►
From YouTube: CNCF TOC Meeting 2021-03-02
Description
CNCF TOC Meeting 2021-03-02
A
A
A
A
A
A
A
B
B
B
Oh
liz,
one
housekeeping
note:
the
only
sig
that
didn't
have
slides
today
was
a
contributor
strategy.
So,
if
they're
here
I'll
maybe
push
them
to
the
end,
not
sure
okay,
is
there
a
placeholder
for
them
or
are
we
I've
dropped
them
from
the
deck,
but
there's
the
placeholder
is.
If
I
see
them
I'll
flag,
you
down.
B
A
What
do
you
think
shall
we
give
it
a
whirl?
Let's
do
it
all
right,
welcome
everyone
to
today's
toc
meeting,
all
the
usual
preamble
you've
made
it
and
I'm
sure,
maybe
we'll
update
that.
So
mostly
we
are
here
for
sig
updates
and
before
we
get
into
sig
updates
amy,
do
you
want
to
say
anything
about
the
renaming
of
cigs
it's
still
in
voting?
That
is
what
I
am
saying
about
it.
The
vote
is.
B
The
vote
was
but
yeah
that
is
where
that
is.
The
vote
is
still
open.
So
if
anybody
have
strong
feelings
about
that,
please
go
ahead
and
I
can
certainly
drop
that
into
chat
in
a
bit
in
here.
But
that's
that's
where
we
are
on
that
all
righty.
Thank
you
very
much.
A
So
looks
like
first
up
is:
oh
there's
a.
B
B
Like
the
the
the
thinking
around
renaming
of
cigs,
yes,
so.
A
We
had
a
discussion
on
it.
I
think
it
was
the
last
public
meeting,
if
I
recall
correctly,
and
the
idea
is
to
avoid
confusion
with
kubernetes
sigs
and
kubernetes
sigs
got
there
first,
so
it
seems
only
fair
for
cnc
f6
to
come
up
with
a
different
name
and
the
name
under
proposal
is
technical
advisory
groups.
I
believe
and
there's
a
bit
more
detail
and
discussion
in
the
github
issue.
A
Also
of
note,
we
talked
a
bit
about
the
possibility
of
holding
votes
on
github
rather
than
on
the
mailing
list,
and
we're
using
this
particular
vote
as
an
experiment
to
see
how
that
whole
process
goes
and
how
people
like
that.
So
I
guess
once
that
vote
is
closed.
We
should
put
something
on
the
agenda
to
just
discuss
whether
we
liked
that
format
for
voting.
D
Hello,
everyone
as
almost
fields
in
school
always
have
to
go
first,
because
you
have
the
first
letter
in
the
alphabet,
so
some
project
updates
on
our
side.
So
there's
a
lot
going
on
now
again
on
the
project
front,
argo
requested
to
move
to
graduation.
So
this
is
an
interesting
one
for
us
in
app
delivery,
because
it's
actually
the
first
project
that
wants
to
move
to
graduation
with
insect
app
delivery.
There
were
already
some
commands,
especially
regarding
ci
batches
from
justin.
D
D
I
started
to
engage
in
the
conversation,
obviously
about
other
obvious
things
like
security
review
and
so
forth,
but
like
as
the
other
sikh
people
are
here.
If
anybody
has
done
or
moved
their
project
to
graduation
already
and
can
give
us
some
hints
and
tips,
they
are
greatly
appreciated.
D
Second
project:
we
had
a
presentation
from
gimlet
io
and
one
chart
for
those
of
you
who
don't
know
these
projects.
They
call
themselves
a
github's
tool.
D
We
had
a
longer
discussion
about
this,
so
one
chart
is,
you
could
think
of
it
more
or
less
as
a
super
powered
helm
chart
depending
what
configuration
you
get,
then
you
get
different
things
out
of
it
from
a
simple
service
and
deployment
all
the
way
to
like
pretty
sophisticated
configuration
and
makes
it
just
simpler
to
not
having
to
understand
helm
and
all
the
the
market
and
kubernetes
minecraft
in
detail
and
kim
latin
is
a
graphically
tool
that
more
or
less
lets
you
fill
out
the
proper
values
file
in
there.
D
Interestingly,
how
we
came
across
them.
