►
Description
Kubernetes Storage Special-Interest-Group (SIG) Namespace Transfer Design Meeting - 27 July 2021
Meeting Notes/Agenda: -
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
B
All
right,
so
this
is
a
document
I
created
to
get
old
logo
first
attempted
the
second
concert
attempt
results,
who
did
not
attend
the
first
time.
First
attempt
it
was
created
by
john
griffis.
B
He
proposed
to
edit
the
pvc
specs
itself
and
to
make
like
two
entities
like
the
original
pvc
create
start
to
create
a
transfer
request,
and
this
one
will
you
add,
annotation
to
this
pvc
and
the
target
pvc
will
will
be
created
and
it
will
be
transferring,
and
once
this
is
done,
we
will
update
the
claim
ref
from
the
pvc
to
the
tv
itself,
and
there
were
there
was
a
poc
created
and
also
another
kept
for
changes
in
the
api.
B
He
proposed
to
have
a
resource,
called
storage
transfer,
request
and
another
resource
called
storage
transfer
approval,
and
that
when
the
con
will
be
controller
like
will
detect
this
two
resources
exist
and
there
will
be
open
certain
condition
matching.
Then
we
initiate
the
transfer
and
then
after
the
transfer
is
done,
the
source
pvc
will
be
deleted
and
the
target
ppc
will
be
created
and
will
be
updated
to
the
tv.
B
B
Also
followed
the
same
approach
as
mike
and
erickson,
but
also
in
the
cab.
There
was
a
comment
by
masaki.
He
actually
created
a
poc
which
will
edit
the
pvc
itself
the
entry
and
he
added
we
will
add
certain
field
to
the
spec
of
the
pvc
and
also
condition
types,
and
he
also
had
the
diagram
showing
how
this
interaction
will
happen.
B
We
discussed
this
is
the
first
session
and
they
were
follow-up
and
kept
a
meeting
bi-weekly
many
participants
added
comments.
We
agreed
that
we
will
follow
the
crd
approach.
B
Actually,
there
is
a
implementation
by
michael
herring,
herrickson
for
red
hat,
it's
not
for
bbc
or
specifically
it's
for
the
image
transfer
for
qgirth,
but
it's
similar
approach.
B
We
agreed
that
we
will
start
a
new
cap
gathering
the
whole
feedbacks
and
starting
building
on
this
implementation.
B
B
Also,
there
is
a
link
for
a
trans
implementation
for
the
pvc,
and
there
will
be
also
like
masaki
proposed
in
adding
the
editing
the
pvc
respects
that
we
will
have
certain
phases
and
open
in
each
phase.
There
will
be
a
certain
expectation
for
the
pvc
and
the
pv
itself.
C
C
B
B
Yeah
sure
so
I
just
wanted
to
finish
so
this
the
comments
is
in
the
dock
for
everyone,
this
added
by
michael,
and
he
is
here
today.
He
can
please
correct
me
if
I'm
wrong
so
again,
so
there
will
be
a
cluster
scope,
object,
transfer
and
this
will
be
the
source
of
the
how
we
initiate
the
transfer.
D
So
this
was
just
so
what
I've
done
so
far,
so
in
the
way
I've
implemented
it
now
is
with
this
cluster
scope
resource
with
the
idea
being
that
there
will
be
a
namespace
scope,
api
built
on
top.
That
will
do
the
matching
and
when
the
matching
happens,
it
will
kick
off
one
of
the
cluster
scopes
resources
to
do
the
actual
transfer.
So
this
is
also,
I
guess,
another
option
for
cluster
admins
to
more
easily
do
a
transfer.
E
F
B
Okay,
so
this
is
the
resource,
the
crd,
it's
a
first
scope
resource
and
there
is
implementation
here
for
qbert
and
again
so
we
have
phases
and
in
each
phase
we
have
a
specific
state
for
the
pvc
and
opens
this.
We
update
like
respects
in
the
pvcs
on
big
decisions
even
to
like
delete
the
source,
pvc
transfers,
the
pv
to
the
new
pvc
and
so
on.
B
There
is
various
conditions
because
we
have,
I
think,
cluster
scope,
a
resource
and
also
there
is
a
problem
that,
if
yeah,
even
so,
we
can
wait
for
for
all
the
consuming
parts
that
they
are
terminated
before
we
do.
The
transfer
a
pod
in
creation.
Time
could
not
be
aware
of
that
and
could
have
a
problem
that
it's
referring
a
pvc
which
will
be
deleted
or
when
it
is
deleted
yeah.
