
sig,
app
delivery,
security,
networking
and
the
kubernetes
conformance
working
group,
and
actually,
I
think
this
last
one
is
actually
super
important.
I
think
we'll
kind
of
like
flush
out
how
we
kind
of
think
this
program
can
come
together.
So
next
slide,
please.
G
So
what
we
really
kind
of
like
see
this
initiative,
as
is
similar
to
the
concepts
borrowed
from
the,
I
would
say,
like
hugely
successful,
kubernetes
conformance
program.
So
there
is
the
kubernetes
conformance
working
group
and
project
sonaboy,
which,
together,
if
you
think
about
it
in
some
ways,
provide
like
a
spec
and
an
implementation
to
understand
what
kubernetes
actually
is
in
the
real
world,
and
so
what
this
allows
us
to
do.
Is
this
separate
the?
G
So
the
working
group
would
allow
us
to
understand
like
define
what
actually
cloud
native
is
in
the
same
way
that
it
defines
what
kubernetes
actually
is
and
the
actual
implementation
would
be
similar
to
project
sonoboy
and
kubernetes
sig
testing,
providing
the
actual
like
testing
framework
to
be
able
to
test
this
against
infrastructure
or
applications.
G
So
next
slide,
please
and
kind
of
some
of
the
milestones
that
we'd,
like
think
about
to
like
kind
of
target,
is
in
something
like
three
to
six
months.
G
Get
this
working
group
formalized
under
a
specific
sig
and
in
the
same
time,
frame
in
three
to
six
months,
submit
the
cnf
like
test
suite
as
potentially
a
sandbox
project
similar
to
project
sonoboy
and,
if
you're
interested
in
learning
about
how
we're
thinking
about
the
structure
right
now,
we
I
encourage
you
to
check
out
this
poll
on
github
and
dive
into
how
our
community
is
talking
about
this
initiative
right
now,
and
so,
if
you
like
check
it
out
right
now,
there's
a
lot
of
people
commenting
from
really
across
the
industry,
and
I
think
diving
through
this
you'll
kind
of
see
how
we're
trying
to
right
now,
pull
together
all
the
disparate
interests
across
the
telco
industry.
G
G
What
we
see
the
telco
industry
kind
of
is
really
all
of
these
are
all
tightly
integrated
with
each
other
and
sometimes
are
at
kind
of
like
they
have
differences
opinion
of
how
things
should
be
done
and
what
we
see
the
benefit
of
kind
of
bringing
this
the
cloud
native
to
the
cncf
is
that
the
cmtf
is
really
the
neutral
body
that
can
help
all
these
different
groups
understand
what
actually
cloud
native
is
and
how
that
can
benefit
the
telco
industry.
G
So
next
slide,
please
next
slide,
please,
oh
so
one
of
my
slides
got
deleted,
so
the
the
ass
that
I
would
have
for
you
right
now,
as
the.
G
As
the
toc,
let
me
just
actually
drop
the
slide
right
in
now,
so
that
everybody
can
see
it
on
the
same.
G
G
G
There's
kind
of
like
three
questions
that
I'd
like
to
like
pose
to
you
all
as
the
toc
is
like
who,
in
the
industry
who,
in
the
ecosystem,
who
among
yourselves,
can
help
us
define
what
cloud
native
and
what
a
cnf
is
from
the
the
definition
level.
Who
can
you
recommend
that
we
speak
to
to
help
us
be
involved
in
this
initiative?
We
like
have
a
wide
network
in
the
telco
domain
and
we're
reaching
out
to
as
many
people
as
we
can
across
all
these
different
groups.
G
But
we
know
the
toc
has
a
lot
of
experience
and
expertise
and
may
be
able
to
have
a
wider
network
than
we
have.
The
second
one
is
in
terms
of
the
structure.
Where
do
you
think
this
would
best
fit
in
the
cncf
in
the
the
in
the
kubernetes
ecosystem,
and
does
the
tlc
think
this
would
be
an
interesting
or
worthy
initiative?
I
know
we
also
have
some
people
from
the
community
here
that
have
also
been
involved
in
this
on
the
call
today.
C
I
have
a
question
bill.
Thank
you
for
your
great
presentation
so
that
there
was
a
slide
about
supporting
testing
on
a
multiple
levels,
application
and
the
infrastructure
testing
support.
Can
you
elaborate
on
the
infrastructure
testing
support
what
is
supposed
to
be
covered
there
and
how
deep
will
it
go.
G
Yeah,
so
we
kind
of
see
that
as
like
a
secondary
goal
in
terms
of
like
the
infrastructure
and
what
that
would
be
is
looking
at
like
is
like
our
infrastructure
actually
implemented
in
the
cloud
native
way.
I
think
our
like,
really
like
immediate
and
like
short-term
goal,
is
actually
just
really
just
looking
at
the
application,
though,
like
some
of
the
service
providers
that
we've
talked
to
the
actual
telco
companies
that
we've
talked
to
have
been
also
interested
in
looking
at
like.
Are
we
sure
that
we're
also
implementing
our
infrastructure
in
a
cloud-native
way?
G
So
do
we
actually
have
declarative
apis?
Do
we
have
immutable
infrastructure
and
are
there
ways
that
we
can
test
for
that,
so
that
could
be
kind
of
a
potential
like
secondary
like
stuff
and
so
really
helping
the
telecom
industry
understand
what
cloud
native
is.
C
Got
it
so
it's
gonna
be
case
per
case
right.
It's
not
something
that
you'll
download
the
tool
and
and
determine
if
it's,
if
it's
built
in
the
right
way,
that
is
more
for
each
okay.
Thank
you.
H
G
A
G
So
sorry,
I
will
also
add
my
contact
information
onto
a
slide
after
this,
so
the
and
also
taylor
carpenter
who's,
helping
with
me
with
this
too
we'll
also
also,
if
you
want
to
get
involved
like
in
this
implementation,
specifically,
please
feel
free
to
comment
on
the
pull
request
that
you
can
see
here,
but
my
contact
information
also
drop
it
in
the
chat.
Right
now
is
just
b
mulligan
at
linuxfoundation.org.
G
Yeah
and
also
the
the
second
part
yeah
taylor-
maybe
you
want
to
jump
in
with
what's
happening
on
the
chat
here,
so
the
cnf
conformance
like
test
suite
already
has
taylor
correct
me.
If
I'm
wrong,
is
it
weekly
meetings
so.
H
H
So
if
you're
interested
in
getting
involved
with
the
test
suite,
then
that's
probably
a
good
place
for
the
working
group.
We're
tentatively
looking
at
9
a.m,
pacific
on
tuesdays.
But
we
got
to
find
a
a
space
for
where
to
start.
Conversing
about
that,
and
it
was
talked
about
during
the
telecom
user
group
meeting
on
monday
as
well.
I
If
I
may
jump
in
sorry
folks
hi,
this
is
priyanka.
Thank
you
bill
and
taylor
for
your
awesome
presentation.
I
just
wanted
to
add
that
at
kubecon
cloud
nativecon
in
two
weeks
there
is
a
meeting
community
meeting.
I
That's
open,
focused
on
this
topic
on
this
working
group
on
thursday,
the
19th
in
the
I
forget
the
exact
time,
but
it's
either
8
a.m,
pacific
or
9
a.m,
pacific
one
of
the
two,
and
so
that
would
be
another
place
to
come
back
to
after
this
initial
conversation
and
then,
like
you
know,
whatever
branches
of
conversation
happen
to
reengage
and
move
forward
together,
we're
hoping
that
a
lot
of
attendees
from
kubecon
find
that
valuable
as
well
so
that'll
be
hopefully
a
big
group.
B
Thanks
great
and
thank
you
bill
for
the
presentation,
I
guess
the
the
question
really
for
toc
is
you
know,
do
we
want
to
see
this
falling
under
one
of
the
sigs?
I
mean
it's
feels
to
me
like
it
would
be
a
good
idea
for
us
to.
You
know
at
arm's
length,
kind
of
be
involved.
It's
a
definition
of
what
cloud
native
means
in
in
this
particular
space.
B
I
think
it's
great
initiative,
lee
already
looks
like
you've.
You've
suggested
having
a
chat
with
sig
network,
and
I
can
see
like
the
runtime
overlap
that
ricardo
you
mentioned.
Are
you
thinking
about
things
like
the
kind
of
dpdk
dependencies.
F
And
how
you
run
the
functions
and
how
you
schedule
the
workloads?
That's
that
was
my
thought
about
it,
but
yeah
yeah
I
can
sync
up
and
with
taylor
or
someone
in
the
group-
and
you
know,
figure
out,
you
know
and
help
him
figure
out.
