►
From YouTube: Kubernetes SIG Storage Meeting 2022-04-07
Description
Kubernetes Storage Special-Interest-Group (SIG) Meeting - 7 April 2022
Meeting Notes/Agenda: https://docs.google.com/document/d/1-8KEG8AjAgKznS9NFm3qWqkGyCHmvU6HVl0sk5hwoAE/edit#heading=h.1x6n8uz3g204
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
Moderator: Saad Ali (Google)
A
Okay,
today
is
april
7
2022.
This
is
the
meeting
of
the
kubernetes
storage
special
interest
group.
As
a
reminder,
this
meeting
is
public
recorded
and
posted
on
youtube,
so
the
agenda
here
is
linked
in
the
meeting,
invite
feel
free
to
add
to
it
as
we
go
on
the
agenda
today,
we're
going
to
go
over
the
124
planning
items
to
note
where
we
are
in
the
124
planning
cycle.
The
code
freeze
has
already
happened.
A
That
happened
on
the
30th
of
may
about
a
week
or
so
ago,
and
the
upcoming
deadlines
are
really
around
kind
of
stabilizing
and
finishing
up.
The
post
code
code
freeze
work
specifically
the
next
deadline.
Well,
I
was
supposed
to
be
cutting
an
rc
release,
but
that's
been
delayed
until
monday,
the
11th,
so
that's
coming
up
soon,
then
test
freeze
is
actually
passed
us
now.
It
was
yesterday
and
then
docs
must
be
completed
and
reviewed
by
the
12th
feature.
A
And
if
you
are
have
a
124
feature
that
you're
doing
a
blog
post
for
please
take
a
look
at
the
spreadsheet,
make
sure
make
sure
your
blog
post
is
tracked
here
and
and
then
the
folks
who
are
helping
with
the
blog
post
will
be
able
to
reach
out
to
you
and
make
sure
that
all
the
requirements
are
completed
on
time.
For
that,
so
that's
pretty
much
it
for
the
timeline.
A
We're
gonna
go
ahead
and
switch
over
to
the
planning
spreadsheet
and
get
get
an
update
on
where
the
different
features
stand.
A
Okay,
so
first
we
have
csi
online
offline
resizing
volume.
Expansion
is
a
month
on
the
line.
I
didn't
see
him
earlier
or
does
anyone
else
have
an
status
update
for
this
item?.
B
A
Cool,
thank
you
shank
and
then
next
item
we
have
is
recovering
from
resize
failures.
B
This
one
we
decided
not
to
much
more
forward
because
I
think,
there's
more
work
so
staying
off.
Obviously,.
A
Sounds
good
and
then
we
have
actually
I'm
gonna
go
ahead
and
mark
the
first
one
as
completed.
A
A
Okay,
we'll
skip
over
that.
One
next
item
is
determine
mount
points
without
relying
on
proc
mount
anyone
able
to
give
an
update
on
this
manu
yawn.
C
Yeah,
we
missed
the
deadline,
so
they
will
be
part
of
125.
got
it.
A
All
right
next
item
is
storage
capacity
tracking
for
pod
scheduling.
A
C
Yeah
there
is
a
draft
of
the
blog,
so
is
today
sorry
say
that
again
there
is
a
draft
of
a
block
article.
A
And
all
the
code
is
complete,
including
the
test
prs,
I'm
not
sure
about
the
tests.
B
So
I
think
they're
still
out
of
tree
external
provisioner,
there's
still
some
work
to
do
on
there
and
also
patrick,
is
going
to
submit
pr
to
use
the
updated
csi
stack,
1.6
and
the
one
that
you
just
cut
said.
A
So
we'll
keep
that
as
started,
and
hopefully
you
can
wrap
that
up
soon.
Next
is
csi
ephemeral
volumes
existing
api.
This
is
being
delayed
to
125,
so
we'll
just
copy
that
over
next
is
the
volume
group
api
updated
kept
to
address
comments.
Any
new
updates
here.
B
A
And
then
we're
gonna
next
item
is
csi
out
of
tree
move,
iscsi
driver
fit
and
finish.
I
don't
know
if
we
have
an
update
from
humble
on
this
one.
A
And
then,
similarly,
we
have
the
samba
sifs
csi
driver
last
status
here
cloud
build
issues
partially
fixed.
Anyone
have
an
update
on
that.
A
We'll
go
ahead
and
mark
that
as
no
update
for
now.
