
►
From YouTube: Kuma Community Call - July 13, 2022
Description
In this call, we discussed the following:
- Upcoming release Kuma 1.7.1
- New policy matching MADR is finally merged
A
So
hello,
everyone
welcome
to
the
Kumo
Community
call,
please
add
your
name
to
that
and
the
list
and
also
feel
free
to
submit
any
agenda
topics
you'd
like
to
discuss
today.
A
Yeah.
We
will
start
with
a
upcoming
release.
We
want
to
release
patch
Kuma
1.7.1
that
fixes
some
issues.
I
think
this
is
timeout
policy
problem.
If
you
apply
timeout
with
external
service,
it
didn't
actually
worked
well
and
also,
if
you
deleted
timeout
I
think
there
were
some
crash
happened
in
the
control
plane
for
Gateway,
so
yeah
this
box,
fixed
and
I
think
something
else.
A
Yeah,
so
some
bug
fixes
we're
going
to
release
it
soon.
I
guess
next
week,
probably
and
another
thing
to
discuss
today,
not
discuss
just
announced
that
a
new
policy
matching
was
finally
merged.
It's
been
a
long
time.
We
we
had
a
lot
of
iterations
on
this
document
and
we
finally
agreed
on
something.
So
you
can.
You
can
read
it
if
you
haven't
done
it
yet
so
yeah,
please
get
familiar
with
the
document
and
I
think
this
is
it
from
from
my
site.
A
We
can
start
with
the
questions
from
people.
We
have
a
lot
of
people
today
on
the
golf.
So
please
ask
your
questions.
B
C
B
D
Yeah
I
had
I
had
a
few
questions
randomly
around
token
management,
specifically
like
the
data
plane,
tokens
I'm,
I'm,
working
on
a
side
project
where
I
am
in
the
process
of
developing
a
plug-in
for
for
Vault.
That
will
for
has
your
Vault
that
will
be
able
to
manage
the
tokens.
D
Essentially,
you
would
take
the
root
token
and
and
register
it
in
this
plugin
the
configuration
and
point
it
to
your
your
control,
plane,
API,
and
then
it
would
be
able
to
use
the
different
Vault
off
methods
to
then
be
able
to
manage
those
tokens
and
the
TTL
times
on
those
tokens.
So
a
user
could
request
a
token
based
off
of
their
policies
and
then
the
root
token
would
issue
that
to
them,
but
then
also
for
services
we
could.
D
We
could
do
the
same
thing
for
services
where
we
could
use
something
like
IAM
or
or
a
different.
You
know
method
where
the
service
could
then
request
access
to
the
data
plane,
but
one
of
the
things
is
I
was
digging
into
the
documentation
it
does.
Although
the
tokens
are
drop
tokens
and
have
a
lifetime,
they
they
don't,
it
doesn't
appear
that
they
currently
that's
just
for
joining
the
data
plane.
D
So
once
you're
joining
the
data
plane
once
your
token
expires,
you're
still
in
the
data
plane
so
and
I
was
talking
to
Jacob
on
that
and
there
there
appears
to
be
some
like
an
issue
up
there,
where
it
was
talking
about
essentially
how
to
handle
the
revocation
of
and
expiration
of
those
those
tokens
and
kind
of
where
that
is,
and
how
that
that
looks
in
the
current
state
of
of
Kuma.
B
Yeah,
so
that
is
correct
that
right
now,
if
you,
if
your
data
playing
proxy
token
expires,
then
well
like
we
do
the
authentication
only
on
the
first
discovery
request,
and
then
we
check,
if
you
did
not
change
your
authentication
data
right,
just
to
kind
of
save
this
process,
which
is
especially
expensive
from
kubernetes
with
a
service
account
token,
because
you
need
to
do
the
top
in
the
review
and
so
on.
B
D
B
Yeah
so
I
think
it's
not
about
pre-fresh,
it's
about
forcing
that
the
data
playing
proxy
to
reconnect
to
the
control
plane
right
because
right
the
data
plane
proxy
reconnects
to
the
control
plane.
Then
we
need
to
go
over
this
authentication
process.
So
yeah,
one
of
the
things
you
can
do
is
just
restart
the
control
right,
which
is,
of
course
not
ideal,
but
it
is
a
work
at
home
and
this
thinking
with
replication,
so
replication
is
check.
B
Tell
me
when
we
do
the
authentication
on
the
first
DS
request
right
so
which
I
think
is
documented
that
you
need
to
restart
the
data
plane.
If
not,
we
need
to
improve
this
talk
but
yeah
again,
you
add
the
token
to
a
revocation
link
and
then,
while
you
need
to
force
VP
to
drop
this
connection,.
