[IMPORTANT] 2017 PaaS Certification Requirements


Dieu Cao <dcao@...>
 

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we would
appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


Daniel Jones
 

Thanks for that Dieu!

Is there work scheduled to get OS cf-release and associated documentation
into a state where Diego is the default, rather than deploying the DEA
architecture?

Regards,
Daniel Jones - CTO
+44 (0)79 8000 9153
@DanielJonesEB <https://twitter.com/DanielJonesEB>
*EngineerBetter* Ltd <http://www.engineerbetter.com> - UK Cloud Foundry
Specialists

On Thu, Oct 27, 2016 at 9:10 AM, Dieu Cao <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we
would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1] https://docs.google.com/document/d/1S9o4u65uG_
YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


Dr Nic Williams <drnicwilliams@...>
 

To confirm - if a CF platform patches any CF components outside of the biweekly or so release cycle that the components might have, then they lose their certification status? I know some on-prem vendors maintain private forks of cf-release and release patches of older versions for their customers; is this allowed or not?

On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:










Hello all,
The 2017 PaaS Certification Requirements is available here [1] and we would appreciate questions/comments on the doc or in this thread.
I've also attached a PDF version for those of you that have difficulty accessing google docs.
2 major changes from the 2016 certification requirements include requiring Diego/Garden and also requiring the use of BOSH.
-Dieu CaoRuntime PMC Lead
[1] https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


Dr Nic Williams <drnicwilliams@...>
 

"For managed offerings, BOSH does not need to be exposed to customers" - what is the origin & reason this is explicitly stated?
Does it infer that there is any scenario at all where BOSH must be exposed to end users/customers?

On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:










Hello all,
The 2017 PaaS Certification Requirements is available here [1] and we would appreciate questions/comments on the doc or in this thread.
I've also attached a PDF version for those of you that have difficulty accessing google docs.
2 major changes from the 2016 certification requirements include requiring Diego/Garden and also requiring the use of BOSH.
-Dieu CaoRuntime PMC Lead
[1] https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


Dr Nic Williams <drnicwilliams@...>
 

Also, why is "using BOSH" a requirement? As awesome as it is for many things, it isn't perfect. If companies innovate/experiment with alternate deployment systems why do they lose certification status?

On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:










Hello all,
The 2017 PaaS Certification Requirements is available here [1] and we would appreciate questions/comments on the doc or in this thread.
I've also attached a PDF version for those of you that have difficulty accessing google docs.
2 major changes from the 2016 certification requirements include requiring Diego/Garden and also requiring the use of BOSH.
-Dieu CaoRuntime PMC Lead
[1] https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


Chip Childers <cchilders@...>
 

Bundling up Dr. Nic's questions for a single reply... Great questions! I
did a bunch of the pre-work on behalf of the PMC Council on this topic, so
I have a bunch of the context loaded.

*Question #1:* To confirm - if a CF platform patches any CF components
outside of the biweekly or so release cycle that the components might have,
then they lose their certification status? I know some on-prem vendors
maintain private forks of cf-release and release patches of older versions
for their customers; is this allowed or not?

*Short Answer:* Yes

*Longer Answer:* "Offerings" should always be based on a specific
cf-release + recommended sub-components that aren't directly included in
the cf-release itself (really this will transition to cf-deployment once
that starts getting versioned "releases"). Bug fixes / vulnerability fixes
are allowed to be back-ported, based on the "Exceptions" listed. This
assumes that the fixes are in the upstream projects. Also notice the
section about "current versions". That's an important concept. In 2017, the
trademark license agreement that is used as the contractual vehicle for
certification will be a perpetual license to use the 2017 "certification
mark". The point here is that the upstream projects don't do LTS (long term
support), but vendors are allowed to. They just have to reference the
appropriate certification year for LTS versions.

*Question #2:* Why is "using BOSH" a requirement? As awesome as it is for
many things, it isn't perfect. If companies innovate/experiment with
alternate deployment systems why do they lose certification status?

*Short Answer:* Consistent operational experience and deployment platform
for services

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.

*Question #3:* "For managed offerings, BOSH does not need to be exposed to
customers" - what is the origin & reason this is explicitly stated? Does it
infer that there is any scenario at all where BOSH must be exposed to end
users/customers?

