►
From YouTube: Technical Oversight Committee 2020/11/20
Description
Istio's Technical Oversight Committee for November 20th, 2020.
Topics:
- TOC Guidance for Istio 1.9
- Istio 1.9 Roadmap Review for Environments and Security Working Groups
D
Okay,
so
continuing
our
conversation
from
the
working
group
leads
meeting,
we
want
to
focus
our
efforts
for
one
night
towards
stabilizing
our
code,
particularly
around
addressing
upgrade
pinpoints,
and
as
part
of
that,
I
think
the
guidance
to
the
working
groups.
We
will
focus
on
features
that
have
been
there
in
istio,
which
is
an
experimental
alpha
phase,
how
we
can
promote
them
and,
following.
E
F
D
C
D
And
if
there
are
bugs
related
to
upgrades
that
fall
in
your
domain,
expertise
evaluate
that
and
then
in
general,
look
at
the
environment,
variables
annotations
and
the
entire
cluster
of
things
where
users
don't
really
know
what
they're
getting
into,
but
they
use
it
and
then
they
upgrade
breaks.
So
we
can
fix
them
by
having
better
documentation,
upgrade
testing
but
also
create
some
tooling,
so
that
users
are
and
users
are
aware
of,
okay
you're
using
the
feature
which
is
experimental
so
probably
when
you
upgrade
it
might
break.
D
G
Yeah
a
couple
of
other
kind
of
points.
I
I
very
much
agree
with
what
nirar
said:
if,
if
there
are
apis
or
features
that
you
don't
want
to
bring
to
stable,
that
are
experimental,
it's
also
good
to
start
getting
rid
of
them
right,
because
anything,
that's
a
latent
option
that
a
user
might
use
is
a
support
problem
waiting
to
happen.
G
So
you
know,
starting
that
telling
process
making
assessments
about
what
people
are
using.
G
You
know,
if
you
have
users
using
experimental
features,
that's
obviously
dangerous
unless
you
really,
particularly,
if
you
don't
plan
to
bring
it,
I
think
other
things
we
talked
there
will
be
a
dedicated
effort
around
improving
the
upgrade
process
and
stabilizing
the
update,
upgrade
process.
That
work
is
already
kind
of
kicked
off,
and
so
we'll
we'll
figure
out
how
to
make
that.
G
You
know
a
an
ongoing
thing
with
a
clear
remit
within
the
community.
G
Right
now,
you
can
kind
of
think
about
as
a
tiger
team,
but
it
might
become
a
working
group
and
then,
lastly,
right.
We
know
that
there
is
functionality
in
flight
that
is
not
yet
released
and
working
groups
are
going
to
want
to
progress
that
you
should
kind
of
establish
a
budget
right
within
your
working
group.
G
For
how
much
of
that
you
want
to
do
in
any
given
release-
and
you
know,
if
you
think
about
you-
know
any
engineering
process,
you
know
I'll
have
30
percent
of
my
engineering
effort
on
new
features,
50
on
maintenance
and
stabilization
of
existing
features,
20
on
issues
and
bug,
fixes
and
things
of
that
nature
for
the
1.9
release,
we're
asking
people
to
shift
the
needle
right
more
towards
the
things
that
we
just
brought
up
and
improving
the
stability
of
the
product,
the
upgrade
process,
etc,
etc.
G
H
D
Yeah
and
I'll
just
add
like
I,
I
you
know
from
a
process
point
of
view,
working
group
leads
and
maintainers
review
the
prs.
I
think,
when
you're
reviewing
some
pr's,
put
your
user
hat
on
and
think
about
whether
it
impacts
upgrades.
D
So
that's
another
thing
that
we
can
have
in
our
mindset
that,
even
if
you
can't
like
some
of
these
apis,
we
we
have
not
been
very
sure
like
metrics
default.
Metrics
are
these
apis
are
not
should
be
changed
or
not.
So
it's
okay
to
have
a
discussion
and
say:
hey:
should
we
document
them?
Should
we
document
the
impact
so
that
users
are
aware
and
how
can
they
disable
it
so
that
process
probably
will
just
continue
assuming
we
can
start
following
it.
