Skip to content

Commit 9154dba

Browse files
committed
Use italics for *SCS-compatible* and the other levels.
Signed-off-by: Kurt Garloff <[email protected]>
1 parent 589556d commit 9154dba

File tree

3 files changed

+21
-17
lines changed

3 files changed

+21
-17
lines changed

standards/certification/cert-levels.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,12 @@ operators of the infrastructure what compliance rules they fulfill.
1414
The SCS project however has defined certification levels for levels two,
1515
three and four in the sovereignty taxonomy.
1616

17-
| Digital Sovereignty level | SCS certification |
18-
|-----------------------------------|-------------------------|
19-
| 1: Data Sov'ty / Legal compliance | (Refer to ENISA/Gaia-X) |
20-
| 2: Provider switching / Tech Compatiiblity | SCS-compatible |
21-
| 3: Ability to shape technology | SCS-open |
22-
| 4: Transparency & SKills for Operations | SCS-sovereign |
17+
| Digital Sovereignty level | SCS certification |
18+
|-----------------------------------|---------------------------|
19+
| 1: Data Sov'ty / Legal compliance | (Refer to ENISA/Gaia-X) |
20+
| 2: Provider switching / Tech Compatiiblity | *SCS-compatible* |
21+
| 3: Ability to shape technology | *SCS-open* |
22+
| 4: Transparency & SKills for Operations | *SCS-sovereign* |
2323

2424
As of September 2024, the *SCS-compatible* certification level is defined
2525
and used; the details for the higher levels are still being worked on.

standards/certification/getting-scs-compatible-certified.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The SCS certification process typically consists of a few simple steps:
1717
3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the
1818
OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can
1919
be paid without becoming a member.
20-
4. The cloud can be listed on the SCS pages as SCS-compatible with a compatibility status that is
20+
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
2121
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
2222

2323
## Self-testing and technical adjustments
@@ -32,14 +32,14 @@ The best approach to get your cloud into compliance is by installing the
3232
test suite locally. Have a look at the
3333
[example](/standards/certification/test-and-adapt-example).
3434

35-
A description how SCS-compatible IaaS compliance can be achieved on environments that use different
35+
A description how *SCS-compatible IaaS* compliance can be achieved on environments that use different
3636
OpenStack implementations is written up in a blog article
3737
[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/).
3838

3939
## Declarations
4040

41-
For the SCS-compatible IaaS v5 standard, the providers must -- if they implement availability zones
42-
at all (which is optional) -- guarantee certain levels of independence for these. This can not
41+
For the SCS-compatible IaaS v5 standard, the providers must if they implement availability zones
42+
at all (which is optional) guarantee certain levels of independence for these. This can not
4343
be fully tested by an automated test. The process thus envisions that providers must create some
4444
documentation on the physical infrastructure and how it maps to availability zones and declare that
4545
this documentation reflects the truth. SCS will review the docs and judge whether they meet the
@@ -55,8 +55,7 @@ process.
5555
Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership
5656
fee, providing the financial resources for the Forum to do its work. Membership in the OSBA is
5757
open to any organization that supports the goals of the OSBA.
58-
Alternatively, a certification fee can be paid without any membership; the fee corresponds to the
59-
lower tier membership fee.
58+
Alternatively, a certification fee can be paid without any membership.
6059

6160
## Getting listed and tested
6261

@@ -88,7 +87,7 @@ which exposes information on the performance and error rate of each cloud.
8887
This provides some transparency on the state of the clouds by constantly running
8988
scenario tests against them and is tremendously helpful for both the cloud operations
9089
teams and their customers. Strictly speaking, it is *not* a requirement for the
91-
SCS-compatible certification, just best practice. It will be part of an
90+
*SCS-compatible* certification, just best practice. It will be part of an
9291
SCS-sovereign certification though, where transparency on operational aspects
9392
is included.
9493

@@ -99,7 +98,7 @@ will enjoy the nightly tests. These might fail for a number of reasons:
9998

