From 5911031b95e09b357e92d26f46b2784d8a9c8006 Mon Sep 17 00:00:00 2001 From: villyes Date: Thu, 7 May 2026 09:22:12 +0200 Subject: [PATCH 1/4] feat(k8s): add SRM MTA-7116 --- pages/kubernetes/menu.ts | 4 + ...kubernetes-shared-responsibility-model.mdx | 393 ++++++++++++++++++ 2 files changed, 397 insertions(+) create mode 100644 pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx diff --git a/pages/kubernetes/menu.ts b/pages/kubernetes/menu.ts index 5a64709714..7830fcb39d 100644 --- a/pages/kubernetes/menu.ts +++ b/pages/kubernetes/menu.ts @@ -239,6 +239,10 @@ export const kubernetesMenu = { label: 'Migrate end-of-life pools to newer Instances', slug: 'migrate-end-of-life-pools-to-newer-instances', }, + { + label: 'Shared Responsibility Model for Kubernetes', + slug: 'kubernetes-shared-responsibility-model', + }, ], label: 'Additional Content', slug: 'reference-content', diff --git a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx new file mode 100644 index 0000000000..617ce2471b --- /dev/null +++ b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx @@ -0,0 +1,393 @@ +--- +title: Shared Responsibility Model for Scaleway Managed Kubernetes Services (Kapsule & Kosmos) +description: Learn about the shared responsibility model for Scaleway Managed Kubernetes Services (Kapsule & Kosmos), outlining the roles of Scaleway and users in managing Kubernetes security, backups, and compliance. +tags: kubernetes srm +dates: + validation: 2026-05-07 + posted: 2026-05-07 +--- + +{/* + Vous pouvez télécharger le modèle de responsabilité partagée relatif aux Instances en français [ici](/pdf/???.pdf/). Veuillez noter que, pour les valeurs contractuelles, la version anglaise fait foi. +*/} + +Scaleway’s managed Kubernetes services, Kapsule and Kosmos, provide a fully managed control plane and associated ecosystem components required to run Kubernetes clusters. Scaleway abstracts many operational tasks to reduce customer operational burden, but customers are still accountable for the security, configuration, and operation of their own workloads and cluster configurations. + +This model clarifies responsibilities in the following categories: + +- “Security of the Cloud”: Scaleway’s responsibility +- “Security in the Cloud”: Customer’s responsibility +- Service‑specific responsibilities for Kapsule and Kosmos +- Specific provisions for HDS (Health Data Hosting) + +Responsibilities vary depending on cluster configuration and the presence of external node providers in Kosmos. + +**Key Principle:** + +*Scaleway ensures the platform is secure and reliable. The customer ensures their workloads and configurations are secure and compliant.* + +## What is a managed Kubernetes service? + +In the context of Scaleway, a managed Kubernetes service refers to the **Kapsule** and **Kosmos** products. Scaleway handles the management and maintenance of the Kubernetes control plane, along with all the crucial core components required for the proper operation of the Kubernetes cluster. + +## What components of Kubernetes are managed by Scaleway? + +Scaleway manages the Kubernetes control plane (either Kapsule or Kosmos), which consists of various components responsible for managing and maintaining the cluster and its state, and scheduling applications. This includes components such as the control plane itself: *etcd*, *API server*, *scheduler*, etc. + +Scaleway takes care of Kubernetes system applications such as CoreDNS, kube-proxy, Container Networking Interface (CNI), and Container Storage Interface (CSI), which are required for the normal run of the Kubernetes cluster and its associated resources. +Scaleway is also responsible for node provisioning and providing updates of operating system node images. + +Scaleway offers support for the latest minor releases and patches, allowing the user to update them regularly on the cluster using our API, CLI, the web console interface or the terraform provider. + +Furthermore, Scaleway provides information and reminders when older versions reach their end of support, ensuring that users stay informed and upgrade their clusters regularly. + +PLACEHOLDER FOR image + +### Components and features handled by Scaleway + +| Component | Responsibility | +| ----------- | --------------- | +| Control plane | etcd, API Server, Scheduler, Controller Manager, Cloud Controller Manager | +| System add-ons (present on each worker node) | CoreDNS, kube-proxy, CNI, CSI | +| Node images | Published, patched, and maintained by Scaleway for managed node pools | +| Control plane high availability | Multi-AZ deployment options, automatic failover | +| Infrastructure integration | VPC, Load Balancers, Block Storage, IAM APIs | +| Patch & version management | Notifications, EOL planning, auto-upgrade support for patches | + +## Security of the Cloud (Scaleway’s responsibility) + +### Infrastructure and platform operations + +Scaleway is responsible for providing and maintaining: + +- **Physical