►
From YouTube: Kubernetes SIG Storage Meeting 2022-10-20
Description
Kubernetes Storage Special-Interest-Group (SIG) Meeting - 20 October 2022
Meeting Notes/Agenda: https://docs.google.com/document/d/1-8KEG8AjAgKznS9NFm3qWqkGyCHmvU6HVl0sk5hwoAE/edit#heading=h.ro5v0bdbk14h
Find out more about the Storage SIG here: https://github.com/kubernetes/community/tree/master/sig-storage
Moderator: Saad Ali (Google)
A
All
right
today
is
October
20
2022.
This
is
the
meeting
of
the
kubernetes
storage
special
interest
group.
As
a
reminder,
this
meeting
is
public
recorded
and
posted
on
YouTube.
Today
on
the
agenda,
we
are
going
to
go
through
our
126
planning
spreadsheet
and
get
status
update
for
features
that
folks
are
working
on
and
as
a
reminder
for
timeline,
the
enhancement
freeze
has
already
passed.
So
if
you
have
a
feature,
that's
working
that
you're
planning
for
126
that
wasn't
already
declared
and
approved
as
a
cap.
That
deadline
has
passed.
A
The
next
upcoming
deadline
is
the
code
freeze
which
will
be
on
November
9th,
which
is
coming
up
fairly
quickly.
So
if
you
have
a
feature
that
you're
working
on
that
is
the
date
to
be
aware
of,
and
next
up
after
that,
we'll
go
over
any
PRS
to
discuss
designs
to
review
and
miscellaneous
items.
So
if
you
have
anything
that
you
want
to
discuss,
feel
free
to
add
them
here
and
we'll
go
over
them
after
going
over
the
planning
spreadsheet.
A
With
that
we'll
go,
hopefully
we'll
go
ahead
and
switch
over
to
the
planning,
spreadsheet
and
start
getting
status
updates.
So
first
item
is
delegate
FS
group
2
CSI
driver
instead
of
cubelet,
including
end-to-head,
updating
end-to-end
tests,
Fabio
Hamad
any
update
on
this
one.
B
I
updated
the
CSI
I
posted
the
internet
test
results
on
the
CSS
Spectrum
I
think
you
have
seen
it
and
you
tagged
the
CSS
Spectrum
417
release
I
think
so
we
are
looking
good
and
yeah.
The
end-to-end
tests
are
already
there.
We
might
think
needs
some
more
but
yeah.
Let's.
C
A
All
right
next
up,
we
have
issues
related
to
assuming
volumes
or
Mount
points.
His
jingle
on
the
line.
A
D
Right,
yeah
right
now,
basically
just
to
continue
review.
Well,
actually,
we
still
continue
to
review
the
CSS
flag
and
the
and
the
cap
yeah,
but
I
think
most
likely
it's
not
going
to
make
it
because
this
is
out
of
tree.
We
I
mean
in
theory
we
can
still
continue,
but
I
think
unlikely.
This
will
make
it.
A
And
do
you
want
to
keep
tracking
it
here
or
drop
it
for.
C
C
A
Good,
then,
we
have
provision
volumes
from
Cross,
namespace
snapshot,
PVC.
C
Meeting
API
code
pretty
good,
please
do
a
code
red
debut.
E
E
A
Thanks
Shane
next
up,
we
have
cozy.
D
We
actually
yeah
I
think
we
probably
don't
have
to
track
this.
Okay.
A
D
For
you
all,
obviously
he's
not
here,
okay
yeah,
so
this
is
basically
did
not
make
it,
and
then
we
need
more
design
discussions.
C
A
We'll
keep
this
in
design
and
we
want
to
keep
tracking
it.
D
Maybe
okay
just
to
not
chug
it,
but
you
know
we
will
be
going
over
the
scene,
the
data
protection
group
as
well.
So
it's
fine.
A
A
A
I
will
mark
this
as
no
update.
Oh
I
think
that.
F
I
think
also
we
we
decided
it
would
stay
in
Alpha
for
this
release,
but
we'll
add
the
tests.
A
All
right
next
is
runtime
assisted
mounting
I
guess
this
was
moved
to
127..
Do
we
want
to
keep
tracking
this
here
deep.
