Skip to content

replace exception rule by Incubator status#1026

Open
depressiveRobot wants to merge 9 commits intomainfrom
feat/scs-0007-incubator
Open

replace exception rule by Incubator status#1026
depressiveRobot wants to merge 9 commits intomainfrom
feat/scs-0007-incubator

Conversation

@depressiveRobot
Copy link
Contributor

@depressiveRobot depressiveRobot commented Nov 28, 2025

Resolves #1024

There are still some open questions:

  • How to allow implementation partners that don't want to offer an own public environment (criteria c) to get a certification?
    • current idea is v3 of the procedural (or a new procedural) which introduces another stage of certification, like "Certified SCS Engineer/Consultant/Trainer"
  • How do we want to handle joint references? (e.g. two or more partners have jointly set up SCS environments or manage them together)
  • How to prove that the environment is not "scripted only"?
    • maybe some kind of plausibility checks and statistics (customers, applications, workloads, stress tests etc.)
    • mainly affects KaaS environments

Show differences between v1 and v2:

Procedural:

git diff --no-index Standards/scs-0007-v1-certification-integrators.md Standards/scs-0007-v2-certification-integrators.md

Supplement:

git diff --no-index Standards/scs-0007-w1-certification-integrators-implementation-notes.md Standards/scs-0007-w2-certification-integrators-implementation-notes.md

@depressiveRobot depressiveRobot self-assigned this Nov 28, 2025
@depressiveRobot depressiveRobot changed the title replace exception rule by Incubator status Draft: replace exception rule by Incubator status Nov 28, 2025
@depressiveRobot depressiveRobot marked this pull request as draft November 28, 2025 12:17
@depressiveRobot depressiveRobot changed the title Draft: replace exception rule by Incubator status replace exception rule by Incubator status Nov 28, 2025
@fkr
Copy link
Member

fkr commented Nov 28, 2025

In addition to @mbuechse 's comment: With the points we get rid of the voting, since I see the voting as one of the primary culprits of the original proposal as well. The decision should lie in the attestation body and with the proposed variant upon points, this would work nicely.

@mbuechse
Copy link
Contributor

mbuechse commented Dec 4, 2025

I tried to incorporate what we had discussed in the SIG. I think the name "Incubator" should be reconsidered.

@fkr
Copy link
Member

fkr commented Dec 4, 2025

I tried to incorporate what we had discussed in the SIG. I think the name "Incubator" should be reconsidered.

i concur. Reading it like "SCS-Certified IaaS Incubator" does not really make sense. Apprentice ;)

  • SCS-certified IaaS Associate?
  • SCS-certified IaaS Mentee?
  • SCS-certified IaaS Protégé?

@depressiveRobot
Copy link
Contributor Author

depressiveRobot commented Dec 4, 2025

Many thanks to both of you, especially @mbuechse for incorporating what was discussed in the SIG. Based on this, I tried to make further adjustments:

  • definition of terms: "implementation partner" and "applicant"
  • wording "scoring system" to get rid of "criteria"

My two cents for a better name than "Incubator":

  • "Associate" does not clearly express to me that the organization is not yet an integrator
  • "Mentee", "Protege" and "Apprentice", "Trainee", "Candidate", "Recriut", "Novice": we can name it like we want, however, with all of them it is not clear to me that the certificate is about becoming a fully-fledged integrator.
  • That's why I have the idea of "SCS-certified IaaS Bronze Integrator". This way we could also reflect the score in the certificate name:
    • two points: "SCS-certified IaaS Bronze Integrator"
    • four points: "SCS-certified IaaS Silver Integrator"
    • six or more points: "SCS-certified IaaS Gold Integrator"

The actual certification process could be described as implementation hints in the Supplement w2. Also with the additions proposed in the SIG, with the three stages of "self-assessment", "codified checks" and "audit". However, this would still require specific plausibility checks and statistics.

@fkr
Copy link
Member

fkr commented Dec 4, 2025

Couple of thoughts:

By having several levels of SCS-Certified IaaS it becomes more complex to comprehend for outsiders, thats why I kinda liked the different naming. “SCS-certified IaaS Integrator” is simple and easily understood. But maybe this discussion / the course of discussion since September shows that we need this added "complexity" in order to address the needs adequately.