datacenter security**, including facilities, access control, and environmental protections +- **Networking infrastructure**, including underlying physical and virtual networks +- Virtualization stack, underlying APIs, and infrastructure control planes used for cluster provisioning +- **Managed Kubernetes control planes**, including high availability and redundancy of API servers and cluster state data +- **Scaleway-provided features integrated with the platform** (e.g., Load Balancers, VPC infrastructure, IAM APIs) +- **Scaleway-maintained Kubernetes node images** and managed node pool lifecycle automation + +### Service resiliency and availability + +Scaleway is responsible for: + +- Ensuring the managed Kubernetes control plane meets availability and resiliency targets defined in product documentation +- Providing multi-AZ (Availability Zone) control plane options where applicable +- Ensuring underlying infrastructure redundancy +- Publishing documented SLAs for managed control planes + +### Integration with other Scaleway services + +Scaleway ensures integration with managed VPC, IAM, Load Balancers, Block Storage, and other infrastructure services used by Kubernetes clusters, including provisioning via Kubernetes APIs. + +### Platform security and updates + +Scaleway maintains: + +- Security patching of infrastructure components and managed control plane components +- Ongoing vulnerability management for services under Scaleway’s control +- Secure and sensible defaults for managed features and integrations +- Customers are notified when versions approach End of Life. + +## Security in the Cloud (User’s responsibility) + +Users are responsible for all aspects of Kubernetes cluster configuration and workloads, including but not limited to: + +### Kubernetes cluster configuration + +Users are responsible for: + +- Kubernetes resource configuration (Deployments, Services, ConfigMaps, Secrets, CRDs) +- RBAC (Role-Based Access Control) and user access permissions +- Admission controls and namespace governance +- Pod security policies and policies enforced through the Kubernetes API +- Network policies within the cluster +- Audit logging (for dedicated offers), logging retention, and observability configuration + +### Node pools, images, and workloads + +When using Scaleway’s managed node pools: + +- Users define the node pool size, instance types, and scaling policies +- Users choose when to trigger node upgrades or rolling image updates +- Users are responsible for workload compatibility + +For custom or external nodes (e.g., in a Kosmos cluster that attaches external non-Scaleway compute): + +- Users are responsible for node provisioning and lifecycle +- Users must ensure operating system security, patching, and hardening +- Users must manage networking connectivity, firewall rules, and node bootstrap configurations + +### Networking and VPC security + +The user is responsible for: + +- Designing VPC segmentation and subnets +- Configuring firewall rules (ACLs) and security groups +- Managing public exposure of services +- Configuring TLS certificates, ingress rules, and DNS + +### Identity, access management, and credentials + +Users are responsible for: + +- IAM policies within their account/project +- Authentication and authorization for cluster access +- Secure storage and rotation of Kubernetes credentials, tokens, and API keys +- Managing least-privilege access for users and applications + +### Workload security and data protection + +Users must ensure: + +- Container images are appropriately scanned, secured, and trustworthy +- Application-level encryption in transit and at rest where required +- Backup and restore strategies for application data and stateful workloads +- Logging and monitoring are configured to meet compliance and audit requirements + +## Add-ons + +Scaleway is responsible for: + +- Providing managed add-ons (for example, CSI drivers, default CNI components, CoreDNS, or NVIDIA GPU Operator) + +Users are responsible for: + +- Configuring these add-ons according to his specific needs when applicable +- Monitoring and maintaining compatibility with cluster workloads +- Evaluating third-party add-ons or custom extensions not maintained by Scaleway + + + When users modify or replace preinstalled components (e.g., altering kubelet configurations, node networking), responsibility for those components transfers to the customer. + + +## Mutualised vs Dedicated + +Kubernetes control plane varies depending on whether it is a shared or dedicated environment, and by the specific dedicated resources that you choose. + +See [the overview of Kubernetes control plane offers](https://www.scaleway.com/en/docs/kubernetes/reference-content/kubernetes-control-plane-offers/) to understand the differences between dedicated and mutualized offers. + +## Cluster Variants: Kapsule vs Kosmos + +### Kapsule + +In Kapsule clusters, the control plane and managed node pools are operated