C
Yeah
there
are
a
couple
of
comments:
deep
needs
to
rework
it
a
bit,
but
I
haven't
heard
back
if
he
is
going
to
do
it
in
this
or
the
next
stories.
A
A
All
right,
next
to
CSI
proxy
for
window
transition
to
privileged
containers
out
of
tree
Alex
is
working
on
this,
and
you
want
to
have
an
update
on
this.
A
That
as
no
update
and
CSI
proxy
performance
issues,
anyone
have
an
update
on
that
one.
A
Okay,
node
expansion,
Secret.
D
A
C
D
E
A
Thank
you.
Next
is
Azure
disk
and
Azure
file.
C
A
A
Then
we
got
s,
we
got
Seth
RBD
and
seff
Fs.
Anyone
have
updates
on
those.
A
D
Yeah
I
think
we're
done
right,
did
we
say,
can
you
check?
Did
we
say,
do
we
need
the
oh
documentation,
I?
Think
right?
Okay,
just
documentation
got.
D
A
Got
it
check
the
dock
and
I
guess
send
another
question
mark
on.
D
Sunday
but
release
notes
is
already
there
right,
so
it's
basically
just
a
just
to
check
if
we
need
but
I
I
believe
even
documentation,
midnight,
okay,
I'll,
double
check.
I,
remember:
Javi
submitted
something
kind
of
updates.
All
the
plugins
but
I'll
ask
a
humble
to
double
check
and
just
steepness
anything.
We
need
to.
A
E
Yeah,
so
the
cap
is
updated
to
reflect
so
we're
dropping
support
for
strategy.
Provisioned
entry
volume,
so
cap
is
updated
for
that
and
I
have
a
PR
out
to
upgrade
it
to
Beta
and
enable
the
beta
flag
by
default.
A
Awesome,
and
so
are
we
moving
to
Beta
this
cycle,
then.
A
A
E
A
E
F
Oh,
do
we
need
the
talk
to
the
release
team
that
does
the
release
team?
Think
that
we're
targeting
alpha
or
beta.
E
I
am
not
really
sure
so
we
had
the
approval
to
a
movie
to
Beta
in
the
previous
release
itself,
but
we
did
not
do
it
because
we
wanted
to
add
more
most
things
to
it,
but
we
dropped.
We
drop
it
again,
so
I'm
not
sure
do
I
get
in
touch
with
them.
D
F
D
D
No,
that's
that's
for
next
release
right
now.
It's
just
getting
everything
ready
or
are
you
saying,
you're
updating
your
account
yeah
if
your
cab
says
better
than
that
that
cup
cannot
be
merged
yet
I
was
not
sure
about
it.
So
so
for
now
you
can
change
everything
else
by
the
stage
from
alpha
to
Beta.
That
part
has
to
wait
until
1.27.
D
Yeah,
because
for
them
before
the
cap,
targeting
beta
to
be
merged,
you
need
to
have
ETV
tests.
We
don't
have
those.
Yet
that's
why
we
cannot
and
also
we
have
way
past
the
deadline
for
cat
merge.
D
E
A
A
So
that
means
we're
keeping
it
in
Alpha
this
cycle,
and
that
is
it
cool.
Thank
you
for
the
update.
Next
is
control
volume,
mode
conversion
between
source
and
Target,
PVC.
D
It's
a
ronak
here
so
basically
well,
the
cap
itself
did
not
get
merged
because
we
we
are
still
working
on
the
ETV
test
so
but
we
so
so
ronaki
is
working
on
this
out
of
a
tree
E3
test
framework.
So
he
is,
he
has
a
PR
out,
so
I
think
Patrick
has
reviewed,
it
I
know
young.
D
You
are
also
going
to
review
that
one,
so
so
we're
trying
to
get
that
one
there
so
because
this
code
is
completely
out
of
three,
so
we
still
have
a
chance
to
to
do
this.
I
don't
know
we
are
getting
getting
close,
but
but
we'll
see.
D
So
yeah
well
I,
so
the
clouded
we
have
the
test
required
test.
Is
there
cap
merged?
Basically,
we
need
a
PR
that
promotes
the
feature
gate.
So
that's
not
there.