We
had
from
the
last
cubecon
this
potato
head
project,
where
we
have
like
an
example
for
most
of
the
delivery
tools
in
there.
They
posted
an
examples.
D
I
looked
at
the
tools
that
this
is
kind
of
interesting
and
might
be
helpful
to
what
a
lot
of
people
are
doing,
especially
as
we
see
more
people
using
standardized
templates
and
then
just
let
developers
fill
out
what
they
want
to
fill
out
and
the
rest
is
handled
automatically
like
everything,
obviously
from
deployments
all
the
way
to
oppa
policies
and
so
forth.
D
So
interesting
project
there
that
governed
in
there
litmus
well
actually
the
more
represented
update,
and
they
also
wanted
to
move
to
incubation.
D
The
last
one
was
just
added
by
harry
in
here:
no
co-host
is
looking
for
sandbox
and
they
will
also
be
presenting
so
localhost
being
a
cloud
native
development
in
environment,
more
or
less
on
the
working
groups
that
we
have
the
operator
working
group.
The
artwork
is
heavily
underway
for
the
operator
white
paper
and
by
the
next
in
the
next
two
weeks.
D
We
expect
to
see
the
first
version,
so
the
first
bits
and
pieces
are
starting
to
appear
right
now,
it's
all,
obviously,
on
github
already,
what's
there,
the
github's
working
group
no
update
from
them
so
far
and
then
on
another
activities
that
are
not
in
here.
There's
some
organizational
updates
here,
so
we
have
to
do
also
some
organizational
work
in
the
in
the
working
group.
Obviously
we
had
a
hairy
move
from
into
that
uc,
which
means
that
he
said
I
was
stepping
down
as
the
co-chair
for
seek
app
delivery.
D
Brian
is
stepping
down
as
well
and
as
we
have
some
then
also
to
see
a
small
change
is
coming
up.
There
is
some
organizational
work
in
at
delivery
that
needs
to
be
taken
care
of
going
forward
and
obviously
we
will
reach
out
to
the
proper
people
and
how
we
can
get
new,
especially
the
co-chairs
in
there.
I
think
the
tlc
liaisons
are
pretty
obvious.
We
want
to
keep
so
the
harry
offered
himself
already,
which
is
quite
obvious.
D
Another
one
would
obviously
be
cornelia,
but
for
co-chairs
we
would
have
some
internal
candidates,
but
those
you
need
to
follow
the
official
voting
and
proposal
process
there
to
get
new
people
supporting
us
on
a
network
front.
So
that's
it
from
sick,
app,
delivery.
D
A
With
the
co-chairs,
do
you
have
like
candidates
or
potential
candidates,
or
are
you
gonna
need
some
help
putting
out
the
word
that
co-chairs
are.
D
And
we
should
do
a
mixture
of
both
obviously
see
the
people
who
are
kind
of
working,
especially
in
the
operator
working
group
being
pretty
active.
So
I
want
to.
E
D
What
I
would
especially
be
interested
in
to
get
people
from
the
end
user
community
into
an
app
delay
where
at
least
have
one
end
user
related
seats,
because
right
now
or
up
to
now
it
was
even
mostly
focused
on
on
renderers,
and
especially
in
this
group,
we
should
have
at
least
have
one
end:
user
representation.
F
There
right,
I
also
agree
that
we
may
want
to
look
at
whether
there
are
folks
from
any
other
companies
want
to
join
the
sig
as
chairs
or
tls.
F
I
think
at
least
it
will
be
great
if
you
can
help
a
little
bit
here,
so
I
I'm
hoping
to
see
maybe
at
least
one
culture
here
to
co-work
with
alloys
in
the
future,
I'm
still
working
in
only
six
after
the
race
things,
but
I
need
to
spend
some
time
on
the
tlc
side,
so
I
think
it's
good
to
have
a
new
candidate
here.
Another
thing
I
want
to
bring
up
is
flux
incubation,
it's
right
now
under
voting,
but
it
has
been
taken
for
a
while.
G
G
Oh
fair
enough,
very
good,
well
so
insig
network,
we
have
been
having
a
fair
bit
of
participation
over
the
last
three
or
four
times
that
we've
met.
So
it's
been,
it's
been
pretty
nice
there's
a
lot
of
the
activity
and
the
participation
has
been
on
initiatives
within
one
of
the
working
groups,
the
service
mesh
working
group.
G
So
we
we
have
generally
take
care
of
some
some
sig
network
business
relatively
quickly
in
part,
because
we
really
just
had
one
outstanding
project
for
a
while
under
review,
and
that
project
is
well
the
project
formerly
known
as
ambassador.
It's.
You
know
now
known
as
emissary
ingress,
and
so
it
is
proposed
for
incubation
and
it
is
out
for
a
public
review.
I
think,
as
of
a
day
or
two
ago
or
here
very
recently.
G
So
that's
a
call
for
all
of
you
on
the
phone
and
not
on
the
phone
to
go,
show
your
support
or
or
lack
thereof,
for
emissary
ingress.
Please
go
out
and
please
go
out
and
vote
for
ambassador.
I
guess
is
what
I'm
saying
get
out
and
vote
all
right,
so
that
that's
sig
network
apologies
didn't
mean
to
make
confusion.
There
of
a
lot
of
the
activities
that
have
been
going
on
in
the
sig
network
have
been
in
the
service
mesh
working
group.
G
There
are
four
or
five
initiatives
within
that
group,
so
just
as
a
quick
recap
about,
I
think
it
was
three
weeks
or
so
ago.
The
group
went
through
a
review
of
service
mesh
patterns,
there's
about
60
of
them
that
have
been
described
about
the
functionality
of
service
meshes
and
how
how
people
can
take
what
the
patterns
are
for
using
those
those
functions.
G
There
was
a
demonstration
of
the
open
application
model
and
meshery
demonstrating
some
of
a
couple
of
those
patterns,
though
the
following
week,
we
ended
up
doing
a
review
of
get
nighthawk
nighthawk
the
load
generator
for
that's
under
the
envoy
project.
Some
exciting
new
features
coming
to
that
project
and
get
nighthawk
is
an
attempt
to
well
get
nighthawk
into
people's
hands
more
easily.
G
This
last
time
that
we
yeah,
I
may
be
getting
confused
on
the
which,
which
the
sequence
was
here,
but
this
upcoming
time
that
we'll
meet
will
be
on
service
mesh
performance
smp
and
really
probably
a
push
to
propose
it
for
sandbox.
G
I
think
that's
been
an
outstanding
item
for
a
while
there's
a
couple
of
find
folks
from
from
intel
who've
been
helping
advance
the
discussion
on
s
p
and
are
showing
support
there
and-
and
I
think
we'll
be
encouraged
to
do
even
more
do
even
more
with
that
specification
as
it
heads
toward
sandbox.
G
Other
items
that
we
discussed
inside
the
service
mesh
working
group
are
well
from
the
smi
team
or
smi
maintainers,
there's
been
an
ask
for
there's
been
an
ask
for
some
assistance
on
feedback.
I
think
both
on
server
the
use
of
service
meshes
so
a
little
bit
of
a
call
and
ask
of
the
sig
to
either
collaborate
on
if
there's
an
upcoming
rate,
end
user
radar
on
service
mesh
to
either
collaborate
there
or
to
try
to
facilitate
a
different
another
survey.
G
A
more
in-depth
survey
focused
on
service
mesh
things
that
smi
the
the
maintainers
group
is
looking
for
feedback
on
where
to
where
to
focus.
There's
been
a
recent
proposal
to
for
them
to
focus
on
multi-cluster
today,
if
you're
familiar
with
smi,
it
covers
four
different,
has
four
different
specifications
covering
different
functionality
that
you
can
use
a
service
mesh?
For
I
mean
that
is
yet
to
cover
multi-cluster
things.
So.
G
A
G
I
think
generically
that's
an
agreeable
statement
like
oh.
That
makes
a
lot
intuitive
sense
to
me
that
you
would
the
the
gr
or
knowing
a
little
bit
of
the
background
here.
The
group
is
responding
to
asks
from
people
who
are
showing
up
to
the
meeting
saying
hey
this.
I
think
there
was
one
user
in
particular
that
showed
up
and
said:
istio
is
refactoring
how
it's
approaching
some
of
the
way
that
it
does
multi-cluster
and
that
approach
doesn't
necessarily
work
for
that
that
particular
user.