by Scaleway: + +- Users define cluster resource configuration and workload placement. +- Managed Kubernetes images and node pool automation are provided. + +### Kosmos + +Kosmos extends managed Kubernetes to support multiple infrastructure sources: + +#### Scaleway-hosted nodes + +Scaleway-hosted nodes behave like Kapsule nodes; Scaleway manages node provisioning and image publishing, while users manage workloads and configurations. + +While Scaleway manages the host infrastructure, hypervisor, and physical security, customers remain responsible for the workload security, and cluster-level policies - consistent with this Kubernetes SRM. + + + Kosmos worker nodes hosted on Scaleway infrastructure are provisioned and managed using Scaleway Instances. As such, the underlying compute, lifecycle management, and host-level security follow the [Scaleway Instances Shared Responsibility Model](https://www.scaleway.com/en/docs/instances/reference-content/instances-shared-responsibility-model/). + + +#### External nodes + +- Nodes hosted outside of Scaleway are under the full responsibility of the user for OS patching, security hardening, connectivity, and health monitoring. +- Scaleway continues to manage the Kubernetes control plane for the combined cluster. + +## Version lifecycle and End‑of‑support policy + +Scaleway’s Kubernetes version policy requires customers to: + +- Track deprecation notices and notifications +- Engage in Kubernetes minor and major version upgrades +- Enable the auto‑upgrade feature for patch version updates within supported minor releases +- Replace nodes at or preferably before the lifecycle limits recommended by the platform + +Scaleway may perform scheduled upgrade assistance for unsupported versions to guarantee operational continuity, but customers must validate workloads before and after such changes. + +Scaleway supports each Kubernetes minor version for at least **12 months after initial release**. + + + The **auto-upgrade** feature applies patch updates only within the same minor version. It covers both the control plane and managed nodes. Ensure the `kube-system` namespace remains unmodified to avoid upgrade failures. + + +### Lifecycle stages + +| Stage | Description | Corresponding Action | +| ----------- | -------------- | -------------------- | +| Release | Version available for new clusters and upgrades | Optional upgrade | +| Deprecation | No longer available for new clusters; existing clusters notified via support ticket | Version upgrade | +| End of Support (EoS) | Automatic upgrade triggered within 30 days to next supported minor version | Validate workloads post forced upgrade | + +**Notifications:** + +- **Deprecation**: Announced in the [Changelog](https://changelog.scaleway.com) +- **EoS**: Communicated via console support ticket and scheduled maintenance notice + +Scaleway may perform forced upgrades for unsupported versions, but workload compatibility is the customer’s responsibility. + +### Usage compliance + +Users must ensure that their usage of the Kubernetes services complies with Scaleway’s Terms of Service, applicable laws, and industry-specific compliance requirements (GDPR, HIPAA, SOC2, etc). + +### Data protection and encryption + +Users are responsible for: + +- Ensuring encryption of sensitive data at rest and in transit inside workloads +- Managing keys and certificates as needed for compliance +- Implementing backup and retention policies consistent with regulatory obligations + +Scaleway provides infrastructure to support such features but does not manage user data content or application encryption. + +### Data deletion and resource lifecycle + +Users must explicitly delete or manage resources (clusters, node pools, volumes, network components, credentials). They can use Kapsule API to synchronously delete scaleway resources attached to an existing cluster. + +Scaleway will remove infrastructure components upon termination but is not responsible for retaining or restoring user workloads or data. + +### Incident Response & Remediation + +Scaleway is responsible for: + +- Restoring control plane to functional state after unforeseen infrastructure events +- Providing observability data and recommendations following platform‑level failures + +Customer is responsible for: + +- Diagnosing workload‑level failures +- Correcting misconfigured resources +- Restoring application state and dependent workflows + + + Scaleway may reset a cluster to a default factory state but does not guarantee recovery of misconfigured or incompatible workloads. + + +## Specific provisions for HDS (Health Data Hosting) with Kapsule Dedicated Offer + +This section describes the specific requirements and responsibilities for hosting health data (or the transit of such data) in accordance with the HDS regulatory framework. + +When processing health data using the Scaleway Kapsule product, users are responsible for: + +- Signing the Scaleway HDS