What's
might
be
best,
but
I
think
network
is
another
one
right.
B
H
I
think
the
idea
is
to
start
with
a
smaller
focus,
so
we're
saying
telco
or
maybe
you
could
say,
networking
applications
where
telco
industry
is
part
of
the
network
domain
and
those
type
of
applications
which
don't
always
act
the
same
as
billa
talked
about,
so
keep
it
at
a
smaller
focus.
And
then,
if
there
looks
like
there's
something
useful
to
expand
or
have
another
one,
then
that
could
happen
later.
H
B
I
don't
feel
like
the
actual,
like
the
group
of
people
who
are
going
to
work
on
this.
You
know
they
can
come,
they
can
come
from
wherever
wherever
the
interest
is
my
natural
kind
of
inclination
is
that
because
it
has
the
word
network
in
it,
it
fits
nicely
in
sig
networking,
but.
H
From
the
when
you
look
at
stuff
below
what
we
you
don't
see,
my
air
quotes
but
application
level
I'll
turn
on
video,
the
application,
so
that,
when
you
look
at
all
the
layers
and
kubernetes
is
really
about
components
and
layering
and
add-ons
and
everything
else
so
below
the
application.
H
When
you
look
at
telco
and
the
network
industry,
I
think
that
would
very
much
work
well
under
sig
network
when
we
focus
it
in
on
just
the
applications
and
if
we're
trying
to
keep
it
as
as
high
up
as
we
can
but
telco
applications,
then
it
may
fit
better
under
app
delivery.
And
I
guess
it
depends
if
the
scope
is
expanded
to
deal
with
other
layers.
B
H
Characteristic
from
the
so
they
from
the
test
suite
itself,
there's
capability
to
test
all
sorts
of
things.
I
mean
we've
added
recently
support
for
using
cluster
api
and
checking.
Does
this
host
have
cluster
api
enabled?
Is
it
being
managed
by
cluster
api?
So
you
can
talk
about
infrastructure,
but
that's
that's
a
test
suite
thing
when
we're
saying
the
conformance
program
and
having
like
a
certification
and
the
working
group
def
defining
what
would
be
there,
I
I
think
it
would
just
depend
on.
H
Do
we
care
about
that
at
the
application
level,
the
telcos
themselves,
I
mean
operators
are
going
to
come
in
and
say
yes,
we
need
to
know
this
because
we
have
agreements
that
we
must
meet.
I
don't
know
if
we
want
those
type
of
functional
requirements
as
part
of
the
program
versus
saying
it
behaves
in
a
cloud
native
way,
and
you
need
to
do
other
things
to
make
sure
that
you've
implemented
functionality.
Requirements
like
jitter
is
not
beyond
something.
J
That
being
within
the
sig
network,
we
the
it,
doesn't
necessarily
constrain
the
focus
of
conformance
to
layer,
3
or
therefore,
proverbially
or
not
proverbially,
but
but
to
this
to
the
osi
model.
H
J
H
Okay,
so
a
one
of
them
that
I
guess
an
example
that
we
have
in
there
is
just
a
simple
ip
forwarder
which
they
you're
gonna,
have
that
capability
and
you
could
have
something
like
doing
deep
packet
inspection
on
stuff.
That
could
be
a
capability
in
a
firewall
or
it
could
be
if
you
split
things
up,
maybe
it's
an
individual
component,
that's
running!
H
So
if
you
break
up
the
words
of
what
network
function,
the
the
actual
definitions
and
saying
something
providing
a
capability
on
in
the
network
or
the
network
packets,
but
when
you
get
into
telco
use
cases
and
stuff,
you
start
saying:
oh
okay,
this
use
case
actually
has
you
know
dns,
and
it
has
some
type
of
authentication
and
access
control,
often
radius.
H
But
if
you
would
start
looking
at
how
would
I
build
this
in
a
kubernetes
native
as
which
would
be
an
implementation
and
cloud
native?
In
my
mind,
then,
maybe
you'd
go.
Why
are
we
using
radius?
Why
don't
we
move
to
something
else?
And
you
see
that
in
some
projects
where
they've
actually
moved
on
to
other
things,
but
normally.
