Skip to content

Commit 1d05ffa

Browse files
committed
Shorten titles. Avoid fwd-looking statements. Wording.
Signed-off-by: Kurt Garloff <[email protected]>
1 parent 3cfa439 commit 1d05ffa

File tree

3 files changed

+21
-17
lines changed

3 files changed

+21
-17
lines changed

standards/certification/getting-scs-compatible-certified.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
# Getting SCS-compatible certification (for operators)
1+
# Getting SCS-compatible certification
22

33
## Process overview
44

5-
The SCS Certification is a technical certification:
5+
The *SCS-compatible* Certification for Operators is a technical certification:
66
The Operator needs to fulfill technical requirements, such as providing certain
77
APIs and guaranteeing certain platform behavior in order to be certifiable.
88

@@ -20,13 +20,16 @@ The SCS certification process typically consists of a few simple steps:
2020
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
2121
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
2222

23+
The official documentation how to become certified is defined in the
24+
[SCS standard 0004](/standards/scs-0004-v1-achieving-certification).
25+
26+
2327
## Self-testing and technical adjustments
2428

2529
In order for a cloud service offering to obtain a certificate, it has to
2630
conform to all standards of the respective scope, which will be tested at
2731
regular intervals, and the results of these tests will be made available
28-
publicly. For more details on how to become certified, please consult the
29-
corresponding [document](/standards/scs-0004-v1-achieving-certification).
32+
publicly.
3033

3134
The best approach to get your cloud into compliance is by installing the
3235
test suite locally. Have a look at the
@@ -69,15 +72,12 @@ Note that there will be a nightly job that tests the cloud for compliance, which
6972
triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs
7073
to be provided free of charge. (This only requires very low quota, one VM is created for a minute
7174
in one of the tests.)
72-
The list of certified clouds will be replaced by the
73-
[compliance monitor](https://compliance.sovereignit.cloud/page/table) soon.
7475

7576
For clouds not being accessible from the outside, a VPN tunnel or a local monitoring
7677
job (with result upload) can be used.
7778

78-
Next to the addition into the list, we also plan to create an SCS-certified badge that
79-
operators will be allowed to use in their marketing material as long as they fulfill the
80-
certification conditions.
79+
Please let us know if you want us to create an official SCS-certified badge that
80+
can be used in your marketing material beyond pointing to our list.
8181

8282
Note that for almost all certified clouds in the list of certified clouds, we also
8383
have a health monitor running (currently still
@@ -88,12 +88,15 @@ This provides some transparency on the state of the clouds by constantly running
8888
scenario tests against them and is tremendously helpful for both the cloud operations
8989
teams and their customers. Strictly speaking, it is *not* a requirement for the
9090
*SCS-compatible* certification, just best practice. It will be part of an
91-
SCS-sovereign certification though, where transparency on operational aspects
91+
*SCS-sovereign* certification though, where transparency on operational aspects
9292
is included.
9393

9494
## Staying compliant
9595

96-
Once your cloud is listed in the list of certified clouds or in the compliance manager, it
96+
Once your cloud is listed in the
97+
[list of certified clouds](https://docs.scs.community/standards/certification/overview)
98+
or in the upcoming
99+
[compliance manager]((https://compliance.sovereignit.cloud/page/table), it
97100
will enjoy the nightly tests. These might fail for a number of reasons:
98101

99102
* There is a new version of the SCS standards in effect and you need to adjust things.
@@ -109,5 +112,5 @@ These are executed from the
109112
By looking at the logs from the github actions, you can typically see why the failure
110113
happened. You could of course also do a local test again to see if the issue can
111114
be reproduced.
112-
In the compliance manager, we will add links to the log files directly on the table,
113-
so it will be even easier to find the relevant log.
115+
In the compliance manager (executing tests via zuul), we will add links to the log
116+
files directly on the table, so it will be even easier to find the relevant log files.

standards/certification/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Compliant cloud environments overview
1+
# Compliant clouds overview
22
<!-- markdownlint-disable -->
33

44
This is a list of clouds that we test on a nightly basis against the certificate scope _SCS-compatible IaaS_.

standards/certification/test-and-adapt-example.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Example testing and adjustment for SCS IaaS-compatible compliance
1+
# SCS-compatible IaaS: Example test and adjust
22

33
## Run the tests
44

@@ -39,7 +39,7 @@ WARNING: Missing recommended flavor 'SCS-4V-32-100'
3939
WARNING: Missing recommended flavor 'SCS-1L-1-5'
4040
DEBUG: Total critical / error / info: 0 / 2 / 0
4141
DEBUG: Fetching image list from cloud 'ciab-test'
42-
DEBUG: Images present: Cirros 0.6.1, Cirros 0.6.2, Debian 12, EVIL2, EVIL3, Ubuntu 22.04 Minimal, disk-bf.qcow2, disk-vmdk.vmdk, openSUSE 15.5, openSUSE 15.6
42+
DEBUG: Images present: Cirros 0.6.1, Cirros 0.6.2, Debian 12, Ubuntu 22.04 Minimal, openSUSE 15.6
4343
DEBUG: Checking 6 image specs against 10 images
4444
ERROR: Missing mandatory image 'Ubuntu 22.04'
4545
WARNING: Missing recommended image 'ubuntu-capi-image'
@@ -58,7 +58,7 @@ CIAB SCS-compatible IaaS v4 (effective):
5858
```
5959

6060
So we run the *SCS-compatible IaaS* tests defined in `scs-compatible-iaas.yaml` in version `v4`; without option `-V`,
61-
the latest effective version would have been used. We further define the cloud to be named `CIAB` (short for
61+
all active versions would have been used, producing more output. We further define the cloud to be named `CIAB` (short for
6262
Cloud-in-a-Box) in the report. And we set the parameter `os_cloud` to `ciab-test`. This references the
6363
name of the cloud as configured in OpenStack `clouds.yaml` and `secure.yaml` which contain the configuration
6464
and credentials to access the cloud as tenant user via the API (SDK or CLI).
@@ -71,6 +71,7 @@ Let's have a look at the results:
7171
* The end result is that we passed three tests and failed to comply with two specs:
7272

7373
```yaml
74+
- FAILED:
7475
- standard-flavors-check:
7576
> Must fulfill all requirements of https://docs.scs.community/standards/scs-0103-v1-standard-flavors
7677
- standard-images-check:

0 commit comments

Comments
 (0)