Next
is
pvc
volume
snapshot,
namespace
transfer
masaki
any
updates
on
this
yeah.
E
A
A
Okay,
let
me
go
ahead
and
move
to
the
next
item,
which
is
csi
volume,
health,
additional
metrics
and
or
events
last
status
was
pr,
is
merged,
but
reverted
submitted
again
and
review
in
progress.
Were
these
able
to
make
it.
B
Right,
I
pin
the
nick
still
wait
while
waiting
for
him
to
respond.
F
Yeah,
the
code
is
done,
the
tests
are
done,
the
docs
are
done
thanks
to
other
people
who
helped
with
this.
So
it's
it's
officially
beta.
The
remaining
item
is
the
blog.
So
are
you
sure
about
that
deadline?
Because
it's
earlier
than
I
thought
for
the
blog.
F
All
right,
okay!
Well,
that
means
I
have
to
hurry
up
and
write
the
new
blog
because
because
I'm
going
to
be
on
vacation
next
week,
so
I
got
to
get
it
out
this
week.
I
guess
but
yeah.
That's
that's
the
last
remaining
item
for
the
move
to
beta.
A
Cool,
oh
that's,
pretty
exciting.
Thanks
been
for
work
on
this
next
up
is
object,
storage,
api,
cozy.
B
B
Yeah,
so
I
think
fan
has
organized
a
few
meetings
to
discuss
the
design.
So
it's
ongoing
design
is
ongoing.
A
Sounds
good
and
then
next
item
is
runtime
assisted
mounting.
G
Yeah,
this
is
in
progress
continuing
to
make
updates
to
the
cap.
A
And
I
imagine
we're
gonna
move
this
to
125.
G
So
I
think
mauricio
mentioned
that
there
might
be
an
issue
with
the
like
resources
to
complete
some
of
this
work
for
this
quarter.
So
it
may
have
to
move
to
125.
A
Okay:
next
item
is
node
expansion
secret.
Anyone
have
an
update
on
this.
B
Right
so
we
actually
request
the
exception,
but
the
release
team
rejected
that
they
think
it's
a
high
risk
yeah
when
we
applied
for
it.
We
have
not
got
api
review
yet
we
finally
got
an
api
review
actually
got
a
approval
from
clayton
on
monday,
so
it's
studio
late.
We
asked
again
after
the
approval.
B
They
still
do
not
want
to
allow
it
because
they
say
there
are
still
some
blocking
issues
in
1924
that
blocking
release
so
they're
afraid
of
adding
anything
that
could
introduce
some
regression.
B
B
A
D
A
Are
complete?
Next,
we
have
csi
core
migrate,
csi
migration,
core
bugs
and
issues
any
issues
or
any
updates
here.
A
Looks
like
there
were
some
bug
fixes.
Did
they
end
up
getting
merged.
A
So
it
looks
like
not
on
by
default,
deprecate
vsphere
67u3
pr
submitted
any
new
updates.
There.
B
So
that
pr
got
merged
yeah,
so
that's
that's
it
so
we're
still
discussing
when
we
should
remove
the
support
for
six
seven.
That's
pending.
H
B
A
B
Yeah
that
wise,
that
one
is
complete,
the
code
and
dog
are
all
complete.
B
So
that
one
did
not
make
it
so
homo
submitted
pr,
but
the
p
ani
provided
menu
tests.
So
we
need
the
e3
tests
that
are
also
running
the
entry
modeling
tests.
So
he
is
going
to
work
on
that
for
1.25.
A
And
then
this
ffs
is
it
the
same
story?
I.
A
Next
up
is
port
works.
Anyone
for
portworx
have
an
update.
B
So
yeah,
so
this
one
seems
to
there
are
some
miscommunications,
the
the
author
tira.
She
didn't
submit
a
pr
to
turn
on
the
feature
gate
to
beta.
Somehow
she
missed
that,
so
she
was
submitting
some
tests,
but
I
think
you
know
the
the
other
feature
gate
is
still
alpha
is
not
beta.
A
Okay,
next
is
always
honor
reclaim
policy.
C
We
missed
the
test
deadline.
There
are,
there
were
some
issues
with
the
implementation,
so
we
decided
to
revert
the
feature
gate
back
to
alpha
and
the
br
has
been
just
merged,
so
it's
alpha
and
we
will
try
again
next
time.
A
Pr
in
progress
was
the
last
status
update
here.
Did
this
get
merged.
B
Yeah
it's
well.