H
Those
higher
moving
a
lot
of
data
if,
if
you're
familiar
with
the
mobile
networks,
like
evolve
packet,
core
you're,
going
to
have
gateways
at
one
side
that
come
in
and
they
have
to
deal
with
some
type
of
session
manager
for
the
different
connections,
from
the
towers,
keeping
up
with
those
and
moving
them
between
and
then
pushing
it
through
until
it
gets
into
the
core
data
network
and
then
eventually,
you
get
off
and
your
phone
hits
whatever
some
voice
service
or
video
service
or
because
this
could
be
delivering
tv
or
whatever
it
happens
to
be.
H
B
In
the
interest
of
time,
perhaps
bill,
you
can
answer
josh's
question
about
telcos
that
are
involved
in
this
conformance
effort,
and
then
I
think
we
should
probably
try
and
move
on
to
the
sig
updates.
G
Yeah
so,
as
I
was
saying
before,
we're
reaching
out
to
people
all
across
the
industry-
and
we
also
already
have
multiple
telcos
involved
in
the
effort
so
specifically
like
here
in
europe,
vodafone
and
orange
in
the
us
we're
talking
to
a
couple
of
yeah.
Okay
thanks
thanks
taylor,
so
also
balkanda
charter
and
talking
to
a
few
of
the
other
major
carriers
in
the
us
right
now
too.
B
B
And
I
am
suggesting
that
unless
anyone
thinks
it's
a
terrible
idea,
we
should
normally
have
this
working
group
fit
under
sig
network.
You
know
that
absolutely
still
encourages
participation
from
anybody
from
any
other
sig
as
well.
J
Yeah
taylor,
if
it,
if
I
think,
if
I
were
to
read
into
it
a
little
bit
that
or
well
maybe
I'll
say
it
like
this-
that
things
that
are
dealt
with
within
sig
network
aren't
necessarily.
I
guess
I
said
that
before
aren't
constrained
to
the
network,
so
smi
conformance
is
an
active
initiative.
That's
going
on,
for
example,
that
somewhat
I
bring
it
up
because
it's
a
similar
concept
so
easy
to
relate
to
its
implementation
is
done
in
crds,
and
so
those
are
deployed
using
using
all
the
higher
level
constructs.
J
But
given
that
service
meshes
and
service
measures
in
general,
they
touch
on
a
lot
of
those
things
that
are
outside
of
network
but
but
are
somewhat
network-centric
in
their
in
its
focus,
and
so
it's
sort
of
an
example
of
like
yeah.
I
don't.
Actually,
I
think
if
you
would
take
any
project
in
the
cncf
almost
any.
I
don't
know
that
any
of
them
like
totally
cleanly
fit
into
one
sig
versus
an
active
versus
the
next.
J
They
just
kind
of
have
a
center
of
gravity,
but
that
I
don't
think
that
there's
any
artificial
or
intentional
constraints
put
on
the
you
know
the
projects
themselves
in
terms
of
what
they
end
up
incorporating
or
how
much
they
end
up
engaging
in
other
six.
H
If
it
was
easy
to
do,
I
would
put
it
between.
I
would
just
straddle
sig
network
and
sig
app
delivery
for
the
the
working
group
I
mean
is
as
as
far
as
it
goes,
there's
and
it's
in
the
documentation
for
the
the
pull
request
which
I'll
drop,
but
the.
H
Those
are
going
to
be
a
starting
place
for
a
lot
of
the
best
practices
for
telcos
and
then
you're
going
to
go.
What
do
we
need
differently
from
what
sig
delivery?
That
may
not
be?
That
may
be
more
specific,
so
I
yeah-
I
I
don't
know
I
can't
say
which
one
it
it.
It
seems
like
it's
going
across
both
for
the
the
working
group
and
I'll
say
the
the
program
and
the
working
group.
H
But
I
don't,
I
don't
think
that
helps
with
liz
you're
talking
about
administrative
issues
and
if
we're
across
both
groups.
I
don't
think
that
helps
unless.
B
Exactly
I
I
think
it's
just
kind
of
there
are
several
sigs
pick
one.
You
know
I
don't
know
if,
if.
B
B
Let's,
let's
table
it
for
now,
as
I
say,
I
don't
think
it's
the
biggest.
You
know
it's
just
administrative
really.
The
the
initiative
is
the
more
interesting
part
of
this,
but
I
do
feel
that
we
have
21
minutes
and
we
should
give
the
six
a
chance
to
tell
us
what
amazing
things
they've
been
up
with.