B
D
B
Well,
you
can
use
the
API
to
add
the
talking
to
other
vocation
leads,
but
if
you
want
to
force
the
reconnection
of
the
data
plane
proxy,
then
you
need
to
restart
CP
rfdp
if
you
like,
if
you
can
right
so
like
it's
up
to
you,
which
option
is
more
suitable,
if
you
are
a
mesh
operator
yeah,
so
there's
a
current
approach.
Of
course,
the
better
idea
would
be
to
be
more
Dynamic
about
this
change
right
to
actually
drop
the
and
serve
the
connection
Whenever.
B
There
is
a
change
on
the
revocation
list,
so
there
is
an
issue
open.
If
you
have
a
little
bit
of
time,
we
would
be
very
happy
for
this
contribution.
We
can.
We
can
also
help
with
this.
D
A
What
if
we
limit
the
duration
of
the
connection
between
proxy
and
control
plane
to
react
from
time
to
time,
yeah.
B
I
was
also
thinking
about
this
because
it's
beneficial
for
the
load
balancing
perspective
right.
So
let's
say
you
have
like
three
instances
of
the
CP
right
and
then
you
want
to
scale
this
up,
so
we
scale
to
four
instances,
but
you
know
all
DPS
are
already
connected
via
this
one
grpc
channel.
So
they
just
want
to
recommend
right
to
this
fourth
instance.
So
you
either
kill
all
control.
D
It
would
kind
of
re-initialize,
with
the
newer
token
right,
like
that,
that's
kind
of
the
the
way
that
I'm
I'm
looking
to
drive
that
aspect
of
it,
but
then
also
if
for
some
reason
like
the
plugin
itself
can
make
could
manually,
you
know
tell
the
service
like.
If
you
revoke
the
token
I
want
to
be
able
to
also
kind
of
revoke
the
token
by
you
know.
If
I
want
to,
like
close
all
the
leases
on
the
token
involved,
I
want
to
be
able
to
make
a
call
into
Kuma.
D
B
B
Yes,
yeah,
that's
that's
one
option.
Yeah.
B
Okay,
one
question
to
this:
one:
have
you
thought
maybe
about
doing
this
in
other
fashion,
which
means
that
the
Bold
plugin
would
issue
new
data
plane
tokens
right,
but
the
CP
would
only
verify
those
tokens,
so
the
Bank
coupling
proxy
tokens
and
user
tokens
are
signed
with
the
RSA
right.
So
you
have
a
public
in
the
private
key.
B
So
technically,
if
we
were
to
make
an
assumption
that
CP
is
only
responsible
for
verifying
the
tokens
right,
you
just
only
need
to
have
the
public
key
and
not
the
private
key,
which
is
again
a
win
for
the
security
right,
because
there
is
not
have
a
private
key
and
then
the
Vault
plugin
would
have
both
or
yes
yeah.
B
Yeah
so
right
now
we
kind
of
like
we
did
not
Implement
any
like
logic
to
explicitly
handle
this
right.
But
since
the
token
is
signed
with
the
RSA
256,
it
is
a
potential
the
an
option
to
kind
of
implement
this,
which
is
again
I.
Think
a
bit
nicer
right,
yeah.
D
B
Okay,
okay,
so
I
don't
know!
If
you
are
writing
this
plugin,
we
could
like
I,
think
it's
a
little
bit
more
work,
probably
to
go
in
this
way
right,
but
at
the
same
time
it
is
a
nicer
way.
So
I
don't
know.
We
could
also
draft
some
proposal
or
whatever
how
to
how
to
implement
this
right
so
yeah.
So
we
would
have
this
option.
D
D
Try
to
keep
secrets
in
our
secret
storage.
So,
like
put,
the
I
was
looking
at
us
potentially
putting
the
root
token,
putting
the
Kumo
root
token
right
inside
of
Vault
and
then
having
Vault
be
able
to
rotate
that
token
on
its
own.
So
then
it's
the
only
one
who
knows
that
token
right,
so
it's
completely
hidden
for
many
users
and
then
you
still
but
have
to
I
think
that's
a
decent
approach
right
now
with
the
current
workflow.
D
But
if
we
could
completely
offload
the
the
certificate
or
the
token
generation
interval
and
then
just
have
the
private,
the
public
key
be
in
the
control
plane
I
like
that
and
then
so.
Then,
how
would
we
then
we
would
still
have
to
implement
the
the
data
plan
checking
right
because
the
data
plane
well.
How
would
we
then
Implement
how
we
would
revoke
access
to
the
Token
to
the
to
the
control
to
the
control
plane
at
that
point
in
time,.
B
So
then,
so
then
you
kind
of
bootstrap
that
control
plane
with
your
own
signing
key.
