►
From YouTube: Kubernetes SIG Storage - Bi-Weekly Meeting 20200618
Description
Meeting of Kubernetes Storage Special-Interest-Group (SIG) Bi-Weekly Meeting - 18 June 2020
Meeting Notes/Agenda: -
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
Moderator: Xing Yang (VMware)
A
A
A
A
A
A
D
C
A
A
C
C
A
E
F
A
A
B
F
F
A
A
A
C
E
C
B
A
C
E
A
A
A
G
A
G
A
H
A
G
I
think
we're
waiting
for
the
NFS
wants
to
finish
movement,
and
then
we
can
also
clean
up
all
the
issues
in
the
old
repo
move
them
over
to
the
new
repo
and
such
I
do
see.
There
are
like
there
are
still
lots
of
issues
and
he
ours
being
opened
against
this
repo
I,
don't
know.
If
Kieran
you
can
have
a
chance
to
like
go
in
and
sort
of
start
cleaning
them
up.
G
B
B
A
A
C
J
K
Yeah,
so
we
have
much
the
PR
for
the
community
said
changes.
Currently,
it
is
much
with
teeth
which
are
get
alpha
after
the
testing
is
complete,
along
with
the
CSI
driver,
will
move
to
or
bump
it
up
to
the
beta
right.
Now
we
have
one
concern
from
the
community
regarding
the
way
we
are
asking
our
customer
to
upgrade
vSphere
27.0,
you
one,
so
we
have
reached
out
to
like
the
PM's
in
the
VMware,
and
we
cannot
back
port
the
api's
that
we
have
added
in
the
7.0
u1r
to
the
6.5
and
the
7.0.
K
A
A
We
already
talked
to
you
and
you
he
is
in
the
cloud
provider
side.
So
yeah
we
will.
You
know
we
can
talk
talking
about
this
here,
so
he
he's
aware
of
this
issue
at
least
okay
yeah.
Let's
talk
about
this
more
offline.
Next
one
is
a
GSM
aberration.
Do
you
have
any
dealer
nd
here
we
showed
you
know
any
status
for.
G
This
there's,
you
he's
been
sending
out
PRS,
but
I
haven't
I,
haven't
been
syncing
up
on
the
on
the
latest
status,
but
I
think
he
is
actively
working
on
this.
I
can
try
to
follow
up
with
him.
A
Thanks
sure,
okay,
so
this
one
is
crossed
out
and
then
we
have
a
WCS
emigration,
not
started.
You
have
there
anyone
working
on
this
side
and
have
you
heard
it
anything
from
Mehta
but
have.
E
L
G
I
guess
Matt:
will
you
be
able
to
sort
of
follow
up
and
and
see
if
you
someone
on
your
team
or
you
can
own
the
AWS
migration
feature.
L
G
Sounds
good
feel
free
to
sync
up.
You
can
sync
up
with
me
offline
and
I
can
sort
of
like
it.
You
updated
on
the
current
status
of
stuff,
but
basically
we're
still
we're
still
going
to
overall
stay
in
beta.
But,
like
we're
gonna
try
to
see,
you
know,
continue
stabilizing
the
feature
and
and
hopefully
trying
to
get
some
cloud
providers
to
go
to
GA
and
that
the
next
please
do.
A
A
A
I
I
I
A
I
A
I
A
Thanks:
okay,
next
one
execution
hook
for
became
snapshot,
so
this
one
we
have
a
container
notify
proposal.
We
discuss
about
that
in
with
the
signal
they
have
some
concerns
for
adding
the
cingulate
so
we're
trying
to
address
their
comments,
but
I
think
there
are
enough.
Ceo
concerns,
though,
still
still
being
discussed.
A
A
G
M
A
M
A
B
M
B
So
the
individual
issues
you
can
track
on
your
own.
The
purpose
for
this
meeting
is
to
kind
of
track
the
high
level
for
the
next
kubernetes
release
and
in
this
coming
release
we're
not
moving
to
GA.
So
this
tracking
bug
fixes
is
fine,
so
for
the
next
release,
what
we'll
do
is
have
a
separate
standalone
item
for
GA
gotcha.
A
M
A
A
N
A
N
N
One
is
the
22
weeks
and
days
to
right
now
this
only
at
the
top
can
only
pass
to
the
node
publish
volume,
whether
we
need
to
extend
it
to
the
two
other
CSI
cost,
like
controller
page
kind
of
stuff.
Am
I
appealing
I,
don't
think
this
is
related
to
past
operations
right
if
I
understand
this,
the,
for
example,
the
notice
stage
stage
volume
call
that
that
calling
amongst
the
warning
to
the
notes,
global
power
system
right
I
mean
I'm,
not
quite
sure
how
it's
related
to
the
parts.