I
I
You
know
per
our
support
policy
because
we
really,
I
mean
we
have
a
lot
of
functionality.
That
is
sorry
that
is
undocumented,
and
you
know
we
sort
of
just
leave
it
as
like.
Well,
you
weren't
using
that
or
you
shouldn't
be
using
that,
because
it's
not
documented
and
it's
like
well,
a
lot
of
stuff
isn't
documented.
How
do
I
know
what
is
stuff?
I
That's,
okay,
to
use
what
stuff
that's
going
to
be
painful
if
I
use
it
that
kind
of
stuff
and
since
we
don't
know,
I
think
that,
having
you
know
a
brief
period
where
we're
like
hey,
we
noticed
this
stuff
we're
going
to
get
rid
of
it.
So
anyway,
that's
I'll!
Stop.
G
I
I'm
not
I'm
not
saying
it's
not
happening,
I'm
just
saying
like
in
addition
to
what
what
niraj
was
saying
that
you
know
if
we're
looking
and
we're
gonna
delete
something
we
should
say.
Okay,
I
need
to
delete
this,
but
I
need
a
way
to
release
so
that
I
can
at
least
tell
people
that
we're
going
to
delete
it,
so
they
can
prepare.
J
C
I
know
it
has
to
right
here
the
costume
brought
up
a
good
point
in
the
in
the
chat
too.
That,
like
one
thing
we
could
do
is
when
we
upgrade
we
can
let
users
know
of
things
that
will
be
removed
soon,
that
they're
still
using
all
right.
We
can
do
a
much
better
job
there
of
not
just
documenting
it,
but
actually,
like
letting
users
know
during
an
upgrade.
K
C
M
M
I
That
I
would
put
there
is
we
had
a
on
the
the
networking
call
yesterday
about
you
know
annotations
in
sidecars
and
those
you
know,
the
question
was
well:
are
those
supported
or
not?
Are
they
api
or
not,
and
it's
like
well
they're
available
they've
been
available?
They
weren't
supported
in
the
cni.
E
I
Of
the
injection,
but
they
were
in
the
in
a
container
version
of
the
injection,
and
that
was
really
what
it
came
around
right.
So
I
think
I
where
I'm
coming
from
is
we
do
have
things
that
aren't
documented,
that
people
are
likely
to
be
using,
but
we
don't
even
know
it,
and
then
we
just
say:
well,
that's
not
documented.
You
know
you
get
what
you
get
so
I
I.
N
Feel
like
we're
talking
about
a
hypothetical
problem
that
doesn't
exist
in
my
opinion,
because
we
have
already
all
the
tooling
to
expose
this
information.
We
have
anything
that's
configured
in
easter,
cr,
that's
deprecated.
We
have
warnings
now
that
are
exposed
pretty
much
everywhere.
We
can
stick
them
and
at
install
we
have
a
bunch
of
deprecation
warnings
and
I
don't
know
that
we've
ever
really
removed
something
without
a
release
note.
So
I
I'm
not
sure
I
I
totally
agree.
It
is
something
that
we
should
solve,
but
I'm
not
sure
it's
really
a
problem.
I
A
N
A
A
If
you
actually
want
to
make
use
of
say
an
alpha
or
an
experimental
feature,
you
need
to
basically
specify
some
sort
of
flag
that
yes
you're
willing
to
use
those,
and
if
not,
you
know
basically
during
that
installer
or
upgrade
we'll
actually
just
spit
out
an
error
message
basis,
saying
no
sorry
we're
not
going
to
do
this
you're
using
that
feature.
Unless
you
override
us
with
this
flag,
so
it
forces
people
to
it,
doesn't
stop
them
from
doing
anything.
It
just
forces
them
to
be
aware.
G
Yeah,
so
we've
specifically
asked
I
specifically
asked
mitch
to
follow
up
on
the
ux
working
group
on
that
subject
and
come
up
with
a
proposal
with
ed.
I
know
that
jason
and
mitch
are
looking
at
the
api
inventory
problem
so
that
we
can
track
lifecycle
features
at
the
field
level
in
the
api.