Yet
yeah
I'll
pin
is
going
to
work
on
that
yeah
yeah
we'll
have
that.
A
And
I,
this
actually
reminds
me:
where
did
we
end
up
with
the
node
fencing
discussion
like
store
storage,
node,
fencing.
A
D
This
is
a
like,
so
that
will
be
like
next
steps
got
it.
So
I'd
like
to
you
know,
discuss
that
so
actually
and
I
actually
have
a
session.
If
you
come
about
the
numbers
for
no
shutdown,
so
we'll
talk
about
next
steps,
so
the
fencing
will
be
one
thing.
So
there
were
a
few.
There
are
a
few
things
right.
There
is
the
there's,
no
fencing
and
story,
fencing
cluster,
fencing
sort
of
few
things.
C
D
Need
to
look
at
that
yeah,
so
there
are
like
a
few
proposals.
We
can
look
at
that
and
see
which
one
we
want
to
go
with.
D
Okay,
so
two
of
those
are
already
referenced
in
the
cap
in
the
alternative
section.
Why
is
the
safety
patch?
That's
already
that
was
in
earlier
version
of
the
cap?
The
the
second
one
is
the
note
fencing
this
was
a.
There
was
a
there
was
a
repo
by
you
know,
rude
FS.
He
has
that
one
right.
He
actually
has
no
code
there.
So
that's
another
one
and
then
the
the
and
then
the
third
one
is
yours.
D
Then
you
have
a
there's
a
PR
in
CSS
back
right,
that's
the
storage
thing,
and
then
there
was
a
fourth
one
which
is
I.
Don't
know,
if
is
Tom
here
today,
yeah
Tom
from
WMC.
They
actually
have
a
project
understood,
so
they
did
something
they
did
some
kind
of
like
storage,
fencing.
They
did
check
from
Storage
side.
D
Whether
there
is
the
I
o
or
not
when
they
see
you
know
not
ready
and
then,
if
not,
if
there's
no
IO,
then
they
will
do
you
know
on
population
Delete,
pods
and
things
like
that,
so
I
have
that
I
have
that
in
Google
doc.
I
can
share
that
with
you.
So
you
can
take
a
look
of
the
details.
D
G
D
Yeah,
so
let
me
share
that
with
you,
so
you
can
take
a
look
yeah.
We
can
have
follow-up
discussions.
Definitely
after
keep
calm.
A
Cool
yeah,
it
sounds
good
I
think
this
will
be
an
interesting
future
Improvement,
so
yeah.
A
All
right,
thank
you
for
that.
Shane
next
is
enable
username
spaces
in
cubelet,
so
uids
get
shifted,
rootless
mode
along
with
Sig
node
anything
new
here
a
month.
B
No
nothing
that
I
know
if
I
have
I,
don't
have
any
updates
for
it
to
that.
But
I
haven't
taken
a
look
at
it.
So.
A
We
can
check
next
time
and
drop
it
if
we
need
to.
Thank
you.
I'm
on
next
is
address
issues
PVC
created
by
stateful
set,
not
being
Auto
removed.
Matt.
Are
you
on
the
line
by
any
chance.
C
C
A
All
right,
thank
you,
everyone
for
the
updates
for
126,
with
that
we'll
switch
back
to
the
agenda
doc.
I
think.
The
only
item
that
we
have
here
on
the
design
review
side
is
from.
A
From
Amazon
he
has
a
proposal
to
have
some
mechanism
by
which
to
modify
as
I
understand
it
arbitrary
parameters
from
the
storage
class.
So
let
me
see
if
I
can
try
to
rephrase
the
ask
here.
A
So
generally
speaking,
there
are
a
set
of
opaque
parameters
when
you
provision
a
volume
that
are
passed
through
storage
class
and
those
parameters
can
control
things
like
iops
or
you
know
the
speed
or
quality
of
a
volume,
and
so
I
think
the
ask
here
is
well
that's
nice
that
you
can
set
those
values
at
provision
time.
A
Is
it
possible
to
you
know,
can
can
we
make
it
possible
to
mutate
that
after
the
volume
has
been
provisioned
rishabh?
If
you're
on
the
line,
can
you
add
to
that
or.
