|
| 1 | +--- |
| 2 | +title: "Implementtaion hints for achieveing SCS-compatible certification" |
| 3 | +type: Supplement |
| 4 | +track: Global |
| 5 | +status: Draft |
| 6 | +supplements: |
| 7 | + - scs-0004-v1-achieving-certification.md |
| 8 | +--- |
| 9 | + |
| 10 | + |
| 11 | +# Getting SCS-compatible certification |
| 12 | + |
| 13 | +## Process overview |
| 14 | + |
| 15 | +The *SCS-compatible* Certification for Operators is a technical certification: |
| 16 | +The Operator needs to fulfill technical requirements, such as providing certain |
| 17 | +APIs and guaranteeing certain platform behavior in order to be certifiable. |
| 18 | + |
| 19 | +These requirements are meant to provide guarantees to their customers, allowing |
| 20 | +them to rely on certain features to be available and on certain system behavior |
| 21 | +that lets their applications run in a reliable way. |
| 22 | + |
| 23 | +The SCS certification process typically consists of a few simple steps: |
| 24 | + |
| 25 | +1. Running the SCS compliance test suite and adjusting the infrastructure until it passes. |
| 26 | +2. Any additional declarations (for non-testable aspects) are written and passed to the SCS certification body. |
| 27 | +3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the |
| 28 | + OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can |
| 29 | + be paid without becoming a member. |
| 30 | +4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is |
| 31 | + updated on a daily basis. SCS then tests the infrastructure on a daily basis. |
| 32 | + |
| 33 | +The precise rules that govern how certificates are issued or withdrawn are defined in the |
| 34 | +[SCS standard 0004](scs-0004-v1-achieving-certification). |
| 35 | + |
| 36 | + |
| 37 | +## Self-testing and technical adjustments |
| 38 | + |
| 39 | +In order for a cloud service offering to obtain a certificate, it has to |
| 40 | +conform to all standards of the respective scope, which will be tested at |
| 41 | +regular intervals, and the results of these tests will be made available |
| 42 | +publicly. |
| 43 | + |
| 44 | +The best approach to get your cloud into compliance is by installing the |
| 45 | +test suite locally. Have a look at the |
| 46 | +[blog article](https://scs.community/blog/2024/10/14/cert-adapt-example.html). |
| 47 | + |
| 48 | +A description how *SCS-compatible IaaS* compliance can be achieved on environments that use different |
| 49 | +OpenStack implementations is written up in a blog article |
| 50 | +[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/). |
| 51 | + |
| 52 | +## Declarations |
| 53 | + |
| 54 | +For the SCS-compatible IaaS v5 standard, the providers must — if they implement availability zones |
| 55 | +at all (which is optional) — guarantee certain levels of independence for these. This can not |
| 56 | +be fully tested by an automated test. The process thus envisions that providers must create some |
| 57 | +documentation on the physical infrastructure and how it maps to availability zones and declare that |
| 58 | +this documentation reflects the truth. SCS will review the docs and judge whether they meet the |
| 59 | +criteria. In case of doubt, audits can be performed. |
| 60 | + |
| 61 | +## Forum SCS-Standards @ OSBA |
| 62 | + |
| 63 | +The SCS brand belongs to the Open Source Business Alliance e.V. (OSBA), an non-profit organization and |
| 64 | +association for the Open Source Industry in Germany. After the completion of the funded SCS project |
| 65 | +in the OSBA on 2024-12-31, the OSBA sets up the Forum SCS-Standards |
| 66 | +which performs the work to evolve the SCS standards, develops the tests and perform the certification |
| 67 | +process and thus becomes the SCS certification body. |
| 68 | + |
| 69 | +Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership |
| 70 | +fee, providing the financial resources for the Forum SCS-Standards to do its work. Membership in the |
| 71 | +OSBA is open to any organization that supports the goals of the OSBA. |
| 72 | +Alternatively, a certification fee can be paid without any membership. |
| 73 | + |
| 74 | +## Getting listed and tested |
| 75 | + |
| 76 | +When all tests are passing, all needed declarations are done, fees for the certification or the |