G
Nate
did
this
for
annotations.
We
need
to
do
it
for
environment
variables.
I
asked
mitch
to
follow
up
on
that
one
too,
or
at
least
try
and
find
a
volunteer.
G
Yes
right
so
you
know,
obviously
we
don't
have
detail
yet,
but
people
have
been
asked
specifically.
Working
groups
have
been
tasked
with
following
up
on
specific
subjects,
and
so,
if
you
have
ideas
for
what
an
ideal
ux
is
right
to
help
users
understand
their
exposure
to
issues
that
would
span
in
particular
span
upgrades
right
where
we're
very
sensitive.
I
suggest
you
engage
with
ux
working
group.
G
G
K
If
I
can
raise
my
hand
here
so
brought
an
interesting
point
yesterday
about
going
over
the
existing
features
and
figuring
out
if
they
meets
a
bar
of
beta,
and
so
so
we
basically
can
present
that
if
the
user
is
using
anything
that
is
not
data
stable
and
supported,
we
should
have
this
warning
and
tell
them
that
it's
it's
it's
not
and
like
the
annotations
that
we
discussed
earlier.
K
K
G
Okay,
yeah
and
there
are
degrees
of
stability.
Some
things
are
horribly
unstable
right.
Some
things
have
no
tests
at
all,
even
though
they
may
actually
be
used,
which
is
like
those
others
are
bad
yeah.
So
this
is
all
part
of
the
api
inventory
management.
And
yes,
one
of
things
I
asked
jason
to
do
is
to
be
able
to
like
to
be
able
to
track
that
state.
G
A
C
D
Okay,
no,
I
mean
yesterday,
I
identified
few
annotations
and
things
like
that
that
I
found,
but
I
think
working
group
leads,
are
experts
in
this
domain
already,
so
you
don't
have
to
wait
for
the
work
that
louie
is
talking
about.
You
can
preempt
it
if
you're
already
aware
of
you
right
and
plan
it
for
one
night
now.
G
Well,
we'll
just
make
the
other
thing
is
we
have
to
make
sure
we
capture
it
in
a
sustainable
way.
Right
like
I,
don't
want
to
go
into
a
document
that
then
dies
a
week
later,
so
it
needs
to
be
worked
into
the
development
process.
That's
part
of
the
thing
I
asked
jason
to
look
at,
so
you
can
start
writing
your
document
now.
You
know,
take
your
inventory,
but
then
expect
it
right
at
some
point
to
convert
it
into
something.
That's
part
of
the
ci
cd.
C
Yeah
so
I
moved
I
had
put
this
one
in
as
part
of
the
earlier
topics
and
moved
it
out
as
a
separate
one,
which
is,
I
feel
like
we.
We
are
delivering
this
guidance
a
little
too
late,
because
a
lot
of
the
working
groups
were
already
putting
together
their
one-nine
presentations
and
already
done
that
work.
C
So
we
should
establish
as
part
of
our
process
that
toc,
you
know
as
part
of
the
toc
meeting
before
we
go,
tell
the
working
groups
to
create
the
roadmaps
that
we
figure
out
what
our
guidance
is
for
the
next
release.
So
maybe
we
can
just
like
remind
ourselves
next
time
to
do
that
ahead
of
time
and
not
wait
until
after
they
start
presenting
and
they
go
wait
wait.
Actually
you
should
do
this.
J
G
I
I
guess
the
the
question.
A
question
seems
we
have
a
pretty
large
group
of
folks
here.
What
would
be
the
ideal
time
for
working
groups?
Do
people
have
opinions
like?
Is
it
a
month
before
we
ship
the
release
that
work
that's
in
flight?
Is
it
more
than
that?
Is
it
less
than
that
like?
What
would
be
the
kind
of
the
ideal
timeline
for
getting
that
guidance.
L
I
think
a
month
before
shipping
is
a
great
timeline.