contract. +- Creating Kapsule clusters specifically dedicated to processing HDS-compliant data +- Ensuring that access to these clusters is restricted following least-privilege rules +- Following Scaleway's general documentation on ensuring HDS compliance. + +Scaleway is committed to providing an HDS-certified infrastructure and maintaining this certification. + +### Backup + +Users are responsible for backing up their data with appropriate storage solutions like HDS block storage. Scaleway must backup Kapsule control-plane configuration and remain able to restore cluster state after cluster malfunction if any. + +### Data Residency + +So that Scaleway can guarantee that data processing remains within authorized data centers in Paris users must: + +- Create Kapsule clusters only in Paris authorized region (fr-par) +- Create associated storage and network resources in Paris region +- **Not route cluster traffic outside of fr-par region** + +### Identification of HDS-Compliant Resources + +Users are responsible for: + +- Identifying which resources (Load Balancers, Instances, Block Volumes) are HDS-compliant +- Attach only such resources to the HDS-compliant Kapsule cluster + +### Data Encryption + +Health data must be encrypted in transit. + +Users are responsible for: + +- Enforcing HTTPS for ingress and egress cluster traffic, i.e. accordingly configure load balancers and gateways +- Handling certificates generation and renewal for transit +- Handling block volume provisioning and encryption with Kapsule CSI and encryption key management + +Scaleway is responsible for: + +- Providing a secure L2 private network on which cluster worker nodes and control-plane traffic is routed +- Providing compliant Storage APIs to store at rest Health data with Kapsule CSI +- Managing and renewing the key used to encrypt the cluster configuration in the etcd database + +### Logs and traceability + +User is responsible for: + +- Configuring and maintaining monitoring & tracing solutions for his workload, eventually using Scaleway Cockpit solution +- Activating and configuring Audit Trail solution + +Scaleway is responsible for: + +- Providing metrics & logging interfaces to monitor control-plane components (including Audit trail capabilities) + +### Reversibility + +#### Step 1: Assess and document current cluster resources + +Begin by documenting your existing cluster configuration. This includes namespaces, deployments, services, storage, and any custom resources or policies in use. + +- Inventory of resources + - Namespaces: List all namespaces in use. + - Deployments and StatefulSets: Identify all applications and workloads running. + - Services: Document LoadBalancers, NodePorts, ClusterIPs. + - ConfigMaps and Secrets: Export configurations and sensitive data. + - Ingress Controllers: Note any Ingress resources and controllers used. + - Persistent Volumes and Claims: List all storage resources. + - Custom Resource Definitions (CRDs): Document any CRDs and associated operators. + - Network Policies: Record any network policies in place. +- Export manifests + + Use kubectl to export the manifests of your resources: + + ```bash + kubectl get all --all-namespaces -o yaml > cluster-resources.yaml + kubectl get pvc --all-namespaces -o yaml > pvcs.yaml + kubectl get configmaps --all-namespaces -o yaml > configmaps.yaml + kubectl get secrets --all-namespaces -o yaml > secrets.yaml + kubectl get ingress --all-namespaces -o yaml > ingress.yaml + kubectl get crd --all-namespaces -o yaml > crds.yaml + ``` + + +#### Step 2: Migrate container images to your new container registry + +Your new cluster will need access to your container images. + +#### Step 3: Create a Kubernetes cluster + +Create and configure a new Kubernetes cluster. + +#### Step 4: Configure kubectl on your new Kubernetes cluster + +#### Step 5: Adapt Kubernetes manifests and configurations + +Your existing manifests may contain cloud-provider-specific settings that need adjustment to align with the new provider’s configuration. + +#### Step 6: Migrate persistent Data and storage + +1. Backup data from your existing cluster: Use appropriate tools to back up data from Persistent Volumes. Methods include: + + - Database dumps: For databases, perform data exports. + - File system copy: For file storage, copy data to a temporary location. + +2. Restore data to newly created cluster. + + - Create PersistentVolumeClaims in your new cluster. + - Restore data into the new volumes: + - Init containers: Use init containers to populate data. + - Data import jobs: Run Kubernetes jobs to import data. + +#### Step 7: Deploy applications to your new cluster + +#### Step 8: Update networking and DNS configurations + +#### Step 9: Test and validate deployments + +Conduct functional, performance, and end-to-end testing to verify the applications work as expected in the new environment. + + + This documentation should be read with Scaleway's HDS agreement and