Thank
you
very
much
taylor
and
and
bill
for
the
presentation.
H
E
Right
yeah,
so
just
a
very
quick
update.
There
are
a
few
things
that
we
do
have
some
very
nice
progress
and
the
first
is
regarding
to
the
operator
working
groups
under
cncfc
gap
delivery.
So
the
working
group
are
basically
continue
working
on
the
definition
white
paper
for
operators.
It's
basically
a
white
paper
for
people
to
understand
better
about
what
is
kubernetes
operators.
E
What's
the
difference
with
operators,
they
say
well
the
project
so
and
this
and
this
white
paper
is
kind
of
blocked
several
weeks
ago,
but
we
have
already
make
new
progress
there
and
we
are.
We
are
very
close
to
finish
the
white
paper
and
we
also
get
a
lot
of
valuable
feedback
from
the
community,
how
to
define
the
the
the
operator's
definition
better
for
the
community,
so
you
can
check
the
documentation
there
for
more
details.
E
There
are
a
lot
of
discussions
or
even
debates
regarding
regarding
to
the
details,
but
I
think
right
now
the
direction
is
very
clear
and
we
are
very
promising
to
have
a
nice
white
paper
out
there
and
the
second
up
upgrade
upgrade
from
update
from
this
thing
is
regarding
to
the
application
delivery
demo
project,
and
we
also
have
very
good
progress
and
engagement
engagement
from
the
community
there
and
if
you
check
the
github
repo
over
there
and
the
application
demo,
the
same
publication
has
already
been
transferred
under
the
cncf
organization,
and
we
do
have
a
lot
of
contributors
from
different
projects
to
contribute,
demos
and
the
user
cases
for
different
projects
and
tools
and
we're
also
leveraging
these
contributions
from
the
community
as
the
main
part
for
the
cncfc
gap.
E
Delivery
could
be
conversation,
it's
basically
a
a
talk
about
how
we
can
use
a
the
same
application
to
demo
different
kind
of
tools
and
projects
in
the
ecosystem.
For
example,
you
can
use
synap
to
package
this
application,
and
then
you
can
use
flux
and
g
and
aggro
cd
to
do
githubs,
and
then
you
can
use
flagger
to
do
the
rollout.
E
You
can
use
algorithm
to
do
the
rollout,
so
it's
basically
like
using
the
same
application
for
various
demos
of
the
ecosystem,
so
people
will
get
better
understanding
about
what
different
projects
can
be
used,
especially
in
a
developer-facing
workflow.
So
this
is
the
main
purpose
of
this
sample
application
advil.
So
if
you
have
any
ideas
or
any
integrations,
you
want
to
see
in
this
application
sample
and
please
feel
free
to
contribute
your
ideas.
E
Just
you
know,
a
demon
example
will
help
a
lot
to
the
community
okay.
So
this
is
what
we
all
have
today.
A
Hey
there,
so,
just
briefly
for
governance,
etc.
We're
gonna
be
running
a
project
paperwork
micro
workshop
at
kubecon.
The
idea
is
to
help
some
of
the
cncf
projects
with
their
graduation
requirements
or
projects
that
want
to
be
in
the
cncf
with
their
sandbox
requirements.
A
I
we
have
our
graduation
official,
graduation
doc,
but
it
leaves
some
things
out
and
I've
actually
opened
some
at
least
one
issue
about
that.
So,
and
it's
really
helpful
for
community
managers,
project
managers
companies
to
actually
have
some
place.
They
can
look
at
that
has
all
of
the
requirements
listed
at
some
point.
I
would
like
that
to
become
an
official
cncf
document,
so
that
projects
do
have
that
as
a
helpful
thing
and
we'll
talk
about
our
process
to
do
so.
A
Let's
see,
carolyn
are
you
here,
nope,
okay,
so
for
contributor
growth,
the
contributor
growth
team
is
working
with
linker
d,
who
came
to
contribute
a
strategy
looking
to
grow
their
contributor
community
they've,
also
gotten
the
template
contributing
file,
the
contributing
file
template
up,
which
is
one
of
the
requirements
and
they're
now
working
on
a
template,
contributor
ladder
and
again
this
is
all
in
the
templates
project
for
our
projects
to
copy
who
are
looking
to
get
their
paperwork
together.
B
Right,
I'm
thinking
for
that.
You
know
particularly
around
the
paperwork
side
of
things.