H
Hey
folks
yeah
I'm
Richard
from
AWS
one
of
the
maintainers
of
the
EBS
CSI
driver,
so
yeah
so
I'll,
pretty
much
summed
it
up.
What
we've
heard
from
from
customers
is
like.
They
will
really
like
to
modify
volume
through
the
kubernetes
control,
plane
right
now,
they're
doing
stuff
like
using
the
CLI
or
the
console
to
update
the
volume
stuff
like
volume
type
iops
throughput.
But
there's
like
there's
like
a
bit
of
a
disconnect
between
what
the
volume
actually
is
and
what's
stored
in
the
kubernetes
control
plane.
H
So
so
we've
thought
about
implementing
something
like
a
modify
volume
RPC
on
the
controller
spec.
That's
somehow
we
can
trigger
that
RPC
against
the
CSI
endpoint
and
update
the
volume
like.
So
what
we
thought
was
the
best
way
to
do
that
is
maybe
make
the
storage
class
feel
mutable.
H
So
the
admin
probably
has
like
a
bunch
of
volume,
types
that
they
expose
to
users
and
someone
can
just
choose
a
different
volume
type.
Like
a
storage
class
name
update
the
field
update
the
PVC
and
then
you
know,
that'll
trigger
the
the
modify
volume
endpoint
I
did
see.
Ben
and
sad
did
mention
that.
Maybe
that's
not
the
best
option,
so
yeah
I
just
wanted
to
discuss
with
you
guys
what
you
guys
think,
because
yeah
well.
G
G
You
know
the
the
storage
class
is
consulted
at
provisioning
time,
but
after
that
it
can
diverge
from
what
the
volume
actually
has
and
kubernetes
doesn't
care.
So,
like
the
understanding
is
those
parameters.
G
If
we
wanted
to
have
kubernetes
be
able
to
update
your
Qs
policy,
which
is
a
great
idea.
I
think
we
would.
The
first
step
would
be
to
have
kubernetes
actually
have
a
way
of
finding
out
what
the
current
value
is,
so
that
it
could
compare
it
to
the
desired
value
and
have
a
reconcile
Loop
to
change
it
right.
That
would
be
step.
One.
F
Yeah
I
think
it
also
depends
on
how
much
you
end
up
storing
in
the
volume
attributes
right,
because
then
now
you
end
up
having
you
could
end
up
having
some
of
those
parameters
stored
in
the
PV
object,
and
maybe
that's
where
some
of
the
confusion
might
be
coming
from
from
end
users.
G
Yeah
yeah
I
mean
something
like
that
or
or
a
new
field.
I
mean
I,
I,
guess
I'm
agnostic
as
to
where
exactly
you
hang
it
off
the
PV
object,
but
you
would
need
some
place
to
say
like
these
are
the
these
are
the
current
parameters
that
are
that
are
mutable
and
these
are
their
current
values
and
then
you
would
have
some
other
object.
That
would
say
what
the
desired
value
is
and
then
you
could
just
write
a
reconcile
Loop.
G
That
would
try
to
try
to
reconcile
it,
but
but
the
key
is
knowing
which
values
are
in
principle,
mutable
and
which
ones
aren't,
because
you
know
there's
there's
a
there's.
Some
of
both
and
storage
class
parameters
cover.
You
know
the
union
of
them
without
knowing
which
is
which
so
like
you'd
need
someone
to
come
and
say
like
this
is
an
immutable
parameter.
This
is
not
a
mutable
parameter.
G
This
is
the
current
value
of
this
mutable
parameter
and
then,
if
you
want
to
change
it,
go
write
a
reconcile
or
look
to
do
that
and
then
there's
the
whole
question
of
security
like
who
is
allowed
to
change
those
things.
You
know
with
Qs
policies,
there's
obvious
sensitivity
to
you
know
an
unprivileged
user
upping
their
own
qos
policy
in
a
way
that
might
damage
other
tenants
using
the
same
storage
system.
F
I
think,
regarding
the
the
actual
use
case
of
changing
the
qos
policy,
I
think
this
is
a
common.
This
is
sort
of
a
common
scenario
across
multiple
storage,
vendors.
So
I
wonder
if
it's
worth
considering,
you
know
having
some
sort
of
first
class
qos
support
to
to
at
least
support
that
case.
