-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Other] Adapt C&H test cluster to SCS Flavor Naming Standard (scs-0100) #415
Comments
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com>
* Kubernetes High Security setup (#415) This commit adds a standard for high security setups, which should increase the overall of a Kubernetes cluster. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com> * Grammar / spelling fixes. Signed-off-by: Kurt Garloff <kurt@garloff.de> * Fix small mistakes Added some notes for the ports and shortened the motivation. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com> * Baseline cluster security (#414) Renamed the file to better match its actual intention. Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com> --------- Signed-off-by: Hannes Baum <hannes.baum@cloudandheat.com> Signed-off-by: Kurt Garloff <kurt@garloff.de> Co-authored-by: Kurt Garloff <kurt@garloff.de>
Thanks for collecting cost of making a cloud SCS compliant. We should decide, where to place this information. Implementation and Testing Notes of each standard could be a good candidate. Goal is, that providers, who want to become SCS compliant can access our lessons learned, easily. |
Furthermore, if we moved cost of making a cloud SCS compliant to its final place and our clusters (productive and test cluster) are SCS compliant, we should close this issue. |
Test script output indicating that the test cluster complies to the
|
Test cluster is up and compliant, so the issue will be closed. |
Adapt C&H test cluster to SCS Flavor Naming Standard (scs-0100) and evaluate its costs.
Todos:
The text was updated successfully, but these errors were encountered: