►
From YouTube: 2021 10 25 Docs Office Hours
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
B
A
B
B
A
B
All
right,
so
it's
stocks
office
hours,
it's
the
25th
of
october,
proposed
topics,
review
the
change
log
for
the
next,
the
weekly
release
it'll
be
out
tomorrow
and
then
security
restructuring
and
so
meg.
If
you're,
okay,
let's
go
through
the
the
change
log
review
first
and
we'll
we'll
adapt
it
and
get
it
done
and
then
okay.
So
let's
see
that
is
github
jenkins.io.
B
Okay,
pull
requests,
and
so
here's
the
changelog,
okay,
so,
okay,
so
this
is
a
rework
for
formatting
of
an
old
one,
no
problem
all
right
here
we
go
2.318.,
so
add
a
constructor
okay,
this
one
add
a
constructor
matching.
Super
is
not
something
that
end
users
need
to
be
told
about.
So
let's
take
that
one
and
make
it
skip
change.
Log.
B
B
B
B
A
That's
the
previous
one.
The
syntax
says
that
apache
ant
has
been
deprecated
right.
We
remove
unsafe
classes
that
have
been
deprecated
from
apache
ant
or
something.
B
B
A
That
does
it.
Yes,.
A
B
A
B
B
B
There,
it
is,
propose
change
likes
entrance
there.
We
go
okay.
B
A
B
A
Right
and
okay,
so.
A
Okay,
hey,
I
can
send
you,
do
you
want
links.
A
Oh
man,
I
can't
get
to
them.
Basically,
we
had
there
were
holes,
it
was
a
mess.
We
had
redundancies
between
them.
I
started
picking
at
it
and
trying
to
fill
in
some
holes
and
then
daniel
and
I
the
our
comments.
We
were
like
just
going
cross-hats
and
we
got
on
a
phone
call.
We
really
wanted
the
same
thing.
We
had
a
couple
of
slight
minor,
different
approaches
that
didn't
matter
at
all.
A
Oh,
I
know
I
know
what
I
need
to
do.
I
need
to
exit
full
screen
and
then
I
can
get
to
my
stuff.
I
bet
yes.
A
A
B
If
you
open
your
email,
you
it
would,
it
will
offer
to
let
you
click
one
button.
That
would
then
grant
me
grant
me
access.
Oh.
B
A
A
B
A
I
kind
of
wanted.
I
was
going
to
put
background
concepts
in
the
index.a
doc
file
and
daniel
felt
strong.
He
wanted
sort
of
that
high
level
story
about
security,
which
actually
I
like
it
now
that
I
see
it
and
put
you
know
these
are
all
your
things,
because
what
I'm
seeing
too
is
we
may
have
some
topics
that
don't
even
have
pages
in
this
section
like,
for
instance,
I,
if,
if
I
find
the
right
stuff
for
credentials,
I'm
not
sure
we
need
to
say
anything
other
than
be
sure.
A
B
A
A
B
A
B
B
B
B
A
B
A
Right,
you
just
sent
it
to
me
and
then
the
question
is
whether
there
is
and
how
you
found
that
I
don't
know.
I
guess
it's.
A
search
is
not
right.
B
I
I
think
I
found
it
with
google
search.
A
A
A
A
Okay
and
we-
and
I
because
I've
also
got
to
see
the
pipeline
reference-
does
have
some
information
about
credentials.
You
have
to
open
the
page
and
do
a
control
f
to
find
it.
B
A
B
A
We
have
a
one-liner
along
with
use,
distributed,
builds.
But
apparently
I
did
not
know
this
that
you
can't
you
shouldn't
run
agents
in
the
same
docker
container
as
the
controller.
B
B
A
B
A
B
B
B
First
story
is
use
the
backup
system
provided
by
your
your
operating
system
or
hosting
vendor,
and
use
it
because,
for
instance,
if
you're
running
on
aws
and
you're,
using
or
if
you're
running
on
opensuse,
opensuse
or
suse
linux
or
if
you're
running
on
freebsd,
those
are
all
systems
that
have
the
concept
of
a
snapshot
based
file
system,
and
so
the
easiest
way
to
take
a
backup
in
those
cases,
is
you
just
create
a
snapshot
and
the
snapshot
is
almost
instantaneous,
it's
so
fast,
because
what
it
does
is
it
it
records
the
file
system.
B
Is
this
big
transaction
log
is
what
it
is
in
these
in
these.
In
these
transactional
file
systems
like
freebsd
and
suzy,
linux
has
it
and
and
others
ubuntu
is
getting
it,
for
instance,
and
and
with
a
transactional
file
system.
Now
all
you
have
to
do
is
record
the
point
in
time,
and
now
you
can
reconstruct
that
thing
at
any
time.
B
But
but
given
given
the
way
these
trends,
these
snapshotting
file
systems
work,
you
can
use,
you
can
use,
you
can
create
a
subsection
of
it.
There
are
all
sorts
of
ways
to
do
that.
You
don't
necessarily.
A
A
Then
because
I
was
thinking
about
securing,
I
mean
I'm
still,
my
first
job
was
running
backups
by
the
way
for
a
research
team
in
the
70s
and
and
actually
we
actually
one
of
the
other
another.
A
competing
lab
had
somebody
break
into
the
lab,
with
a
great
big
magnet
and
run
it
over
all
the
mag
tapes
and
destroy
all
their
data.
A
So
you
know
so
I
think
of
that.
But
does
anybody
run
backups
to
external
media
anymore.
B
A
A
Right,
but
so
we
can
okay,
so
if
you
don't
make
sure
it's
secure,
but
if
you're
running,
if
you're
doing
backups
to
the
cloud,
do
you
gain
something
by
putting
your
backups
in
say
two
different
geographies
or.
B
A
B
B
A
A
A
A
B
A
B
A
A
B
A
But
I
think
you
know,
and
it's
I
mean
we
can't
cookbook
it,
but
if
you
look
for
this,
look
for
you
know,
if
you
don't
find
any
of
those,
you
haven't
been
intruded,
but
we
we
ought
to
be
able
to
give
them.
Some
hints
I
mean
one.
One
of
them,
I
think,
is
probably
the
old-fashioned
one
of
just
read
your
logs
regularly.
So
when
you
see
something
unusual,
you
notice
it
look
for
anything.
B
A
A
B
B
A
A
Oh
one
more
quickie:
do
you
still
have
the
page
upwards
where
the
dock
is
built.
B
I
can
get
it
up
it's
right
here.
Yes,
sure.
A
Go
to
the
distributed,
builds
the
second
sec.
Second,
one
just
this
one:
okay,
yes
and
scroll
down.
I
think
that's
where
this
is.
I've
got
a
quick
explanation
of
nodes
and
of
no
what's
a
node.
What's
an
agent.
What's
an
executor
is
that
in
here,
someplace.
B
A
B
A
A
B
A
But
that
that's
one
thing
it's
so
much
of
this
stuff.
I
look
at
it
and
it
makes
sense,
but
I
it
wasn't
so
long
ago
that
I
didn't
understand
any
of
this
and
I
was
so
confused
by
what's
a
node
and
what's
an
agent
and
what's
an
executor.
B
A
A
B
B
A
A
B
A
B
B
That's
that
that
is,
that
is
a
distinction
I
can't
make,
because
I
look
at
this-
and
this
is
definitely
an
agent.
It
has
delete
agent
on
it
and.