There
are
multiple
pr's
you're
ongoing,
so
there
are
some
work
on
going
on
external
snap
charter
and
also
external
provision.
So
we
are
still
moving
forward,
but
still
in
progress.
B
And
there's
a
dog
pr,
that's
been
reviewed
block
is
pending,
there's
a
placeholder
for
that.
A
Thank
you.
Shane
next
up
is
secret
protection.
A
A
Last
status
update
was
pr
and
review
placeholder
blogged
out
any
new
updates.
There.
B
Yeah
so
codepr
is
merged.
B
A
All
right,
no
update
likely
moved
to.
A
So,
okay,
so
yeah
again
reminder
the
feature.
Blog
deadline
is
coming
up
april,
12th,
which
is
pretty
soon
so,
if
you're
working
on
a
blog,
please
get
that
done
as
soon
as
you
can.
H
Yeah,
hello,
hello,
hello,
yeah,
so
I
already
got
reviews
for
both
these
I'm
just
here
to
hassle
people
a
little
bit
more.
These
are
related
to
menus.
Mount
point
check
pr
in
the
sense
that
the
motivation
is
the
same.
We
want
to
speed
up
mounting
and
unmounting
for
efs,
because
we
have
a
customer,
that's
complaining
about
it,
but
I
also
have
numbers
somewhere
in
the
pr
to
demonstrate
that
this
actually
helps
so
for
this
one.
H
H
And
that's
been
fine,
except
there
is
this
part
of
the
code
that
is
using
that
device
multiple
check
to
decide
whether
mount
operations
can
run
in
parallel
or
not,
because
if
you
imagine
like
evs,
you
can
only
mount
the
device
once
somewhere
right.
So
it
makes
sense
not
to
paralyze
that,
but
for
efs
it
doesn't
make
sense.
You
should
be
able
to
mount
it
in
parallel.
H
H
A
Yeah
cool,
thank
you
matt
for
surfacing
that
and
helping
improve
the
the
code
here
and
folks
on
the
call.
Please
help
review
matt
if
you
don't
get
traction,
feel
free
to
ping
us
on
slack
or
come
back
to
this
meeting
and
poke
folks
again.
A
Any
discussion
on
this
pr
from
anyone
on
the
call.
H
H
G
Okay,
I
was
just
curious
if
all
of
them
benefit
or
if,
if
it's,
if
it's
somewhere
related
to
just
something
that
does
not
do
staging
I'll
I'll,
probably
take
a
look
at
the
pr
yeah.
H
It's
I
I
think
it's
only
if
it
doesn't
support
staging
like
I
might
be
thinking
too
low
level,
but
it's
like
just
if
the
csi
driver
does
not
want
staging.
Then
we
want
to
pretend
it
doesn't
or
you
want
to
treat
it
as
it
doesn't
have
a
mount
device
call,
which
I
think
is
how
it
should
be.
But
yeah
yeah
I'll,
take
a
look
and
then
I'll
answer
for
sure
I'll.
A
H
This
one
is
more
obviously
related
to
manuscript,
because
this
is
trying
to
speed
up
the
mount
point
check
by
reducing
it
to
one
syscall,
because
we're
seeing
that
when
you
have
a
lot
of
amounts,
meaning
thousands
of
amounts
and
you're
creating
and
deleting
a
lot
of
pods
at
once
then
getting
a
consistent
read
of
the
amount
table,
even
if
you
retry
10
times
in
a
row,
is
actually
fairly
unlikely,
and
I
have
numbers
for
that
somewhere
at
the
bottom
of
that
pier,
where,
if
I
try
to
unmount
100
pods
each
with
100
volumes
each
at
roughly
the
same
time,
I
hit
the
consistent
read
error
like
a
thousand
times
and
in
terms
of
how
that
affects
performance.
H
H
H
Is
that
we're,
assuming
is
on
linux,
which
is
very
safe
to
assume,
I
think,
will
return
the
string
not
mounted
if
something
is
not
mounted
meaning
like
it
does
it
already
does
a
mount
check
for
you
when
you
call
it
on
the
target,
so
we
don't,
we
don't
really
have
to
be
doing
the
check
first
and
then
calling
on
mount
and
then
doing
the
check
right
after
again,
which
is
what
we're
doing
right
now
in
practice.
H
So
that's
what
it's
doing.
It's
basically
checking
for
the
string
not
mounted,
and
I
had
to
rework
the
pr
so
originally
it
was
like
relying
on
a
flag
to,
but
then
I
found
like
the
flag
didn't
behave
like
how
I
wanted.
So
this
is
much
simpler.
It's
just
saying
check
the
string.
H
H
It
takes
it
from
on
average
minutes
to
amount
volumes
to
seconds
like
three
seconds.
My
testing
is
not
super
rigorous,
but
it's
very
easy
to
reproduce
the
results.
F
H
I
know
I
know
so
I
I
I
anticipate
that
so
I'm
gonna
I
have
a
little
script
prepared,
so
we're
I
think,
based
on
reading
the
code
for
it,
which
is
in
c,
and
I
don't
know
how
to
read
c.
I
don't
know
how
to
write
c
but
like
the
not
mounted
thing
has
been
in
it
since,
like
1993.
If
the
copyright
is
right,
so
it's
like
it
is
more
of
a
stretch
of
an
assumption
than
like,
assuming
that
on
the
host,
there's
gonna
be
slash.
F
F
H
I
don't
know
I
was
also
I
was
thinking
we
could
check
for
that,
also
because
cuba
already
when
it
starts
up
it.
As
far
as
I
think
I
know
it
does,
has
some
checks
for
like
host
properties.
If
you
do
get
volume
host
and
you
can
get
stuff
like
that,
then
we
can
call
it
on
some
nonsense.
This
is
a
very
you
know.
This
is
a
very
crazy
idea,
but,
like
you
can
call
it
on
some
nonsense
path
and
check.
Does
it
say
not
mounted?
F
H
That's
the
manu
syscall
pr,
but
that
relies
on
a
new
kernel
and.
H
I
think,
like
just
in
principle,
if
you
mount
like,
even
if
you
mount,
we
can't
assume
that
it's
outputting
the
same
thing
and
must
be
checking
them
out
table
for
us.
So
I'm
thinking.
F
F
H
Just
do
what
does
like
yeah,
I
can't.
H
B
H
F
Is
this
related
to
the
other
issue,
the
long-standing
one
we
have,
which
is
issues
assuming
that
that
amount
points
are
or
I
forget
what
the
name
of
the
work
item
is
sod.
You
might
remember
it,
but
but
we
have
long-standing
problems
with
our
heuristic,
that
that
tries
to
figure
out.
If
something
is
a
mountain
point
or
not,
and
we
have
known
performance
issues
with
the
way
that
it
reads
the
the
proc
mount
info
file
and
the
solution
was
found.
I
thought
we
were
going
to
use
is.
I
If
I
could
just
add
a
point,
so
I
mean
going
to
your
point
been
that
we
could
start
doing
what
umount
does,
I'm
not
sure
that's
the
right
direction
to
go,
and
it's
like,
if
we're
concerned,
about
systems
that
might
have
a
different
u-mount
implementation,
then
like
us,
trying
to
make
a
u-mount
that
reliably
works
across
the
apparent
variety
of
systems.
Like
also.
F
I
Yeah
so
like
I'm,
I'm
actually
thinking
that
I
mean,
especially
if
I
understand
the
context
maps
and
like
this
is
on
eks,
where
presumably
you
have
more
control
over
the
node
than
like
a
a
general
kubernetes
thing.
I
I'm
wondering
if
we
want
to
go
more
like
in
the
direction
of
the
deprecated
experimental
mounter
path
and
give
the
cloud
provider
a
way
to
hook
and
just
do
the
right
thing.
I
Right,
which
is
often
like
because
I
mean,
like
you,
know,
thinking
of
gke
right,
we
run
everything
on
cause
which
has
its
own.
You
know,
which,
which
is
a
specific
distro
that
we
have
can
can
control
over.
I
mean
I'll
admit
to
being
a
bit
biased,
because
we're
actually
discovering
a
problem
with
the
experimental
mounter
where
gk
customers
have
come
to
depend
on
the
fact
that
the
experiment,
the
containerized
mounter,
runs
in
a
context
that
has
cube
dns.
I
So
you
can
use
cube,
cube
dns
to
specify
a
nfs
server
which
does
not
work
in
general,
and
you
know
like
again.
This
is
a
situation
where,
like.
If
a
you
know,
this
is
kind
of
like
a
cloud
provider
specific
thing.
Well,
it
sounds
like
a
deployer
deployer-specific
thing.