The second thought: we just certified four companies with ‘SCS-certified IaaS Integrator’ and renaming this would mean that this has to be adjusted as well.

@mbuechse
Copy link
Contributor

mbuechse commented Dec 5, 2025

We can say that "Silver" (and above) MAY be omitted, so as to remain backwards-compatible.

@depressiveRobot
Copy link
Contributor Author

I tried to incorporate our latest proposal regarding certificate levels and the points mentioned in the last SIG Std/Cert on 2025-12-02.

@depressiveRobot
Copy link
Contributor Author

depressiveRobot commented Dec 11, 2025

Regarding the open question "How to allow implementation partners who are very knowledgeable, but will never meet the requirements of Integrator to become certified?"

Version 2 of this standard intentionally does not consider this question. It should rather be a separate new standard like "Certified SCS Consultant".

The other two open issues are addressed in the current draft, see supplement.

@depressiveRobot
Copy link
Contributor Author

During the presentation at the Forum SCS-Standards regular call on 2025-12-12 the issue was raised that the current naming system using certificate levels (aka "Certified SCS IaaS Bronze Integrator") is too long:

These were the suggestion so far:

  • Certified SCS IaaS Bronze Integrator
  • Certified SCS IaaS Integrator with a label/stamp "Incubator"/"Incubator status"
  • Certified SCS IaaS Incubator (relation to Integrator missing)
  • SCS-certified IaaS ...
    • Associate, Mentee, Protege, Trainee, Candidate, Recriut, Novice
    • with all of them it is not clear that the certificate is about becoming a fully-fledged SCS Integrator

What we are looking for: A shorter name/term that clearly expresses that it is an entry-level/lower level certification to the "normal" SCS Integrator.

@mbuechse
Copy link
Contributor

I could review this. At a quick glance, I don't see any severe problems. Before I give it more scrutiny, I think we should be clear regarding the naming inside the certificate zoo.


- two points for each SCS-compliant environment of a third party successfully brought into production by the applicant in the last 12 months, one point for 6 months;
- two points for each SCS-compliant environment of a third party actively being managed by the applicant for the last 12 months, one point for 6 months;
- two points for each SCS-compliant public-cloud environment with at least two regions or at least three availability zones being operated by the applicant for the last 12 months, one point for 6 months.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMO in Kubernetes the regions don't matter really that much. Therefore, I believe this criteria is only really valid for IaaS.
If we want to make it explicitly for both, we should probably think about some examples of what we wanna include in this list and what should be excluded.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this item should be read as specific to IaaS for the time being -- which is the case in scs-0007-v1.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mbuechse can you elaborate? In v1 it is probably fixed to IaaS, which is fine, because there was no KaaS. But this is the scs-0007-v2 document that we iterate on.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

v1 does refer to KaaS as well, but not in this last item. What I mean is that we can add an item for KaaS later once we know how to deal with it. As you pointed out yourself, the regions/azs make no sense with KaaS. Or we add such an item now, but it seems to me a dedicated item for KaaS makes more sense than mangling everything into one item. Would you have a suggestion for such an item?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay, so you propose to add another PR later (probably start with writing an issue) that "fixes" this?
So basically an issue to "mark the current as specific to IaaS and add something specific to KaaS?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No, I would add at least one change to this very PR already, namely to make this item specific for IaaS. And we can also add a KaaS-version of this item in this PR as well, provided that we come up with one. That's why I asked you for a proposal. Time horizon according to fkr would be March 10 (preferably earlier).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay, then let's add the information that this is about IaaS, and I think we'll need to separately discuss KaaS. I'll comment in this PR also based on what we discussed in the SIG meeting

@depressiveRobot
Copy link
Contributor Author

@janiskemper Your comments appear to be valid objections. I have added this to the next SIG Std/Cert on 2026-02-12 to discuss it. If you can, please join the meeting.

@janiskemper
Copy link
Member

noted

The certificates are awarded for a period of one year based on the predefined scoring system below.
The certification is done either by the Forum SCS-Standards or an attestation body nominated by the forum.