G
The
way
that
they've
deployed
kubernetes
the
way
that
they
manage
namespaces
that
had
to
do
with
the
fact
that
they're
reusing
the
same
name,
space
across
multiple
clusters
and
istio's
multi-cluster,
was
expecting
that
name
spaces
are
globally
unique
and
so
anyway,
I
think
the
group
to
respond
to
a
well-placed
comment
from
josh
is.
I
think
the
group
is
more
or
less
responding
to
to
people
that
are
showing
up
and
asking
questions
about
multi-cluster
support,
but
it's
a
good.
H
Give
some
quick
status
on
the
sick
observability,
so
I
will
try
to
be
quick.
The
main
focus
right
now
is
the
collaboration
with
open
telemetry.
On
the
incubation
proposal
that
was
proposed
couple
weeks
ago.
We
have
huge
amount
of
good
discussions
on
on
technical
levels,
adoptions
and
so
on,
and
the
project
is
such
such
large
that
yeah
it
takes
some
time,
but
I
would
like
to
invite
everyone
as
well
to
join
us
comment
on
the
on
the
document.
H
We
are
creating
and
and
kind
of
give
your
opinion
and
also
some
suggestions,
for
you
know
how
to
make
open
telemetry
better,
so
kind
of
this
is
our
main
focus
right
now.
We
also
work
on
some
white
paper
for
observability.
I
forgot
to
add
that
to
the
slides,
sorry
and
kind
of
related
to
this
incubation,
I
would
have
an
open
question
to
to
the
toc,
and
maybe
you
know
the
community
here
is
that
open
telemetry
is
very
unique
project
right.
H
We
usually
had
you
know
all
our
project
that
moved
from
sandbox
moved
to
sandbox
first
and
then
to
incubation
and
graduation
being
somewhat
ready
and
ready
in
terms
of
all
the
core
components.
All
the
core.
You
know,
goals
of
the
project
well
were
the
were
defined
adopted
fulfilled.
So
we
could.
It
was
easy
to
assess
this
right
right
now.
H
Open
telemetry
is
very
unique
on
this
field,
because
tracing
is
very
well
adopted
very
well,
you
know
constructed
the
apis
are
solid
and
you
know
very
much
using
cloud
native
solutions,
but
other
other
signals
like
metrics
and
logics
logging
are
kind
of
starting
up,
and
you
know
getting
this
motion,
but
not
getting
there.
Yet
it's
not
like
stable
and
adopted
and
very
well
aware.
So
I
wonder
you
know
if
it's
a
requirement
for
incubation
or
maybe
only
for
graduation.
H
So
this
is
like
an
open
question.
We
we
kind
of
the
main
question
right
now.
Have
I
guess
so
I
we
would
love
feedback
on
that,
but
maybe
before
this
let
me
give
yeah
the
upcoming
agenda
items
so
something
on
future.
We
want
to
focus
on.
There
is
white
paper
on
tracing
side
for
the
very
beginners
level
kind
of
guide,
how
to
start
with
with
an
open,
telemetry
and
other
tracing
projects,
and
we
are
talking
about
streaming
apis
and
how
to
observe
those
so
yeah.
That's
the
status
from
the
observability.
A
A
Sorry,
I
feel
like
we
should
probably
try
to
at
least
touch
a
bit
more
on
this.
On
this
question
of
hard
requirements.
For
incubation
I
mean
yeah
incubation
is
supposed
to
be
a
high
bar.
It's
supposed
to
be.
You
know
the
the
point
where
we
do
the
majority
of
due
diligence.
H
Exactly
exactly
sorry
for
bringing
that
up
to
now,
I
think
richie
asked
me
also
to
say
that
he
was
supposed
to
send
some
email
about
this,
but
he
forgot
so
yeah.
Let's,
let's
discuss
this.
I
feel
it's
very
it's
very
fuzzy
at
this
point
and
there
might
be
some
suggestions
for
you
know
there
might
be
some
recommendation
we
can
make.
I
know
open
telemetry
really
want
to
be
consistent
across
multiple
signals,
so
they
don't
want
to
incubate
like
one
project,
one
part
of
the
project
and
others,
maybe
later
so
yeah.
A
I
Yeah,
I'm
happy
to
provide
a
little
bit
of
context,
so
there
there's
two
different
aspects:
open
telemetry.