F
I
Exactly
and,
and
so
like,
I'm
just
just
thinking
if
these,
if,
if
this
problem
of
needing
to
tweak
mount
to
do
the
right
thing
for
something
that
is
like
perhaps
specific
to
a
deployment,
is
best
solved
by
by
having
a
deployment
specific
hook
rather
than
you
know,
trying
to
come
up
with
a
general.
You
know
basically,
entry
solution.
F
It
doesn't
sound
like
a
terrible
idea,
it
sounds
safer
and-
and
there
is
going
to
be
a
general
solution
in
tree
for
kernels
that
are
new
enough
right.
It's
just
that
on
older
and
I
think
it's
really
old
kernels
only
you
have
to
fall
back
to
the
existing
slow
implementation.
F
I
F
I
don't
know
my
preference
is
to
fix
the
actual
performance
issue
which
it
sounds
like
we
kind
of
know
how
to
do
put
that
in
tree
and
then,
if
that's
still
not
good
enough
for
certain
deployers,
then
pursue
the
the
hacky
kind
of
you
know,
deploy
your
hook
to
do
something
special,
but
yeah
yeah.
The
concept
of
parsing,
the
output
of
a
umo
binary
in
kubernetes
core
seems.
I
H
Yeah,
no,
I
agree
it's
kind
of
nasty,
and
originally
I
was
thinking
that
we
could
rely
on
a
flag,
but
then
I
misunderstood
the
meaning
of
the
flag
in
any
way.
That
flag
also
does
not
exist.
In
all
implementations
of
view,
mount
so.
H
F
I
might
be
mistaking
this
particular
enhancement
with
this
some
different
bug
fix
related
to
performance.
I
didn't
think
it
was
that.
H
F
F
H
H
I
don't
want
to
invest
that
much
effort
into
that.
For,
for
what
seems
to
me,
like
you
know,
like
the
the
solution,
for
us
is
insight.
You
know
we
could
within
eks.
Obviously
I'm
not
I
shouldn't
you
know
say
we
want
to
do
this,
but
like
we
could
just
fork
it
and
say:
okay,
you
know
everyone's
on
amazon,
linux
2..
We
know
the
binary
we
control
the
configuration
I
really
want
to.
H
You
know
find
some
kind
of
middle
ground,
so
yeah
I'll
dig
into
how
so,
as
you
said,
ben
I
can
dig
into
how
the
util
linux
implementation
actually
does
amount
table
check.
Maybe
we
can
copy
that
and
I
do-
and
I
just
still
kind
of
do-
want
to
pursue
the
crazy
check
where
like
if
we
know
a
particular
binary
is
going
to
return,
not
mounted.
H
H
I
know
we're
very
hesitant
about
adding
flags
and
stuff,
but
like
the
difference,
is
like
minutes
right
for
for
unmounting
versus
seconds.
So
I
wonder
if
that
would
justify
yet
another
flag,
but
yeah
I
don't
know
this
is
a
good
discussion.
I
have
a
bunch
of
options,
but
just
frankly,
I'm
I'm
under
pressure
to
get
something
in,
and
I
don't
think
I'm
gonna
want
to
invest
in
the
sort
of
mount
hook
solution
which
requires
a
lot
of
engineering
work
that
I'm
not
probably
might
not
be
smart
enough
to
do.
Compared
to
this.
I
I
Having
the
the
mount
hook,
solution
is
also
basically
just
a
flag.
H
C
I
Csi
drivers,
because
you
can
do
whatever
you
want
for
amount
like
it's:
okay
to
parse
the
u-mount
output.
I
H
So
we
don't
really
care
too
much
if
it
touches
the
library,
that's
also
relied
on
by
csi,
because
from
our
perspective,
if
there's
100,
subpass
and
there's
only
one
efs
volume,
we're
more
concerned
about
optimizing
the
subpath
than
what
the
efs
volume
csi
driver
is
doing
and
yeah.
H
Okay,
I
don't
know,
let's
I
can
hold
the
pr
if
we're
super,
you
know
not
comfortable
with
the
not
mounted
approach
and
I'm
going
to
dig
into
the
mount
hook
and
I'm
going
to
dig
into
possibly
a
configuration
option.
Also,
I'm
also
going
to
dig
into
what
u-mount
is
doing.
That's
special.
I
don't
know
if
it's
holding
a
lock
or
whatever,
but
you
know
I'll
have
to
figure
that
out.
C
H
C
C
H
H
B
H
H
C
H
B
C
H
Okay,
I'm
gonna
quote
you
on
that.
