►
From YouTube: Kubernetes SIG CLI 20230208
Description
Kubernetes SIG CLI bi-weekly meeting on February 8, 2023.
Agenda and Notes: https://docs.google.com/document/d/1r0YElcXt6G5mOWxwZiXgGu_X6he3F--wKwg-9UBc29I/edit#bookmark=kix.8hz19v29qctm
A
I'm
clicking
record
welcome
to
the
February
8th
edition
of
the
Sig
CLI
bi-weekly
meeting
I'm
Sean
Sullivan
I'm
your
host
we'll
get
directly
into
our
announcements.
We
have
the
enhancements
freeze
tomorrow
and
there's
at
least
one
of
our
caps
is
I,
think
in
pretty
good
shape
and
I'll
I'll
leave
that
up
to
to
Justin
or
to
Katrina
to
discuss
that
when
we
get
to
sub-project
and
kept
updates,
but
I
hope
you've
been
working
hard
on
your
enhancements.
A
If,
since
the
freeze
is
tomorrow
and
then
about
four
weeks
later,
maybe
a
little
bit
more
than
that
is
when
we
have
our
code
freeze
for
the
127
release
and
we're
scheduled
for
a
release
on
April
11th
for
127..
A
Okay,
so
there's
a
part
of
our
meeting
we'd
like
to
introduce
newer
members,
those
that
haven't
been
here
in
a
very
long
time
or
those
who
are
brand
new.
This
is
an
opportunity
for
the
Sig
to
to
meet
you
and
you
to
meet
the
Sig.
So
if
there's
anybody
who'd
like
to
take
this
opportunity,
please
go
ahead.
A
A
So
would
anyone
like
to
I'm
gonna
I'll
bring
up
the
the
the
prune
apply
set
cap?
Is
that
visible
now.
A
Okay,
great,
would
anyone
like
to
discuss
the
status
of
that.
C
Sure,
just
like
it
looks
like
it's
going
to
be
good
to
go
for
tomorrow,
so
we're
super
excited
to
start
actually
working
on
it.
We
kind
of
paired
on
it
a
little
bit
last
week,
but
we're
gonna
be
writing
the
feature
in
Earnest,
because
it
looks
like
it's
gonna
go
in.
A
C
C
C
We
tried
to
do
very
extensive
and
detailed
release
notes
to
help
folks
out
this
time.
So,
if
you're
interested
in
customized,
please
have
a
look
at
this
release,
give
it
a
try.
We
were
really
proud
of
all
the
work
that
went
into
this,
both
from
the
core
team
and
all
of
our
contributors.
Wow.
C
Yeah
we
have
some
really
great
stuff
in
there.
There's
performance
improvements,
there's
a
major
new
localized
feature.
Thank
you
to
Anna
for
all
of
her
hard
work
on
that
over
the
past
months.
C
There's
new
home
fields
that
we
added
by
popular
support
and
then
tons
of
bug
fixes
for
various
areas
of
customized,
so
yeah,
and
we
are
intending
to
propose
this
for
cube
cuddle
in
before
code
freeze
as
well
as
usual.
We
bump
it
and
keep
cuddle
after
a
period
and
for
this
one
we're
going
to
wait
a
few
weeks
before
we
propose
that
bump
to
see.
C
If
there's
more
bug,
reports
that
come
in
because
if
there
are
then
we
would,
you
know
we
would
probably
do
5.0.1
release
with
any
fixes
before
actually
pushing
it
up
to
to
keep
Kettle
before
the
fridge.
So
we're
waiting
a
little
bit
to
do
that,
but
we
do
intend
to
get
version
5
into
Cube
cuddle,
127.
A
And
so
is
it
okay
if
I
move
on
to
kui?
Yes,
thanks
Nick,
would
you
like
to
talk
about
kui,
13.1.
D
Sure
and
the
release
notes:
you
can
see
shots
some
bug
fixes.
We
had
some
reports
of
not
displaying
well
on
phones.
Those
are
fixed,
some
more
load
time
improvements,
I
think
we're
down
to
about
500
milliseconds
for
a
little
time,
pretty
happy
with
that
and
then
in
terms
of
features.
D
Finally,
Helm
status
and
there's
a
container
tab
for
pods.
So
that's
about
it.
A
E
E
Mention
that
I'm
getting
started
working
on
this,
so
if
people
have
opinions,
let
me
know
there
is
a
PR
open
updating
the
cap
itself,
but
probably
don't
look
at
it.
Yet
wait
till
Katrina
does
and.
