Skip to content

Commit 689528f

Browse files
garlofffkr
authored andcommitted
Test and implementation note for Cert achievement.
Moved from docs repo in response to discussion on PR docs/#253. Signed-off-by: Kurt Garloff <[email protected]>
1 parent e42f64e commit 689528f

File tree

1 file changed

+137
-0
lines changed

1 file changed

+137
-0
lines changed
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
title: "Implementtaion hints for achieveing SCS-compatible certification"
3+
type: Supplement
4+
track: Global
5+
status: Draft
6+
supplements:
7+
- scs-0004-v1-achieving-certification.md
8+
---
9+
10+
11+
# Getting SCS-compatible certification
12+
13+
## Process overview
14+
15+
The *SCS-compatible* Certification for Operators is a technical certification:
16+
The Operator needs to fulfill technical requirements, such as providing certain
17+
APIs and guaranteeing certain platform behavior in order to be certifiable.
18+
19+
These requirements are meant to provide guarantees to their customers, allowing
20+
them to rely on certain features to be available and on certain system behavior
21+
that lets their applications run in a reliable way.
22+
23+
The SCS certification process typically consists of a few simple steps:
24+
25+
1. Running the SCS compliance test suite and adjusting the infrastructure until it passes.
26+
2. Any additional declarations (for non-testable aspects) are written and passed to the SCS certification body.
27+
3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the
28+
OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can
29+
be paid without becoming a member.
30+
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
31+
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
32+
33+
The precise rules that govern how certificates are issued or withdrawn are defined in the
34+
[SCS standard 0004](scs-0004-v1-achieving-certification).
35+
36+
37+
## Self-testing and technical adjustments
38+
39+
In order for a cloud service offering to obtain a certificate, it has to
40+
conform to all standards of the respective scope, which will be tested at
41+
regular intervals, and the results of these tests will be made available
42+
publicly.
43+
44+
The best approach to get your cloud into compliance is by installing the
45+
test suite locally. Have a look at the
46+
[blog article](https://scs.community/blog/2024/10/14/cert-adapt-example.html).
47+
48+
A description how *SCS-compatible IaaS* compliance can be achieved on environments that use different
49+
OpenStack implementations is written up in a blog article
50+
[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/).
51+
52+
## Declarations
53+
54+
For the SCS-compatible IaaS v5 standard, the providers must — if they implement availability zones
55+
at all (which is optional) — guarantee certain levels of independence for these. This can not
56+
be fully tested by an automated test. The process thus envisions that providers must create some
57+
documentation on the physical infrastructure and how it maps to availability zones and declare that
58+
this documentation reflects the truth. SCS will review the docs and judge whether they meet the
59+
criteria. In case of doubt, audits can be performed.
60+
61+
## Forum SCS-Standards @ OSBA
62+
63+
The SCS brand belongs to the Open Source Business Alliance e.V. (OSBA), an non-profit organization and
64+
association for the Open Source Industry in Germany. After the completion of the funded SCS project
65+
in the OSBA on 2024-12-31, the OSBA sets up the Forum SCS-Standards
66+
which performs the work to evolve the SCS standards, develops the tests and perform the certification
67+
process and thus becomes the SCS certification body.
68+
69+
Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership
70+
fee, providing the financial resources for the Forum SCS-Standards to do its work. Membership in the
71+
OSBA is open to any organization that supports the goals of the OSBA.
72+
Alternatively, a certification fee can be paid without any membership.
73+
74+
## Getting listed and tested
75+
76+
When all tests are passing, all needed declarations are done, fees for the certification or the
77+
membership in the Forum SCS-Standards at the OSBA have been paid, the infrastructure service
78+
can become officially certified.
79+
80+
The SCS team will add the cloud to the [list of certified clouds](https://docs.scs.community/standards/certification/overview)
81+
on the SCS docs page. This can be used to prove to customers that the cloud is SCS compliant.
82+
Note that for public clouds, there will be a nightly job that tests the cloud for compliance, which will be
83+
triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs
84+
to be provided free of charge. (This only requires very low quota, one VM is created for a minute
85+
in one of the tests.)
86+
87+
For clouds not being accessible from the outside, a VPN tunnel or a local monitoring
88+
job (with result upload) can be used.
89+
90+
Please let us know if you want us to create an official SCS-certified badge that
91+
can be used in your marketing material beyond pointing to our list.
92+
93+
### Optional Health Monitor
94+
95+
Note that for almost all certified clouds in the list of certified clouds, we also
96+
have a health monitor running (currently still
97+
[openstack-health-monitor](https://docs.scs.community/docs/operating-scs/guides/openstack-health-monitor/Debian12-Install)
98+
but soon the new [health-monitor](https://scs.community/tech/2024/09/06/vp12-scs-health-monitor-tech-preview/)),
99+
which exposes information on the performance and error rate of each cloud.
100+
This provides some transparency on the state of the clouds by constantly running
101+
scenario tests against them and is tremendously helpful for both the cloud operations
102+
teams and their customers. Strictly speaking, it is *not* a requirement for the
103+
*SCS-compatible* certification, just best practice. It will be part of an
104+
*SCS-sovereign* certification though, where transparency on operational aspects
105+
will be required.
106+
107+
## Staying compliant
108+
109+
Once your cloud is listed in the
110+
[list of certified clouds](https://docs.scs.community/standards/certification/overview)
111+
which is fed by the
112+
[compliance manager](https://compliance.sovereignit.cloud/page/table), it
113+
will enjoy the nightly tests. These might fail for a number of reasons:
114+
115+
* There is a new version of the SCS standards in effect and you need to adjust things.
116+
* Your cloud was unreachable or otherwise had intermittent issues.
117+
* You have done changes to your cloud that break *SCS-compatible* compliance.
118+
* The test automation engine (zuul) is in trouble.
119+
* The tests have a bug.
120+
121+
In either case, this need proper analysis to determine what should be done.
122+
<!--In the list of certified clouds, the tests are performed by github actions.
123+
These are executed from the
124+
[github SCS standards repository](https://github.com/SovereignCloudStack/standards).
125+
By looking at the logs from the github actions, you can typically see why the failure
126+
happened. You could of course also do a local test again to see if the issue can
127+
be reproduced.-->
128+
In the compliance manager (executing tests via zuul), we will add links to the log
129+
files directly on the table, so it will be even easier to find the relevant log files.
130+
It is a good idea to reproduce the failures by running the test suite locally,
131+
as it may be easier to focus on just the one failing aspect of your infrastructure.
132+
133+
Your cloud will show up as failing in the compliance manager after tests start
134+
failing; this is not the same as a revoked certification, though. For clouds that have been
135+
compliant before, it is highly recommended to work with the SCS certification body
136+
upon such failures to determine a way back into compliance that avoids certification
137+
revocation.

0 commit comments

Comments
 (0)