One
is
like
the
core
components
so
think,
like
instrumentation
libraries,
that
you
add
to
your
application
and
the
second
is
a
collector
component,
so
think,
like
an
agent
you
deploy
that
collects
and
processes
data,
so
those
core
concepts
exist
in
opensymmetry
today
and
are
leveraged
pretty
extensively.
I
The
the
part
is
on
top
of
that
are
the
data
signals
so
think,
like
traces,
metrics
and
logs,
so
tracing
actually
reached
stability
in
open
telemetry
and
is
being
rolled
out
across
the
instrumentation
libraries
right
now.
I
Metrics
are
in
beta
and
will
reach
stability
later
on
this
year
and
logs
are
alpha
they're
experimental
at
this
point,
with
the
goal
being
to
provide
those,
probably
by
by
next
year,
there
there's
a
lot
of
adoption
on
the
tracing
side
already
from
the
instrumentation
library
perspective
and
on
the
collector
side,
there's
adoption
for
both
traces
and
metrics,
but
the
the
project
is
actually
quite
large,
like
it's,
not
a
single
focused
or
single
component
or
single
repository
project.
I
It's
it's
pretty
dispersed,
thus
kind
of
the
question
around
the
different
signals
and
to
be
fair,
these
are
not
the
only
three
signals.
More
are
going
to
be
added
to
open
symmetry
over
time,
so
the
project
will
kind
of
expand
and
scope,
but
this
is
kind
of
the
the
initial
focus
for
for
the
project.
A
A
I
suppose
there
might
be
questions
about
how
those
are
signaled
to
users,
whether
the
you
know,
if
I
mean
I'm
a
very
hypothetical
example,
suppose
that
the
logging
part
actually
never
stabilized
and-
and
you
know,
turned
out
to
be
an
experiment
that
failed,
I'm
not
saying
it
well,
I'm
just
posing
that
as
a
hypothesis
that
doesn't
necessarily
mean
that
the
whole
you
know
open
telemetry
can
still
be
successful,
regardless
in
much
the
same
way
that
kubernetes
is
successful,
despite
the
fact
that
some
alpha
features
end
up
getting
deprecated.
A
I
Maturity
and
we're
thinking
about
it.
Similarly
right
so
semver
is
followed
for
the
different
signals
themselves,
so
kind
of
a
similar
model
to
kubernetes,
and
yes,
additional
things
will
be
added,
so
you
have
to
be
able
to
mark
like
what
you
can
depend
on
versus
what
we'll
have
breaking
changes,
for
example.
So
that's
the
approach
that
the
project's
taking
currently.
C
A
Every
single
thing
in
a
project
has
to
be:
you
know
wildly
adopted
and
widely
adopted
for
the
project
to
potentially
be
ready
for
incubation,
and
does
anybody
think
that's
a
terrible
idea
and
a
terrible
analogy.
H
Yeah,
I
think
it
makes
sense
just
just
from
my
side.
I
think
you
know
product
doesn't
need
to
be
perfect.
That's
for
sure
there
are
experimental
things.
However,
my
perception
was
and-
and
you
know
maybe
I'm
wrong-
is
that
you
know
that
the
signals
observability
signals
are
kind
of
you
know
have
equal
importance,
let's
say
so.
If
logging
and
and
metrics
are
not
yet
well
not
yet
defined.
H
J
Yeah,
I
I
believe
our
requirement
for
a
project
moving
from
sandbox
to
incubation.
One
of
our
major
requirements
is
that
they
have
to
have
three
users
with
it
being
implied
that
those
are
production
users,
so
yeah
and-
and
I
think
I
think
this
is
a
good
example
of
why
that's
still
a
good
benchmark,
because
you
know
is
too
much
undefined
is
enough
to
find
or
whatever
honestly
the
users
can
decide
that
right.
J
K
Just
the
thought
of
this,
because
we've
come
across
similar
sort
of
circumstances
in
in
six
storage,
I
think
we
probably
need
to
differentiate
between
sub
components
or
standalone
bits
of
a
project
versus
integral
bits
of
a
project
right,
because
you
know
if
we
use
kubernetes
as
the
analogy
having
some
function
or
some
feature,
which
is
alpha
or
beta,
is
one
thing
having
an
entire
sub-project
that
may
or
may
not
be
usable
or
production-worthy
is
probably
another.