I'm
gonna
give
that
to
my
manager.
There's
no
nice
solution.
So
don't
rush
me
yeah,
but
that's
the
truth.
A
All
right,
thank
you,
matt
for
bringing
this
up
and
the
the
discussion.
Any
anyone
else
have
a
comment
on
this
before
we
move
on
to
the
next
item.
A
I
assume
this
speed
up
mount
point
cleanup
when
there's
thousands
of
mount
points.
Is
this
related
or
unrelated
yeah.
D
B
Yeah,
so
cuban
eu
is
coming
up
next
month,
so
a
few
of
us
will
be
there
yeah
and
I
will
be
giving
an
update
on
six
storage.
B
So
I
think
last
time
at
the
kubecon
north
america
we
had
this
meet
and
greet
it's
part
of
the
contributor
summit.
B
Do
we
want
to
do
the
same
thing
yesterday
in
the
data
protection
group
there
were
a
few
people
asking
if
there
is
a
meet
up,
so
I
think
we
could
grab
a
table
there
at
the
contributor
summit
and
we
could
just
meet
so
it's
more
like
casual.
It's
not.
We
don't
have
a
formal
agenda
like
we
used
to
have
to
go
site.
I
think
this
time
we
still
we
don't
really
have
a
quorum.
B
So
I
think
there
are
probably
more
people
going
there
this
time
than
last
time,
but
still
a
lot
of
people
are
not
going
there.
So
so
think
that
maybe
we
could.
We
could
just
chat
there
at
that
contributor
summit
and
then
there's
also
this
meet
and
greet,
but
I
think
meet
and
greet
is
more
for
you
want
to
meet
some
new
people
who
are
interested
in
journey
or
sid
right.
B
So
if
there
are
other
people
who
who
are
already
part
of
the
sick
want
to
want
to
chat,
I
think
we
could
also
do
that
before
the
meet
and
greet.
A
Okay,
we'll
go
ahead
and
move
on
to
the
last
item,
then
ben
yeah.
So
many.
F
F
Is
there
any
effort
to
enhance
kubernetes
security
or
harden
it
in
accordance
with
the
executive
order
that
you
are
aware
of,
because
presumably
kubernetes
is
used
by
the
us
government
and
if,
if
it
doesn't
meet
the
requirements
laid
out,
there
probably
will
be
problems.
So
I
was
just
curious
what
if
anything,
was
being
done
or
if
there
were
activities
being
tracked.
B
So
I
know
that
in
the
last
cubecam
there
are
a
lot
of
talks
around
security,
so
I
think
it's
related
to
this
executive
order
and
also
kubernetes
release
team.
They
in
1.22
release.
They
also
added
this
a
bill
of
materials.
You
know
that
shows
the
source
code
binaries
and
published
images.
B
I
think
that
might
be
responding
to
you
know
two
responses.
I
do
not
remember
the
details.
I
I
remember
when
I
was
at
cubecon.
I
attended
some
sessions
and
they
were
talking
about
this
executive
order.
So
so
I
I'm
pretty
sure
in
kubernetes
there
are,
there
are
work
going
on.
Maybe
the
best
way
to
track
this
would
be.
C
F
B
Yeah,
so
I'm
pretty
sure
kubernetes
has
this
one
you
know
have
has
worked
going
on,
like
I
said,
even
in
sick
release.
There
are
a
few
things
that
that
is
related
to
this.
But
if
you
want
to
know
that
you
know
all
everything
that
we're
doing
then
probably
the
best
way
is
to
go
to
seek
security
and
check
there.
E
F
That
it
wasn't
there's.
B
F
Okay,
yeah,
I
mean
one
of
the
weirder
requirements
was
around
like
unit
test
coverage
and,
like
I
didn't
know,
if
kubernetes
had
particularly
high
unit
test
coverage
or
if
it
was
even
measured,
I
mean
I
didn't
know.
If.
F
F
I
don't
even
know
if
kubernetes
hits
that
bar
but
yeah.
I
can
follow
up
with
the
security
guys
because
they
would
probably
be
more
likely
to
know
the
details.
B
F
A
Well
sounds
good
and
if
you
discover
anything,
feel
free
to
bring
it
back
to
the
sig
and
let
folks
know
just
fyi,
okay,
all
right,
I
think
that's
pretty
much
it
for
the
agenda
today.
Anyone
else
have
any
other
items
they
want
to
discuss.
If
not,
we
are
right
at
time
today.