►
From YouTube: Kubernetes SIG Storage Meeting 2023-03-09
Description
Kubernetes Storage Special-Interest-Group (SIG) Meeting - 09 March 2023
Meeting Notes/Agenda: https://docs.google.com/document/d/1-8KEG8AjAgKznS9NFm3qWqkGyCHmvU6HVl0sk5hwoAE/edit#heading=h.ao8nq01jg6b7
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
Moderator: Saad Ali (Google)
A
All
right
today
is
March
9
2023.
This
is
the
meeting
of
the
kubernetes
storage
special
interest
group.
As
a
reminder,
this
meeting
is
public
recorded
and
posted
on
YouTube
today
on
the
agenda,
we're
going
to
go
over
the
127
planning
and
if
you
have
anything
you'd
like
to
discuss
whether
it's
PRS
that
you
want
to
get
attention
for
designs
that
need
review
or
anything
else,
please
feel
free
to
add
it
to
the
agenda
in
terms
of
127
planning.
A
And
we
can
get
started
first
item
we
have
is
from
haymont
I,
don't
know
if
he's
on
the
line.
A
Hello,
so
first
item
is
recovering
from
resize
failures:
open
apis
to
unblock
quas.
B
A
Awesome.
Thank
you.
Next
is
issues
related
to
assuming
volumes
are
Mount
points.
Anyone
have
an
update
on
this
I'm,
not
sure
if
Jing
is
on
the
line.
A
C
A
Think
I
have
no
concerns
from
my
end,
I
was
waiting
for
you
and
James
to
see
if
you
all
are
okay
moving
forward.
C
Yeah
I
think
he
has
they've
given
plus
one
this
morning.
I
see.
C
Great
yeah,
so
we
do
have
some
follow-up
actions
just
to
take
a
look
of
the
script.
Change
I've
moved
to
GitHub
actions,
I,
don't
know
if
that
has
affected
this.
You
know
the
compare
comparison
of
the
generated
output,
I,
don't
know
what
happened
there
so.
D
C
Take
a
look
at
that
yeah
and
also
in
addition
to
the
CSS
back
release.
We
also
have
the
API
definitions,
PR
merged
and
the
work
is
in
progress
to
write
the
controller
and
a
sample.
Csi
driver
implementation.
A
Awesome,
this
is
I,
think
the
flagship
feature
for
this
release.
So
thank
you
for
pushing
a
shank
thanks.
All
right
next
up
is
provision
volumes
from
Cross
namespace
snapshot.
Pvc
continue,
Alpha
work,
any
updates
on
this
one.
D
A
Thank
you
Michelle.
Next
up
we
have
CSI
volume,
Health,
additional
metrics
and
or
events
anything
new
on
this
one.
C
No,
unfortunately,
not
I
have
not
seen
the
E3
test
being
updated.
It's
still
working
progress
got.
A
E
B
A
C
A
Got
it
cool
sounds
like
good
progress.
Thank
you.
Next,
we
have
new
rwo
access
mode
being
moved
to
Beta
Michelle.
Any
updates
on
this
one.
D
A
Awesome
sounds
like
this
is
pretty
much
pretty
much
done.
Yeah.
A
A
I
think
this
is
the
same
same
as
last
time.
I
haven't
seen
any
updates
on
the
CSI
spec
side
for
this
one
so
copy
that
over
next
we
have
CSI
proxy
for
Windows
transition
to
privileged
containers
out
of
tree.
Any
update
on
this.
A
Okay,
I'm
gonna
mark
this
one
as
no
update
moving
on.
We
have
node
expansion
secret,
so
I
think
last
status
here
was
end-to-end
test
and
review
anything
new
here.
B
C
But
I
think
we
need
more.
This
is
just
one
test
got
it
yeah.
A
A
The
last
status
was
we'll
need
to
move
feature
gate
to
Beta.
Anyone
know
the
status
of
this
xion.
A
Next,
we
have
CSI
migration
related
things,
so
remove
entry
GCE.
This
is
a
placeholder
for
128,
so
we'll
skip
that
we
have
remove
entry,
AWS
EBS,
anything
new
on
this
one
yeah.
E
You
can
mark
this
one
as
complete
the
pr
for
it
was
merged.
Nice.
B
F
F
E
Yeah
so
I
attended
the
Sig
Club
provider
meeting
and
they
were
okay
with
removing
it
as
part
of
that
PR.
So
yeah.
F
A
Cool,
thank
you
both.
So
next
one
is
just
for
tracking
we'll
skip
over
that
to
remove
entry,
Azure
disk.
Any
updates
on
that
one.
A
Cool
thank
you
for
the
update
we'll
skip
over
the
next,
because
we
uncommitted
to
them
for
this
cycle.