A
C
Thanks
Caitlin,
that's
a
super
exciting
feature
for
customize,
so
I'm
really
really
happy
to
see
it
moving
forward.
A
Okay,
so
the
it
doesn't
look
like
we
hit.
We,
it
looks
like
we
have
about
three
items
here.
The
first
item
is
one
I
put
on
there's
a
recently
Resurrected
issue.
That's
been
around
for
a
long
time
and
is
is
starting
to
get
more
attraction,
which
is
websocket
support
for
Coupe,
cuddle,
exec
and
attach,
and
also
port
forward.
A
A
So
there's
a
couple
Coupe
control
commands
that
would
significantly
benefit
from
Full
duplex
communication
over
a
single
TCP
socket
and
those
are
the
three
Coupe
cuddle
commands
that
I
just
described,
and
so
initially
the
way
that
they
were
this
protocol
was
implemented
for
these
commands
was
was
speedy
and
Speedy
was
a
Google
proprietary
protocol
that
eventually
became
HTTP
2.0
and
there's
some
slight
differences
between
those
two,
but
because
of
that,
Speedy
has
been
deprecated.
A
It's
been
deprecated
for
probably
eight
years
when
HTTP
2.0
was
was
ratified
by
the
ietf
in
back
I,
think
in
2015,
and
so
we
there
there's
been
many
different
complaints
about
exec,
not
working
in
certain
situations
or
not
just
exec,
but
these
these
three
Coupe
control
commands
because
of
Speedy
and
because
of
the
deprecation
and
because
this
particular
protocol
has
been
deprecated
for
so
long.
So
the
API
server
already
supports
websockets,
and
this
is
another
protocol
which
implements
this
full
duplex
communication
over
a
single
socket.
A
And
so
there
is
an
effort
to
get
these
commands
to
understand
or
to
speak.
This
websockets
I
think
eventually
we
want
to
get
to
http
2.0,
but
I
I.
To
be
honest,
I,
don't
think
that
that's
supported
in
the
API
server,
but
we
do
know
that
the
API
server
supports
websockets.
Now,
although
Daniel
Smith
was
saying
that
you
know
there
may
be
some
bugs,
it's
and
we'd
probably
want
to
test
that
out
in
order
to
get
a
quick
win.
A
I'm,
pretty
sure
that
we're
going
to
be
implementing
websockets
in
these
commands
and
the
way
that
this
works
is
you
send
an
HTTP
request,
and
one
of
the
headers
is
an
upgrade
saying:
I
want
to
upgrade
to
websockets,
so
so
I
just
wanted
to
raise
that.
A
Raise
that
visibility
to
everybody
that
anybody
I
think
actually
a
couple
of
us
myself
included,
might
already
have
been
given.
A
There
may
be
some
consensus
that
some
of
my
time
could
be
worked
on
this,
and
so
I
might,
and
there
may
be
others
as
well,
but
whoever
would
like
to
to
be
involved
in
this,
please.
Let
me
know.
A
Right
so
if
you
look
at
this
issue,
it
started
about
three
years
ago,
dim
started
it
and
it's
actually
quite
involved,
and
so
it
goes
back
and
forth
with
a
bunch
of
people,
and
there
was
actually
one
person,
Mark
Borstein,
who
I
think
got
most
of
the
way
there
and
it
it
kind
of
just
fell
apart.
It
looks
like
and
it
started
the
the
issue
itself
started,
becoming
stale
and
rotten,
it's
been
frozen
by
by
Daniel
Smith
just
this
last
week.
A
A
B
Like
I
said,
I
I
found
the
pr
that
I
have
in
my
notes,
which
was
trying
to
touch
the
exact
and
touch.
F
A
Yeah
I
know
and
I
also
heard
that
Chao
had
started
working
on
this,
but
I
think
that
also
fell
by
the
wayside.
A
So
I'm
gonna
I'm
gonna,
try
to
get
this
pushed
over
the
finish
line
and
was
hoping
to
to
bring
this
to
your
guys
attention
and
to
benefit
from
because
I
I
think
that
there's
been
dozens
of
people
who
have
been
involved
in
this
and
I'd
like
to
kind
of
Corral
it
and
get
it
over
the
finish
line.
C
On
that
PR
says,
there's
a
like
at
the
very
end
right
before
it
closes
there's.
It
says
it
is
clear
that
this
change
will
require
cap
to
move
forward.
Is
that
still
the
thinking.
A
That
that'll
be
part
of
what
I'm
gonna
dig
into,
but
I'll
report
back
back
to
the
Sig
on
where
we
are
on
that
so
yeah.
