Date   

Re: [RESULT] TOC Selected Seat, 2023

Alex Chircop
 

Congratulations Erin!    and thank you so much Dims for all your hard work and contributions!

Kind regards,
Alex


On Tue, Mar 14, 2023 at 7:29 PM Amye Scavarda Perrin <ascavarda@...> wrote:
I'm pleased to announce the results of the TOC Election for the TOC chosen seat, please welcome Erin Boyd to the TOC.

Many thanks to our additional candidates for this round:
Ricardo Aravena
Phil Estes
Rey Lejano
Saiyam Pathak
Xing Yang

Finally, thank you to Davanum Srinivas for his work on the TOC! 

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...



This email and any attachments are confidential to the intended recipient and may also be privileged or copyrighted material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you are not the intended recipient please delete it from your system and notify the sender. StorageOS Ltd is a company registered in England and Wales with company number 09614942. Registered office address: 2 Minton Place, Victoria Road, Bicester, Oxfordshire, OX26 6QB.


[RESULT] TOC Selected Seat, 2023

Amye Scavarda Perrin
 

I'm pleased to announce the results of the TOC Election for the TOC chosen seat, please welcome Erin Boyd to the TOC.

Many thanks to our additional candidates for this round:
Ricardo Aravena
Phil Estes
Rey Lejano
Saiyam Pathak
Xing Yang

Finally, thank you to Davanum Srinivas for his work on the TOC! 

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


Re: Expectations and updates from the TOC

Chris Short
 

Thank you for what y'all do. I know it's not easy and is more like threading a needle from an airplane at 40,000 feet. But, each and everyone of you is appreciated by the community.

Chris Short
He/Him/His
EKS Product Marketing
Kubernetes Contributor Comms Co-Lead
TZ=America/Detroit

On Mar 14, 2023, at 12:03, Emily Fox <themoxiefoxatwork@...> wrote:

CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.


Community members, Projects, and Adopters,
 
  As you know we, the TOC, are currently managing a lot of open issues and requests from community members who have asked us to more accurately reflect the current state of project maturity, evaluations, reviews, and in general our processes. At the moment, we’re working on getting a handle on these requests, organizing them into meaningful streams of work and core areas of focus for us and the community to pursue, while balancing the existing and ongoing obligations and activities assigned to the TOC. We feel your additional perspective and concerns provide us key insights that — when taken together with other feedback and observations — can be integrated into a positive and actionable solution in alignment with our principles.
 
  We ask that your give us some time to sort through these. We all thank you for being a valued community member interested in improving the experience not only for projects but for our community and adopters.

-Emily Fox


Re: Expectations and updates from the TOC

alexis richardson
 

thank you Emily and TOC

On Tue, Mar 14, 2023 at 4:03 PM Emily Fox <themoxiefoxatwork@...> wrote:

Community members, Projects, and Adopters,

As you know we, the TOC, are currently managing a lot of open issues and requests from community members who have asked us to more accurately reflect the current state of project maturity, evaluations, reviews, and in general our processes. At the moment, we’re working on getting a handle on these requests, organizing them into meaningful streams of work and core areas of focus for us and the community to pursue, while balancing the existing and ongoing obligations and activities assigned to the TOC. We feel your additional perspective and concerns provide us key insights that — when taken together with other feedback and observations — can be integrated into a positive and actionable solution in alignment with our principles.

We ask that your give us some time to sort through these. We all thank you for being a valued community member interested in improving the experience not only for projects but for our community and adopters.

-Emily Fox


Expectations and updates from the TOC

Emily Fox
 

Community members, Projects, and Adopters,
 
  As you know we, the TOC, are currently managing a lot of open issues and requests from community members who have asked us to more accurately reflect the current state of project maturity, evaluations, reviews, and in general our processes. At the moment, we’re working on getting a handle on these requests, organizing them into meaningful streams of work and core areas of focus for us and the community to pursue, while balancing the existing and ongoing obligations and activities assigned to the TOC. We feel your additional perspective and concerns provide us key insights that — when taken together with other feedback and observations — can be integrated into a positive and actionable solution in alignment with our principles.
 
  We ask that your give us some time to sort through these. We all thank you for being a valued community member interested in improving the experience not only for projects but for our community and adopters.