So
far,
these
are
the
notes
that
I
have
gathered
and
I'm
opening
this
for
discussion
for
everyone.
D
Yes,
so
just
to
reiterate
this,
this
api
we're
using
it
in
keyboard
internally,
but
for
like
a
more
user-focused
thing,
we
are
going
to
be
planning
to
build
a
namespace
scoped
api
on
top
of
this.
So
I
don't
know
if
that's
an
approach
community
would
be
interested
in
as
well,
including
in
the
new
cap.
D
So
yeah,
that's
just
one
thing
and
you
know.
A
D
Yeah,
the
one
that
I've
implemented
yeah,
the
one
that
I've
implemented
is
cluster
scoped.
Okay,
the
the
cap
is
for
name
space
scoped
and
as
kind
of
an
implementation
detail,
I
was
thinking
the
name.
Space
scoped
would
be
implemented
by
having
a
controller
that
simply
does
the
matching
and
then
once
the
matching
is
done
for
request
and
approval
creates
internally
an
object
transfer
that
does
the
actual
transfer.
A
Right,
but
we
don't
need
two
right:
we
only
need
one.
Otherwise,
it's
going
to
be
confusing.
If
you,
how
both
are
you,
are
you
planning
to
have
both
yeah?
I
think.
D
So
again,
we're
using
this
object
transfer
directly
internally.
I
think
we
yeah
planning
to
have
both
but
yeah.
I
can
understand
the
community
may
think
that's
confusing.
D
Yeah,
I
mean
it
well
to
me
it
yeah.
This
is
the
name
space
scope.
Api
would
be
more
of
a
user
generated
api.
You
know,
and
this
could
be
more
of
the
admin
api
but
yeah.
I
could
understand
where.
D
A
So
what
about
the
the
one
proposed
in
christian's
cup?
Is
that
the
namespace?
I
thought
yes,
yes,
right.
D
A
D
So
I
guess
we
could
talk
more
about
just
the
implementation
steps
here,
if
that,
if
that
may
be
more
relevant
than
the
api,
or
we
can
talk
about
the
comments
that
have
come
up
on
the
kept
that
exists
and
whatever
people
want
to
do.
A
Yeah,
can
we
can
we
agree
on
this
apis?
I
mean
the
one
proposed
in
the
in
in
the
cab,
the
the
one
that
christian
has.
D
Yeah
I
like
I
like
the
one
yeah
I
like
the
one
I
mean
I
personally
like
the
one
in
the
cap
for
namespace.
I
also
like
that
it
has
that
that's
the
secret
kind
of
to
make
it
easy
like
more
secure.
I
think
that
was
a
good
addition,
but
yeah.
I
I
like
this
api
here.
A
A
B
B
F
It
could
use
the
same
model
it
at
this
very
similar,
but
if
it's
not
it
could
it
could
adjust
to
use
the
same
model
as
a
a
csr
being
signed
by
the
certificate
manager.
You
had
to
send
an
approval
for
a
request
to
to
to
have
it
signed.
Does
that
make
sense?
F
C
I
thought
that
was
the
principle
behind,
like
all
you
have
are
two
names
based
objects,
and
then
you
know
like
alice
and
bob
want
to
trade.
A
volume
so
alice
creates
a
cr.
Bob
creates
a
cr
and
it
moves
from
alice's
namespace
to
bob's
namespace,
and
they
don't
need
any
administrator
to
get
involved.
As
long
as
the
two
of
them
agree.
F
F
So
if
you
and
I
work
for
two
like
different
companies-
and
we-
you
gave
me
some
money
and
then
I
give
you
the
volume-
and
you
know
something
like
that.
C
C
Anything
the
idea
is
the
guy
who
currently
has
access
to.
It
has
to
agree
to
give
it
to
someone
else
and
the
the
main
reason
that
we
want
the
recipient
to
also
create
something
is
to
prevent
giving
of
unwanted
volumes
right.
If
I
spam
you
with
100
volumes
that
you
don't
want,
you
don't
want
to
have
to
deal
with
that
so
requiring
both
the
current
owner
and
the
new
owner
to
participate,
addresses
that
problem.
F
As
long
as
the
target
name,
space
owner
or
or
there's
a
cr
in
the
name
space
where
the
target
is
going
to
go,
whoever
created
that
doesn't
have
to
be
an
admin
right.
It
can
be
right,
yeah,
yeah.
I
think
that
works
yeah.
C
C
F
C
A
C
F
C
So
it
seems
like
you
want
to
do
something
that
involves
either
creating
new
secrets
or
copying
secrets
or
moving
the
secrets
or
or
something
to
the
destination
name
space
or
or
you
require
that
that's
arranged
out
of
band
right.
You
could
just
explicitly
say:
look
if
you
don't.
If
you
have
secrets-
and
you
don't
do
something
it,
this
will
break,
and
so
you
have
to
do
something
like
that
might
not
be
friendly,
but
it
will
at
least
be
correct.
H
H
C
H
H
A
D
It's
also
would,
I
think,
certain
admins
would
not
not
like
the
idea
of
a
controller
that
can
read
all
secrets
from
all
names.
C
Yeah
yeah,
I
mean
there's
a
security
threat
that
needs
to
be
analyzed
under
underneath
all
of
this,
but
just
from
a
basic
correctness,
point
of
view,
we
have
to
have
a
stance
on
like.
Are
we
copying
secrets?
Are
we
moving
secrets?
Are
we
leaving
this
as
an
exercise
for
the
admin?
Are
we
leaving
this
as
an
exercise
for
the
users
like
who's,
whose
job
is
it
to
get
the
secrets
to
the
other
side?.
H
C
I
think
that
the
the
user
creates
them
in
the
current
model.
Like
the
in
your
storage
class,
you
can
specify
a
name
or
a
name
pattern
in
the
storage
class
and
that
will
get
stamped
on
the
pvs,
but
then
kubernetes
only
ever
reads
the
secrets
that
already
exist,
and
I,
if
I'm
not
mistaken,
I
think
portworx
is
the
heaviest
user
of
this
feature
right.
G
This
is
masaki.
Thank
you
very
much
for
your
explanation.
Then,
of
course,
the
problem.
I
sent
a
message
on
the
chat
window.
Could
you
open
the
url.
G
I
don't
think
this
solves
all
the
mentioned
there.
How
could
you
make
a
little
bit
more.
G
Yeah
I've
implemented
a
prototype
of
the
secret
hand
ring
based
on
my
poc
implementation.
The
idea
is
to
modify
your
pv
based
on
its
storage
class
template
before
it
is
bound
to
the
destination
pv.
G
So
if
the
secret
is
referencing
to
the
same
names
namespace
of
the
source
speed
pvc,
it
can
be
modified
to
a
reference
to
the
destination
namespace
based
on
the
storage
class
template.
A
Are
you
copying
the
content
of
the
secret
to
the
destination,
or
are
you
still
referring
to
the
same
secret
or
the
different
secret
after
this
transfer.
C
So
I
I
like
the
idea
of
it
of
the
pvc
ending
up
so
that
it
still
is
correct
based
on
like
how
it
would
have
looked
if
it
had
been
created
in
the
other
name
space.
As
far
as
secrets
are
concerned,
I
do
worry
a
little
bit
about,
depending
on
the
storage
class,
because
the
storage
class
can
change
or
get
deleted
after
the
volume
is
created.
C
C
To
believe
that
the
definition
of
the
secrets
in
the
storage
class
now
is
still
accurate,
yeah
and
you
have
you
have
to
go
based
on
what
the
storage,
what
storage
class
looked
like
at
the
time
that
the
volume
was
created,
because
that's
how
the
secrets
were
stamped
on
that
particular
volume,
but
you
could
still
figure
that
out.
I
think
I
hope
yeah,
because.
C
That
through,
but
but
it
raises
a
few
technical
issues,
one
is,
I
believe,
that
the
secrets
portion
of
the
pv
object
are
immutable,
and
so
how
do
you
propose
to.
G
Changing
it
more
better
way
like
adding
a
status
only
at
all.
I
C
C
Okay,
well
that
that's
worth
thinking
through,
but
yeah
yeah.
So
so,
if
the
presumptions
going
to
mutate
the
pv,
so
it
points
to
secrets
that
look
like
as
if
the
pv
was
created
in
the
new
namespace,
where
it
now
lives,
then
yeah.
You
know
any
sort
of
templatized
secrets
that
point
back
to
the
original
namespace
have
to
be
updated,
and
then
it's
just
a
question
of
who
copies
them
or
who
moves
them
to
the
new
name.
Space.
F
G
F
So
I
don't
know
if
we
talk,
we
need
to
really
go
after
copying
secrets
just
point
to
the
one
on
that
namespace,
that's
new,
because
it
could
be
my
secret
that
I
want
to
look
into.
C
Right,
but
if
you
have
like
alice,
who
has
a
volume
that
she
wants
to
give
to
bob
and
the
volume
is
encrypted
with
alice's
key,
which
is
in
a
secret
in
alice's
namespace
and
now
she's
handing
the
volume
to
bob
like
either.
You
have
to
re-encrypt
the
whole
volume
with
bob's
key,
which
is
something
that
this
controller
can't
do
or
alice
needs
to
give
a
copy
of
her
key
to
bob
so
that
he
can
read
the
volume.
C
C
C
D
F
That's
true
what
I'm
trying
to
say
is
that
this
is
kind
of
where
the
admin
needs
to
step
in,
because
the
storage
class
is
only
editable
about
the
admin.
So
if
the
storage
class
says
that
the
secret
for
this
pvc
is
in
the
namespace
of
the
pvc
right,
then
there
needs
to
be
some
coordination
if
the
the
secret
needs
to
be
moved
in
first,
so
I
think
that's
an
out-of-band.
I
think
that's
outside
the
scope
of
this
part.
As
I'm
trying
to
say.
F
Yes,
I
I
don't
disagree
with
that.
I'm
trying
to
say
that
I
feel
it's
outside
the
scope.
I
think
there's
a
new.
What
we're
trying
to
say
is
that
there's
a
new
requirement
that
this
will
require
for
secrets
to
also
be
transferred
to
a
new
namespace,
and
I
just
think
that,
outside
the
scope
of
this
pvc
thing
because
pvc,
it's
like
it,
doesn't
really
care
if
the
secrets
there
or
not,
it's
just
pointing
right,
it's
a
reference,
but
I
don't
think
it
should
be
this
group's
resolution.
B
I
actually
agree
to
this
as
well.
I
think,
if
we
have
a
storage
secret,
we
can
just
reject
transfer
and
we
can
title
this
in
a
different
ship
and
then
we
it
can
be
like
added
in
beta,
for
example,
but
for
alpha.
I
think
we
can
focus
on
bbc
and
volume
snapshot.
G
I
think
pv
secret
can
be
cloned
in
just
a
command
line
in
some
cases.
So,
even
if
we
don't
have
a
generic
mechanism
to
transfer
the
secret
allowing
a
secret
to
point
to
another,
namespace
is
useful
for
users.
I
C
You
don't
always
want
to
move
it.
Sometimes
you
want
to
copy
it
like,
like
pvcs,
you
don't
want
to
copy,
because
that's
going
to
cause
problems
most
likely
secrets,
you
may
want
to
leave
the
old
one
behind
and
make
a
new
one.
That's
a
copy
in
the
new
name
space.
If,
if
the
users
agree
to
share
the
secret.
I
F
Is
where
I
think
the
admin
needs
to
like
step
in
right,
but
I
just
don't
I'm
trying
to
reduce
the
scope
of
the
other
project,
so
we
don't
keep
going
yeah.
I.
C
F
D
F
F
It
could
be,
you
know,
as
long
as
we
have
state
in
the
status
of
the
changing
we
could
just
like,
we
have
pods
that
you
submit
and
the
plot
status
could
say
unable
to
pull
image.
You
know
you
could
just
say
things
like
that.
You
know
the.
F
C
F
Correct
it'll
definitely
show
up
in
the
pvc
status,
so
that's
already
answered.
I
think.
B
B
Okay,
so
so
like
just
to
make
sure
that
I
understand
correctly,
so
we
will
not
tackle
the
storage
secrets
in
this
right.
C
Well,
we
still
have
to
decide
what
we,
what
exactly
we
do
to
the
pv
or
we.
We
can
say
that
you
know
you
got
to
get
the
secrets
over
there,
but
we're
going
to
point
the
new,
the
newly
rebound
pv
at
a
secret
in
the
new
namespace,
which
may
or
may
not
be
there
or
we
can
say
we're
not
going
to
do
anything
and
it's
going
to
continue
to
point
at
the
old
namespaces
secret,
which
will
cause
a
different
problem.
Oh.
F
F
F
D
C
Object
doesn't
have
a
namespace,
it's
not
namespace,
so
it
needs
to
explicitly
point
to
namespace
secrets
in
order
to
function
correctly.
F
C
I
C
I
I
How
do
you
detect
if
that
secret
was
templated?
To
begin
with,
I.
F
C
F
So
I
think,
in
conclusion,
we're
saying
we're
punting
on
copying
the
secret
and
we're
saying
when
how
do
we
manage
the
secret
transfer
is
that
we
may
need
to
enhance
the
pv
csi
object
so
that
the
controller
will
have
more
information
to
do
the
transfer
correctly?
Is
that
correct
all
right.
C
F
This
is
a
not
a
out-of-band
feature.
This
is
part
of
kubernetes,
or
is
this
a
sidecar.
D
Like
similar
to
the
external
snapshot
controller,
I
was
thinking
the
rds
and
the
controller
okay.
C
D
C
D
C
But
we
always
get
in
trouble
anytime.
We
try
to
look
at
the
storage
class
for
existing
volumes
because
it
always
leads
to
corner
cases.
We
had
this
problem
with
resize,
where
we
had
some
pointer
to
like
allow
volume,
resizing
the
storage
class
and
and
then
when
the
resize
controller
was
asking.
If
it
was
okay
to
resize
the
volume,
it
would
go,
look
up
the
storage
class
at
that
time
and
most
of
the
time
it
worked,
but
sometimes
it
didn't
work,
and
so
we
decided
to
copy
that
field
into
the
pv.
I
I
think
yeah
I
mean
I
think
that
sounds
reasonable
to
start
with.
We
can,
you
know,
see
from
there
if
there
is
ways
our
ways
we
can
like
backfill
objects,
but
I
think
it's
reasonable
to
start
with
this
super.
E
I
had
a
different
question
when
we
last
talked
about.
We
also
talked
about
like
I
think
what
about
pvs
that
have
certain
operation
and
progress
on
them
like?
Maybe
they
are
being
resized?
Maybe
they
are
being
snapshotted?
E
E
Snapshotted
yeah
there's
actually
there's
no
coordination
there
right
now.
H
A
D
In
the
controller
that
I
wrote,
there's
a
kind
of,
if
you
look
at
the
kind
of
phases
that
I
wrote
in
the
pending
phase,
you're
kind
of
waiting
for
a
bunch
of
things,
you're
waiting
for
you-
know
no
pods
using
the
pvc
and
as
well
as
waiting
for.
I
think
there
are
a
couple
annotations
that
we
wait,
that
aren't
that
don't
exist
in
the
pvc
they're
like
the
cloning
protection
and
pvc
is
source
protection.
So
we
just
wait
for
them
not
to
exist,
of
course,
their
timing
conditions,
but.
C
But
with
regard
to
the
snapshotting,
I
think,
if,
if
the
snapshot
object
is
created
and
if
the
snapshot
controller
gets
through
the
process
of
creating
a
volume,
snapshot,
content
object
that
points
to
the
pv.
At
that
point,
it
no
longer
matters
if
the
pvc
exists,
because
the
snapshotter
has
all
the
information
it
needs
to
finish,
creating
that
snapshot
in
the
original
namespace,
and
so
as
long
as
it
gets
to
that
point
before
the
transfer
completes,
then
the
snapshot
can
run
in
parallel
with
the
transfer
and
nothing
bad
will
happen.
E
C
Well,
yeah
yeah,
I
mean
if,
if,
if
you
create
the
volume
snapshot
object
and
before
the
snapshot,
controller
can
can
take
a
look
at
it
and
create
a
volume
snapshot
content
the
transfer
successfully
executes,
then
you'll
just
get
an
error
from
the
volume
snapshot
controller.
Saying
like
what
pvc
are
you
talking
about.
You
know
it's
not
here
it's
gone
and
and
that's
fine
right
as
you
just
lost
the
race.
H
F
Yeah,
if
I,
if
I
was
going
to
do
that,
then
I
would
really
time
it
to
make
sure
that
my
the
processes
were
done
from
a
color
point
of
view.
C
G
One
question:
if
we
transfer
a
volume
while
it
is
resizing,
doesn't
it
make
data
corruption.
C
C
G
I
I
mean
if
the
source
pbc
specifies
the
size
of
a
and
the
transfer
name,
namespace
copy
the
size
as
a,
but
while
it
is
changing
the
source
size
to
b.
But
if
that
transfer
transfer
happens
at
the
same
time,
then
it
might
happen
that
the
mismatch
of
the
volume
size.
F
Yeah,
most
storage
systems,
can
they
the
source
of
truth
or
the
size
of
the
volume,
is
on
their
metadata,
not
on
kubernetes.
C
I
From
the
from
the
transfer
perspective
like
if
a
resize
was
in
progress,
then
what
I
would
expect
to
happen
is
the
resize
would
continue
after
the
transfer
is
done,
because
the
pvc
size
and
the
pv
size
might
be
out
of
date
or
might
be
different.