We
should
make
sure
that
amy
is
in
sync
on
this,
because
you
know
she's
she's
been,
I
think,
doing
the
actual
sort
of
checking
up
on
what
paperwork
projects
are
doing
and
it
would
be
great.
Can
we
get
that
sent
around
the
this
emailing
list?
A
Sure
one
of
the
things
I
need
to
actually
come
up
with,
based
on
the
issue
that
I
filed,
is
a
proposal
for
keeping
the
various
places
that
the
requirements
are
expressed
in
sync,
because
we
don't
currently
have
a
sort
of
concrete
process
by
which
say
the
sandbox
entry
form
gets
updated
and
the
printed
requirements
get
updated
at
the
same
time.
B
Great
yeah
that
I
completely
agree,
the
the
documentation
certainly
has
some
inconsistencies
and
without.
J
J
I
don't
know,
I
suspect
that
matt.
I
don't
know
if
you're,
if
there's,
if
you're
ready
for
a
comment
here,
but
that
team
is
curious
about
the
probability
that
that
due
diligence
might
come
back
before
kubecon,
because
it
because
of
it's
a
venue
to
talk
about
those.
J
Mr
klein,
if
you're
there,
but
otherwise
they
were,
they
were
asking
for
an
update
recently
and
so
the
so
speaking
of
kubecon.
There's
hey.
M
B
I
think
if
we
think
the
dd
is
is
finished,
do
we
have
a
public?
You
know
period
for
comment.
J
Nice
yeah,
nice
all
right,
very
good,
so
we
have
a
couple
of
upcoming
presentations
of
the
projects
that
are
listed
here.
J
There
was
an
last
time
that
we
met.
We
talked
about
a
few
different
topics.
One
of
those
was
some
points
of
interest
of
talks
that
were
given
at
onboycon
and
so
one
of
them
being
around
vpp
as
a
technology
and
and
it
relating
to
envoy,
and
so
we've
invited
that
same
speaker
to
come
rehash
a
bit
and
kind
of
engage.
In
some
conversation,
the
under
the
service
mesh
working
group.
There
are
a
few
initiatives.
J
J
The
service
mesh
interface,
conformance
initiative
or
smi
conformance
is
smi,
as
rather
the
smi
project
is
asking
for
to
meet
with
regularity
as
kind
of
a
separate
work
stream
on
advancing
smi
conformance,
which
is
great
because
there
are
seven
service
meshes
that
claim
conformance
with
that
spec,
and
we
can't
wait
to
see
those
validated
much
in
the
same
way
that
cnf
conformance
was
kind
of
spoke
of
sonaboy
sort
of
a
similar
thing
for
smi
conformance,
there's
smi
office
hours
at
kubecon
being
held
by
some
of
the
maintainers
they'll
talk
about
smi
conformance
there.
J
There
has
been
a
couple
of
meetings
that
go
that
touch
on
the
subject
will
not
touch
on
but
but
discuss
service
mesh
performance
as
an
up
and
coming
proposed
specification
and
up
and
coming
proposed
sandbox
project.
There.
Part
of
those
discussions
have
been
engagements
with
a
couple
of
researchers
focused
on
distributed
performance
analysis.
J
So
you
know
understanding
the
the
behavior
of
really
from
a
from
a
performance
perspective
from
a
network-centric
perspective,
the
behavior
of
distributed
systems
so
microservices
and
their
how
different
types
of
microservices
and
how
chatty
they
are
and
doing.
Analysis
on
those.
J
K
It's
me
hi,
so
just
current
status
of
ongoing
work.
There
are
some
discussions
around
semantics
for
for
metric
labeling,
for
obvious
reasons
course
we
have.
We
have
open
telemetry,
who
is
who
is
defining
a
lot
of
things
so
just
to
make
sure
that
there
is
interoperability
between
open
metrics
and
prometheus
and
open
telemetry,
on
the
other
hand,
and
all
of
them
at
the
that's
the
same
thing
or
as
one
holistic
thing.
K
We
have
two
working
groups,
at
least
in
an
internal
incubation
state,
where
we
basically
want
to
take
discussions
and
package
them
into
subgroups.
To
then
report
back
to
the
main
call
reason
being
that
we
don't.
We
can't
fit
all
of
all
of
the
stuff
which
we
have
into
the
course
anymore,
and
most
people
seem
to
prefer
talking
about
it.