-Emily Fox


k8s.gcr.io Redirect to registry.k8s.io - What You Need to Know

Davanum Srinivas
 

FYI if you are running an older k8s cluster, here's a heads up from the community.

thanks,
Dims

---------- Forwarded message ---------
From: 'Chris Short' via leads <leads@...>
Date: Mon, Mar 13, 2023 at 3:02 AM
Subject: k8s.gcr.io Redirect to registry.k8s.io - What You Need to Know
To: <dev@...>, <leads@...>


Last  Friday, the following was published in the Kubernetes blog and is available at https://k8s.io/image-registry-change:

TL;DR: What you need to know about this change

  • On Monday, March 20th, traffic from the older k8s.gcr.io registry will be redirected to registry.k8s.io with the eventual goal of sunsetting k8s.gcr.io.
  • If you run in a restricted environment, and apply strict domain name or IP address access policies limited to k8s.gcr.iothe image pulls will not function after k8s.gcr.io starts redirecting to the new registry. 
  • A small subset of non-standard clients do not handle HTTP redirects by image registries, and will need to be pointed directly at registry.k8s.io.
  • The redirect is a stopgap to assist users in making the switch. The deprecated k8s.gcr.io registry will be phased out at some point. Please update your manifests as soon as possible to point to registry.k8s.io.
  • If you host your own image registry, you can copy images you need there as well to reduce traffic to community owned registries.

If you think you may be impacted, or would like to know more about this change, please keep reading.

How can I check if I am impacted?

To test connectivity to registry.k8s.io and being able to pull images from there, here is a sample command that can be executed in the namespace of your choosing:

kubectl run hello-world -ti --rm --image=registry.k8s.io/busybox:latest --restart=Never -- date

When you run the command above, here’s what to expect when things work correctly:

$ kubectl run hello-world -ti --rm --image=registry.k8s.io/busybox:latest --restart=Never -- date
Fri Feb 31 07:07:07 UTC 2023
pod "hello-world" deleted

What kind of errors will I see if I’m impacted?

Errors may depend on what kind of container runtime you are using, and what endpoint you are routed to, but it should present such as ErrImagePullImagePullBackOff, or a container failing to be created with the warning FailedCreatePodSandBox.

Below is an example error message showing a proxied deployment failing to pull due to an unknown certificate:

FailedCreatePodSandBox: Failed to create pod sandbox: rpc error: code = Unknown desc = Error response from daemon: Head “https://us-west1-docker.pkg.dev/v2/k8s-artifacts-prod/images/pause/manifests/3.8”: x509: certificate signed by unknown authority

What images will be impacted?

ALL images on k8s.gcr.io will be impacted by this change. k8s.gcr.io hosts many images beyond Kubernetes releases. A large number of Kubernetes subprojects host their images there as well. Some examples include the dns/k8s-dns-node-cacheingress-nginx/controller, and node-problem-detector/node-problem-detector images.

I am impacted. What should I do?

For impacted users that run in a restricted environment, the best option is to copy over the required images to a private registry or configure a pull-through cache in their registry.

There are several tools to copy images between registries; crane is one of those tools, and images can be copied to a private registry by using crane copy SRC DST. There are also vendor-specific tools, like e.g. Google’s gcrane, that perform a similar function but are streamlined for their platform.

How can I find which images are using the legacy registry, and fix them?

Option 1: See the one line kubectl command in our earlier blog post:

kubectl get pods --all-namespaces -o jsonpath="{.items[*].spec.containers[*].image}" |\
tr -s '[[:space:]]' '\n' |\
sort |\
uniq -c

Option 2: A kubectl krew plugin has been developed called community-images, that will scan and report any images using the k8s.gcr.io endpoint.

If you have krew installed, you can install it with:

kubectl krew install community-images

and generate a report with:

kubectl community-images

For alternate methods of install and example output, check out the repo: kubernetes-sigs/community-images.

Option 3: If you do not have access to a cluster directly, or manage many clusters - the best way is to run a search over your manifests and charts for "k8s.gcr.io".

Option 4: If you wish to prevent k8s.gcr.io based images from running in your cluster, example policies for Gatekeeper and Kyverno are available in the AWS EKS Best Practices repository that will block them from being pulled. You can use these third-party policies with any Kubernetes cluster.

Option 5: As a LAST possible option, you can use a Mutating Admission Webhook to change the image address dynamically. This should only be considered a stopgap till your manifests have been updated. You can find a (third party) Mutating Webhook and Kyverno policy in k8s-gcr-quickfix.

Why did Kubernetes change to a different image registry?

k8s.gcr.io is hosted on a custom Google Container Registry (GCR) domain that was set up solely for the Kubernetes project. This has worked well since the inception of the project, and we thank Google for providing these resources, but today, there are other cloud providers and vendors that would like to host images to provide a better experience for the people on their platforms. In addition to Google’s renewed commitment to donate $3 million to support the project's infrastructure last year, Amazon Web Services announced a matching donation during their Kubecon NA 2022 keynote in Detroit. This will provide a better experience for users (closer servers = faster downloads) and will reduce the egress bandwidth and costs from GCR at the same time.