K
Also
because
some
of
those
things
if
they're
not
actually
defined,
may
also
have
dependencies
on
other
things
or
ip
policy
issues
or
all
sorts
of
other
things,
because
they
just
haven't
been
ironed
out
yet.
So
I
would
probably
caution
it
back
about
you
know.
If
a
project
has
a
dozen
repos,
you
probably
want
to
actually
specify
which
repos
or
which
components
are
specifically
joining
as
a
cncf
project.
L
Everything
in
the
organization
is
a
cncf
project
and
the
ip
policy
applies
to
everything.
That's
moved,
that's
inside
the
repo,
regardless
of
what
status
it's
in,
there's,
no
there's
no
bits
of
this
auger
in
or
out
of
the
project.
K
D
When
we,
for
example,
the
our
girl
submission,
which
was
a
pretty
massive
suite
of
different
sub
projects
that
were
in
a
different
state
and
just
just
recently
was
the
current
flag
submission
with
which
harry
brought
up
right
now,
where
they're,
currently
in
between
a
full
version,
one
two
two
version
two,
while
I'm
wanting
to
move
in
this
case
to
incubation,
I
think
we
will
see
this
high
velocity
in
projects
more
and
more,
and
maybe
the
criteria
need
to
be
adjusted
here
or
how
we
communicate
about
projects
because
for
open
telemetry
from
somebody
actively
working
with
the
tracing
part.
D
Even
if
the
rest,
never
materializing
the
project
in
itself
has
value,
it
has
has
an
option.
Well,
actually,
the
the
metrics
part.
I
know
it's
also
adopted
by
very
bigger
end
user
organizations
already
just
that
logging
part
is
not
there,
so
I
think
we
have
some.
That's
also
why
we
have
like
tech
leads
and
the
cdss
technical
risk
of
things
not
actually
turning
out.
D
The
other
risk
is
that
we
won't
find
people,
then
the
other
is
organizational
risk.
Nobody
actually
working
on
it
well,
logs
do
not
exist.
I
think
how
to
write
a
logging
signal
library
excuse
my
hybrid
feedback.
It's
not
like
really
rocket
science
yeah.
This
has
been
done
before
it's
not
just
standardized
there.
It
might
take
longer
from
an
organization
point
to
find
people
to
actually
work
on
it
and
to
have
like
the
overall
agreement.
I
think
a
lot
of
this
is
really
in
the
assessment.
D
It's
a
bit
of
a
gray
zone,
and
we
will
just
see
this
higher
velocity
like
for
our
goals,
like
the
key
parts
of
the
project,
are
already
mature
enough
for
flux.
They
have
a
very
good
plan
to
move
from
version,
one
to
version
two
there's
a
lot
of
industry
momentum
in
there.
People
are
already
already
moving
there.
D
I
think
there
is
no
hard
criteria
and
I
think
the
standard
project
criteria
do
not
really
help
that
much
here
and
like
technical
vision
and
technical
stability
of
the
ideas
behind
it
is
not
really
even
a
criteria
for
the
project.
Maybe
that's
something
to
add
in
there
at
least
have
a
statement
on
assessment
by
where
I
was
reviewing.
It.
A
I
think
we
should
probably
move
on
because
we'll
we'll
run
out
of
time
for
the
other
six,
but
I
hope
I
think
that
was
a
useful
discussion
and
I
hope
that's
sort
of
set
some
thinking
in
place
for
sick
observability.
Folks.
M
Hey
hello,
everyone!
Well,
okay,
so
we've
been
having
presentations.
We
had
a
couple
of
presentations
last
month,
so
some
updates
on
some
of
the
projects
that
I
had
mentioned
on
the
previous
meeting.
So
we
had
on
the
containers
and
runtime
space.
Sysbox
is
a
project
that
allows
you
to
run
containers
in
bm
or
day
containers
that
look
like
vms.
M
So
it
allows
you
to
run
full
workloads
that
would
run
in
the
ends
with
systemd
and
you
can
even
run
kubernetes
clusters
inside
the
container
so
pretty
interesting
project.