That's
usually
the
feature
complete
deadline
for
or
the
branch
cutting
deadline
for
the
prior
release,
so
we're
gonna
be
busy
with
one
nine
right
up
until
that
time,
the
earliest
we
would
begin
thinking
about
110,
I
think,
would
be
up
right
after
that.
H
D
A
H
N
It
it
may
be
nice
to
do
it
even
slightly
earlier,
because
a
lot
of
times
we
have
changes
that
we
were
lined
up
for
like
the
day
or
week
after
the
branch.
So
if
there
was
something
that
was
conflicting
with
that,
it
would
be
too
late.
Usually
that's
just
cleaning
up
old
stuff,
though
so
it's
pretty
unlikely,
but
depending
on
what
you
are
going
to
recommend,
I
suppose
it
it
could
matter
like
mixer,
for
example,
we
killed
it
like
a
day
after
we
cut
the
branch.
G
Certainly,
if
you
know
that
the
counterbalance
this
is
a
working
group,
have
a
a
big
sprawling
feature
that
they're
trying
to
take
on,
and
they
want
explicit
guidance
about
when
it
would
be
good
to
take
on
the
risks
associated
with
that
within
the
project.
It's
it's
good
to
bring
that
directly
to
the
toc.
F
O
C
So
we
want
to
talk
about
the
next
topic,
which
is:
should
we
start
having
time
boxed
links
that
you're
allowed
to
stay
in
alpha
beta
before
you're
required
to
yeah
upper
out.
A
Mean
it
wouldn't
be
the
case
where,
if
no
one
responds
we
just
depict
the
feature,
it
would
be
a
policy
and
a
guidance
yeah.
J
N
Yeah
so
kubernetes
just
something
similar
to
this,
but
I
don't
think
that
we
can
just
apply
their
policy.
I
was
trying
to
find
it.
I
couldn't
find
the
exact
details,
but
if
I
remember
writing
can't
stay
as
an
alpha
api
for
more
than
I
don't
know
some
number
of
releases,
but
unlike
us,
they
have
like
better
versioning
of
their
resources,
so
they
go
from
alpha
one.
Then
they
go
to
alpha
two.
N
Whereas
for
us
we
don't
we
don't
really
do
that
so
like
that
would
be
resetting
the
clock
when
they
go
to
alpha
2.
Essentially,
it
also.
N
Like
vms,
like
that's
alpha,
for
I
mean
it's
been,
I
don't
know
about
two
three
years
exactly
if
we
don't
have
like
multiple
stages
of
alpha
right.
The
intent
is
that
it's
it's
making
forward
progress
right,
yeah,
not
that.
C
J
G
C
B
C
B
D
C
J
D
L
So
this
topic
is
really
important,
but
I'm
not
sure
that
it's
urgent
that
we
define
it
this
week
as
opposed
to
two
weeks
from
now.
We
do
have
five
roadmaps
to
cover
today.
Yeah.
C
P
I'll
just
15
seconds,
there's
a
doc
here
on
istio
translations
for
issue.io.
If
you
have
some
time,
take
a
take,
a
look
at
it
and
add
some
comments.
If
you
want
to.
A
K
That's
the
least
I
mean
I
don't
I'm
not
reading
it
again.
I
think
happy
to
answer
any
questions.
We
tried
to
minimize
list.
We
failed
if
anyone
can
can
take
stuff
out,
we'll
be
happy.
J
K
Oh,
oh,
that's
yeah,
so
it
it's
a
collection
of
small.
You
know,
documentation
things
that
are
not
necessary
development,
but
but
you
know
making
sure
that
everyone
is
aware
that
features
are
you
know
state,
and
you
know
that
mesh
config
is
a
proper
way
to
configure
and
everything
else
is
not
supported,
and
it's
not
stuff
because
it's
not
really
up
an
item
that.
K
Mcs
is
it's
it's
it's
api
from
kubernetes
that
has
been
going
for
quite
a
while,
and
you
know
it's
moving
forward
to
to
to
progressions
are
featured
basically.
G
K
We
decided
it's
p1,
but
you
know
some
people
are
working
on
it
because
our
pre
com,
prior
commitments
to.
D
Exactly
I
agree,
which
is
a
document
yeah
perfect.