For more details on this change, check out registry.k8s.io: faster, cheaper and Generally Available (GA).

Why is a redirect being put in place?

The project switched to registry.k8s.io last year with the 1.25 release; however, most of the image pull traffic is still directed at the old endpoint k8s.gcr.io. This has not been sustainable for us as a project, as it is not utilizing the resources that have been donated to the project from other providers, and we are in the danger of running out of funds due to the cost of serving this traffic.

A redirect will enable the project to take advantage of these new resources, significantly reducing our egress bandwidth costs. We only expect this change to impact a small subset of users running in restricted environments or using very old clients that do not respect redirects properly.

What will happen to k8s.gcr.io?

Separate from the the redirect, k8s.gcr.io will be frozen and will not be updated with new images after April 3rd, 2023k8s.gcr.io will not get any new releases, patches, or security updates. It will continue to remain available to help people migrate, but it WILL be phased out entirely in the future.

I still have questions, where should I go?

For more information on registry.k8s.io and why it was developed, see registry.k8s.io: faster, cheaper and Generally Available.

If you would like to know more about the image freeze and the last images that will be available there, see the blog post: k8s.gcr.io Image Registry Will Be Frozen From the 3rd of April 2023.

Information on the architecture of registry.k8s.io and its request handling decision tree can be found in the kubernetes/registry.k8s.io repo.

If you believe you have encountered a bug with the new registry or the redirect, please open an issue in the kubernetes/registry.k8s.io repoPlease check if there is an issue already open similar to what you are seeing before you create a new issue.

--
To unsubscribe from this group and stop receiving emails from it, send an email to leads+unsubscribe@....


--
Davanum Srinivas :: https://twitter.com/dims


Re: [VOTE] Keycloak for incubation

Duffie Cooley
 

+1 binding


Re: [WG Platforms] "Platforms for cloud-native computing" whitepaper content ready - please review!

Josh Gavant
 

Hi folks - we've opened this issue to capture discussion and feedback and will finalize and merge this PR once everyone has a chance to review. If you want to have a public discussion about anything in the paper consider commenting on those. Alternatively, feel free to reach out to all of us in #wg-platforms on Slack or even DM me there 😊.


Re: [WG Platforms] "Platforms for cloud-native computing" whitepaper content ready - please review!

Josh Gavant
 

Thanks for the feedback Emily. Responses:

> Are you all planning to add any use cases or user stories about organizations that have built a platform for cloud native computing in a future version?

This version lists ~5 generic use cases here gathered from our research and customer work but the main purpose of that list is to help readers grasp the concepts.

We'd like to directly gather user stories and use cases in support or refutation of ideas in the paper and other new ideas in a vendor-neutral way and publish them in our repos. Can folks share guidance with us on how to reach CNCF customers, ideally without involving vendors? We propose a survey at time of publication and would also pursue interviews of those customers. The data and unstructured comments we gather would be shared openly.

> Are you also planning to provide guidance or information to projects that are working on making a user experience on a platform better – the specific needs adopters building out platforms would have?

We propose to go a level deeper into all the attributes and capabilities the paper enumerates for platforms, including adopting a product/customer-centric mindset and providing good user experiences. Here's the issue where we're tracking product mindset work explicitly, please help us: https://github.com/cncf/tag-app-delivery/issues/282. I personally hope we'll eventually refine understanding of the capabilities enabled by portals like Backstage (which may be on your mind :D) - e.g. component catalog, template engine, doc framework and search.

We're just starting to pursue opportunities within capability domains to simplify, standardize and reduce complexity for platform builders and users, check out all our labelled issues here: https://github.com/cncf/tag-app-delivery/labels/wg-platforms


containerd fuzzing audit

Adam Korczynski <Adam@...>
 

Hello all,

containerd recently completed their fuzzing audit which resulted in a comprehensive fuzzing suite running continuously by way of OSS-Fuzz and in the CI covering multiple critical parts of the code base. The fuzzers found 4 issues, including a memory-exhaustion vulnerability of moderate severity.

You can read more about the audit in this blog post: https://www.cncf.io/blog/2023/03/02/containerd-completes-fuzzing-audit/

Many other projects have completed fuzzing audits, including Vitess, Argo, Kubernetes, Cluster-API, Cilium. You can read more about fuzzing the CNCF landscape here: https://www.cncf.io/blog/2022/06/28/improving-security-by-fuzzing-the-cncf-landscape/.