10099
* There is a new version of the SCS standards in effect and you need to adjust things.
101100
* Your cloud was unreachable or otherwise had intermittent issues.
102-
* You have done changes to your cloud that break SCS-compatible compliance.
101+
* You have done changes to your cloud that break *SCS-compatible* compliance.
103102
* The test automation engine (github actions / zuul) is in trouble.
104103
* The tests have a bug.
105104

standards/certification/test-and-adapt-example.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ e.g. by issuing a command like `openstack --os-cloud=MYCLOUD catalog list` or
1414
`KUBECONFIG=~/.kube/MYCLUSTER.yaml kubectl get nodes -o wide`.
1515

1616
Let's do a run against a sample environment:
17+
1718
```bash
1819
garloff@framekurt(//):/casa/src/SCS/standards/Tests [1]$ ./scs-compliance-check.py -V v4 -s CIAB -a os_cloud=ciab-test scs-compatible-iaas.yaml
1920
INFO: module opc-v2022.11 missing checks or test cases
@@ -56,7 +57,7 @@ CIAB SCS-compatible IaaS v4 (effective):
5657
> Must fulfill all requirements of https://docs.scs.community/standards/scs-0104-v1-standard-images
5758
```
5859

59-
So we run the SCS-compatible IaaS tests defined in `scs-compatible-iaas.yaml` in version `v4`; without option `-V`,
60+
So we run the *SCS-compatible IaaS* tests defined in `scs-compatible-iaas.yaml` in version `v4`; without option `-V`,
6061
the latest effective version would have been used. We further define the cloud to be named `CIAB` (short for
6162
Cloud-in-a-Box) in the report. And we set the parameter `os_cloud` to `ciab-test`. This references the
6263
name of the cloud as configured in OpenStack `clouds.yaml` and `secure.yaml` which contain the configuration
@@ -68,6 +69,7 @@ Let's have a look at the results:
6869
We also receive 13 warnings for not having recommended flavors, we can ignore them for now.
6970
* On the images side, the mandatory image `Ubuntu 22.04` is not registered.
7071
* The end result is that we passed three tests and failed to comply with two specs:
72+
7173
```yaml
7274
- standard-flavors-check:
7375
> Must fulfill all requirements of https://docs.scs.community/standards/scs-0103-v1-standard-flavors
@@ -81,6 +83,7 @@ the entropy test and the image metadata test.
8183
## Address issues
8284

8385
To fix the failures, we will thus need to:
86+
8487
* Add properties to the two flavors where they are missing.
8588
* Register the `Ubuntu 22.04` image (with the appropriate metadata).
8689

@@ -101,7 +104,9 @@ INFO: Flavor SCS-4V-16: SET scs:name-v1=SCS-4V:16
101104
INFO: Flavor SCS-4V-16: SET scs:name-v2=SCS-4V-16
102105
INFO: Processed 15 flavors, 6 changes
103106
```
107+
104108
and as this is a OSISM-based SCS system, we can on the manager just run the image manager:
109+
105110
```shell
106111
dragon@manager:~$ osism manage images --cloud admin --filter "Ubuntu 22.04"
107112
2024-09-23 13:21:43 | INFO | Processing image 'Ubuntu 22.04 (20240705)'
@@ -142,14 +147,14 @@ dragon@manager:~$ osism manage images --cloud admin --filter "Ubuntu 22.04"
142147
dragon@manager:~$
143148
```
144149

145-
A description how SCS-compatible IaaS compliance can be achieved on environments that use different
150+
A description how *SCS-compatible IaaS* compliance can be achieved on environments that use different
146151
OpenStack implementations is written up in a blog article
147152
[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/de/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/).
148153

149-
150154
## Rerun tests
151155

152156
We now succeed:
157+
153158
```shell
154159
garloff@framekurt(//):/casa/src/SCS/standards/Tests [130]$ ./scs-compliance-check.py -V v4 -s CIAB -a os_cloud=ciab-test scs-compatible-iaas.yaml
155160
INFO: module opc-v2022.11 missing checks or test cases

0 commit comments

Comments
 (0)