Thank
you.
So
I'm
going
to
keep
going
down
this
list
unless
somebody
is.
K
It
this
why
it's
a
p1
another
p0,
it's
not
a
p2,
so
this
is
technical
depth
related
to
to
security
and
and
control.
It's
not.
Maybe
maybe
it's
p2,
if
you
if
you
want,
but
it
still
needs
to
happen
because
we
are
we
we
haven't
finished
all
the
was
checks
and
so
he's
thinking
I'll.
Definitely.
K
K
Bad
happens:
if
we
don't
do
it,
it's
it's
fine.
We
like
vms.
We
we've
been
with
this
situation
for
a
long
time.
It's
not
really
a
problem,
but
with
externalist
ud
launching,
which
is
item.
Seven,
it's
becoming
more
and
more
important
to
to
secure
the.
D
So
the
so
let
me
rephrase
in
terms
of
a
product,
product
owner
goal.
D
E
K
E
D
L
K
L
D
D
Yeah,
third
one,
I
guess
it
looks
like
we
discussed
it,
but
we
need
an
owner
that
that
is
the
guidance
here
right.
We
need
to
make
upgrades
better.
A
Okay,
can
you
present
john?
Can
you
shoot
that
to
me
over
g
chat.
E
K
D
E
Point
it's
it's
down
he's
expanded
if
you
scroll
up
it
down
yeah.
That's
show
me
where.
K
K
Yeah,
our
policy
is
that
mesh
config
is
a
source
of
configuration
for
east
qrd
and
other
things
are
experimental,
are
not
supported
or.
D
E
A
Okay,
are
we
done
with
the
environments
you
want
to
keep
going
here.
D
E
K
We
still
have
some
testing
to
do
and
some
improvements.
I
do
not
think
there
is
any
other
alternative
at
the
moment
for
safe
upgrade,
except
for
revision.
A
D
J
A
to
introduce
the
install
where
you
break
control,
plane
and
gateway
into
two
separate
installation
operations.
D
J
N
S
J
Yes
and
should
be
zero
to
beta.
I
think.
A
J
T
T
Because
I
imagine
that
that
will
be
most
customers
eventually.
K
T
D
D
A
K
Yeah
for
for
eight
it's
it's
basically,
we
want
to
to
you
know
kind
of.
Apparently
there
are
some
weekly
builds
that
are
produced
and
we
want
to
make
sure
that
stability
is,
is
good
release
during
a
weak,
weak
tweak
to
avoid
the
big
bank
at
the
end
totally
discovers
that
symptom
broken
basic.
So
we
because
there
are
kind
of
changes
that
may
introduce
subtle,
behavior
changes,
subtle
problems,
and
we
want
to
make
sure
that
we
catch
them
faster.
So.
K
They
are
public
and
the
user
who
chooses
to
use
from
head
and
trust
that
our
automatic
testing
is
good.
They
could
use
it.
K
J
N
K
It's
improving,
basically,
that's
a
few
people
know
about
it.
Basically,
we
need
to
raise
visibility.
What
are
you
going
to
improve?
More
more,
you
know
stability
testing
on
an
upgrade
testing
on
those
alpha
releases.
K
D
D
That's
yeah
I
mean,
but
there's
still
quite
a
few
rows
with
constant's
name.
I'm
just
trying
to
understand.
H
N
Q
J
N
A
A
H
Also
a
quick
question:
since
we
were
talking
about
the
promotions
of
from
alpha
to
beta
and
a
time
box,
should
we
have
another
column
that
says
path
path?
Two.
So
if,
if
a
feature
is
an
alpha,
then
path
two
would
be
beta,
then,
whatever
timeline
two
months,
whatever
I
mean,
does
that
make
sense
or
it
can
be
a
discussion
or
maybe
I
can
take
it
since
that's
the
proposal
we
thought
maybe.
A
H
H
D
So
for
row,
four
somebody
from
the
environments
working
group
is
gonna.
Take
that
expanded
description
and
add
it
here
and
find
owners
right.
