Re: next steps on "opening up the cluster"
Jason Mendenhall
I think it's important to ensure that we don't end up with projects scattered across multiple locations.
The objective should always be to put all projects on the cluster. In my opinion, it's one of our strengths as an organization.
We currently have a multi-tenant cloud environment for provisioning VMs and a section where dedicated hardware can be leveraged.
We have contemplated the idea that we should provide $0/timed access to the multi-tenant space "the CNCF cloud" to all members. In essence, you get a login and off you go and all dedicated hardware projects would follow the process
Chris outlined.
Are we deviating from that approach? Our we missing some execution steps to opening it up? Does the cluster committee need to assemble to discuss how we might do this?
I've been out for a couple of weeks so I may be out of the loop. If any of this is redundant, apologies from the clueless guy.
Jason M.
702.333.6570
CONFIDENTIAL INFORMATIONThis email message, its chain, and any attachments: (a) may include proprietary information, trade secrets, confidential information and/or other protected information ("Confidential Information") which are hereby labeled as Confidential for protection purposes, (b) is sent to you in confidence with a reasonable expectation of privacy, (c) may be protected by confidentiality agreements requiring this notice and/or identification, and (d) is not intended for transmission to, or receipt by unauthorized persons. If you are not the intended recipient, please notify the sender immediately by telephone or by replying to this message. Please then delete this message, any attachments, chains, copies or portions from your system(s). Thank you. CONFIDENTIAL INFORMATIONThis email message, its chain, and any attachments: (a) may include proprietary information, trade secrets, confidential information and/or other protected information ("Confidential Information") which are hereby labeled as Confidential for protection purposes, (b) is sent to you in confidence with a reasonable expectation of privacy, (c) may be protected by confidentiality agreements requiring this notice and/or identification, and (d) is not intended for transmission to, or receipt by unauthorized persons. If you are not the intended recipient, please notify the sender immediately by telephone or by replying to this message. Please then delete this message, any attachments, chains, copies or portions from your system(s). Thank you. |
|