If you wish to have a fuzzing audit carried out for your CNCF-hosted project, please reach out to the CNCF.

Kind regards,
Adam Korczynski
Security Engineer, Ada Logics

ADA Logics Ltd is registered in England. No: 11624074.
Registered office: 266 Banbury Road, Post Box 292,
OX2 7DL, Oxford, Oxfordshire , United Kingdom


Qualified Nominees for TOC Elected Seat, 2023

Amye Scavarda Perrin
 

Hi all, 
Pleased to announce the nominees for the TOC elected seat for 2023. 

Ricardo Aravena
Erin Boyd
Phil Estes
Rey Lejano
Saiyam Pathak
Xing Yang

Ballots are distributed to the TOC members at this time, this election will complete on March 14, 2023 at noon Pacific. 

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


New Sandbox Projects as of 3/7

Amye Scavarda Perrin
 

Two new projects have been approved by the TOC: 
Clusternet - https://github.com/cncf/sandbox/issues/10#issuecomment-1458527529
Inspektor Gadget - https://github.com/cncf/sandbox/issues/7#issuecomment-1458528110

Welcome new sandbox projects! 

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


Re: [WG Platforms] "Platforms for cloud-native computing" whitepaper content ready - please review!

Emily Fox
 

This is a great read Josh!  Are you all planning to add any use cases or user stories about organizations that have built a platform for cloud native computing in a future version? Are you also planning to provide guidance or information to projects that are working on making a user experience on a platform better – the specific needs adopters building out platforms would have?  I'm not sure if these are current needs, however there has been more interest from adopters around this topic, what makes a good platform, challenges in sustaining, etc. 

~Emily Fox


Agenda for March 7 TOC meeting

Amye Scavarda Perrin
 

Hi all, 
We'll be meeting tomorrow at 8am Pacific.
Presentation: https://docs.google.com/presentation/d/1cBsHyFWJ3tMU8_VFYRe_pJF-M-UZ56HBdUF62420i78/edit#slide=id.g25ca91f87f_0_0 

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


[RESULT] OpenKruise approved for incubation

Amye Scavarda Perrin
 

OpenKruise has been approved for incubation: https://lists.cncf.io/g/cncf-toc/message/7763

+1 Binding
9/11
Lei Zhang: https://lists.cncf.io/g/cncf-toc/message/7765
Davanum Srinivas: https://lists.cncf.io/g/cncf-toc/message/7810
Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/7817
Cathy Zhang: https://lists.cncf.io/g/cncf-toc/message/7818
Emily Fox: https://lists.cncf.io/g/cncf-toc/message/7820
Ricardo Rocha: https://lists.cncf.io/g/cncf-toc/message/7827
Erin Boyd: https://lists.cncf.io/g/cncf-toc/message/7829
Matt Farina: https://lists.cncf.io/g/cncf-toc/message/7831
Dzolo

+1 NB:
Jianbo Sun: https://lists.cncf.io/g/cncf-toc/message/7770
Daniel Deeney: https://lists.cncf.io/g/cncf-toc/message/7773
bh4aws@..: .https://lists.cncf.io/g/cncf-toc/message/7778
ophira0110@...: https://lists.cncf.io/g/cncf-toc/message/7781
13611129507@...: https://lists.cncf.io/g/cncf-toc/message/7785
ChrisLiu: https://lists.cncf.io/g/cncf-toc/message/7788
bussanq@...: https://lists.cncf.io/g/cncf-toc/message/7789
francis.x.ni@...: https://lists.cncf.io/g/cncf-toc/message/7790
Bing Wang: https://lists.cncf.io/g/cncf-toc/message/7792
mingele.chen@...: https://lists.cncf.io/g/cncf-toc/message/7793
Sean: https://lists.cncf.io/g/cncf-toc/message/7794
TomYu: https://lists.cncf.io/g/cncf-toc/message/7796
smartdoc647@...: https://lists.cncf.io/g/cncf-toc/message/7798
qixiaobo.nj@...: https://lists.cncf.io/g/cncf-toc/message/7802
doraemonext@...: https://lists.cncf.io/g/cncf-toc/message/7804
Christopher Adigun: https://lists.cncf.io/g/cncf-toc/message/7805
chasecheng1122@...: https://lists.cncf.io/g/cncf-toc/message/7808
maxmiles39@...: https://lists.cncf.io/g/cncf-toc/message/7823

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


Re: [VOTE] Keycloak for incubation

Francis Pouatcha
 

+1


From: cncf-toc@... <cncf-toc@...> on behalf of sebastian.schuster via lists.cncf.io <sebastian.schuster=bosch-si.com@...>
Sent: Wednesday, March 1, 2023 3:46 PM
To: cncf-toc@... <cncf-toc@...>
Subject: Re: [cncf-toc] [VOTE] Keycloak for incubation
 
+1 NB


Re: [VOTE] Keycloak for incubation

Rahul Jadhav
 

+1 NB

On Fri, Feb 24, 2023 at 2:53 AM Amye Scavarda Perrin <ascavarda@...> wrote:
Keycloak has applied to be included at the incubation level.

PR: https://github.com/cncf/toc/pull/463
DD: https://docs.google.com/document/d/1oLCHd6b-jkISl-9ACy3hlDEmSoRKai3McKBcizBTxbc/edit?usp=sharing

Richardo Rocha is the TOC sponsor for this project, has called for public comment and has approved a call for a public vote. (https://lists.cncf.io/g/cncf-toc/message/7869)

Please vote (+1/0/-1) by replying to this thread.

Remember that the TOC has binding votes only, but we do appreciate non-binding votes from the community as a sign of support!

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


[WG Platforms] "Platforms for cloud-native computing" whitepaper content ready - please review!

Josh Gavant
 

Hi TOC members. As discussed in #310 and #315 and thanks to many great contributors, TAG App Delivery's WG Platforms has wrapped up content development for our whitepaper defining Platforms for cloud-native computing and we're pleased to share it with you all for final review: https://github.com/cncf/tag-app-delivery/blob/platforms-v1alpha1/platforms-whitepaper/v1alpha1/paper.md
 
The TAG/WG's goal in publishing this whitepaper is to help enterprise leaders and platform builders understand what internal platforms are and the values they promise; and offer succinct guidance on building effective platforms and platform teams. We believe effective platforms will a) enable cloud users to get more from cloud computing and b) help CNCF projects position themselves to users as part of such a platform.

Alongside your review we're seeking a copy-edit and preparing a web site and other channels to distribute this broadly. We'll shift from `v1alpha1` to `v1` to signify final acceptance, along the lines of this draft PR. We intend to publish in early April in time for Kubecon Amsterdam. Follow and contribute to progress here: https://github.com/cncf/tag-app-delivery/milestone/2.
 
The next goals of WG Platforms include the following, follow along in these GitHub issues and join our meetings and Slack channel to learn more and contribute!
 
  1. Gather user feedback on platform adoption and the paper's guidance and improve it
  2. Go deep into individual platform capabilities and drive reduction of complexity in them
  3. Develop example platforms based on our work as guidance to users

Thank you for your feedback and support!

Best,
Josh


Re: [VOTE] Keycloak for incubation

Austin Mayberry
 

+1

On Thu, Feb 23, 2023 at 4:23 PM Amye Scavarda Perrin <ascavarda@...> wrote:
Keycloak has applied to be included at the incubation level.

PR: https://github.com/cncf/toc/pull/463
DD: https://docs.google.com/document/d/1oLCHd6b-jkISl-9ACy3hlDEmSoRKai3McKBcizBTxbc/edit?usp=sharing

Richardo Rocha is the TOC sponsor for this project, has called for public comment and has approved a call for a public vote. (https://lists.cncf.io/g/cncf-toc/message/7869)

Please vote (+1/0/-1) by replying to this thread.

Remember that the TOC has binding votes only, but we do appreciate non-binding votes from the community as a sign of support!

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...


Re: [VOTE] Keycloak for incubation

Christopher Pisano
 

+1NB

On Thu, Feb 23, 2023 at 4:23 PM Amye Scavarda Perrin <ascavarda@...> wrote:
Keycloak has applied to be included at the incubation level.

PR: https://github.com/cncf/toc/pull/463
DD: https://docs.google.com/document/d/1oLCHd6b-jkISl-9ACy3hlDEmSoRKai3McKBcizBTxbc/edit?usp=sharing

Richardo Rocha is the TOC sponsor for this project, has called for public comment and has approved a call for a public vote. (https://lists.cncf.io/g/cncf-toc/message/7869)

Please vote (+1/0/-1) by replying to this thread.

Remember that the TOC has binding votes only, but we do appreciate non-binding votes from the community as a sign of support!

--
Amye Scavarda Perrin | Director of Developer Programs, CNCF | amye@...



--
Christopher Pisano | Director of Engineering
732.300.9260 | Email | Calendar

MORNING CONSULT | Intelligent Data, Intelligent Decisions