A
R
Yeah
so
number
one,
the
first
one
is:
we
have
a
long
like
aged
tracking
bag
for
migrating,
our
old
kubernetes
csr,
api
client
to
their
new
v1
api,
and
I'm
still
tracking
that,
and
we
are
planning
to
get
that
done,
that
migration
done
in
this
cycle.
R
G
R
A
R
D
Oliver
quick
question
before
you
move
on:
will
this
allow
users
to
specify
a
dtl
for
all
the
certificates,
because
that
functionality
at
the
higher
level
was
kind
of
taken
away?
We
have
environment
variables,
but,
like
constant
says,
we
normally
don't
want
users
to
use
environment
variables
for
those
right.
R
We
we
support
ttl
for
the
users
to
configure,
but
there
are
ways
how
to
support.
It
is
like
kind
of
changing
from
release
to
release
right,
so
we
just
need
to.
If,
if
we,
I
think
we
still
need
to
make
the
dc,
we
still
need
to
support
the
customizable
tpl,
but
how
to
support
it.
It's
a
question.
We
need
a
better
way
to
support
it.
I
agree
so.
K
D
It
used
to
be
part
of
hell
values,
early
on
as
helm,
support
was
removed,
we
got
rid
of
and
we
moved
to
sds.
There
is
no
high-level
user
api
to
configure
this
other
than
an
unsupported
experimental
environment
variable.
R
D
U
Well,
I
can
I
can
talk
about
this
one
yeah,
so
this
is
the
tool
support,
customer
plugin,
oscillation
engine,
so
instead
already
provides
its
own
oscillation
policy,
but
in
many
cases
customers
still
want
to
use
their
existing
oscillation
engine
and
go
ahead.
A
So
I'm
on
is
this
kind
of
playing
the
role
that
mixer
policy
checks
used
to
play,
or
is
it
different.
Q
U
U
Cool
yeah,
so
yummy
already
had
the
design
revealed
and
I
think
he
already
checking
the
api
and
the
country
is
working
on
implementation.
So
we
plan
to
shift
this
feature
in
alpha
in
1.9
and.
A
Actually,
I'm
curious
is
anybody
so
doug,
I
think
you're
on
and
also
mandar
might
be
on.
What
do
you
guys
think
about
this?
In
terms
of
you
know
the
relationship
to
the
previous
mixer
policy
checks.
F
A
U
Yeah,
at
least
for
some
use
case
like
it's
not
a
performance
sensitive,
for
example,
a
user
needs
to
log
into
a
go
through
oitc
flow
to
log
in
and
get
a
token
to
access.
The
mesh.
This
kind
of
use
case
is
not
performance,
sensitive.
U
Yeah,
that's
a
collaboration
with
the
networking
working
group.
I
think
yeah.
The
contributor
is
also
listening,
written
and.
U
U
U
Yeah
the
1.8
plan,
so
we
can
change
it.
Thank
you.
Yeah
line.
5
is
a
better
support
for
josh
authentication
in
ecm
so
currently
institute.
The
standard
authentication
institute
is
to
forward
the
cognitive
charge.
Token
to
api
server,
basically
called
token
review
api,
and
we
want
to
provide
some
native
authentication
mechanism
in
sdlt.
U
This
will
work
well.
This
will
support
the
case
like
a
remote
institute
case,
in
which
case
you
cannot
hold
the
request.
Api
server
and
the
also
vm
case
will
also
be
benefit,
but
we
also
benefit
from
this,
because
the
token
you
get
is
not
this
all
not
always
kubernetes
chart
which
could
be
other
jobs.
U
D
Can
I
ask
why
a
security
working
group
thinks
this
should
be
a
p0
and
how
it
aligns
with
our
upgradability
initiative.
U
We
make
it
zero
because
we
we
actually
plan
to
do
it.
Yeah.
J
Mimi,
I'm
I'm
also
interested
in
your
thoughts.
We
can
take
offline
for
certainly
on
the
relationship
of
this
particular
item
with
external
hd
promotion
and
how
is
it
impacting
the
existing
multi-cluster
which
we're
also
using
remote
cluster
without
hdod
inside
of
the
remote
cluster,
which
already
reaches
beta.
