►
From YouTube: Kubernetes SIG Windows 20190108
Description
Kubernetes SIG Windows 20190108
A
Hi
everybody
and
welcome
to
another
sick
windows,
meetup
hope
everybody
had
a
pretty
good
vacation
or
time
off
and
we're
starting
the
new
year,
I
actually
started
with
a
ton
of
activity
on
the
testing
front.
I
know:
Patrick
has
been
super
busy
on
the
front
and
likely
give
us
an
update
soon,
but
are
we
ready
to
start
with
the
CRI
continued?
The
update.
B
A
B
There
is
a
setup
script
with
instructions
available
on
how
you
can
set
up
your
own
kubernetes
node,
with
crack
container
D
running
and
one
issue
I'd
like
to
or
not
with,
that
is
that
networking
is
currently
broken,
but
due
to
the
when
CNI
plugin,
but
later
this
week
there
should
be
an
update
that
fixes
that
issue
and
so
for
now,
I've
been
working
on
porting
majority
of
the
cry
test
tests
over
to
Windows
and
for
the
most
part,
that's
finished,
and
you
can
see
the
status
also
in
the
repository
for
that.
B
A
Have
one
quick
question:
I
mean
I,
see
Eileen
here,
so
he'll
probably
might
might
jump
here,
but
one
of
the
issues
that
we
had
with
the
original
implementation
was
that
the
CNI
was
called
on
every
container
in
the
same
namespace
and,
and
that
was
a
little
bit
problematic.
So
the
folks,
the
cloud
base
and
Eileen
specifically
had
asked
with
a
container
d
support.
It
we'll
be
able
to
fix
that
issue.
B
C
A
And
that,
and
that's
perfectly
reasonable,
I
think
there
any
so
I
think
we've
talked
about
this
before
I'd
want
to
go
G
a
our
goal
is
to
only
have
Server
2019
support
and
we've
had
talks.
You
know
Dinesh
and
a
few
others
were
on
the
call
previously
what
we
talked
about
issues
that
we
found
that
their
time
to
pack
for
them
to
Server
2019.
Is
there
anybody
that
will
have
an
objection
to
saying
that
7:19
will
be
the
only
support
of
the
West
at
GA
time.
A
E
D
Is
that,
like
anything,
that's
gonna
be
necessary
for
what's
considered
like
base,
functionality
will
be
back
ported
to
2019
or
any
like
stuffing
overlay
is
the
only
thing
I'm
thinking
of
where
it's
like
didn't
make
it
in
2019,
but
I
was
just
having
this
conversation.
Sorry.
This
is
a
bit
of
attention.
D
C
Think
overlay
is
under
consideration,
but
I
wouldn't
say
that
there's
a
blanket
policy
in
place,
it's
just
sort
of
gonna
be
a
case-by-case
basis
and
so
I
think
we
should
focus
on.
You
know
getting
the
functionality.
That's
there
in
2019
to
stable.
You
know
as
sort
of
the
first
goal,
and
then
you
know
we
can
always
add
more
stuff
on
from
there.
C
But
if
that
means,
you
know
only
using
flannel
and
hood
in
host
gateway
mode,
or
you
know
the
azure
C&I
or
if
we
get
it
equivalent
on
GCE,
because
that
may
be
a
reasonable
first
thing
and
then
we,
you
add
the
vehicle
and
overlay
support
potential
in
kubernetes
version
15,
or
something
like
that.
If
there's
a
problem
where
the
Windows
operating
system
isn't
ready
in
time
for
when
we
need
to
ship
the
kubernetes
release,
so.
A
So
I
had
a
couple
of
other
questions
on
the
continuity
support,
so
so
it
looks
like
you
guys,
obviously
made
a
lot
of
great
progress,
so
that's
awesome
right.
So
is
there
a
target
time
frame
to
that?
Were
you
thinking
that
this
will
be
stable
enough
to
start?
You
know
figuring
out
what
the
next
steps
are
in
terms
of
pushing
it
out.
B
D
C
A
E
It's
the
long
shortage
of
a
long
and
short
of
it
is
we're
planning
on
using
the
config
Maps,
since
there's
really
no
secrets
to
be
accessed,
there's
no
secret
data
being
used
to
create
the
to
use
the
GMs
a
account
there's.
If
you
read
through
the
the
cap,
the
only
thing
that
stands
out
modification
was
that
were
looking
at
or
was
it
the
credential
spec
string
added
to
a
service
account
to
specifically
denote
that
it's
a
GMS
a
and
changing
the
adding
a
use
of
verb
for
deep
commented
on
that
earlier.