N
A
C
B
G
G
L
L
J
N
There
is
a
short
term:
one
dead
out
already
been
put
him
in
the
in
the
sacred
stores:
si
driver
data,
the
ground,
the
token
request
permission
to
the
service
candle
of
the
driver
pod
and
that
they
can
create
token
there,
but
this
requires
some
other
changes
on
the
automation.
Clocking
is
to
validate
that.
N
The
token
request
is
requested
by
the
sister
on
behalf
of
the
pod
that
the
sales
driver
is
mounting
the
warnings
to
so
it's
kind
of
messy
to
implement
a
kind
of
rules
like
policies
to
do
the
validation
and
also
there
are
many
other
sis
drivers
requests
this
requests.
The
service
can
token
so
I
think
it's
better
to
implement
in
the
kool-aid.
N
N
C
Okay,
well,
if
the
first
mount
fails,
then
the
pod
is
not
started,
but
once
the
put
is
running
and
Ramon
fails,
then
we
just
log
it
which
is
fine.
As
long
is
it
safe
to
do
like
I'm,
not
sure
I
fully
understand
this
token
expression
in
this
stuff.
Does
it
mean
if
the
token
expires,
then
the
port
should
not
have
access
to
the
secret
data
and
we
should
block
it
somehow.
N
So
so
the
so,
for
example,
the
what
the
water
has
the
secret
or
which
requires
an
authentication,
and
so
so
the
sister
EVER
will
request
the
pod
service
can
token
so
that
at
the
subscriber
can
use
it
to
do
the
authentication
and
if
the
the
token
expires,
so
basically,
the
secret
also
has
the
detail
it
will
expire.
If
that
expires,
it
work
will
require
a
token
and
the
token
will
also
expiry
sometime
like
10
minutes.
So
this
it
means
if
the
secrets
expire,
they
will
require
the
token
again,
but.
N
M
C
N
G
G
N
G
O
N
Yeah
we
allowed
it
to
be
stale
because
the
ribbon
failed
but
I
wake
you
the
pad
with
the
Rimmel
fielder
for
the
driver.
G
N
C
N
C
N
G
N
C
N
G
Api
calls
like
I,
think
you
were
mentioning
somewhere
that
the
CSI
driver
needs
to
make
like
a
API
called
to
validate
the
audience.
This.
G
G
I
N
G
N
C
G
B
A
B
A
P
P
So
in
this,
in
the
same,
at
the
same
time,
we
look
to
improve
performance,
because
if
we
introduced
this
this
right
on
using
this
abstraction,
we
can
offer
transport
casting,
meaning
that
the
user
would
be
declaring
one
endpoint,
but
actually
on
the
under
poles.
That
would
be
using
the
cast
version
of
it
and
yeah
we're
looking
to
get
more
feedback.
You
know
have
more
discussions
with
the
open
source,
community
and
yeah.
Any
any
feedback
is
welcome
and
maybe
next
time
I
can
give
a
demo
as
well.
I,
don't
know.
A
B
B
A
P
A
D
D
A
D
A
You
can
you
provide
a
link.
Well,
what
is
that
link
ready?
Are
you
looking
at
this
because
ember
embrace
this?
That's
like
the
CSI
driver,
but
we
we
don't
know
if
they
about
the
I
think
they
already
have
the
translation,
far
I'm,
just
not
sure.
What's
the
next
step,
I
think
they
already.
This
is
already
beta.
So
we
don't
know
who
is
working
on
finishing
this
and
Breen
is
Gigi
I,
guess
that's
the
question
so
I
know
I
know
who
is
will
come
amber
but
not
I.
Suppose.
A
Two
minutes
left
I.
Think
TV
I
already
give
an
update
on
that.
I
could
see
a
celebration,
promise,
fear
and
so
KK
has
this
I
think
we
won't
have
time
I
see
you
have
some
slides.
They
are
a
thank-you
thing.
Oh
you
think
thank
you
John
KK,
so
you
want
to
talk
about
this
being
the
next
meeting.
You
would
just
want
to
give
a
quick
overview
of
this.
You
have
a
proposal
yep.
I
So
right
now
we
don't
have
a
way
in
which
we
can
tune
the
performance
of
persistent
volume
at
runtime,
and
this
presents
some
scenarios
for
users
which
we
could
potentially
improve
by
providing
a
genetic
framework
with
kubernetes,
and
the
proposal
is
for
community
input.
Us
are
there
other.
You
know,
folks,
who
are
also
interested
in
this
kind
of
approach,
and
there
are
a
couple
of
approaches
which
we
have
put
forward
to
see.