Instead
of
writing
an
email
list
and
such
so,
we
need
to
create
some
new
spaces
where
people
can
just
have
those
discussions
outside
of
the
main
call
of
course
else.
We
would
never
finish.
K
There
is
a
plan
for
the
litmus
project
to
the
next
introduction
and
there
is
open
metrics,
which
we
would
like
to
suggest
for
incubation
already
talked
with
chris
a
about
this
who
thinks
it's
a
good
thing.
Also.
Obviously,
openmetrics
is
fifth
in
the
end
user
survey,
so
yeah
we
are
once
again
offering
to
you
due
diligence,
but
obviously
I'm
biased,
because
I'm
both
sick,
chair
and
open
metrics
founder
so
yeah.
Just
just
to
to
note
that
I
have
this
and
that's
it.
K
Yeah
well,
there's
lots
and
lots
and
lots
of
opens
so
the
the
super
short
history
openmetrics
comes
out
of
prometheus.
That
was
started
2015
as
a
thing
to
to
standardize
the
metrics
exposition
format
of
prometheus.
As
a
truly
vendor
neutral
or
project
neutral
wire
format.
K
And
yes,
there's
a
ton
of
opens,
it's
it's
quite
convoluted.
There's
more
opens
even,
but
these
are
the
relevant
ones.
For
now
this.
B
K
Yeah,
so
the
working
dock
for
openmetrics
is
in
the
form
of
an
of
an
idea,
internet
draft
which
will
be
super
submitted
to
the
ops
wg
within
itf,
and
then
hopefully
it
will
become
an
rfc.
I
already
talked
to
the
chair
of
the
ops,
wg
and
they're,
basically
waiting
to
take
this
and
get
it
through
the
system.
B
Nice
all
right,
I
think,
we'll
need
to
you-
know,
hear
a
bit
more
about
that.
Maybe
you
know
at
least
understand.
I
don't
need
to
at
least
understand
what
these
different
open
projects
are,
but
it
sounds
good
sounds
very
good,
any
any
other
questions
on
that,
or
should
we
move
on
to
which
is
the
next
sig.
B
F
We
have
a,
we
don't
have
a
lot
of
time
so
yeah.
This
is
ricardo
and
sick
run
time
so
quickly.
Some
updates,
mostly
around
presentations
and
community
outreach
we
reached
out
to
some
projects
and
and
also
we
have
some
presentations
so
on
the
containers
and
runtimes.
F
Our
next
meeting
is
on
thursday,
so
we
have
the
crosslet
team
present
and
that's
basically
webassembly
running
as
the
cubelet,
so
you
can
run
webassembly
workloads
with
kubernetes,
so
it's
a
project
early
or
early
project
in
the
works
so
but
an
exciting
technology,
and
so
because
we're
excited
about
the
presentation,
tryouts,
another
project
that
we
reached
out
to
and
that's
basically
a
container
image
registry.
We
have
a
few
of
those,
but
this
one
is
written
in
rust,
so
interested
to
or
we're
eager
to
see
what
the
differences
are.
F
There
lucid
is
another
web
assembly,
runtime
started
by
fastly
and
we
reached
out
to
them.
So
hopefully
we
get
a
presentation
from
them.
Then,
on
the
hiot
ai
ops
space,
we
have
a
presentation
from
qflow
schedule
on
december
3rd,
obviously
after
kubecon,
so
we're
not
going
to
have
a
meeting
during
kubecon.
F
Fuckflow
is
a
project
that
allows
you
to
run
workloads
at
the
edge
similar
to
cube
h,
but
it
doesn't
run
on
kubernetes.
It
runs
in
containers
but
they're
looking
to
add
support
for
kubernetes,
so
they
presented
at
our
last
meeting.
F
So
they're
part
of
another
foundation
called
fi
ware,
but
you
know
we
thought
it
might
be
interested
to
interesting
to
for
them
to
present
k3s
and
a
project
in
sandbox
already
for
running
kubernetes
at
the
edge.
F
So
hopefully
we're
going
to
have
a
presentation
from
them
too
and
open
your
edge
computing
workloads
and
also
a
sandbox
project
in
the
cscf
already,
and
I
hope
we
want
to
have
a
presentation
just
for
informational
purposes
and
for
community
outreach
and
then
finally,
so
we
have
some
presentations
like
kubecon,
so
we
have
a
runtime
intro
session.