E
A
So
so,
jeremy,
most
of
them
most
of
the
work
here
is,
I
don't
want
to
minimize
I,
just
wanna
call
it
config
work,
there's
the
work
to
basically
specify
hey,
which
account
do
you
wanna
use,
and
you
want
to
map
it
down
to
the
container
so
that
the
container
will
obtain
their
identity
in
the
network.
The
two
important
things
here:
how
and
I
know
that
this
was
surface
before
Patrick
is
very
well
aware
of.
E
That
was
one
of
the
reasons
we
looked
at
using
the
config
map,
since
we
can
use
the
build
in
our
back,
that's
in
kubernetes
to
determine
which
kubernetes
moons
are
allowed
to
have
access
to
which
config
map
that
would
contain
the
credential
spec
for
the
GMs,
a
the
issue
that
we
that
deep
was
that,
even
though
you
you
can
list
it
out,
I
guess
so.
There
was
about
changing
the
list,
behavior
for
cred
spec
and
adding
a
use
verb
to
it.
E
F
Jeremy,
maybe
I
can
step
in
here.
My
name
is
Sean
and
I
work
with
Tucker
and
I'm,
not
actually
gonna
be
doing
the
implementation,
and
this
said
the
way
we
plans-
and
this
is
adding
an
admission
controller-
to
actually
check
out
creation
time
that
the
user,
making
the
requests
have
the
authorization
to
use
the.
G
F
A
A
I'll
check
it
yeah
all
right.
That's
okay,
I'll
check
that.
So,
basically,
the
admission
control
will
check
to
your
prospect,
make
sure
you
are
you're
authorized
for
that
and
you're
able
to
use
my
count
now.
Let
me
run
through
a
difference.
Matters
like
from
an
enterprise
and
I
have
like
ten
fifteen
different
applications.
I
might
likely
have
ten
fifteen
GMS
air
consoles
I
need
to
manage.
We
have
to
create
an
15
different
config
Maps.
That
I
will
have
to
offer
eyes
independently
for
this
just.
A
C
C
So
that
way,
that
discussion
doesn't
doesn't
change
later
and
if
they
want
to
start
talking
about
things
like
test
cases
and
stuff
I
think
that
should
all
go
in
the
cap.
But
this
is
something
that's
supposed
to
be
an
iterative
process,
and
so
I
really
want
to
merge
with
just
this
top
matter.
That's
in
there
right
now
and
if
they
don't
do
that,
then
they're
not
following
the
process
and
so
I
want
to
kind
of
you
know
push
on
on
that
side.
D
Mean
I
try
to
just
summarize
all
that
I
know.
You
know
what
works
today.
What
doesn't
work
what's
expected
to
work
in
the
future
and
and
just
linking
to
some
of
the
discussions?
I've
been
had
various
mailing
lists
around
like
what
the
approach
is
gonna
be
for
this,
but
yeah
definitely
agree
with
what
Patrick
says.
It's
just
like
wanted
to
get
something
out
the
door
as
soon
as
possible,
so
we
can
start
like
collaborating
and
getting
that
consensus
founded.
C
And
and
then
you
know
at
cube
con,
you
know
I
also
talked
to
Aaron
who's.
The
released
lead
for
version
14
and
his
ask
you
know
across
the
community
has
been
you
want
to
put
an
enhancement
in
version
14.
Please
have
a
please
have
a
cap
there
and
so
I've
already
passed
this
number
on
to
them,
so
they
could
get
it
on
the
list
of
things
they're
going
to
check.
D
C
A
Have
you
have
you
has
Jace
responded
back
because
I
want
to
make
sure
that
J's
actually
gets
a
chance
to
view
that
he
owes
us
some.
We
always
some
things.
We
need
to
cash
from
him
from
what
happened
last
time.
So
as
a
James
to
us
I
think
he
could
be
a
good
good
first
person
to
look
at
it.
If
he
doesn't
reply
to
you
Ben.
Let
me
it'sa
me
a
quick
like
message
and
I'll
thinking
privately.
C
So
we
picked
one,
and
here
you
go,
but
one
of
those
is
starting
to
add
some
density
tests
v
and
open
that
one
and
I've
got
some
comments
on
that
one
in
terms
of
getting
a
building
and
then
called
you
has
the
other
one
open
that
takes
the
network
tests
were
depending
on
host
networking
and
it
and
turns
host
networking
off
so
that
they
pass
on
Windows.
Did
you?
Are
you
on
the
call
Claudia.
I
I
I
That
this
is
the
chickens
so
that
the
maximum
back
of
timer
is
not
exceeded
by
a
couplet.
But
the
issue
is
that
the
the
sleep
period
between
the
container
met
might
be
a
little
bit
too
short
for
for
Windows
know
that
this
would
be
just
skipping
Windows
validated
tests
from
the
conformance
this
missiles.
So
we
wouldn't
have
to
have
an
exclusion
list
which
can
be
quite
long
and.