| 77 | +membership in the Forum SCS-Standards at the OSBA have been paid, the infrastructure service |
| 78 | +can become officially certified. |
| 79 | + |
| 80 | +The SCS team will add the cloud to the [list of certified clouds](https://docs.scs.community/standards/certification/overview) |
| 81 | +on the SCS docs page. This can be used to prove to customers that the cloud is SCS compliant. |
| 82 | +Note that for public clouds, there will be a nightly job that tests the cloud for compliance, which will be |
| 83 | +triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs |
| 84 | +to be provided free of charge. (This only requires very low quota, one VM is created for a minute |
| 85 | +in one of the tests.) |
| 86 | + |
| 87 | +For clouds not being accessible from the outside, a VPN tunnel or a local monitoring |
| 88 | +job (with result upload) can be used. |
| 89 | + |
| 90 | +Please let us know if you want us to create an official SCS-certified badge that |
| 91 | +can be used in your marketing material beyond pointing to our list. |
| 92 | + |
| 93 | +### Optional Health Monitor |
| 94 | + |
| 95 | +Note that for almost all certified clouds in the list of certified clouds, we also |
| 96 | +have a health monitor running (currently still |
| 97 | +[openstack-health-monitor](https://docs.scs.community/docs/operating-scs/guides/openstack-health-monitor/Debian12-Install) |
| 98 | +but soon the new [health-monitor](https://scs.community/tech/2024/09/06/vp12-scs-health-monitor-tech-preview/)), |
| 99 | +which exposes information on the performance and error rate of each cloud. |
| 100 | +This provides some transparency on the state of the clouds by constantly running |
| 101 | +scenario tests against them and is tremendously helpful for both the cloud operations |
| 102 | +teams and their customers. Strictly speaking, it is *not* a requirement for the |
| 103 | +*SCS-compatible* certification, just best practice. It will be part of an |
| 104 | +*SCS-sovereign* certification though, where transparency on operational aspects |
| 105 | +will be required. |
| 106 | + |
| 107 | +## Staying compliant |
| 108 | + |
| 109 | +Once your cloud is listed in the |
| 110 | +[list of certified clouds](https://docs.scs.community/standards/certification/overview) |
| 111 | +which is fed by the |
| 112 | +[compliance manager](https://compliance.sovereignit.cloud/page/table), it |
| 113 | +will enjoy the nightly tests. These might fail for a number of reasons: |
| 114 | + |
| 115 | +* There is a new version of the SCS standards in effect and you need to adjust things. |
| 116 | +* Your cloud was unreachable or otherwise had intermittent issues. |
| 117 | +* You have done changes to your cloud that break *SCS-compatible* compliance. |
| 118 | +* The test automation engine (zuul) is in trouble. |
| 119 | +* The tests have a bug. |
| 120 | + |
| 121 | +In either case, this need proper analysis to determine what should be done. |
| 122 | +<!--In the list of certified clouds, the tests are performed by github actions. |
| 123 | +These are executed from the |
| 124 | +[github SCS standards repository](https://github.com/SovereignCloudStack/standards). |
| 125 | +By looking at the logs from the github actions, you can typically see why the failure |
| 126 | +happened. You could of course also do a local test again to see if the issue can |
| 127 | +be reproduced.--> |
| 128 | +In the compliance manager (executing tests via zuul), we will add links to the log |
| 129 | +files directly on the table, so it will be even easier to find the relevant log files. |
| 130 | +It is a good idea to reproduce the failures by running the test suite locally, |
| 131 | +as it may be easier to focus on just the one failing aspect of your infrastructure. |
| 132 | + |
| 133 | +Your cloud will show up as failing in the compliance manager after tests start |
| 134 | +failing; this is not the same as a revoked certification, though. For clouds that have been |
| 135 | +compliant before, it is highly recommended to work with the SCS certification body |
| 136 | +upon such failures to determine a way back into compliance that avoids certification |
| 137 | +revocation. |
0 commit comments