Skip to content

Commit 87a7803

Browse files
kgubegarloffmbuechsefkr
authored
Add standard for provider networks (#572)
Signed-off-by: Kurt Garloff <[email protected]> Signed-off-by: Felix Kronlage-Dammers <[email protected]> Signed-off-by: Konrad Gube <[email protected]> Signed-off-by: Matthias Büchse <[email protected]> Co-authored-by: Kurt Garloff <[email protected]> Co-authored-by: Matthias Büchse <[email protected]> Co-authored-by: Felix Kronlage-Dammers <[email protected]>
1 parent d2fb97e commit 87a7803

File tree

3 files changed

+405
-0
lines changed

3 files changed

+405
-0
lines changed
Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,133 @@
1+
---
2+
title: "Implementation hints for achieving SCS-compatible certification"
3+
type: Supplement
4+
track: Global
5+
status: Draft
6+
supplements:
7+
- scs-0004-v1-achieving-certification.md
8+
---
9+
10+
## Process overview
11+
12+
The *SCS-compatible* Certification for Operators is a technical certification:
13+
The operator needs to fulfill technical requirements, such as providing certain
14+
APIs and guaranteeing certain platform behavior in order to be certifiable.
15+
16+
These requirements are meant to provide guarantees to their customers, allowing
17+
them to rely on certain features to be available and on certain system behavior
18+
that lets their applications run in a reliable way.
19+
20+
The SCS certification process typically consists of a few simple steps:
21+
22+
1. Running the SCS compliance test suite and adjusting the infrastructure until it passes.
23+
2. Any additional declarations (for non-testable aspects) are written and passed to the SCS certification body.
24+
3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the
25+
OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can
26+
be paid without becoming a member.
27+
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
28+
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
29+
30+
The precise rules that govern how certificates are issued or withdrawn are defined in the
31+
[SCS standard 0004](scs-0004-v1-achieving-certification.md).
32+
33+
## Self-testing and technical adjustments
34+
35+
In order for a cloud service offering to obtain a certificate, it has to
36+
conform to all mandatory requirements of all standards of the respective scope, which will be tested at
37+
regular intervals, and the results of these tests will be made available
38+
publicly.
39+
40+
The best approach to get your cloud into compliance is by installing the
41+
test suite locally. Have a look at the
42+
[blog article](https://scs.community/2024/10/14/cert-adapt-example/).
43+
44+
A description of how *SCS-compatible IaaS* compliance can be achieved on OpenStack environments that
45+
do not use the SCS reference implementation is written up in the blog article
46+
[Cost of making an OpenStack Cluster SCS compliant](https://scs.community/2024/05/13/cost-of-making-an-openstack-cluster-scs-compliant/).
47+
48+
## Declarations
49+
50+
For the SCS-compatible IaaS v5 standard, the providers must — if they implement availability zones
51+
at all (which is optional) — guarantee certain levels of independence for these. This can not
52+
be fully tested by an automated test. The process thus envisions that providers must create some
53+
documentation on the physical infrastructure and how it maps to availability zones and declare that
54+
this documentation reflects the truth. SCS will review the docs and judge whether they meet the
55+
criteria. In case of doubt, audits can be performed.
56+
57+
## Forum SCS-Standards @ OSBA
58+
59+
The SCS brand belongs to the Open Source Business Alliance e.V. (OSBA), an non-profit organization and
60+
association for the Open Source Industry in Germany. After the completion of the funded SCS project
61+
in the OSBA on 2024-12-31, the OSBA sets up the Forum SCS-Standards
62+
which performs the work to evolve the SCS standards, develops the tests and perform the certification
63+
process and thus becomes the SCS certification body.
64+
65+
Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership
66+
fee, providing the financial resources for the Forum SCS-Standards to do its work. Membership in the
67+
OSBA is open to any organization that supports the goals of the OSBA.
68+
Alternatively, a certification fee can be paid without any membership.
69+
70+
## Getting listed and tested
71+
72+
When all tests are passing, all needed declarations are done, fees for the certification or the
73+
membership in the Forum SCS-Standards at the OSBA have been paid, the infrastructure service
74+
can become officially certified.
75+
76+
The SCS team will add the cloud to the [list of certified clouds](https://docs.scs.community/standards/certification/overview)
77+
on the SCS docs page. This can be used to prove to customers that the cloud is SCS compliant.
78+
Note that for public clouds, there will be a nightly job that tests the cloud for compliance, which will be
79+
triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs
80+
to be provided free of charge. (This only requires very low quota, one VM is created for a minute
81+
in one of the tests.)
82+
83+
For clouds not being accessible from the outside, a VPN tunnel or a local monitoring
84+
job (with result upload) can be used.
85+
86+
Please let us know if you want us to create an official SCS-certified badge that
87+
can be used in your marketing material beyond pointing to our list.
88+
89+
### Optional Health Monitor
90+
91+
Note that for almost all certified clouds in the list of certified clouds, we also
92+
have a health monitor running (currently still
93+
[openstack-health-monitor](https://docs.scs.community/docs/operating-scs/guides/openstack-health-monitor/Debian12-Install)
94+
but soon the new [health-monitor](https://scs.community/tech/2024/09/06/vp12-scs-health-monitor-tech-preview/)),
95+
which exposes information on the performance and error rate of each cloud.
96+
This provides some transparency on the state of the clouds by constantly running
97+
scenario tests against them and is tremendously helpful for both the cloud operations
98+
teams and their customers. Strictly speaking, it is *not* a requirement for the
99+
*SCS-compatible* certification, just best practice. It will be part of an
100+
*SCS-sovereign* certification though, where transparency on operational aspects
101+
will be required.
102+
103+
## Staying compliant
104+
105+
Once your cloud is listed in the
106+
[list of certified clouds](https://docs.scs.community/standards/certification/overview)
107+
which is fed by the
108+
[compliance manager](https://compliance.sovereignit.cloud/page/table), it
109+
will enjoy the nightly tests. These might fail for a number of reasons:
110+
111+
* There is a new version of the SCS standards in effect and you need to adjust things.
112+
* Your cloud was unreachable or otherwise had intermittent issues.
113+
* You have done changes to your cloud that break *SCS-compatible* compliance.
114+
* The test automation engine (zuul) is in trouble.
115+
* The tests have a bug.
116+
117+
In either case, this need proper analysis to determine what should be done.
118+
<!--In the list of certified clouds, the tests are performed by github actions.
119+
These are executed from the
120+
[github SCS standards repository](https://github.com/SovereignCloudStack/standards).
121+
By looking at the logs from the github actions, you can typically see why the failure
122+
happened. You could of course also do a local test again to see if the issue can
123+
be reproduced.-->
124+
In the compliance manager (executing tests via zuul), we will add links to the log
125+
files directly on the table, so it will be even easier to find the relevant log files.
126+
It is a good idea to reproduce the failures by running the test suite locally,
127+
as it may be easier to focus on just the one failing aspect of your infrastructure.
128+
129+
Your cloud will show up as failing in the compliance manager after tests start
130+
failing; this is not the same as a revoked certification, though. For clouds that have been
131+
compliant before, it is highly recommended to work with the SCS certification body
132+
upon such failures to determine a way back into compliance that avoids certification
133+
revocation.

0 commit comments

Comments
 (0)