### Certificate levels
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Certificate levels
### Certificate tiers


### Certificate levels

Version 2 of this standard introduces a multilevel certification with Silver and Bronze levels. The levels are awarded according to a target score to be reached based on a predefined scoring system (see below).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Version 2 of this standard introduces a multilevel certification with Silver and Bronze levels. The levels are awarded according to a target score to be reached based on a predefined scoring system (see below).
Version 2 of this standard introduces tiers of certifications beginning with Silver and Bronze tiers. The Tiers are awarded according to a target score to be reached based on a predefined scoring system (see below).

Comment on lines +31 to +35
- Certified SCS IaaS Silver Integrator: SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Silver Integrator: SCS KaaS (Kubernetes as a Service) implementation partner
- Certified SCS IaaS Bronze Integrator: aspiring SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Bronze Integrator: aspiring SCS KaaS (Kubernetes as a Service) implementation partner

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking at these names again. We all agree that basically the Silver and Bronze Scheme is legit. Since those are "Tiers" (not levels, see my other comment), why don't we name them like this:

Suggested change
- Certified SCS IaaS Silver Integrator: SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Silver Integrator: SCS KaaS (Kubernetes as a Service) implementation partner
- Certified SCS IaaS Bronze Integrator: aspiring SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Bronze Integrator: aspiring SCS KaaS (Kubernetes as a Service) implementation partner
- Certified SCS IaaS Integrator (Silver): SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Integrator (Silver): SCS KaaS (Kubernetes as a Service) implementation partner
- Certified SCS IaaS Integrator (Bronze): aspiring SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Integrator (Bronze): aspiring SCS KaaS (Kubernetes as a Service) implementation partner

Basically making the Bronze and Silver a noticeable tier. The artwork for the badges would also resemble this. This way the name of the Certification stays the same and the Tier becomes visible.

@selis-osba ?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good. I’ll start working on the badges and add them to the website with descriptions.

@fkr fkr marked this pull request as ready for review February 13, 2026 09:45
depressiveRobot and others added 3 commits February 13, 2026 10:45
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Matthias Büchse <matthias.buechse@alasca.cloud>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
@fkr fkr force-pushed the feat/scs-0007-incubator branch from f5e129c to 3fa1c55 Compare February 13, 2026 09:45
@fkr
Copy link
Member

fkr commented Feb 13, 2026

As a timeline for this PR, I'd like to see this PR being merged before March 10th, so that at the Forum's Meeting of March 10th this can be presented so that we can stabilize it afterwards.

Signed-off-by: Matthias Büchse <matthias.buechse@alasca.cloud>
Version 2 of this standard introduces a multilevel certification with Silver and Bronze levels. The levels are awarded according to a target score to be reached based on a predefined scoring system (see below).

- Certified SCS IaaS Silver Integrator: SCS IaaS (Infrastructure as a Service) implementation partner
- Certified SCS KaaS Silver Integrator: SCS KaaS (Kubernetes as a Service) implementation partner
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We discussed in the SIG meeting that we want to focus on a KaaS certification, not a Kubernetes certification. What does this mean?

KaaS means that we cannot only create one cluster, but we need a system to create n clusters and manage them in parallel. This includes upgrade processes, scaling, etc.

I wouldn't necessarily say that KaaS MUST be based on a fully automated process, but this is something we should discuss.

IF we say that it has to be fully automated, we can easily have a test case: We need to create a cluster via API, then run the conformance tests successfully, and then delete it again. This happens right now with our Syself Autopilot tests.

IMO there is no need to do further tests, because we also don't have similar load tests on IaaS level.

The goal would be to add a definition what KaaS is and then clarify the exact scoring system.

cc @mbuechse @fkr @depressiveRobot @chrisschwa

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup. To be frank, that's more or less always been how I viewed it, but it's good (and also necessary, it turns out) to make this explicit.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Regarding automation: our test suite can run with a static kubeconfig file, but I would expect partners to provide a means of creating and deleting a cluster that can be integrated in the testsuite (we are already using extensible hooks for that).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Feature Request] SCS-0007 Integrator incubator status

6 participants