C
C
C
C
F
E
C
E
C
You
have
to
have
to
have
some
per
pvc
lock
that
that
you
would
end
up
holding
either
by
like
setting
the
phase
to
something
different
and
then
other
controllers
refusing
to
interact
with
it
when
it
was
in
that
phase
or
something
like
that.
H
C
Copying
yeah
transferring
snapshots
is
a
heck
of
a
lot
safer
but
you're
going
to
get
complaints
from
people
who
have
drivers
that
don't
support
snapshots
and
they
just
want
to
transfer
the
pcs
directly
right.
That's
because
if
everyone
supported
snapshots
across
the
board,
then
yeah
you
could
say,
look
we
only
support
transferring
snapshots
and
just
clone
the
snapshot
when
it
gets
to
the
other
side.
F
F
C
F
One,
what
I'm
trying
to
say
is
that
when
we
hear
that
use
case,
then
we'll
start
that
enhancement.
I
I
keep
trying
to
reduce
the
scope
of
this
project.
Yeah
yeah
yeah,
so
I'm
trying
to
say
look
guys,
forget
secrets,
forget,
keep
it
simple
snap.
The
volume
create
a
volume,
carry
clone
in
the
other
side
and
call
it
a
day
right.
H
C
F
C
C
C
C
C
H
The
data
that
you're,
let's
say
transferring
is
in
a
stable
and
consistent
state,
whereas
you
know
like,
I
think
what
christian
said
like
he
currently
requires.
You
know:
paul's
using
the
pvcs
in
the
source
name,
space
to
get
tear
down
so
nobody's
using
those
paws,
and
then
the
transfer
happens.
So
there's
some
element
of
coordination
here
in
between
source
and
destination
name
spaces,
whereas
with
snapshots
you
don't
even
have
that
you
don't
even
require
that
coordination.
A
D
Yeah,
so
I
I
always
thought
that
snapshots
were
a
good
good
use
case
so
totally,
but
I'm
just
wondering
if
we
can,
even
in
transferring
pvcs
use
them
internally.
So
we
would
snapshot
the
pvc
in
the
source
and
then
delete
it
and
then
transfer
and
create
like
we.
I
think
we
could
do
a
lot
of
the
orchestration.
Maybe
in
the
controller,
that's
true
of
the
transfer.
D
I
D
F
But
I
mean,
I
think,
what
we're
trying
to
say
is
that
if
the
infrastructure
supports
this,
then
what
the
user
is
really
trying
to
do
is
not
to
transfer
a
volume.
What
the
user
is
really
trying
to
do
is
to
transmit
an
app
right,
so
we
just
can
make
that
happen
easily
through
some
cr.
Just
like
we're
doing
here,
we
take
care
of
that
process.
I'm
trying
to
say.
A
D
I
know
I
I
am
pro
automating
things
for
the
user
and
just
because
it
can
be
done
out
of
fandom.
You
know,
you
know
why
not
make
it
easier.
F
C
I
mean
today,
if
you
have
admin
privileges,
you
can
manually
move
a
snapshot
across
namespaces
by
mucking
with
the
retention
policy.
Deleting
the
volume
snapshot
object,
creating
a
new
volume
snapshot,
object,
rebinding
it
and
all
that,
and
then
now
you
have
a
volume
snapshot
in
the
new
namespace
that
you
can
go
ahead
and
clone
like
that's
possible
to
do
manually
today.
F
A
A
Made
some
changes
that
every
time
you
create
a
new
volume,
snapchat
yeah,
you
have
to
create
a
like
a
new
one
in
snapchat
content.
So
we
actually
don't
really
allow
the
transfer
to
happen
easily
yeah.
So
that's
that's
not,
but
but.
A
A
Correct
yeah,
that
is,
that
is
possible,
so
I
think
we
are
really
out
of
time.
Yeah.
A
Yeah
we
need
to.
We
need
to
have
a
follow-up,
I
think
so.
Okay,
so
it
looks
like
now.
We
are
okay.
So
now
we
are,
we
are
looking
at
whether
to
just
to
allow
transfer
volume
snapshot.
So
maybe
we
just
we
need
to
have
a
follow-up
meeting
to
continue
that
discussion
and
mustafa.
Are
you?
Are
you,
okay
with
that?
Maybe
just
yeah.
F
B
Yeah,
I
actually,
since
the
beginning,
I
thought
this
is
what
would
be
the
way
to
go?
Okay,.