If
that's
the
case,
then
it
won't
get
into
128.
G
That's
it
were
there
any
powers.
D
A
That
was
yeah
that
was
Borstein,
who
mentioned
that
and
that
that
actually
did
sound
like
the
correct
path.
Again
yeah
you,
you
disagree,
I,
gorillas,
it's
archives;
okay,
so
that
might
have
been
a
while
ago,
yeah.
G
A
Okay,
I'll
put
that
as
a
note,
yeah
I
think
that
there's
just
it's
a
sprawling
it.
If
you
start
digging
into
these
issues,
you'll
end
up
with
you
know,
100
tabs
in
your
browser,
so
so
I
think
a
big
part
of
the
effort
is
going
to
be
just
to
kind
of
Corral.
It
all
organize
it
all
and
see
what
what
gaps
need
to
be
filled
in
order
to
get
it
across
the
finish
line.
B
B
Are
on
the
same
topic
from
my
notes,
it's
also
linked
in
the
original
PR
yeah.
There
has
been
multiple
or
just
let.
H
B
Supportive
of
the
of
the
episode
of
the
approach
in
general
trying
to
push
this
forward.
A
Okay,
so
let
me
share
this
particular
tab.
Ardo.
Would
you
like
to
speak
about
improvements
around
Coupe
control,
delete
minus
minus
all
right.
F
F
This
I
think
we
can
add
some
kind
of
validation
or
even
block
deleting
cluster-wide
resources
if
the
namespace
is
explicitly
set
and
that's
why
I
wanted
to
bring
that
topic
and
because
of
bad
foods,
compatible
issues.
I,
don't
know,
I,
wonder
your
opinions
about
it.
C
B
Yeah
I'm
just
trying
to
find
the
original
discussion
that
Eddie
kicked
off
some
time
ago.
Okay,
I
have
the
link,
so
Eddie
had
an
entire
conversation
about
the
topic.
B
There
has
been
multiple
argument
in
both
directions.
B
B
Most
likely
Cube
cuddle
will
not
be
changed
due
to
backwards
credibility,
but
that's
where
we
came
up
with
the
cube
RC
such
that
users
are
able
to
change
the
defaults
for
a
certain
flag
and
another
one
was
the
introduction
of
the
interactive
mode
or
delete
not
sure
if
the
interaction
was
ever
implemented
in
delete,
but
the
interactive
option
in
combination
with
QRC,
where
you
would
set
explicitly
the
default
to
always
be
on
in
case
for
some
users,
this
could
give
you
that
kind
of
guarantees,
but
in
general,.
F
B
Yes,
and
no,
because
you
can
always
articles
the
biggest
issue,
is
the
pattern
of
all
if
he,
if
the
author
would
not
pass
with
that
at
all,
the
original
issue
would
not
happen
in
the
first
place.
B
In
parallel
to
that,
you
can
always
pass
a
mix
of
cluster
and
namespace
scope,
resources,
in
which
case
you
do
expect
that
it
will
work
just
fine
and
figure
out
what
you
care
about
and
correctly
identify
the
cluster's
code
and
the
namespace
scope
and
apply
the
provided
namespace
to
the
ones
that
you
have
and
unfortunately,
by
the
fact
that
the
lead
is
one
of
the
commands
that
has
been
out
there,
the
longest,
the
the
backwards
compatibility
and
the
potential
Fallout
of
changing
the
defaults
is
bigger
than
and
the
cost,
especially
if
we
look
through
over
the
past.
B
A
little
bit
over
but
I
would
say
five
six
years.
I
would
say
we
had
like
four
or
five
issues.
Eddie
Eddie
addressed
an
issue
a
while
back.
That's
what
trigger
taste,
email
threat.
I
was
trying
to
approach
a
similar
problem
even
earlier.
I
think
it's.
It's
also
mentioned
in
that
email,
but
they're
just
jumping
into
something
similar
and
for
now
we're
pointing
people
to
the
coupon
C
effort
that
should
allow
to
prevent
them
from
similar
cases
and
other
than
that.
B
There
are
options
how
you
can
prevent
from
those
kind
of
situations
on
the
question
level.
F
Okay
thanks,
probably
the
most
thing
for
me
is
I
thought
you
can
only
pass
PV
or
PVC,
but
if
it
accepts
multiple
resources,
one
time
yeah
it.
A
F
A
So
a
couple
quick
questions
should
we
should
we
say
triage
accepted
on
this
issue?
A
B
Either
the
one
from
Eddie
I
think
he
has
a
couple
of
issues:
1056
he's
pointing
out
to
1056.,
so
maybe
just
not
sure
what
happened
with
the
1056.