G
Oh
you
mean
like
have
have
an
object,
called
a
qos
policy
with
some
opaque
parameters
in
it,
but
the
but
the
name
is
Meaningful
to
kubernetes
and
then
and
then
have
a
field
in
the
storage
class
called
Qs
policy
name,
and
then
you
can
change
it
or
something
maybe
yeah
yeah,
but
that
that
would
be
preferencing
Qs
policies
above
every
other
storage
class
parameter
and
I
I
have
to
imagine
there's
another
one
that
would
people
you
know
the
moment.
B
Will
this
require
only
control
plane
or
will
it
require
something?
On
node
side,
the
example
uses,
for
example,
AWS
EBS
and
the
modify
volume
call
Can,
for
example,
be
also
used
to
resize
the
volume
in
case
of
EBS,
for
example,
and
that
kind
of
who
worries
me
like
like
what
kind
of
changes
it
can
make
into
volume
and
if
it
has
an
interaction
with
like
available
disk
size
and
whatnot.
F
G
Yeah,
all
those
are
good
points.
Yeah,
there's,
there's
different
kinds
of
mutability.
Some
you
distributedly
change.
Some
you
can
only
change
offline,
some,
you
can
only
change
offline
and
you
have
to
wait
for
the
storage
system
to
copy
your
data
or
something
thank
you.
A
Yeah
so
I
think
tldr
on
this
is
having
a
generic
mechanism
by
which
to
mutate,
storage
class
parameters
is
kind
of
a
no-go
for
us.
The
recommended
path
is
if
there
is
a
specific
field
that
you
are
interested
in
mutating,
say
it's
iops
or
quality
of
service,
or
something
like
that.
First
step
would
be
to
promote
that
into
an
official
first
class
field
in
PVC
similar
to
capacity,
and
then
we
can
talk
about
what
mutation
for
that
looks
like
and
the
benefit
of
doing
that
is.
A
You
can
have,
for
example,
different
types
of
policies
and
how
you
represent
it,
meaning
you
know
things
like
what
Ben
was
saying.
If
you
you
know,
you
don't
want
a
storage
administrator
to
let
application
developer
modify
the
quality
of
service
at
will.
They
should
be
able
to
to
set
that
somehow
or
versus
like
they
don't
care
they
want
to.
Let
anybody
modify
it.
You
know
they
should
be
able
to
set
it
that
sort
of
thing.
H
Yeah
I
guess
the
ask
wasn't
to
modify
storage
class
themselves
but
modify
modify
the
PVC
to
change
the
storage
class
name
field.
I
guess
I
feel,
like
probably
people
were
getting
confused
by
that.
G
Well,
you're
asking
for
a
very
generic
facility
and
I
think
we're
pointing
out
that,
like
that,
creates
a
lot
of
new
problems,
and
so,
rather
than
do
something
generic,
we
could
do
something
much
more
narrow.
That
would
just
scratch
your
itch
and
be
done
in
a
way
that
doesn't
cause
implementation
issues.
H
H
So
yeah
we've
we've
thought
about.
You
know
what
what
thoughts
I
just
did
was
having
some
fields
that
are
I,
guess
like
a
common
subset
of
among
all
vendors
and
promoting
them
as
like,
first
class
members
in
PVC,
but
that
I
guess
that
gets
us
like
I,
don't
know
like
60
of
the
way
there,
but
not
100
percent.
G
Well,
based
on
based
on
your
user
requests,
is
it,
is
it
really
qos
or
is
it
qos
and
one
other
thing
or
like
how?
What
kinds
of
things
do
you
want
to
be
able
to
change
in
practice?.
C
H
A
I
think
the
challenge
there
is
going
to
be
coming
up
with
that
sufficiently
expressive.
Qos
is
still
useful
to
everyone,
but
yeah.
It
seems
like
a
reasonable
path
forward.
If
we
can
come
up
with
a
qos
field,
have
policies
around
it
get
that
emerged
and
then
make
it
mutable.
F
Yeah
I
think
there
are
actually
multiple
qos
proposals
that
I've
seen
kind
of
floating
out
there,
there's
probably
at
least
three
or
four,
so
it
might
be
worth
taking
a
look
at
what's
already
up
there
and
seeing
if
it
will
any
one
of
them
will
meet
the
needs.