So
the
like
the
bootstrapping
phase
is
a
little
bit
different,
because
right
now
is
that
you
start
the
control
pane.
You
extract
the
admin
token,
and
then
you
do
all
the
operations
right.
If
you
have
your
own
signing
key,
that's
that's
slightly
inconvenient,
because
you
need
to
replay
the
signing
key
somehow
right
and
with
this
approach
that
we
can
provide
the
public
key.
B
Only
it's
very
easy
to
just
start.
The
control
the
call
the
control
plane
with
the
static
configuration
right,
correct.
D
D
B
D
B
D
B
Kuma
side,
to
be
honest,
it's
pretty
pretty
straightforward
when
we
did
changes
to
a
data
plane
token
we
sort
of
had
this
thought
in
our
head,
but
we
didn't
kind
of
implement
this
right.
Okay,
we
we
would
need
to
introduce
new
configuration
in
the
comma
STP
right
right
to
provide
the
list
of
the
public
to
a
public
keys
to
a
data
plane
token
and
user
token,
and
then
we
would
need
to
implement
an
interface
called
called
validator
in
the
in
the
token
package.
So
that
would
be
like
a.
B
Like
a
validator
that
uses
this
public
key
and
not
the
private
key
right,
yeah
and
also
probably
a
good
idea,
would
be
to
sort
of
block
the
creation
of
of
the
private
key
in
the
control
plane
and
block
the
apis
to
generate
the
tokens.
So
it's
kind
of
explicit.
D
Yeah
gotcha,
this
all
right,
all
right,
so
that
would
handle
that
and
then
for
but
then
also
we
would.
We
still
need
to
add
the
piece
into
the
data
plane
right.
That
would
be
that
rechecks
that
constantly
rejects
its
ability
to
connect
to
the
great
or.
D
Is
there
anything
you
need
to
change
in
the
in
the
data
plane
to
handle
the
like
when
you're
no
longer
valid
like
when
you
get
added
to
the
revocation
list?
That
terminates
your
session
or
is
that
all
in
the
control
plane.
B
That's
in
the
control
plane
so,
regardless
of
the
option,
you'll
implement
this
okay.
If
this
will
be
an
online
signing
or
offline
signing
right.
The
application
problem
is
like
a
separate
thing
too.
Yeah
yeah
yeah
right
to
implement.
D
B
Right,
yeah
I
remember:
we
talked
in
the
pr
somewhere
I,
don't
remember
where
a
long
time
ago
that
we
could
also
do
like
a
token
signing
like
offline
token
signing
from
kumakato
right
so
Kuma
cattle
generate
data
plane.
Token
would
somehow
accept
the
private
signing
key
and
then
just
generate
token,
without
even
going
to
the
control
right.
D
A
Yeah,
okay,
do
we
have
anything
else,
questions.
A
B
We
have
a
new
people
with
Daniel
and
Via
slack
I'm.
Sorry,
if
I,
if
I
destroy
your
first
names,
do
you
do
you
mind,
sharing
a
little
bit
what
you're
trying
to
do
with
Kuma?
It's
always
useful
for
us
to
know.
C
Yeah
hi
guys
nice
to
meet
you
so
today,
today,
the
very
first
time
we
joined
your
meeting
and
yes,
we're
doing
some
kind
of
multi-service
mesh
integration
using
our
network
service
mesh
and
we
integrated
it
with
Kuma
and
maybe
in
August
would
like
to
share
a
demo
to
you
and
for
sure
it
will
be
useful
to
get
your
thoughts
about
this,
and
maybe
we
could
have
some
kind
of
collaboration
based
on
it
later.
C
So
it's
at
this
moment,
it's
more
likely
to
start
up
in
our
company
and
yes,
so
if
you
don't
mind,
we
will
join.
Maybe
next
meetings
just
to
meet
you
closer
and
maybe
I
also
could
be
Health
helpful
later.
B
Yeah
yeah
you're
free
to
join
again,
if
you
want
and
if
you
have
a
like,
if
you
want
a
specific
slot
for
a
demo,
we
usually
have
time,
but
it's
always
better.
If
you
it's
a
bit
of
a
heads
up
anyway,
so
we
can
make
sure
we
build
super
space
and
we
put
you
in
the
agenda.
B
B
It's
kind
of
working
but
I
think
it
needs
a
little
bit
more
polishing
before
showing
it
to
you,
because
I
think
it
could
be
improved
before
doing
edema,
so
I
think
maybe
in
August
I
believe
at
least
it
will
be
done.
So
it
will
work
even
better
than
now.
C
Yet
honestly,
we
have
Integrations
with
console
is
still
and
another
variation
of
console,
which
is
mostly
in
progress.
This
moment.