Let
me
open
it
up
that
got
closed.
B
Yeah,
because
it
has
a
with
the
entire
explanation,
so
I
would
just
link
Eddie's
comment
sometime
56.,
specifically,
this
comments.
H
B
Good
question
that
was
probably
a
good
question,
but
I'm
guessing
you
already
know
the
answer
that
we
can't
change
it
at
this
point
in
time.
B
B
F
Thank
you
I
understand
to
use
the
point
of
view
if
you
create
a
temporary
namespace,
and
do
you
just
want
to
delete
all
of
it
all
of
the
resource
in
it,
you
can
use
dash
dash
all
but
yeah
I
understand
the
problem
here.
Thank
you,
foreign.
B
Obliged
if
Antoine
is
on
the
line,
I'll
probably
pass
it
on
over
to
him
because
he
authored
the
cap
I
stumble
upon
it.
Literally
yesterday
or
the
day
before
yesterday,
yesterday's
and
I'm
open.
There
will
be
a
discussion
about
the
topic
a
little
bit
later
today
during
the
prr
review.
Jean
had
some
concerns
about
changing
the
default
and
we
need
to
figure
out
how
to
approach
the
topic.
I
I
Oh,
it's
been
delayed
a
long
time
already.
So
if
we
can
move
with
that,
I'd
be
happy.
B
I'm,
pretty
sure
that,
whatever
the
outcome
of
today's
this
discussion
will
be,
we
can
actually
within
127
start
adding
some
warnings
around
the
user
usage
of
the
of
those
flags
to
prepare
the
users
that
in
the
next
version,
we
will
be
doing
whatever
change.
We
will
decide
to
do
having
that
extra
time
will
be
definitely
beneficial
for
for
the
users.
B
B
Can
you
quickly
describe
the
idea
behind
the
cap
so
that
everyone
in
your
room
are
on
the
same
page.
I
Okay,
so
the
idea
we
had
with
this
cap
specifically
was:
we
had
many
discussions,
so
I
can't
even
remember
what
I
proposed
in
the
camp,
but
I
think
we
wanted
to
switch.
The
default
of
server
side
apply
to
being
Auto
and
auto
being
a
new
flag,
the
flag
meant,
if
you
have
some
resources,
your
clients
are
applied
in
the
past,
who
are
going
to
continue
client-side
applying
these
resources,
but
new
resources
are
going
to
be
solo
set
applied
and
the
resources
are
going
to
continue
being
server-side
applied.
I
One
time
one
we
can
have
today
is
that
if
you
have
some
resources
that
are
the
inside
applied
and
some
that
are
so
also
reply,
it's
pretty
hard
to.
You
have
to
only
apply
the
the
one
you
want
with
the
right
flag
and
then
another
set
with
a
different
flag
which
can
be
confusing
and
we've
seen.
People
go
back
and
forth
between
client-side
and
server
side
by
accident,
because
they
don't
specify
the
right
value
and
we
are
doing
our
best
to
get
a
good
migration
from
1pdlr.
I
But
it's
not
completely
perfect,
so
we'd
like
to
avoid
people
going
from
client-side
to
server
side
to
client-side
constantly
by
accident,
so
Auto
detecting
was
an
idea
to
help
people
to
prevent
people
from
doing
the
wrong
thing.
I
We
could
continue
to
plan
cytoplay
them
or
we
could
show
us
how
to
play
them,
which
would
go
toward
the
goal
of
like
having
our
knees
or
outside
of
play
eventually,
but
that's
going
to
break
a
lot
of
what
what
most
small
people
I
think,
mostly
because
of
conflicts
and
I,
don't
think
it
was.
The
ICD
systems
are
necessarily
ready
for
conflicts.
I
It
would
basically
it
would
migrate
people
to
server-side
reply,
but
most
people
would
not
realize
I
would
say
the
vast
majority
of
people
would
not
realize
so
that
would
allow
us
to
migrate
people
to
Southern
server
play
without
them
noticing,
which
is
good.
The
problem
is,
we
lose
a
lot
of
the
value
of
conflicts
and
it
sounds
hard
to
switch
back
the
value
of
false
conflicts.
Later
so,
we
quite
don't
know
what
to
do.
C
B
Objections
about
The
Silence,
which
was
the
one
that
I
first
voiced
in
the
cap
where,
because
you
rely
on
the
fact
that,
if
something
exists
then
you
use
server-side,
you
use
client-side
and
it
has
an
annotation.