So
hopefully
we
will
get
more
contributors
and
people
excited
about
the
sick
and
getting
more
traction
and
and
then
also
the
container
orchestrated
work
group.
F
That's
going
to
have
a
a
panel
at
cubecon,
so
yeah,
that's
that's
it
for
the
update,
I
think
we're
sorry.
I
took
four
minutes.
B
All
right
for
those
of
us
who
can
let's
run
over
quickly
who's
here
from
seek
security
emily,
I
think.
O
Yes,
emily
hello,
everyone.
This
is
my
first
time,
so
I'm
gonna
go
really
quick.
I'm
gonna
go
backwards,
so
cloud
native
security
day,
north
america
is
a
virtual
event.
On
november
17th
we
have
over
800
folks
that
are
signed
up
for
it
and
we'll
be.
We
will
be
running
a
capture
of
the
flag
activity
at
the
same
time.
O
Throughout
the
day,
the
end
of
the
day
wrap
up,
we'll
be
talking
about
the
activity
and
there's
a
dedicated
channel
during
the
event
just
for
the
cts,
we'll
also
be
promoting
it
on
a
twitch
live
stream
tomorrow
at
3
30
eastern
time.
So
if
you're
interested
tune
in
switching
back
to
the
cloud
native
security
white
paper,
we've
had
a
ton
of
positive
comments
and
feedback
from
the
community.
O
Everybody
says
how
much
they
loved
it
and
how
much
they
needed
it.
So
our
next
steps
are
seeking
editorial
help
from
the
cncs
staff.
If
that's
available,
getting
final
sign
off
from
our
love,
leasing,
security,
talk,
liaisons
and
then,
hopefully
being
able
to
coordinate
with
the
cncf
for
a
blog
post
about
those
updates.
That's
it.
B
Amazing,
I'm
sure
amy
and
chris
can
help
you
with
those
requests-
storage,
hello,.
P
Hello
I'll
be
super
quick,
so
for
the
profique
project
we've
been
working
with
with
justin
from
the
tlc,
so
thanks
justin
for
all
the
efforts
in
there
as
we've
been
going
through,
the
dd
we've
come
across
a
couple
of
items
which
which
mean
that
the
project
is
now
looking
to
resubmit
as
a
sandbox,
rather
than
pushing
forward
with
the
with
the
dvd,
and
this
is
mostly
around
being
able
to
prove
production
users
of
the
open
source
version
of
the
project,
the
open
ebs
project.
P
We
are
going
through
a
review
process
with
them
for
their
move.
From
sandbox
to
to
incubation.
We
had
another
chat
with
the
team
today
to
to
to
discuss
some
of
the
licensing
concerns
and
we're
we're
gonna
wait
for
there
for
them
to
come
back
to
us
with
some
some
options
longhorn
presented
and
they
are
looking
to
move.
They
have
a
proposal
in
place
to
move
from
sandbox
to
incubation
they
presented
to
the
sig,
we're
just
giving
the
review
at
face
value.
P
We
don't
think
there's
any
issues
to
stop
a
recommendation.
So
that's
probably
going
to
be
going
forward
to
to
the
toc
to
to
ask
for
somebody
to
to
come
forward
for
for
doing
the
dd,
the
project,
presentations
of
notes.
P
We
have
reviewed
with
the
data
lifecycle
framework
who
have
updated
their
their
their
presentation
and
updated
some
of
the
documents
to
to
address
some
of
the
issues
that
toc
had
when
they
last
voted
on
sandbox
and
they
are
resubmitting
their
their
project
for
consideration
at
the
next
vote,
and
we've
we've
stalled
for
a
couple
of
weeks
on
the
performance
and
benchmarking
my
paper,
but
we're
going
to
put
in
the
last
bit
of
efforts
to
go
without
before
before
kubecon
and
then.
P
Finally,
we've
we've
recorded
our
session
for
for
kubecon,
and
hopefully
you
know
again
gain
gain
some
more
traction
on
on
the
community
and
one
final
small
thing:
the
cncf
storage
landscape
white
paper
has
been
renamed
to
be
more
simple
and
we're
calling
it
the
cncf
storage
white
paper.
So
as
not
to
have
it
confused
with
the
actual
cncf
landscape,
which,
which
is
obviously
a
you
know,
very
different
beast
and
that's
it.
For
six
storage.