K
But
this
is
an
alpha
feature
supposed
to
be
an
alpha
feature
I
mean
the
rest
is
better,
so
probably
doesn't
have
any
effect,
because
we
cannot
use
alpha
in
beta.
I
mean
you
cannot,
you
cannot
depend
on
it.
Basically,
so,
even
if
it
reaches
alpha,
it's
not
something
that
external,
h2d
or
other
things
can
depend
on.
K
But
speaking
of
alphabet
and
and
upgradability
line,
2
getting
line
two
to
bedtime
is
that
the
most
critical
thing
for
the
upgrade
scenarios
in
in.
R
Don't
need
to
this
is
not
you're
talking
about
line
two
right.
It's
not!
This
is
not
a
user
aware
upgrade
it's
it's!
It's
configuration.
K
R
We
can
test
that
the
information
I
got
from
the
kubernetes
team
is
this.
We
want.
K
R
Yeah
our
goal
is
zero
down
time
right.
So,
if
we
add
one
more
root,
it
shouldn't
cause
any
doubt.
A
We
all
think
it's
very
important.
I
think
that's
what
casa
is
trying
to
express.
K
A
J
Asking
I
think
a
couple
of
us
just
come
from
steering,
so
we
look
at
what
is
the
most
important
feature
of
the
security
work
group?
Certainly
it's
neutral
tls,
so
we
would
love
to
have
your
thoughts
on
you
know.
Is
there
any
plan
to
promote
mutual
tls
from
beta
to
stable,
because
we
do
believe
that.
A
A
R
J
D
R
R
We
give
them
the
way
to
configure
through
environment
variable,
but,
yes,
there
are
missing
pieces
there.
I
think
probably
we
need
to
in
our
in
the
previous
releases.
We
can.
Users
can
still
configure
it
through
the
template
through
their
helm
and
now
it's
missing
and
we
lost
track
of
it.
It's
more
like
a
box.
R
Yeah,
I
think
I
think
that's
we
can
we
can
capture
track
that
as
a
bug
fix
because
previously
was
feasible
through
helm,
but
today,
when
we
move
to
mesh
config,
it's
not
there.
So
it's
like
more
like
a
bug
to
me.
R
G
G
R
I
think
we
just
we
were
missing
that,
like
api
level,
still
stable
ness
there
for
well.
G
T
K
K
K
G
U
So
should
we
change
some
of
them
to
be
a
p1
and
not
introducing
new
features,
but
focusing
on
the
maintaining
existing
features
and
upgrade
paths.
R
Is
because
there
are
some
things
that
are
related
to
their
mutual
dls
itself
or
their
certificate
management.
Those
we
will
do
some
assess,
as
louis
was
saying
like
we,
we
evaluate
what's
missing
for
a
stable
and
we
promote
them
for
the
policies.
Maybe
they
mean
you
can
work
separately,
because
there
are
a
couple
of
different
things.
Maybe
you
can
prune
some
of
them
deep
demote
them
to
p1
or
p2,
and
but.
A
But
please
don't
support,
please
do
not
demote
the
support
for
multiple
custom
routes.
E
K
And
the
first
of
all
aligned
to
help
environment
working
group
to
skip
releases
and
and
to
have
you
know
some
more
testing
around.
You
know
interoperability
with
older
version
of
you
know
and
all
the
envoy
talking
when
you
enjoy
and
don't
control
playing
talking.
D
H
N
N
It's
been
a
consistent
thing
that
pops
up
every
release
are
these:
are
these
an
envoy
in
the
istio
agent?
Where
are
the
bugs
no
they're,
typically
an
envoy?
Actually
I
mean
I
would
love
to
see
the
easter
agent
code
cleaned
up
as
well,
but
it's
that's
more
of
like
a
code.
Health
than
a
convoy,
crashes
or
envoy
never
gets
certs.
U
A
U
A
A
R
A
You
chen,
the
audio,
is
not
good
a
lot
of
background
noise.
It's
hard
to
hear
you.