You
use
client
side.
If
it's
something
new
and
doesn't
exist
in
the
cluster,
then
you
switch
automatically
to
server
side.
B
That's
something
that
I
would
like
to
understand
other
than
that
I
I,
think
that
is
reasonable
and,
although
maybe
I
would
put
some
some
kind
of
information
that,
oh
yes,
we
actually
picked
the
server
side
just
so
that
you
are
aware
that
this
is
what
you
should
be
doing
in
case.
You
figure
out
that
you
you
do
want
to.
I
How
how
do
you
feel
about
cicd
system
that
are
going
to
break
if
we
sort
of
start
to
play
some
resources
by
some
price.
B
I
You
are
you
saying:
if
we
had
several
set
of
play,
equals
true,
meaning
we
have
no
mixed
mixed
objects.
You'd
be
fine
with
that,
because
that's
still
going
to
break
systems,
but
the
system
is
easy
to
fix.
You
just
add
dash
dash
server
side,
your
portfolks,
if
it's
a
system,
it's
very
easy
to
update
I,
think
it's
it's
going
to
break.
E
I
C
I
am
I,
don't
have
a
an
opinion
about
how
common
it
is.
I
have
no
idea
to
be
honest,
but
I
I
guess
I
want
to
dig
into
like
why
that's
bad,
like
apply
does
actually
is
on
a
per
object
basis,
so
I
get.
It
can
be
confusing
if
the
default
like,
if
auto
mode,
does
client-side
on
one
hand
and
then
server
side
with
Force
conflicts
disabled
on
the
other,
then
you're
gonna
get
very
different
behaviors
there,
because
client
side
behaves
as
though
it
forces
conflicts.
C
C
What
would
the
risks
to
the
end
users
be?
If
that's,
what
auto
mode
meant.
I
C
I
I
guess
that's
what
it
comes
down
to
I'm,
more
thinking
from
a
behavioral
perspective
like
if
I'm
an
end
user.
What
do
I
expect
and
how
do
I
get
consistent,
Behavior
here,
like
the
the
consistent
flow
Behavior
like
because,
if
I'm
thinking
about
like
the
average
user,
they
have
no
idea
what
server
side,
client
side
means
right
and
to
them
like
the
meaningful
difference
is:
is
that
difference
in
Conflict
handling,
so
the
transparent
upgrade
path
that
comes
to
Optimum
to
forced
conflict?
Server-Side
apply?
C
So
that's
that's
sort
of
my
train
of
thought
like
that.
That's
what
we
could
do
automatically
so
auto
mode
could
potentially
do
that
which
yes,
you're
right
in
in
practice,
means
toggling
a
flag
value
based
on
another
flag
value
which,
maybe
is,
is
not
ideal.
Arguably
that
already
happens
because
Force
conflicts
behaviorally.
You
know
like
what?
What
does
that
sound
like
to
the
user
for
server
side
apply?
It's
it's
defaulted
on
right
or
sorry,
defaulted
off.
C
The
polarity
confuses
me
when
I'm
talking
about
this
I've
default
it
off,
whereas
a
force
client-side
apply
behaviorally,
it's
defaulted
on.
Yes,.
I
Yes,
I
think
for
people
who
have
no
idea
what's
going
on
you're
right,
the
the
default
is
actually
not
the
same,
but
as
soon
as
you've
started
using
the
server
side
of
like
like
flag.
Sorry,
then
it's
very
weird.
C
I
C
I'm
saying
like
if
the
auto
mode
is
sort
of
behaving
like
the
client
side
mode
of
that
server-side
flag,
then
it's
actually
not
any
weirder
than
what
we're
already
doing.
I
If
we
accept
that
yeah
I
can
see
that
I
don't
know
if
it's
going
to
solve
the
plan,
though
I
would,
in
six
months
eight
months
a
year
from
now
will
be
like.
How
do
we
get
from
Auto
to
something
else
and
we'll
have
the
same
discussion
again
and
that's
gonna.
Make
me
sad,
yeah.
C
I
think
Otto's
just
one
facet
of
the
plan
that
other
conversation
we're
having
about
like
what
is
the
actual
transition
of
these
flags
is,
is
important
to
have,
and
we
don't
have
like
a
solid
plan
for
what
that
can
look
like
and
be
non-destructive,
but
Ottawa
would
be
like
I
a
tool
to
help
people
actually
do
this
and
and
not
be
disrupted
in
the
process.
What.
