Skip to content

Commit a51f28e

Browse files
committed
Move Getting Certified into scs-0004-w1. Move example into Blog.
This follows the suggestions from the discussion on PR #523. - Rather than having an independent description of what scs-0004-v1 means in practice, let's have it as implementation notes, making it easier to keep things aligned. - The example fits better into a blog format. Signed-off-by: Kurt Garloff <[email protected]>
1 parent a92e2b0 commit a51f28e

File tree

3 files changed

+8
-278
lines changed

3 files changed

+8
-278
lines changed

sidebarsStandards.js

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ const sidebars = {
2121
items: require('./sidebarsCertificationItems.js') // this file will be generated entirely by `populateCerts.js` via npm post-install hook found in the package.json
2222
},
2323
'certification/getting-scs-compatible-certified',
24-
'certification/test-and-adapt-example',
2524
'certification/overview'
2625
]
2726
},
Lines changed: 8 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -1,116 +1,13 @@
11
# Getting SCS-compatible certification
22

3-
## Process overview
4-
5-
The *SCS-compatible* Certification for Operators is a technical certification:
6-
The Operator needs to fulfill technical requirements, such as providing certain
7-
APIs and guaranteeing certain platform behavior in order to be certifiable.
8-
9-
These requirements are meant to provide guarantees to their customers, allowing
10-
them to rely on certain features to be available and on certain system behavior
11-
that lets their applications run in a reliable way.
12-
13-
The SCS certification process typically consists of a few simple steps:
14-
15-
1. Running the SCS compliance test suite and adjusting the infrastructure until it passes.
16-
2. Any additional declarations (for non-testable aspects) are written and passed to the SCS Forum.
17-
3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the
18-
OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can
19-
be paid without becoming a member.
20-
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
21-
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
22-
23-
The official documentation how to become certified is defined in the
3+
The conditions to become *SCS-copmatible* certified are defined in the
244
[SCS standard 0004](/standards/scs-0004-v1-achieving-certification).
255

6+
Hints how the process is working in practice for existing certified
7+
clouds can be found in the corresponding
8+
[Implementation Notes](standards/scs-0004-w1-achieving-certification-implementation).
269

27-
## Self-testing and technical adjustments
28-
29-
In order for a cloud service offering to obtain a certificate, it has to
30-
conform to all standards of the respective scope, which will be tested at
31-
regular intervals, and the results of these tests will be made available
32-
publicly.
33-
34-
The best approach to get your cloud into compliance is by installing the
35-
test suite locally. Have a look at the
36-
[example](/standards/certification/test-and-adapt-example).
37-
38-
A description how *SCS-compatible IaaS* compliance can be achieved on environments that use different
39-
OpenStack implementations is written up in a blog article
40-
[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/).
41-
42-
## Declarations
43-
44-
For the SCS-compatible IaaS v5 standard, the providers must — if they implement availability zones
45-
at all (which is optional) — guarantee certain levels of independence for these. This can not
46-
be fully tested by an automated test. The process thus envisions that providers must create some
47-
documentation on the physical infrastructure and how it maps to availability zones and declare that
48-
this documentation reflects the truth. SCS will review the docs and judge whether they meet the
49-
criteria. In case of doubt, audits can be performed.
50-
51-
## Forum SCS-Standards @ OSBA
52-
53-
The SCS brand belongs to the Open Source Business Alliance e.V. (OSBA), an non-profit organization and
54-
association for the Open Source Industry in Germany. The OSBA creates the Forum SCS-Standards
55-
which performs the work to evolve the SCS standards, develops the tests and perform the certification
56-
process.
57-
58-
Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership
59-
fee, providing the financial resources for the Forum to do its work. Membership in the OSBA is
60-
open to any organization that supports the goals of the OSBA.
61-
Alternatively, a certification fee can be paid without any membership.
62-
63-
## Getting listed and tested
64-
65-
When all tests are passing, all needed declarations are done, fees for the certification or the
66-
membership in the Forum SCS-Standards at the OSBA have been paid, the infrastructure service
67-
can become officially certified.
68-
69-
The SCS team will add the cloud to the [list of certified clouds](https://docs.scs.community/standards/certification/overview)
70-
on the SCS docs page. This can be used to prove to customers that the cloud is SCS compliant.
71-
Note that there will be a nightly job that tests the cloud for compliance, which will be
72-
triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs
73-
to be provided free of charge. (This only requires very low quota, one VM is created for a minute
74-
in one of the tests.)
75-
76-
For clouds not being accessible from the outside, a VPN tunnel or a local monitoring
77-
job (with result upload) can be used.
78-
79-
Please let us know if you want us to create an official SCS-certified badge that
80-
can be used in your marketing material beyond pointing to our list.
81-
82-
Note that for almost all certified clouds in the list of certified clouds, we also
83-
have a health monitor running (currently still
84-
[openstack-health-monitor](https://docs.scs.community/docs/operating-scs/guides/openstack-health-monitor/Debian12-Install)
85-
but soon the new [health-monitor](https://scs.community/tech/2024/09/06/vp12-scs-health-monitor-tech-preview/)),
86-
which exposes information on the performance and error rate of each cloud.
87-
This provides some transparency on the state of the clouds by constantly running
88-
scenario tests against them and is tremendously helpful for both the cloud operations
89-
teams and their customers. Strictly speaking, it is *not* a requirement for the
90-
*SCS-compatible* certification, just best practice. It will be part of an
91-
*SCS-sovereign* certification though, where transparency on operational aspects
92-
is included.
93-
94-
## Staying compliant
95-
96-
Once your cloud is listed in the
97-
[list of certified clouds](https://docs.scs.community/standards/certification/overview)
98-
or in the upcoming
99-
[compliance manager](https://compliance.sovereignit.cloud/page/table), it
100-
will enjoy the nightly tests. These might fail for a number of reasons:
101-
102-
* There is a new version of the SCS standards in effect and you need to adjust things.
103-
* Your cloud was unreachable or otherwise had intermittent issues.
104-
* You have done changes to your cloud that break *SCS-compatible* compliance.
105-
* The test automation engine (github actions / zuul) is in trouble.
106-
* The tests have a bug.
107-
108-
In either case, this need proper analysis to determine what should be done.
109-
In the list of certified clouds, the tests are performed by github actions.
110-
These are executed from the
111-
[github SCS standards repository](https://github.com/SovereignCloudStack/standards).
112-
By looking at the logs from the github actions, you can typically see why the failure
113-
happened. You could of course also do a local test again to see if the issue can
114-
be reproduced.
115-
In the compliance manager (executing tests via zuul), we will add links to the log
116-
files directly on the table, so it will be even easier to find the relevant log files.
10+
There is a [blog article with an example](https://scs.community/blog/2024/10/14/cert-adapt-example.html)
11+
of running the test suite and addressing the failures. Observations on
12+
[making an OpenStack cloud that is not using the SCS reference implementation compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/)
13+
are covered in another blog article.

standards/certification/test-and-adapt-example.md

Lines changed: 0 additions & 166 deletions
This file was deleted.

0 commit comments

Comments
 (0)