applicable certifications. If you have any questions, contact HDS support for clarification. + \ No newline at end of file From c6a3e96867d808ced335cc7ea3a4550d343ff766 Mon Sep 17 00:00:00 2001 From: villyes Date: Thu, 7 May 2026 13:48:15 +0200 Subject: [PATCH 2/4] feat(k8s): add SRM MTA-7116 --- ...kubernetes-shared-responsibility-model.mdx | 182 +++++++++--------- 1 file changed, 89 insertions(+), 93 deletions(-) diff --git a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx index 617ce2471b..6f8ba62c09 100644 --- a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx +++ b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx @@ -7,9 +7,7 @@ dates: posted: 2026-05-07 --- -{/* - Vous pouvez télécharger le modèle de responsabilité partagée relatif aux Instances en français [ici](/pdf/???.pdf/). Veuillez noter que, pour les valeurs contractuelles, la version anglaise fait foi. -*/} +import image from './assets/scaleway-managed-kubernetes-schema.webp' Scaleway’s managed Kubernetes services, Kapsule and Kosmos, provide a fully managed control plane and associated ecosystem components required to run Kubernetes clusters. Scaleway abstracts many operational tasks to reduce customer operational burden, but customers are still accountable for the security, configuration, and operation of their own workloads and cluster configurations. @@ -18,13 +16,17 @@ This model clarifies responsibilities in the following categories: - “Security of the Cloud”: Scaleway’s responsibility - “Security in the Cloud”: Customer’s responsibility - Service‑specific responsibilities for Kapsule and Kosmos -- Specific provisions for HDS (Health Data Hosting) +- Specific provisions for Health Data Hosting (HDS) Responsibilities vary depending on cluster configuration and the presence of external node providers in Kosmos. -**Key Principle:** + + **Key Principle:**
Scaleway ensures the platform is secure and reliable. The customer ensures their workloads and configurations are secure and compliant. +
-*Scaleway ensures the platform is secure and reliable. The customer ensures their workloads and configurations are secure and compliant.* +{/* + Vous pouvez télécharger le modèle de responsabilité partagée relatif aux Services Kubernetes gérés par Scaleway (Kapsule et Kosmos) en français [ici](/pdf/placeholder.pdf/). Veuillez noter que, pour les valeurs contractuelles, la version anglaise fait foi. +*/} ## What is a managed Kubernetes service? @@ -34,14 +36,13 @@ In the context of Scaleway, a managed Kubernetes service refers to the **Kapsule Scaleway manages the Kubernetes control plane (either Kapsule or Kosmos), which consists of various components responsible for managing and maintaining the cluster and its state, and scheduling applications. This includes components such as the control plane itself: *etcd*, *API server*, *scheduler*, etc. -Scaleway takes care of Kubernetes system applications such as CoreDNS, kube-proxy, Container Networking Interface (CNI), and Container Storage Interface (CSI), which are required for the normal run of the Kubernetes cluster and its associated resources. -Scaleway is also responsible for node provisioning and providing updates of operating system node images. +Scaleway takes care of Kubernetes system applications such as CoreDNS, kube-proxy, the Container Networking Interface (CNI), and the Container Storage Interface (CSI), which are required for the normal run of the Kubernetes cluster and its associated resources. Scaleway is also responsible for node provisioning and providing updates of operating system node images. -Scaleway offers support for the latest minor releases and patches, allowing the user to update them regularly on the cluster using our API, CLI, the web console interface or the terraform provider. +Scaleway offers support for the latest minor releases and patches, allowing the user to update them regularly on the cluster using our API, CLI, the web console interface, or the Terraform Provider. Furthermore, Scaleway provides information and reminders when older versions reach their end of support, ensuring that users stay informed and upgrade their clusters regularly. -PLACEHOLDER FOR image + ### Components and features handled by Scaleway @@ -62,7 +63,7 @@ Scaleway is responsible for providing and maintaining: - **Physical datacenter security**, including facilities, access control, and environmental protections - **Networking infrastructure**, including underlying physical and virtual networks -- Virtualization stack, underlying APIs, and infrastructure control planes used for cluster provisioning +- **Virtualization stack, underlying APIs, and infrastructure control planes** used for cluster provisioning - **Managed Kubernetes control planes**, including high availability and redundancy of API servers and cluster state data - **Scaleway-provided features integrated with the platform** (e.g., Load Balancers, VPC infrastructure, IAM APIs) - **Scaleway-maintained