I
If
we
actually
gave
people
eight
months
and
be
disruptive,
what
if
we
told
them
we
instead
of
wanting
somewhere
for
eight
months
and
in
eight
months
we
flip
the
solo
side,
driver
and
people
will
get
conflicts,
they'll
be
material.
If
they
have
tools,
they
can
upgrade
it
in
the
eight
months.
If
they
haven't,
they
can
update
it
since
Sunday,
it's
not
like
the
migration
is
actually
expensive.
Right
by
then
we
might
have
the
QRC
file.
C
I
I
think
the
the
QRC
is
not
as
helpful
because
like
from
a
safety
angle,
what
matters
is
what
we're
talking
about
in
auto
mode
that,
like
a
given
object,
gets
a
consistent
strategy.
So
you
don't
flip
back
and
forth,
and
QRC
is
a
user
preference.
So
it's
a
per
individual
per
actor
preference,
which
is
probably
not
the
level
you
want
it
on,
but
yeah
I
mean
we
do.
We
do
have
to
do
a
lot
of
warning.
C
The
timeline
is
super
long
because
we're
talking
about
GA
Flags
so
like
what
is
that,
like
a
year
and
a
half
or
something
I'm,
just
trying
to
think
of
like
we
want
to
give?
If
we're
going
to
tell
users
that
they
have
to
do
something,
we
want
to
give
them
the
tools
to
be
able
to
do
it
as
safely
and
disruption
free
as
possible.
I
So
yeah
we
basically
what
you're
saying
is
we
have
you
all
know
how
to
make
sure
the
migration
is
working
perfectly,
but
all
they
have
to
do
is
just
switch
the
flag
if
well,
if
they
want
to
keep
the
old
way
right.
Oh
they,
oh
they
integrate
whatever
they
have
to
integrate
the
server
side
thing.
I
C
G
G
C
I
It
is
the
warning:
I
I
agree
with
you.
They're
gonna
miss
it
100,
but
then
what
the
problem
is,
what
do
they
have
to
do
when
they
realize
they
messed
it
up?
If
it's
like?
Oh
you
have
to
rewrite
all
your
controllers
and
it's
going
to
take
months.
Then
that's
definitely
the
problematic.
If
it's
like.
Oh
you
have
to
change
this
one
script
to
change
this
one
flag.
C
I
guess
the
there's
also
a
question
of
like
what
is
level
of
confidence
and
say
we
flip
from
clients
of
our
default
to
server
side
by
default
with
conflicts
enabled
you
could
say
like
okay,
on
the
one
hand,
maybe
the
only
thing
they
need
to
do
is
add.
Force
conflicts
equals
true.
If
they
had
a
problem
with
this,
they
didn't
notice
the
app
Auto
upgraded
and
they
had
the
errors
yeah
yeah
they
had
that
flight.
But
how
confident
are
we
in
just
that
transition
itself?
C
Like
you
said
we
fixed
a
bug
in
it
last
release,
it's
not
perfect.
Do
we
do
we
actually
like
the
secondary
questions?
Do
we
actually
need
something
like
auto
mode,
because
that
provides
sort
of
an
extra
safety
layer
for
people
who
are
doing
this
transition
because
it
makes
them
never
actually
transition
any
single
object
from
one
to
the
other.
I
J
I
C
Migration,
how
much
are
we
going
to
expect
our
users
to
trust
the
migration
like
if
we're?
If
we're
not
confident
in
saying
this
is
perfect,
it
doesn't
go
wrong.
Then
Autumn,
something
like
auto
mode,
sounds
like
super
useful
to
the
end
user,
because
then
we
don't
actually
Force
anybody
down
that
path.
Even
when
we
flip
the
default.
I
The
people
are
going
to
have
some
client-side
applied
object.
If
we
flip
the
switch
to
the
solar
side,
then
we're
gonna
have
to
migrate.
Everyone's
objects,
all
the
objects
right
at
the
time.
They
do
results
there
to
play
the
first
time
so
when
they
update,
so
we
need
to
make
sure
we
don't
mess
up
the
config
at
that
time.
I
guess
that's
the
uploading
Katrina.
I
J
Well,
I,
like
the
idea
of
switching
server
side
apply
on
in
the
near
term,
but
having
forced
conflicts
Beyond
in
the
auto
mode
she's
talking
about,
but
then
in
the
future
like
we're
warning
everyone
we're
going
to
turn
Force
conflicts
off
eventually,
so
we
have
all
that
time.
A
year
to
transition,
people
onto
server
side
apply
and
then
at
the
end
of
it
we
can
just
as
easy
as
turning
Force
conflicts
off.
