Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Other] Adapt C&H test cluster to SCS Flavor Naming Standard (scs-0100) #415

Closed
3 tasks done
anjastrunk opened this issue Dec 19, 2023 · 5 comments
Closed
3 tasks done
Assignees
Labels
SCS-VP10 Related to tender lot SCS-VP10

Comments

@anjastrunk
Copy link
Contributor

anjastrunk commented Dec 19, 2023

Adapt C&H test cluster to SCS Flavor Naming Standard (scs-0100) and evaluate its costs.

Todos:

  • Adapt C&H test cluster to SCS standard
  • Update standard documentation with costs/cost estimation
  • Write how to and/or adaption script
@anjastrunk anjastrunk added the SCS-VP10 Related to tender lot SCS-VP10 label Dec 19, 2023
@anjastrunk anjastrunk changed the title [Other] Adapt C&H test cluster's flavors to SCS Flavor Naming Standard (scs-0100) [Other] Adapt C&H test cluster to SCS Flavor Naming Standard (scs-0100) Dec 19, 2023
cah-hbaum added a commit that referenced this issue Jan 4, 2024
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
cah-hbaum added a commit that referenced this issue Jan 11, 2024
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
cah-hbaum added a commit that referenced this issue Feb 12, 2024
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
cah-hbaum added a commit that referenced this issue Feb 13, 2024
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
cah-hbaum added a commit that referenced this issue Feb 14, 2024
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
cah-hbaum added a commit that referenced this issue Feb 14, 2024
* Kubernetes High Security setup (#415)

This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>

* Grammar / spelling fixes.

Signed-off-by: Kurt Garloff <kurt@garloff.de>

* Fix small mistakes

Added some notes for the ports and shortened the motivation.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>

* Baseline cluster security (#414)

Renamed the file to better match its actual intention.

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>

---------

Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
Signed-off-by: Kurt Garloff <kurt@garloff.de>
Co-authored-by: Kurt Garloff <kurt@garloff.de>
@cah-hbaum
Copy link
Contributor

cah-hbaum commented Apr 5, 2024

Cost estimation for this standard can be found here.

The how to and script can be found in here and here.

@anjastrunk
Copy link
Contributor Author

Cost estimation for this standard can be found here.

The how to and script can be found in here and here.

Thanks for collecting cost of making a cloud SCS compliant. We should decide, where to place this information. Implementation and Testing Notes of each standard could be a good candidate. Goal is, that providers, who want to become SCS compliant can access our lessons learned, easily.

@anjastrunk
Copy link
Contributor Author

Furthermore, if we moved cost of making a cloud SCS compliant to its final place and our clusters (productive and test cluster) are SCS compliant, we should close this issue.

@cah-hbaum
Copy link
Contributor

cah-hbaum commented Apr 10, 2024

Test script output indicating that the test cluster complies to the SCS-0100-v3-flavors standard:

    ./iaas/flavor-naming/flavor-names-openstack.py -c scs-test --mand=./iaas/scs-0100-v3-flavors.yaml:
      rc: 0
      stdout:
      - 'scs-test:'
      - '  OtherFlavorSummary:'
      - '    TotalAmount: 0'
      - '  SCSFlavorSummary:'
      - '    FlavorsWithWarnings: 0'
      - '    MandatoryFlavorsMissing: 0'
      - '    MandatoryFlavorsPresent: 0'
      - '    OptionalFlavorsValid: 28'
      - '    OptionalFlavorsWrong: 0'
      - '    TotalAmount: 28'
      - '  TotalSummary:'
      - '    Errors: 0'
      - '    Warnings: 0'
      - ''
      stderr: []
      info: 0
      warning: 0
      error: 0
      critical: 0
      result: 1

@cah-hbaum
Copy link
Contributor

Test cluster is up and compliant, so the issue will be closed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
SCS-VP10 Related to tender lot SCS-VP10
Projects
None yet
Development

No branches or pull requests

3 participants