*Short Answer:* It doesn't infer that for users.

*Long Answer:* That language was put in there to be specific that offerings
that are online PaaS services shouldn't be required to (and none do) expose
the BOSH layer to users of the Elastic Runtime layer (or customers
generally).

Hope that helps!

-chip

On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com>
wrote:

Also, why is "using BOSH" a requirement? As awesome as it is for many
things, it isn't perfect. If companies innovate/experiment with alternate
deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we would
appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <(267)%20250-0815>


Chip Childers <cchilders@...>
 

I think the evolution from cf-release to cf-deployment is naturally causing
this to happen, although you make a very good point that perhaps that could
be accelerated and / or more explicit.

The DEA EOL notice that Dieu shared back in mid September talked about the
removal of the DEA's from cf-release after the 6 months of overlap between
Diego "1.0" and the DEA's being fully retired.

Lots of moving parts here, including needing to support the transition of
everyone from one to the other.

On Thu, Oct 27, 2016 at 4:47 AM Daniel Jones <
daniel.jones(a)engineerbetter.com> wrote:

Thanks for that Dieu!

Is there work scheduled to get OS cf-release and associated documentation
into a state where Diego is the default, rather than deploying the DEA
architecture?

Regards,
Daniel Jones - CTO
+44 (0)79 8000 9153 <+44%207980%20009153>
@DanielJonesEB <https://twitter.com/DanielJonesEB>
*EngineerBetter* Ltd <http://www.engineerbetter.com> - UK Cloud Foundry
Specialists

On Thu, Oct 27, 2016 at 9:10 AM, Dieu Cao <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we
would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit


--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Geoff Franks <geoff@...>
 

Is the BOSH requirement something that affects everyone, or just non-managed offerings? If the only BOSH isn't required to be provided to users from a managed-offering, why require it to have been present in building what was offered? Shouldn't the part that matters for consistency be the CF experience in those situations?

On Oct 27, 2016, at 10:06 AM, Chip Childers <cchilders(a)cloudfoundry.org> wrote:

Bundling up Dr. Nic's questions for a single reply... Great questions! I did a bunch of the pre-work on behalf of the PMC Council on this topic, so I have a bunch of the context loaded.

Question #1: To confirm - if a CF platform patches any CF components outside of the biweekly or so release cycle that the components might have, then they lose their certification status? I know some on-prem vendors maintain private forks of cf-release and release patches of older versions for their customers; is this allowed or not?

Short Answer: Yes

Longer Answer: "Offerings" should always be based on a specific cf-release + recommended sub-components that aren't directly included in the cf-release itself (really this will transition to cf-deployment once that starts getting versioned "releases"). Bug fixes / vulnerability fixes are allowed to be back-ported, based on the "Exceptions" listed. This assumes that the fixes are in the upstream projects. Also notice the section about "current versions". That's an important concept. In 2017, the trademark license agreement that is used as the contractual vehicle for certification will be a perpetual license to use the 2017 "certification mark". The point here is that the upstream projects don't do LTS (long term support), but vendors are allowed to. They just have to reference the appropriate certification year for LTS versions.

Question #2: Why is "using BOSH" a requirement? As awesome as it is for many things, it isn't perfect. If companies innovate/experiment with alternate deployment systems why do they lose certification status?

Short Answer: Consistent operational experience and deployment platform for services

Long Answer: I agree that BOSH can be better, as can all software ;-). However, the certification process for offerings isn't about experimentation in the ecosystem. It's about consistency across the distributions. Requiring BOSH as the deployment method gives us two key things: (1) much more consistency for operators of the platform and (2) a consistent target (really a least common denominator) for ISV's packaging software for backing services. The value of consistency year over year doesn't diminish the value of experimentation outside of the certified distributions.

Question #3: "For managed offerings, BOSH does not need to be exposed to customers" - what is the origin & reason this is explicitly stated? Does it infer that there is any scenario at all where BOSH must be exposed to end users/customers?

Short Answer: It doesn't infer that for users.

Long Answer: That language was put in there to be specific that offerings that are online PaaS services shouldn't be required to (and none do) expose the BOSH layer to users of the Elastic Runtime layer (or customers generally).

Hope that helps!

-chip


On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com <mailto:drnicwilliams(a)gmail.com>> wrote:
Also, why is "using BOSH" a requirement? As awesome as it is for many things, it isn't perfect. If companies innovate/experiment with alternate deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io <mailto:dcao(a)pivotal.io>> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty accessing google docs.

2 major changes from the 2016 certification requirements include requiring Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1] https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit <https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit>
--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <tel:(267)%20250-0815>


Chip Childers <cchilders@...>
 

It is a requirement for all certified offerings of all types. Regarding
why: see my comments about consistent operational experience (think about a
service provider's ops team as part of the market of people working with
the CF stack) and consistent deployment environment for Services.

On Thu, Oct 27, 2016 at 10:40 AM Geoff Franks <geoff(a)starkandwayne.com>
wrote:

Is the BOSH requirement something that affects everyone, or just
non-managed offerings? If the only BOSH isn't required to be provided to
users from a managed-offering, why require it to have been present in
building what was offered? Shouldn't the part that matters for consistency
be the CF experience in those situations?

On Oct 27, 2016, at 10:06 AM, Chip Childers <cchilders(a)cloudfoundry.org>
wrote:

Bundling up Dr. Nic's questions for a single reply... Great questions! I
did a bunch of the pre-work on behalf of the PMC Council on this topic, so
I have a bunch of the context loaded.

*Question #1:* To confirm - if a CF platform patches any CF components
outside of the biweekly or so release cycle that the components might have,
then they lose their certification status? I know some on-prem vendors
maintain private forks of cf-release and release patches of older versions
for their customers; is this allowed or not?

*Short Answer:* Yes

*Longer Answer:* "Offerings" should always be based on a specific
cf-release + recommended sub-components that aren't directly included in
the cf-release itself (really this will transition to cf-deployment once
that starts getting versioned "releases"). Bug fixes / vulnerability fixes
are allowed to be back-ported, based on the "Exceptions" listed. This
assumes that the fixes are in the upstream projects. Also notice the
section about "current versions". That's an important concept. In 2017, the
trademark license agreement that is used as the contractual vehicle for
certification will be a perpetual license to use the 2017 "certification
mark". The point here is that the upstream projects don't do LTS (long term
support), but vendors are allowed to. They just have to reference the
appropriate certification year for LTS versions.

*Question #2:* Why is "using BOSH" a requirement? As awesome as it is for
many things, it isn't perfect. If companies innovate/experiment with
alternate deployment systems why do they lose certification status?

*Short Answer:* Consistent operational experience and deployment platform
for services

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.

*Question #3:* "For managed offerings, BOSH does not need to be exposed
to customers" - what is the origin & reason this is explicitly stated? Does
it infer that there is any scenario at all where BOSH must be exposed to
end users/customers?

*Short Answer:* It doesn't infer that for users.

*Long Answer:* That language was put in there to be specific that
offerings that are online PaaS services shouldn't be required to (and none
do) expose the BOSH layer to users of the Elastic Runtime layer (or
customers generally).

Hope that helps!

-chip


On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com>
wrote:

Also, why is "using BOSH" a requirement? As awesome as it is for many
things, it isn't perfect. If companies innovate/experiment with alternate
deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we
would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <(267)%20250-0815>


--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Chip Childers <cchilders@...>
 

To follow up... it was pointed out to me that the document didn't state
DRAFT well enough (it does now).

My answers below were from the perspective of having thought this proposal
through, and the context of what is and isn't a change from 2016.

Any other comments from anyone? This is the time to say so if you have
any.. including disagreements with any assumptions or thoughts below.

Thanks all!

On Thu, Oct 27, 2016 at 10:06 AM Chip Childers <cchilders(a)cloudfoundry.org>
wrote:

Bundling up Dr. Nic's questions for a single reply... Great questions! I
did a bunch of the pre-work on behalf of the PMC Council on this topic, so
I have a bunch of the context loaded.

*Question #1:* To confirm - if a CF platform patches any CF components
outside of the biweekly or so release cycle that the components might have,
then they lose their certification status? I know some on-prem vendors
maintain private forks of cf-release and release patches of older versions
for their customers; is this allowed or not?

*Short Answer:* Yes

*Longer Answer:* "Offerings" should always be based on a specific
cf-release + recommended sub-components that aren't directly included in
the cf-release itself (really this will transition to cf-deployment once
that starts getting versioned "releases"). Bug fixes / vulnerability fixes
are allowed to be back-ported, based on the "Exceptions" listed. This
assumes that the fixes are in the upstream projects. Also notice the
section about "current versions". That's an important concept. In 2017, the
trademark license agreement that is used as the contractual vehicle for
certification will be a perpetual license to use the 2017 "certification
mark". The point here is that the upstream projects don't do LTS (long term
support), but vendors are allowed to. They just have to reference the
appropriate certification year for LTS versions.

*Question #2:* Why is "using BOSH" a requirement? As awesome as it is for
many things, it isn't perfect. If companies innovate/experiment with
alternate deployment systems why do they lose certification status?

*Short Answer:* Consistent operational experience and deployment platform
for services

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.

*Question #3:* "For managed offerings, BOSH does not need to be exposed
to customers" - what is the origin & reason this is explicitly stated? Does
it infer that there is any scenario at all where BOSH must be exposed to
end users/customers?

*Short Answer:* It doesn't infer that for users.

*Long Answer:* That language was put in there to be specific that
offerings that are online PaaS services shouldn't be required to (and none
do) expose the BOSH layer to users of the Elastic Runtime layer (or
customers generally).

Hope that helps!

-chip


On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com>
wrote:

Also, why is "using BOSH" a requirement? As awesome as it is for many
things, it isn't perfect. If companies innovate/experiment with alternate
deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we
would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <(267)%20250-0815>
--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Chip Childers <cchilders@...>
 

RE: Question #2 below -

One of the things that we've been thinking about regarding operator
experiences with Cloud Foundry, and why standardizing on BOSH may be very
attractive, is figuring out how people that get skills in CF operations are
able to move between different environments (service providers / product
companies / enterprise users) and have relatively transferable skills
across installations.

This is something I'd like to test with feedback from the community. Does
it seem valuable to have consistency for operators? Would there actually be
consistency?

On Thu, Oct 27, 2016 at 10:06 AM Chip Childers <cchilders(a)cloudfoundry.org>
wrote:

Bundling up Dr. Nic's questions for a single reply... Great questions! I
did a bunch of the pre-work on behalf of the PMC Council on this topic, so
I have a bunch of the context loaded.

*Question #1:* To confirm - if a CF platform patches any CF components
outside of the biweekly or so release cycle that the components might have,
then they lose their certification status? I know some on-prem vendors
maintain private forks of cf-release and release patches of older versions
for their customers; is this allowed or not?

*Short Answer:* Yes

*Longer Answer:* "Offerings" should always be based on a specific
cf-release + recommended sub-components that aren't directly included in
the cf-release itself (really this will transition to cf-deployment once
that starts getting versioned "releases"). Bug fixes / vulnerability fixes
are allowed to be back-ported, based on the "Exceptions" listed. This
assumes that the fixes are in the upstream projects. Also notice the
section about "current versions". That's an important concept. In 2017, the
trademark license agreement that is used as the contractual vehicle for
certification will be a perpetual license to use the 2017 "certification
mark". The point here is that the upstream projects don't do LTS (long term
support), but vendors are allowed to. They just have to reference the
appropriate certification year for LTS versions.

*Question #2:* Why is "using BOSH" a requirement? As awesome as it is for
many things, it isn't perfect. If companies innovate/experiment with
alternate deployment systems why do they lose certification status?

*Short Answer:* Consistent operational experience and deployment platform
for services

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.

*Question #3:* "For managed offerings, BOSH does not need to be exposed to
customers" - what is the origin & reason this is explicitly stated? Does it
infer that there is any scenario at all where BOSH must be exposed to end
users/customers?

*Short Answer:* It doesn't infer that for users.

*Long Answer:* That language was put in there to be specific that offerings
that are online PaaS services shouldn't be required to (and none do) expose
the BOSH layer to users of the Elastic Runtime layer (or customers
generally).

Hope that helps!

-chip


On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com>
wrote:

Also, why is "using BOSH" a requirement? As awesome as it is for many
things, it isn't perfect. If companies innovate/experiment with alternate
deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we would
appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1]
https://docs.google.com/document/d/1S9o4u65uG_YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <(267)%20250-0815>

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Daniel Jones
 

My tuppence/two cents:

I have met folks who used non-BOSH Cloud Foundry solutions, and were
surprised when they hired people with "Cloud Foundry" on their resumes who
then had to start from scratch when debugging operational issues.

"I thought you operated Cloud Foundry in your last place?"
"I did, but none of the tools work on *this* one."

That's a marketing and reputation issue, right there. I'm all for more
innovative (and resource-efficient) ways of deploying Cloud Foundry, and if
BOSH isn't part of the deal then some thought needs to go into how these
differences are communicated to users and customers such that they aren't
left with any nasty surprises, because that's clearly bad for the ecosystem
as a whole.

Regards,
Daniel Jones - CTO
+44 (0)79 8000 9153
@DanielJonesEB <https://twitter.com/DanielJonesEB>
*EngineerBetter* Ltd <http://www.engineerbetter.com> - UK Cloud Foundry
Specialists

On Thu, Oct 27, 2016 at 7:57 PM, Chip Childers <cchilders(a)cloudfoundry.org>
wrote:

RE: Question #2 below -

One of the things that we've been thinking about regarding operator
experiences with Cloud Foundry, and why standardizing on BOSH may be very
attractive, is figuring out how people that get skills in CF operations are
able to move between different environments (service providers / product
companies / enterprise users) and have relatively transferable skills
across installations.

This is something I'd like to test with feedback from the community. Does
it seem valuable to have consistency for operators? Would there actually be
consistency?

On Thu, Oct 27, 2016 at 10:06 AM Chip Childers <cchilders(a)cloudfoundry.org>
wrote:

Bundling up Dr. Nic's questions for a single reply... Great questions! I
did a bunch of the pre-work on behalf of the PMC Council on this topic, so
I have a bunch of the context loaded.

*Question #1:* To confirm - if a CF platform patches any CF components
outside of the biweekly or so release cycle that the components might have,
then they lose their certification status? I know some on-prem vendors
maintain private forks of cf-release and release patches of older versions
for their customers; is this allowed or not?

*Short Answer:* Yes

*Longer Answer:* "Offerings" should always be based on a specific
cf-release + recommended sub-components that aren't directly included in
the cf-release itself (really this will transition to cf-deployment once
that starts getting versioned "releases"). Bug fixes / vulnerability fixes
are allowed to be back-ported, based on the "Exceptions" listed. This
assumes that the fixes are in the upstream projects. Also notice the
section about "current versions". That's an important concept. In 2017, the
trademark license agreement that is used as the contractual vehicle for
certification will be a perpetual license to use the 2017 "certification
mark". The point here is that the upstream projects don't do LTS (long term
support), but vendors are allowed to. They just have to reference the
appropriate certification year for LTS versions.

*Question #2:* Why is "using BOSH" a requirement? As awesome as it is for
many things, it isn't perfect. If companies innovate/experiment with
alternate deployment systems why do they lose certification status?

*Short Answer:* Consistent operational experience and deployment platform
for services

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.

*Question #3:* "For managed offerings, BOSH does not need to be exposed
to customers" - what is the origin & reason this is explicitly stated? Does
it infer that there is any scenario at all where BOSH must be exposed to
end users/customers?

*Short Answer:* It doesn't infer that for users.

*Long Answer:* That language was put in there to be specific that
offerings that are online PaaS services shouldn't be required to (and none
do) expose the BOSH layer to users of the Elastic Runtime layer (or
customers generally).

Hope that helps!

-chip


On Thu, Oct 27, 2016 at 5:29 AM Dr Nic Williams <drnicwilliams(a)gmail.com>
wrote:

Also, why is "using BOSH" a requirement? As awesome as it is for many
things, it isn't perfect. If companies innovate/experiment with alternate
deployment systems why do they lose certification status?






On Thu, Oct 27, 2016 at 6:11 PM +1000, "Dieu Cao" <dcao(a)pivotal.io> wrote:

Hello all,

The 2017 PaaS Certification Requirements is available here [1] and we
would appreciate questions/comments on the doc or in this thread.

I've also attached a PDF version for those of you that have difficulty
accessing google docs.

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.

-Dieu Cao
Runtime PMC Lead

[1] https://docs.google.com/document/d/1S9o4u65uG_
YrVQAdg7nxw7BrXAiL64hFSWBNVKZCMNI/edit

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815 <(267)%20250-0815>

--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Cornelius Schumacher
 

On Donnerstag, 27. Oktober 2016 01:10:37 CEST Dieu Cao wrote:

2 major changes from the 2016 certification requirements include requiring
Diego/Garden and also requiring the use of BOSH.
What does that mean for the stemcells? Is it required to use the stemcells
being officially released by the BOSH team, or is this one of the "explicitly
defined plugin points" where it's ok to use an alternative?

--
Cornelius Schumacher <cschum(a)suse.de>


Chip Childers <cchilders@...>
 

On Fri, Oct 28, 2016 at 3:10 AM Cornelius Schumacher <cschum(a)suse.de> wrote:

On Donnerstag, 27. Oktober 2016 01:10:37 CEST Dieu Cao wrote:

2 major changes from the 2016 certification requirements include
requiring
Diego/Garden and also requiring the use of BOSH.
What does that mean for the stemcells? Is it required to use the stemcells
being officially released by the BOSH team, or is this one of the
"explicitly
defined plugin points" where it's ok to use an alternative?
What do you (or others) think would be the right approach?
--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Cornelius Schumacher
 

On Fri, 28. Oktober 2016 14:15:22 CEST Chip Childers wrote:
On Fri, Oct 28, 2016 at 3:10 AM Cornelius Schumacher <cschum(a)suse.de> wrote:
On Donnerstag, 27. Oktober 2016 01:10:37 CEST Dieu Cao wrote:
2 major changes from the 2016 certification requirements include
requiring
Diego/Garden and also requiring the use of BOSH.
What does that mean for the stemcells? Is it required to use the stemcells
being officially released by the BOSH team, or is this one of the
"explicitly
defined plugin points" where it's ok to use an alternative?
What do you (or others) think would be the right approach?
I think it's good to keep some flexibility and openness, especially at such
integration points as the stemcell where there are defined interfaces and
tests.

This can help to accommodate customers who have specific needs, e.g. because
of standardization on certain infrastructure components. An all-in-one
solution, while having its advantages, is just not always a viable option from
an operational point of view, so having certain flexibility could increase
adoption.

I think it's also good from a community perspective as it results in a less
monolithic project and allows for wider cooperation around components with
well-defined integration points. It's easier to get involved and contribute if
you can start with components and can keep some choices from where you are
coming from.

Requiring the use of BOSH already would be quite a strict requirement because
there is overlap with other infrastructure and tools, which might already be
in use. BOSH is a great way to deploy Cloud Foundry, but allowing for
alternatives as well might have some benefits, e.g. around innovation as Dr.
Nic already mentioned.

So from my point of view it would be worth looking into ways how to keep some
openness in the certification in these lower level areas which are not
directly related to the user experience and maybe require interfaces or
certain tests to be passed instead of specifying the exact implementation.

--
Cornelius Schumacher <cschum(a)suse.de>


Chip Childers <cchilders@...>
 

Great feedback Cornelius. Inline comments and questions for everyone below:

On Fri, Oct 28, 2016 at 12:55 PM Cornelius Schumacher <cschum(a)suse.de>
wrote:

On Fri, 28. Oktober 2016 14:15:22 CEST Chip Childers wrote:
On Fri, Oct 28, 2016 at 3:10 AM Cornelius Schumacher <cschum(a)suse.de>
wrote:
On Donnerstag, 27. Oktober 2016 01:10:37 CEST Dieu Cao wrote:
2 major changes from the 2016 certification requirements include
requiring
Diego/Garden and also requiring the use of BOSH.
What does that mean for the stemcells? Is it required to use the
stemcells
being officially released by the BOSH team, or is this one of the
"explicitly
defined plugin points" where it's ok to use an alternative?
What do you (or others) think would be the right approach?
I think it's good to keep some flexibility and openness, especially at such
integration points as the stemcell where there are defined interfaces and
tests.

This can help to accommodate customers who have specific needs, e.g.
because
of standardization on certain infrastructure components. An all-in-one
solution, while having its advantages, is just not always a viable option
from
an operational point of view, so having certain flexibility could increase
adoption.

I think it's also good from a community perspective as it results in a less
monolithic project and allows for wider cooperation around components with
well-defined integration points. It's easier to get involved and
contribute if
you can start with components and can keep some choices from where you are
coming from.

Your points are really good. I can also see a clear argument for eventually
having multiple stemcells based on different Linux distros that CF can use
(although it's more than just stemcells that would be needed). Another
point of consideration is that stemcells can theoretically be re-baked with
additional software for management / telemetry / etc... to fit into
existing ITSM environments. The proposal didn't indicate any specific
stemcells being required for these reasons.


Requiring the use of BOSH already would be quite a strict requirement
because
there is overlap with other infrastructure and tools, which might already
be
in use. BOSH is a great way to deploy Cloud Foundry, but allowing for
alternatives as well might have some benefits, e.g. around innovation as
Dr.
Nic already mentioned.
I'd like to hear more about this from the community.

One side of the "argument" is the consistency that I was describing. I
think there's significant value in more operational consistency across the
CF ecosystem, for the reason that Daniel Jones went on to highlight
else-thread. The other consistency argument relates to knowing that BOSH is
there for packaging backend services (although it's also important that the
Service Broker API continues to be implementation agnostic for lots of
reasons).

The other side is that experimentation / innovation around deployment and
management of CF is valuable. We see non-BOSH deployment models in three of
the existing "certified" offerings today. Does that benefit users /
customers more than having consistency across offerings? Thoughts?


So from my point of view it would be worth looking into ways how to keep
some
openness in the certification in these lower level areas which are not
directly related to the user experience and maybe require interfaces or
certain tests to be passed instead of specifying the exact implementation.

--
Cornelius Schumacher <cschum(a)suse.de>
--
Chip Childers
VP Technology, Cloud Foundry Foundation
1.267.250.0815


Troy Topnik
 

It's important that this community understands that the *inclusion* of BOSH in the 2017 certification would *exclude* the Stackato and ContainerCF distributions which were certified in 2016, possibly others. This draft moves the goalposts significantly.

Quoting Chip:

It's about consistency across the distributions. Requiring BOSH as the
deployment method gives us two key things: (1) much more consistency for
operators of the platform and (2) a consistent target (really a least common
denominator) for ISV's packaging software for backing services. The value of
consistency year over year doesn't diminish the value of experimentation
outside of the certified distributions.
What about a consistent target for Cloud Foundry certified distributions? I completely disagree that this does not diminish experimentation. Companies will not invest in experiments that can never be commercially leveraged, and cannot make financial commitments without "consistency year over year" in the certification process itself.

To provide a little of my perspective: HPE's Stackato team embarked on a huge effort to re-engineer our product to meet the 2016 Cloud Foundry certification standard. This involved deprecating a lot of code and starting basically from scratch to develop Stakato 4.

We made this investment and took these risks with the understanding that the benefits of certification (customer confidence, compatibility, developers better positioned to contribute upstream, less churn maintaining forked code) would outweigh the hardships. If the BOSH requirement makes it into the 2017 certification we're actually worse off than we were a year ago, with less confidence that the requirements won't shift under our feet again.

I'm not actually objecting to BOSH itself here, just the notion that adding it to Cloud Foundry certification requirements is necessary. BOSH was built to be a comprehensive release engineering tool for *any* project. Let it be it's own thing.

TT


--
Troy Topnik
Sr. Product Manager | Helion Stackato
troy.topnik(a)hpe.com


Iovanov, Vlad Mircea
 

Regarding a consistent operator experience, I believe it will differ with or
without BOSH being a requirement for certification.
Some vendors will choose to add layers on top of BOSH, to improve UX, much like
what Pivotal is doing with the Pivotal Operations Manager.
So, in a sense, we can look at the common bits of CF as a kernel, from which
you get distros. If I'm Red Hat certified, it doesn't mean I can transfer all
my knowledge to Ubuntu.

From an architectural perspective, I think it's a mistake to further couple BOSH
with Cloud Foundry. During our CF containerization work, we've found that has
already lead to bad coding practices. I am referring to ERB templates and tight
coupling to monit.
But BOSH does have great primitives. It prescribes how code needs to be
organized, built and configured. That makes the codebase great for
experimentation with other deployment mechanisms and strategies.
For that reason, I think using the BOSH release as a form to package the
certified code of Cloud Foundry is a good idea. But using BOSH to deploy Cloud
Foundry would cut off the drive to experiment. Which means that no one will pay
attention to the problems that come from tightly coupling the two systems.
Furthermore, BOSH is a deployment mechanism for the VM world. Given the current
investment of the industry towards containers, why are we trying to further tie
Cloud Foundry to a VM-based infrastructure?

On 10/28/16, 11:04 AM, "Topnik, Troy" <troy.topnik(a)hpe.com> wrote:

It's important that this community understands that the *inclusion* of BOSH in the 2017 certification would *exclude* the Stackato and ContainerCF distributions which were certified in 2016, possibly others. This draft moves the goalposts significantly.

Quoting Chip:

> It's about consistency across the distributions. Requiring BOSH as the
> deployment method gives us two key things: (1) much more consistency for
> operators of the platform and (2) a consistent target (really a least common
> denominator) for ISV's packaging software for backing services. The value of
> consistency year over year doesn't diminish the value of experimentation
> outside of the certified distributions.

What about a consistent target for Cloud Foundry certified distributions? I completely disagree that this does not diminish experimentation. Companies will not invest in experiments that can never be commercially leveraged, and cannot make financial commitments without "consistency year over year" in the certification process itself.

To provide a little of my perspective: HPE's Stackato team embarked on a huge effort to re-engineer our product to meet the 2016 Cloud Foundry certification standard. This involved deprecating a lot of code and starting basically from scratch to develop Stakato 4.

We made this investment and took these risks with the understanding that the benefits of certification (customer confidence, compatibility, developers better positioned to contribute upstream, less churn maintaining forked code) would outweigh the hardships. If the BOSH requirement makes it into the 2017 certification we're actually worse off than we were a year ago, with less confidence that the requirements won't shift under our feet again.

I'm not actually objecting to BOSH itself here, just the notion that adding it to Cloud Foundry certification requirements is necessary. BOSH was built to be a comprehensive release engineering tool for *any* project. Let it be it's own thing.

TT


--
Troy Topnik
Sr. Product Manager | Helion Stackato
troy.topnik(a)hpe.com


Troy Topnik
 

I have met folks who used non-BOSH Cloud Foundry solutions, and were
surprised when they hired people with "Cloud Foundry" on their resumes who
then had to start from scratch when debugging operational issues.

"I thought you operated Cloud Foundry in your last place?"
"I did, but none of the tools work on *this* one."

That's a marketing and reputation issue, right there.
I think this confusion (or misrepresentation) is best solved by the Cloud Foundry Expert Certification that Stormy Peters has coordinated. I objected initially to the mandatory inclusion of BOSH in that operator training and certification, but I'll concede that it does fix this potential problem for people hiring CF talent.

TT


Aaron L <aaron.lefkowitz@...>
 

*Long Answer: *I agree that BOSH can be better, as can all software ;-).
However, the certification process for offerings isn't about
experimentation in the ecosystem. It's about consistency across the
distributions. Requiring BOSH as the deployment method gives us two key
things: (1) much more consistency for operators of the platform and (2) a
consistent target (really a least common denominator) for ISV's packaging
software for backing services. The value of consistency year over year
doesn't diminish the value of experimentation outside of the certified
distributions.
The consistent target from an Engineering perspective should always be the
contract or interface, but should never degrade to the point of being a
particular implementation. This has been damaging in many open source projects.
Where competition has always fostered excellence in these projects. Look
at gcc and clang, or vim and neovim where the original projects were in
states of decay, but a competitor emerging kicked them back into gear. Settling
on BOSH as a lowest common denominator will make BOSH stagnate.

With only one deployment mechanism and no clean interface to separate Cloud
Foundry components and releases from BOSH implementation details, it's possible
that the lines become so blurred that BOSH becomes impossible to remove. Even
if at some point it becomes desirable because the community has reason to move
away from BOSH (ie. rewrite time, or perhaps a better mechanism has been
discovered or even leveraging a new open source project to do the same) it will
be harder to do so, and hamper the evolution of the project.

I'd propose keeping BOSH out of the CF certification, and instead start work
on describing the BOSH <-> CF interface more cleanly, and work to improve that
so that various deployment mechanisms can be used all the while retaining the
consistency which seems to be the real goal we're trying to strive for here.