B
So
maybe
we
could
literally
use
127.
to
start
putting
the
warning
already
that
oh
you're,
using
server
side
you're
using
apply.
We
are
going
to
change
it.
You
should
already
start
explicitly
setting
the
flag
to
true
or
false
such
that
users
will
be
prepared
to
use
one
or
the
other
before
we
even
start
making
the
switch
in
the
next
release
and
I'm
positive
that
there
will
be
a
multitude
of
users
who
will
not
pick
one
or
the
other
and
we'll
go
with
the
migration.
I
I
We
could
first
do
Auto
apply.
The
existing
resources
continue
to
create
with
client
side,
have
a
warning
to
say
we
stopped
server
side
of
playing
your
resources
soon
then
start
doing
that
with
the
first
conflict,
maybe
in
the
order
mode
and
then
stop
doing
false
conflict,
one
at
one
point
or
another,
and
then
someone
sort
of
like
everything.
How
does
that
sound?
I
Trying
to
ease
the
transition
I
feel
like
we're,
cutting
the
that's,
maybe
a
French
saying
I,
don't
know
how
appropriate
it
is,
but
I
feel
like
it's
going
to
be
a
lot
of
pain
points
every
every
four
months.
People
are
gonna,
have
a
little
bit
of
pain
as
opposed
to
having
a
lot
of
pain
at
one
point,
but
then
forget
about
it.
B
I
What
do
we
say?
I
switched
the
cap
to
I,
keep
the
auto
mode.
We
keep
it
the
way
it
is
for
existing
resources,
as
in
currently
client-side
applied.
Resources
are
continuing
to
be
clear
inside
so
outside
of
play.
The
resources
continue
to
be
suicide.
New
resources
are
client
side
in
the
first
place,
maybe
with
the
warning.
B
I'm
I'm
so
for
I'm,
still
leaning
towards
that
I
I
might
be
wrong,
but
I'm
still
leaning
towards
the
approach
where,
if
you're,
processing
entire
directory
and
nothing
was
touched
on,
the
directory
before
was
apply.
I.
G
B
That
has
been
already
applied
and
it's
already
been
applied
for
the
clients
that
apply
where
you
would
end
in
a
weird
mistake
or
half
of
it.
Server-Side
applied
and
half
of
the
clients
that
apply.
That's,
probably
something
that
I
would
prefer
to
avoid.
I
Okay,
so
when
you're
saying
directory,
can
we
say
it's
the
set
of
resources
being
applied,
and
so
basically,
if,
if
any
of
the
resources
in
the
set
that
you're
applying
has
ever
been
client-side
applied,
then
new
resources,
our
client-side
applied?
Yes,
what
if
you
have
a
mix.
C
Dig
into
that
like
why?
Why
are
why
are
we
afraid
of
that
situation
like
it?
The
applies
that
is
kind
of
arbitrary.
In
most
cases,
unless
you
have
pruning
enable
you
can
apply
random
sets
and
and
have
like
the
cube
control
generally
speaking,
doesn't
have,
and
the
cluster
certainly
has
no
concept
of
sets
across
these
objects,
so
why?
Why
do
we
actually
care
about
creating
that
scenario.
B
I'm
being
paranoid
as
usual,
I
didn't
have
any
strong
arguments
and
I
can
easily
be
persuaded
otherwise
I'm
just
trying
to
come
up
with
the
worst
possible
scenarios.
That
could
happen
with
that
there.
If,
if
you
put
399,
can
tell
me
that
I'm
wrong
and
I'm
making
this
up
I'm
I'll
be
fine
with
the
I.
C
C
If,
if
we
don't
make
the
right
plan
here,
we're
going
to
cause
a
lot
of
confusion
like
we
need
to
be
clear
on,
what's
actually
dangerous
to
the
users
and
what
we
need
them
to
pay
attention
to,
because
they
have
limited
attention
for
to
give
us
and
like,
for
example,
if
we
can
make
them
not
care
about
the
client-side,
server-side
distinction
and
only
care
about
like
what
to
them
is
the
feature
in
this
migration,
so
that
they're
not
like
what
even
client-side
server
side.
What
like.
C
I
A
And
it-
and
it
seems
like
one
of
the
biggest
problems-
is
going
to
be
okay,
we
moved
somebody
to
server
side
and
they
may
or
may
not
need
forced
conflicts
right,
so
that's
gonna
so
like
it
could
be
that
this
is
completely.
You
know
the
one
case
where
people
are
going
to
trip
up
you
know
for
sure,
is
we
moved
them
to
server
side
and
oh
no?