I
Hi,
this
is
Manu
I'm
part
of
the
same
team
as
rishab.
Also
at
AWS
just
wanted
to
state
that
you
know
we
we
seem
to
be
seeing
other.
You
guys
are
probably
already
aware
of
this,
but
we
seem
to
be
seeing
other
vendors
also
interested
in
this
capability.
I
I
think
just
on
the
email
thread,
there
were
like
two
or
three
different
CSI
providers
who
also
expressed
interest
in
this
capability,
and
it
seems
like
this
would
be
utterly
useful
for
for
providers
to,
especially
in
terms
of
the
kind
of
automation
that
they're
trying
to
build
for
for
migration,
and
things
like
that.
So
I
mean
you
guys
probably
have
a
lot
more
background
than
I.
I
Do
in
terms
of
you
know
how
the
the
storage
infrastructure
works
with
kubernetes,
but
but
this
does
seem
like
a
useful
capability
to
to
kind
of
build
out.
G
Yeah
I
I
totally
agree
in
my
experience
like
from
the
second
day,
I
was
working
on.
Csi
people
started
asking.
Well,
how
do
you
change
the
storage
class
right
because
they
they
want
to
do
this
and
unfortunately
my
advice
to
them
was
always
well
you
you
do
it
out
of
band
right
kubernetes
doesn't
let
you
do
that,
but
but
I
agree.
If,
if
we
could
find
a
way
to
do
it,
it
would
unlock
a
lot
of
useful
things.
Yes,.
I
Exactly
and
and
I
think
I
think
the
the
point
that
you
make
there
is
a
very
valid
one
like
there
are.
There
are
a
whole
bunch
of
other
use
cases
which
could
potentially
benefit
from
this
capability,
but
people
haven't
yet
really
thought
about
because
the
option
is
not
available.
So
so,
if
we,
if
we
could
come
up
with
something
that
that
works,
I,
think
that
would
that
would
really
help
drive
a
lot
of
interesting
activity
in
this
space.
So.
F
G
I
was
just
going
to
compare
it
to
like
volume
resize
like
initially
kubernetes,
would
not
let
you
resize
your
volumes
and
the
utility
of
being
able
to
resize
the
volume
is
quite
obvious,
so
we
embarked
on
the
volume
expansion
feature
which
has
taken
years
to
to
you
know
to
reach
GA,
and
there
was
a
lot
of
bumps
along
the
way,
but
it
was.
It
was
a
worthwhile
exercise
because
I
think
implementation.
We
have
is
very
good.
G
I
I
hope
that
a
qos
feature
would
not
take
as
long,
but
it
does
face
about
the
same
amount
of
difficulty
in
terms
of
getting
all
the
pieces
right
so
like
I
think
we
should
do
it,
but
we
shouldn't
assume
it's
going
to
be
a
quick
and
easy
thing.
That'll
be
done
in
a
month.
I
think
it'll
require
careful,
careful
thought
and
Design
to
get
right.
C
G
G
I
mean
it's
a
one,
can
imagine
a
qos
policy
that
includes
like
class
of
storage,
SSD
versus
hard
disk
and
then,
as
long
as
you
can
transparently
change
that
under
the
covers,
like
you,
could
just
do
it
right.
It
is
that
that
would
be
a
feature
of
what
the
Qs
policy
can
express
and
I
would
argue
that
that's
the
kind
of
thing
it
should
be
able
to
express
well.
C
G
C
G
So
there's
things
in
storage
classes
like
like
volume,
encryption
right,
you
typically
can't
start
encrypting
a
previously
unencrypted
volume
or
start
unencrypting.
Your
previously
encrypted
volume,
things
like
the
file
system
type
like
once
you
put
ext4
on
a
disk.
You
can't
change
it
to
xfs.
After
there's
a
bunch
of
data
there
there's
a
bunch
of
there's
a
bunch
of
storage
class
parameters
that
sort
of
get
stamped
on
the
volume
at
creation
time,
and
then
it's
understood
that
they're
not
going
to
change
ever
right.