Next
is
control
volume,
conversion
between
source
and
Target,
PVC.
C
Yeah,
that's
still
the
same
at
the
placeholder
PR
is
submitted
for
the
blog.
A
Got
it
cool?
Thank
you,
Shane
next
is
actually
let
me
put
this
as
almost
done.
A
F
So
the
feature
has
been
flipped
to
Beta.
Well,
not
free.
It
was
introduced
as
beta
and
I
have
one
PR
pending
sick
Note
review.
I
am
adding
some
metrics
to
their
code
and
I
need
their
approval,
which
is
hard
to
get
actually
the
other,
so
yeah
I'm
bringing
people
we
will
see
in
the
worst
case.
We
do
not
have
the
metrics
and
we
will
have
the
feature
gate
as
beta
interesting.
F
No,
no
reviewing
the
metrics
for
or
you
know
we
have
these
log
messages
orphan
Port
found
because
I
could
not
remove
the
directory
because
of
blah
blah
blah.
So
I
did
metric
for
that.
So
we
don't
need
to
grab
logs.
We
can
look
at
the
metric
okay.
A
All
right,
thank
you.
Both
next
is
PV.
Last
phase
transition
time
looks
like
cap
was
merged,
but
no
updates.
Since
anything
new
here.
A
G
Hey
I'm
here
sorry
picture
there,
so
the
the
so
I'm
I'm
trying
to
summarize
the
the
issue
has
been
getting
the
end-to-end
tests
working,
it
doesn't
seem
feasible
to
use
kind
So.
The
plan
is
to
do
a
manual
run
of
the
GCE
and
end
tests
with
the
mutation
detector
enabled
and
see.
If
we
can
then
see
if
we
can
deploy
the
pdcsi
driver
with
the
cloud
provider
gcp
end-to-end
tests,
so
that
when
this
is
beta,
it
will
be
tested.
G
A
Got
it
sounds
like
a
complicated
set
of
tests?
Thank
you
for
working
on
that
Matt
yeah.
Next
is
volume
expansion
for
stateful
sets
and
we
haven't
had
an
update
here
for
a
while
a
month.
Do
you
have
anything
here?
Maybe.
B
No
nothing
today
I'll
try
to
find
some
time
to
review
it.
Okay,
no.
A
Worries.
Thank
you.
Final
item
here
is
non-graceful
node
shutdown.
Oh,
this
was
for
tracking,
so
we
can
skip
over
this.
Okay.
I
think
we
are
done
with
status
updates.
I'll
go
back
to
our
agenda.
Doc
looks
like
we
have
one
miscellaneous
item:
K
does
gcrio
is
deprecated
move
to
registry.k.io
there.
G
A
Significant
image
pulls
for
AWS
driver
no
driver,
registrar,
liveness
probe,
who
posted
this.
This.
D
D
I
think
they're,
trying
to
figure
out
how
to
best
deal
with
this
I
think
the
two
approaches
they're
looking
at
is
either
just
straight
up
deleting
the
images
or
they're
trying
to
look
at
implementing
some
sort
of
redirection,
but
yeah
I
think
either
way
both
of
them
have
the
potential
to
break
users.
A
Yeah,
thank
you
for
the
important
note
there
Michelle
call
out
for
everybody
on
the
call.
If
you
are
aware
of
the
usage
of
any
of
these,
please
please
try
to
take
action
on
these
as
soon
as
possible.
D
H
Wait
can
anyone
hear
me
yeah?
Oh
okay,
sorry
it
wasn't
letting
my
name
yeah
for
what
it's
worth
over
at
the
AWS
and
yes,
CSI
driver
we're
aware
of
this.
We
have
a
warning
at
the
top
of
our
readme
and
in
previous
release
notes.
H
You
know
telling
people
that
it's
possibly
going
to
go
away,
but
obviously,
if
you're
CS,
if
you
develop
a
CSI
driver
here,
you
know
you
very
likely,
presumably
use
the
node
driver,
registrar
or
live
news
probe,
so
you
know
worth
making
sure
that
you
don't
have
any
instructions
floating
around
or
manifests
using
the
old
images.
H
But
you
know
we've
been
warning
people
for
as
long
as
we
have
been
aware
of
this
issue,
and
you
know,
unfortunately,
some
people's
clusters
might
break
eventually
if
it
gets
cut
off.
But
you
know,
if
that's
what
they
have
to
do
to
save
the
money
for
the
infrastructure.
You
know
that's
what
they
have
to
do.
D
H
D
C
D
A
Cool.
Thank
you
for
the
follow-up
they're
saying
good
call
out
any
other
questions.
Comments.
Concerns
related
to
this.
A
Okay,
if
there's
nothing
else,
we
can
end
early
today
and
give
you
all
about
40
minutes
back.
Thank
you.
Everyone.