A
Now
they
have
conflicts
over
some
of
the
fields
and
something
just
started
failing,
which
sounds
like
the
cicd
case,
especially
if
we
focus
in
on
that
case
that
very
very
common
pain
case
that
might
help
us
move
forward.
What
do
you
think?
What
does
everybody
think.
C
Yeah
I
I
think
the
the
force
con
Concepts
that
can't
force
conflicts
issue
is
kind
of
the
the
Crux
of
the
problem.
I
agree
like
because
of
the
CI
CD
just
disruption
like
tons
of
people
use
this
in
in
that
context,
and
we're
always
telling
people
to
also
so
we
don't
want
to
make
their
lives
hard
when
they
do
what
we
tell
them
to,
and
one
idea
that
I
had
around
this
is
that,
like
that,
forced
conflicts
flag?
C
If,
if
we're,
if
we're
hesitant
to
do
a
migration
where
we
just
turn
on
server-side,
apply
with
conflicts
forced
by
default,
because
we
didn't
want
them
to
miss
out
on
that
functionality,
then
maybe
that's
where
we
should
force
the
user's
attention
is
in
making
that
choice
like
make
that
flag
required
or
some
equivalent
flag
required
so
that
they
have
to
say
no
I
actually
didn't
want
conflict
detection.
Thank
you
very
much
like
because
that's
that's
a
meaningful
choice
of
them.
C
Do
I
want
conflicts
enabled
or
not,
and
if
I'm
in
a
CI
CD
system,
maybe
I
I,
don't
want
to
detect
conflicts
if
I'm
outside
it
I.
Do
they
don't
really
care?
If
the
operation
happens,
oversider
client
side,
but
they
do
care
about
that
distinction
and
we
want
them
to
care
about
it.
So
maybe
that's
what
we
look
at.
C
B
I
would
I
would
try.
I
would
use
127
to
figure
out
the
details
and
write
it
down
if
something
pops
up.
We
will
have
enough
time
to
address
the
issues
accordingly
and
put
warnings
already
in
127
in
the
code
in
place,
maybe
ideally
put
out
a
blog
post,
explaining
and
and
preparing
users
for
the
for
the
switch
and
their
warning
could
actually
point
to
that
blog
post
already
and
then
I,
don't
know
something
like
that
and
then
actually
start
with
the
changes
in
128.
C
B
C
One:
okay,
one
one
one
suggestion,
maybe
that
we
could
get
something
into
127.,
this
auto
value
for
the
flag.
Maybe
we're
like
pretty
close
to
thinking
that
we
have
some
idea
of
what
that
should
look
like
that
could
be
hidden
behind
an
alpha
flag.
We
could
have
like
yeah.
If,
if
you
have
some
Alpha
flag,
enabled
that's
our
common
pattern
right,
then
there's
an
auto
value
for
that
flag
and
people
could
actually
try
it
and
then,
if,
during
this,
like
bigger
process,
discussion
we're
like.
C
C
I
can
do
the
blog
post
thing
as
well
like
much
I
was
saying
if
we
have
that
as
an
anchor,
it
can
be
like
we're
trying
to
figure
out
how
this
works.
We
made
this
auto
mode
thing
put
this
flag
on.
Try
it
out,
tell
us
that
why
it's
terrible
idea
and
here's
our
big
plan,
please
comment
on
our
camp.
It's
like
kind
of
an
anchor.
I
Yeah
to
have
solo
set
a
play
enabled
in
the
first
place
like
if
people
are
crying
Alpha
things
they've
probably
already
tried
to
also
to
play.
I
would
hope.
We
don't
know
if
I'll
show.
I
Yeah
we
can
try
it's
it's
starting
for
you
to
experiment
with
that.
C
A
So
to
the
notes,
I've
added
a
little
bit
more
context
for
those
who
are
deep
in
the
Weeds
on
this
Daniel
Smith
has
a
Blog
on
the
kubernetes
kubernetes
blog
post
about
why
server,
side's,
important
and
and
as
more
context,
just
so
everybody
knows,
we've,
the
kubernetes
community
has
put
a
significant
amount
of
investment
into
server-side
apply
and
until
we
actually
make
it
default,
it's
you
know
we're
not
going
to
realize
that
investment.
A
A
Foreign
okay
looks
like
we've:
we've
filled
up
our
entire
hour,
I
didn't
think
we
were
going
to
at
the
beginning,
but
we
we
have.
Is
there
anybody
else
before
we
stop
recording
before
we
log
off?
Is
there
anything
else
that
anybody
would
like
to
address
in
in
one
minute.