C
G
C
Provider
can
make
the
decision
to
to
fail
the
request
or
not,
then,
because
there's
so
there's
so
much
variability
for
one
provider
to
the
next.
A
Yeah,
the
challenge
is,
you
know,
with
storage
class,
the
parameters
are
completely
opaque
to
us
and
and
the
way
that
the
system
has
been
designed
is
you
know.
Storage
class
is
a
set
of
opaque
parameters
at
provision
time
after
provision
time
it
has
no
meaning
to
kubernetes.
You
know
the.
The
fact
is
that
it
shouldn't
even
be
on
the
pvpvc
object.
C
G
Yeah,
you
could
imagine
a
a
like
some
CSI
apis
that,
like
told
kubernetes
what
the
current
values
of
all
those
big
parameters
were
and
told
kubernetes,
which
ones
were
mutable,
and
so
you
could
then
build
like
a
generalized,
opaque
perimeter
reconciler
and
build
that
like
you
could
imagine
it
but,
like
I,
think
that's
a
nightmare
because
of
all
the
weird
edge
cases
that
would
pop
out,
which
is
why
I
think
we
don't
want
to
go
down
that
path.
A
A
Yeah
I
think
I
would
suggest,
following
the
let's
first
class
quality
of
service
and
then
make
that
mutable
and
if
there
are
other
use
cases
where
folks
are
like
hey,
this
thing
should
definitely
be
mutable.
Let's
consider
first
classing
whatever
that
related
field
is
as
well.
A
Would
anybody
on
the
call
be
interested
in
following
up
on
this
on
chasing
this
down
to
the
next
step,
which
is
creating
a
cap.
C
C
A
And
was
that
yeah
perfect.
C
Cool
all
I
guess
start
something
on
slack
or
something
like
that,
and
we
can
figure
out
how
best
to
collaborate.
H
F
C
A
Good
discussion
thanks
a
lot
folks,
any
other
last
minute
comments
on
this
foreign.
A
Then
next
item
is
non-graceful
node
shutdown.
Next
steps,
Shing
was
decided
by
you
I.
D
Just
added
there
so
Ben,
please
take
a
look.
You
know
anyone
else,
who's
interested
okay.
So,
let's
take
a
look.
We
can
maybe
have
a
meeting
to
discuss
this
after
coupon.
D
D
A
And
then,
lastly,
next
week
is
kubecon
North
America
and
there
will
be
a
set
of
Sig
storage
related
events.
You
want
to
go
over
these
real,
quick.
D
Yeah,
it's
it's
actually
on
the
schedule,
so
this
is
for
new
people
who
are
interested
in
learning
how
to
get
started.
You
can
go
there
and
meet
people,
and
then
there
are.
We
also
have
two
sessions.
D
You
know
the
6
30
session
on
Friday
I
will
be
giving
the
session
with
Mauricio
Mauricio
will
be
getting
a
Windows
update,
I
mean
Windows
Deep
dive
actually,
and
we
will
also
be
going
over
the
six
storage
updates
for
1.25
and
1.26
release
and
also
Wednesday,
and
there
is
a
session
on
data
protection
group,
so
Xiang,
Chen
and
I
will
be
giving
that
session
yeah.
So
if
you
are
at
coupon
and
you're
interested
and
please
join
those
sessions
or
events.
A
I'll
start
a
little
thing
here,
which
is
attending.
A
A
All
right
anything
else.
I
I
had
one
quick
question
and
I
apologize
if
this
is
out
of
this
is
not
on
the
agenda,
so
not
sure
how
we
handle
these,
but
we
had
some.
We
had
it.
We
had
some
changes
in
the
mount
utils
repository
that
we
are
looking
to
get
some
reviews
on
haven't
really
had
any
traction
on
it
for
a
while
I
can
send
out
a
link
to
the
pr.
If
that
helps,
and
we
were
hoping
that
somebody
who's
an
official
maintainer
for
that
repository
may
be
able
to
provide
a
review
soon.
A
Yeah,
absolutely
please
throw
a
link
in
here.
C
A
Don't
want
to
put
you
on
the
spot
any
chance.
You
can
help
review
this
one
yeah.
A
All
right,
folks,
anything
else
before
we
go.