Kubernetes node images** and managed node pool lifecycle automation @@ -74,7 +75,7 @@ Scaleway is responsible for: - Ensuring the managed Kubernetes control plane meets availability and resiliency targets defined in product documentation - Providing multi-AZ (Availability Zone) control plane options where applicable - Ensuring underlying infrastructure redundancy -- Publishing documented SLAs for managed control planes +- Publishing documented Service Level Agreements (SLAs) for managed control planes ### Integration with other Scaleway services @@ -87,7 +88,7 @@ Scaleway maintains: - Security patching of infrastructure components and managed control plane components - Ongoing vulnerability management for services under Scaleway’s control - Secure and sensible defaults for managed features and integrations -- Customers are notified when versions approach End of Life. +- Customers are notified when versions approach End of Life ## Security in the Cloud (User’s responsibility) @@ -97,8 +98,8 @@ Users are responsible for all aspects of Kubernetes cluster configuration and wo Users are responsible for: -- Kubernetes resource configuration (Deployments, Services, ConfigMaps, Secrets, CRDs) -- RBAC (Role-Based Access Control) and user access permissions +- Kubernetes resource configuration (Deployments, Services, ConfigMaps, Secrets, Custom Resource Definitions (CRDs)) +- Role-Based Access Control (RBAC) and user access permissions - Admission controls and namespace governance - Pod security policies and policies enforced through the Kubernetes API - Network policies within the cluster @@ -123,7 +124,7 @@ For custom or external nodes (e.g., in a Kosmos cluster that attaches external n The user is responsible for: - Designing VPC segmentation and subnets -- Configuring firewall rules (ACLs) and security groups +- Configuring firewall rules (Access Control Lists (ACLs)) and security groups - Managing public exposure of services - Configuring TLS certificates, ingress rules, and DNS @@ -153,7 +154,7 @@ Scaleway is responsible for: Users are responsible for: -- Configuring these add-ons according to his specific needs when applicable +- Configuring these add-ons according to their specific needs when applicable - Monitoring and maintaining compatibility with cluster workloads - Evaluating third-party add-ons or custom extensions not maintained by Scaleway @@ -165,16 +166,16 @@ Users are responsible for: Kubernetes control plane varies depending on whether it is a shared or dedicated environment, and by the specific dedicated resources that you choose. -See [the overview of Kubernetes control plane offers](https://www.scaleway.com/en/docs/kubernetes/reference-content/kubernetes-control-plane-offers/) to understand the differences between dedicated and mutualized offers. +See the [overview of Kubernetes control plane offers](https://www.scaleway.com/en/docs/kubernetes/reference-content/kubernetes-control-plane-offers/) to understand the differences between dedicated and mutualized offers. -## Cluster Variants: Kapsule vs Kosmos +## Cluster variants: Kapsule vs Kosmos ### Kapsule In Kapsule clusters, the control plane and managed node pools are operated by Scaleway: -- Users define cluster resource configuration and workload placement. -- Managed Kubernetes images and node pool automation are provided. +- Users define cluster resource configuration and workload placement +- Managed Kubernetes images and node pool automation are provided ### Kosmos @@ -195,7 +196,7 @@ While Scaleway manages the host infrastructure, hypervisor, and physical securit - Nodes hosted outside of Scaleway are under the full responsibility of the user for OS patching, security hardening, connectivity, and health monitoring. - Scaleway continues to manage the Kubernetes control plane for the combined cluster. -## Version lifecycle and End‑of‑support policy +## Version lifecycle and End‑of‑Support policy Scaleway’s Kubernetes version policy requires customers to: @@ -209,7 +210,7 @@ Scaleway may perform scheduled upgrade assistance for unsupported versions to gu Scaleway supports each Kubernetes minor version for at least **12 months after initial release**. - The **auto-upgrade** feature applies patch updates only within the same minor version. It covers both the control plane and managed nodes. Ensure the `kube-system` namespace remains unmodified to avoid upgrade failures. + The **auto-upgrade** feature applies patch updates only within the same minor version. It covers both the control plane and managed nodes. Ensure that the `kube-system` namespace remains unmodified to avoid upgrade failures. ### Lifecycle stages @@ -222,14 +223,14 @@ Scaleway supports each Kubernetes minor version for at least **12 months after i **Notifications:** -- **Deprecation**: Announced in the [Changelog](https://changelog.scaleway.com) +- **Deprecation**: Announced in the [Changelog](https://www.scaleway.com/en/docs/changelog/) - **EoS**: Communicated via console support ticket and scheduled maintenance notice Scaleway may perform forced upgrades for unsupported versions, but workload compatibility is the customer’s responsibility. ### Usage compliance -Users must ensure that their usage of the Kubernetes services complies with Scaleway’s Terms of Service, applicable laws, and industry-specific compliance requirements (GDPR, HIPAA, SOC2, etc). +Users must ensure that their usage of the Kubernetes services complies with Scaleway’s Terms of Service, applicable laws, and industry-specific compliance requirements (GDPR, HIPAA, SOC2, etc.). ### Data protection and encryption @@ -243,151 +244,146 @@ Scaleway provides infrastructure to support such features but does not manage us ### Data deletion and resource lifecycle -Users must explicitly delete or manage resources (clusters, node pools, volumes, network components, credentials). They can use Kapsule API to synchronously delete scaleway resources attached to an existing cluster. +Users must explicitly delete or manage resources (clusters, node pools, volumes, network components, credentials). They can use Kapsule API to synchronously delete Scaleway resources attached to an existing cluster. Scaleway will remove infrastructure components upon termination but is not responsible for retaining or restoring user workloads or data. -### Incident Response & Remediation +### Incident response and remediation Scaleway is responsible for: - Restoring control plane to functional state after unforeseen infrastructure events - Providing observability data and recommendations following platform‑level failures -Customer is responsible for: +Customers are responsible for: - Diagnosing workload‑level failures - Correcting misconfigured resources - Restoring application state and dependent workflows - + Scaleway may reset a cluster to a default factory state but does not guarantee recovery of misconfigured or incompatible workloads. -## Specific provisions for HDS (Health Data Hosting) with Kapsule Dedicated Offer +## Specific provisions for Health Data Hosting (HDS) with Kapsule Dedicated offer This section describes the specific requirements and responsibilities for hosting health data (or the transit of such data) in accordance with the HDS regulatory framework. When processing health data using the Scaleway Kapsule product, users are responsible for: -- Signing the Scaleway HDS contract. +- Signing the Scaleway HDS contract - Creating Kapsule clusters specifically dedicated to processing HDS-compliant data - Ensuring that access to these clusters is restricted following least-privilege rules -- Following Scaleway's general documentation on ensuring HDS compliance. +- Following Scaleway's general documentation on ensuring HDS compliance Scaleway is committed to providing an HDS-certified infrastructure and maintaining this certification. ### Backup -Users are responsible for backing up their data with appropriate storage solutions like HDS block storage. Scaleway must backup Kapsule control-plane configuration and remain able to restore cluster state after cluster malfunction if any. +Users are responsible for backing up their data with appropriate storage solutions such as HDS block storage. Scaleway must back up Kapsule control-plane configuration and remain able to restore cluster state after cluster malfunction, if any. -### Data Residency +### Data residency -So that Scaleway can guarantee that data processing remains within authorized data centers in Paris users must: +So that Scaleway can guarantee that data processing remains within authorized data centers in Paris, users must: -- Create Kapsule clusters only in Paris authorized region (fr-par) -- Create associated storage and network resources in Paris region -- **Not route cluster traffic outside of fr-par region** +- Create Kapsule clusters only in the Paris authorized region (fr-par) +- Create associated storage and network resources in the Paris region +- **Not route cluster traffic outside of the `fr-par` region** -### Identification of HDS-Compliant Resources +### Identification of HDS-compliant resources Users are responsible for: - Identifying which resources (Load Balancers, Instances, Block Volumes) are HDS-compliant - Attach only such resources to the HDS-compliant Kapsule cluster -### Data Encryption +### Data encryption Health data must be encrypted in transit. Users are responsible for: -- Enforcing HTTPS for ingress and egress cluster traffic, i.e. accordingly configure load balancers and gateways -- Handling certificates generation and renewal for transit +- Enforcing HTTPS for ingress and egress cluster traffic, i.e., accordingly configuring load balancers and gateways +- Handling certificate generation and renewal for transit - Handling block volume provisioning and encryption with Kapsule CSI and encryption key management Scaleway is responsible for: - Providing a secure L2 private network on which