They
had
a
presentation
early
month,
so
another
project
that
presented
is
trout
and
that's
container
image
registry
and
the
difference
with
some
of
the
other
registries
that
are
around
is
that
this
one
is
written
in
rust,
so
they're
targeting
use
cases
that
are
looking
for
a
kind
of
faster,
lighter
weight
image
registry.
M
Maybe
people
running
container
registries
in
kubernetes
clusters,
so
yeah
they're
presented
at
our
last
meeting
and
it's
still
in
the
works,
and
this
is
from
the
folks
in
from
container
solutions.
M
M
This
is
from
backed
by
a
company
from
the
name
is
second
state,
so
it's
a
web
assembly
virtual
machine
so
pretty
excited
to
have
them
presenting
our
segment
on
thursday.
M
They
reply
to
our
invitation
and
they're
also
looking
at
presenting
another
run
time
or
whether
something
run
time
that,
and
I
think
their
focus
is
on
having
high
performance
workloads,
other
webassembly
runtimes.
We
have
westmore
swam
watson
time.
Some
of
them
we
reached
out
question
time,
hasn't
replied
yet
so,
hopefully
you
know
we
get
them
to
present
at
some
point
in
the
operating
system
space
in
the
meeting
next
this
month
or
the
not
the
one
thursday.
M
But
then
one
after
that,
we
now
have
a
rest
ctl,
it's
a
project
from
the
folks
at
facebook,
and
this
is
a
project
that
allows
you
to.
M
Manage
the
resources
on
a
system
based
on
metrics,
so
things
like
number
of
requests
or
latency
on
some
of
the
requests
that
our
server
is
actually
receiving
in
adjusting
that
dynamically,
and
this
project
is
also
written
in
rust,
so
another
interesting
project
presenting
and
then
finally,
on
the
iit
and
edge
space,
we're
still
talking
to
k3s
they're,
already
a
cscf
project,
so
we'll
have
them
present
at
some
point
in
the
future
and
as
far
as
other
sick
run
time
activities,
our
container
orchestrated
device
work.
M
M
M
So
we
had
a
conversation
about
you
know
some
of
the
projects
that
we're
working
on
and
that
we're
reaching
out
to
and
and
and
some
ideas
of
how
to
help
get
more
engagement
with
the
sig
and
when
this
with
the
cncf
and
some
related
events,
so
we're
going
to
have
a
kubecon
eu
session
and
there's
three
events
that
are
not
per
se
directly
related
to
cigarette
time.
M
But
you
know
there's
some
relation
with
some
of
the
projects,
for
example
kubernetes
on
the
edge
date,
there's
cloud
data
wasn't
date
and
and
there's
also
cloud
data
rest
day
in
yeah.
That's
that's
all
the
updates
that
I
have
from
runtime
happy
to
take
any
questions,
see
if
you
have
any.
A
M
It's
pretty
exciting,
what's
up
and
yeah,
hopefully
that
that
actually
helps
their
sig
and
the
ecosystem
grow
and
and
take
it
forward.
E
Hello,
everyone,
some
quick
updates
for
you
all.
Today
we
have
the
secure
supply
chain
working
group
issue,
number
510.
They
are
rapidly
moving
forward
with
a
supply
chain,
security,
white
paper.
It's
been
scoped,
we
have
a
documented
schedule
and
we're
looking
for
a
final
release
of
that
paper
before
kubecon,
so
keep
an
eye
out
for
a
call
for
community
review,
we'll
be
sending
that
out
to
our
sig
list
as
well
as
probably
the
cncf
list.
We
were
successfully
able
to
merge
the
translation
of
the
cloud
native
security
white
paper
into
chinese.
E
E
E
We're
going
to
also
be
sending
out
a
call
to
action
for
that
requesting
both
content
and
development
opportunities
from
the
community
to
contribute
to
this
really
awesome
effort.
But
the
biggest
update
of
all
is
that
we
have
updated
our
process
based
off
of
the
past
five
security
assessments
that
have
been
performed
and
the
feedback
from
the
projects
that
underwent
those
assessments.
E
We're
now
calling
them
security
reviews
to
avoid
a
lot
of
the
community
confusion
that
community
experienced
going
through
this,
but
we've
also
made
some
changes
to
the
overall
process
to
better
align
with
the
maturity
level
of
projects
moving
through
the
cncf
ecosystem.
So
we've
got
some
big
updates
there.
Lots
of
changes,
please
check
out
the
changes
in
our
repo
under
the
assessments
readme,
and
we
also
have
a
current
proposal
to
more
formally
align
these
new
changes
with
the
cncf
phases
and
that's
under
pr
534.
K
Goods
morning,
so
we
had
the
discussion
last
time
that
we
were
that
we
needed
to
kind
of
spec
out
the
sig
we
had
been
looking
for.
Some
new
tech
lead
for
the
for
the
sake
for
a
while
we'd
like
to
nominate
two
tech
leads.
One
is
rafaela
who
works
with
red
hat?
K
Has
a
lot
of
has
a
lot
of
background
in
kubernetes,
of
course,
and
storage,
and
has
recently
been
altering
a
cloud
native
dr
document
in
the
sig,
and
also
we'd
like
to
nominate
sheng
yang
who's,
an
engineering
manager
with
with
suzy,
formerly
rancher
and
he's
also
the
the
maintainer
one
of
the
maintainers
for
the
for
the
longhorn
project.
K
Shang
again
has
a
lot
of
background
in
in
storage.
Is
a
really
strong
technical
lead
and
has
been
involved
in
the
sig
for
probably
a
couple
of
years
honestly
since,
since
we
first
started
so
so,
we'd
like
to
nominate
these,
these
two
people
for
tech
leads,
I'm
gonna
follow
up
with
an
email
to
the
toc
mailing
store.
Perhaps
I
don't
know
if
this
should
be
another
one
of
those
that
goes
into
a
github
issue
for
voting,
but
I'll
I'll.
Take
your
lead
on
that.
N
And
is
the
co-chair
of
the
storage
segment?
My
second
denomination,
I
think
they're
both
great
candidates
and
contribute
a
lot
to
the
community.
So
I
fully
support
it.
N
F
A
Closed
off
for
you
yeah
and
a
vote
very
quickly,.
K
K
So
the
the
longhorn
project,
we
really
need
to
click
off
the
dd
process.
I
need
to
follow
up
with
which
side
on
that
ciarabo
fs
are
currently
in
sandbox.
They
are
proposing
to
to
move
to
incubation
they
presented
to
the
sig
just
last
week.
We're
we're
getting
together
to
to
review
a
few
of
the
items
and
we
should
be
able
to
make
a
recommendation
shortly
and
open.
Ebs
is
some
other
discussion,
but
we
haven't.
K
We
haven't
moved
forward
that
one
of
the
main
topics
that
we're
working
on
is
a
is
a
disaster
recovery.
K
A
cloud
native
disaster
recovery
document
which,
as
I
mentioned
rafaela,
was
working
on
he's,
he's
also
produced
an
overview
presentation
which
kind
of
helps
with
the
with
the
documents
we're
covering
lots
of
lots
of
areas,
including
you
know,
some
really
sort
of
technically
hard
stuff,
like
you
know,
different
consensus,
algorithms,
but
also
you
know
different
ways
of
deploying
databases
across
for
disaster
recovery
and
covering
some
of
the
cloud
native
ways
as
well
as
some
of
the
legacy
ways
of
doing
them
to
to
provide
that
overview.
K
So
so
hopefully
this
will
be
something
that
will
be
really
useful
for
for
sort
of
end
users
going
forward
the
project
fine
yard
presented
to
the
sig
they
plan
to
submit
to
the
sandbox.
I
imagine
it
will
be
on
the
march
23rd
session,
so
that
should
be
coming
up
for
for
a
vote.
K
A
Me
great
any
questions
for
alex
and
six.
A
A
A
All
right,
I
have
one
other
little
thing
from
a
couple
of
weeks
ago,
I
said
I
would
draft
a
proposed
wording
for
adding
the
requirement
for
having
some
sort
of
documented
security
process
at
incubation
level,
and
I'm
just
gonna
stick
the
link
to
that
into
the
chat
in
case.
Anyone
has
any
comments.
A
Oh,
did
we
have
anybody
from
contributor
experience.
C
Need,
I
think
the
only
other
thing
to
bring
up
is
the
michelle's
seat
is
coming
up
for
availability,
so
the
tsc
is
going
to
select
a
new
person
to
replace
her.