cluster worker nodes and control-plane traffic is routed -- Providing compliant Storage APIs to store at rest Health data with Kapsule CSI +- Providing compliant Storage APIs to store health data at rest with Kapsule CSI - Managing and renewing the key used to encrypt the cluster configuration in the etcd database ### Logs and traceability -User is responsible for: +Users are responsible for: -- Configuring and maintaining monitoring & tracing solutions for his workload, eventually using Scaleway Cockpit solution -- Activating and configuring Audit Trail solution +- Configuring and maintaining monitoring and tracing solutions for their workload, eventually using Scaleway's Cockpit solution +- Activating and configuring Scaleway’s Audit Trail solution Scaleway is responsible for: -- Providing metrics & logging interfaces to monitor control-plane components (including Audit trail capabilities) +- Providing metrics and logging interfaces to monitor control-plane components (including Audit Trail capabilities) ### Reversibility -#### Step 1: Assess and document current cluster resources - -Begin by documenting your existing cluster configuration. This includes namespaces, deployments, services, storage, and any custom resources or policies in use. - -- Inventory of resources - - Namespaces: List all namespaces in use. - - Deployments and StatefulSets: Identify all applications and workloads running. - - Services: Document LoadBalancers, NodePorts, ClusterIPs. - - ConfigMaps and Secrets: Export configurations and sensitive data. - - Ingress Controllers: Note any Ingress resources and controllers used. - - Persistent Volumes and Claims: List all storage resources. - - Custom Resource Definitions (CRDs): Document any CRDs and associated operators. - - Network Policies: Record any network policies in place. -- Export manifests +1. Assess and document current cluster resources. - Use kubectl to export the manifests of your resources: + Begin by documenting your existing cluster configuration. This includes namespaces, deployments, services, storage, and any custom resources or policies in use. - ```bash - kubectl get all --all-namespaces -o yaml > cluster-resources.yaml - kubectl get pvc --all-namespaces -o yaml > pvcs.yaml - kubectl get configmaps --all-namespaces -o yaml > configmaps.yaml - kubectl get secrets --all-namespaces -o yaml > secrets.yaml - kubectl get ingress --all-namespaces -o yaml > ingress.yaml - kubectl get crd --all-namespaces -o yaml > crds.yaml - ``` + - Inventory of resources: + - Namespaces: List all namespaces in use. + - Deployments and StatefulSets: Identify all applications and workloads running. + - Services: Document LoadBalancers, NodePorts, ClusterIPs. + - ConfigMaps and Secrets: Export configurations and sensitive data. + - Ingress Controllers: Note any Ingress resources and controllers used. + - Persistent Volumes and Claims: List all storage resources. + - Custom Resource Definitions (CRDs): Document any CRDs and associated operators. + - Network Policies: Record any network policies in place. + - Export manifests. Use `kubectl` to export the manifests of your resources: + ```bash + kubectl get all --all-namespaces -o yaml > cluster-resources.yaml + kubectl get pvc --all-namespaces -o yaml > pvcs.yaml + kubectl get configmaps --all-namespaces -o yaml > configmaps.yaml + kubectl get secrets --all-namespaces -o yaml > secrets.yaml + kubectl get ingress --all-namespaces -o yaml > ingress.yaml + kubectl get crd --all-namespaces -o yaml > crds.yaml + ``` -#### Step 2: Migrate container images to your new container registry +2. Migrate container images to your new container registry. -Your new cluster will need access to your container images. + Your new cluster will need access to your container images. -#### Step 3: Create a Kubernetes cluster +3. Create and configure a new Kubernetes cluster. -Create and configure a new Kubernetes cluster. +4. Configure kubectl on your new Kubernetes cluster. -#### Step 4: Configure kubectl on your new Kubernetes cluster +5. Adapt Kubernetes manifests and configurations. -#### Step 5: Adapt Kubernetes manifests and configurations + Your existing manifests may contain cloud-provider-specific settings that need adjustment to align with the new provider’s configuration. -Your existing manifests may contain cloud-provider-specific settings that need adjustment to align with the new provider’s configuration. +6. Migrate persistent data and storage. -#### Step 6: Migrate persistent Data and storage + 1. Backup data from your existing cluster. Use appropriate tools to back up data from Persistent Volumes. Methods include: -1. Backup data from your existing cluster: Use appropriate tools to back up data from Persistent Volumes. Methods include: + - Database dumps: For databases, perform data exports. + - File system copy: For file storage, copy data to a temporary location. - - Database dumps: For databases, perform data exports. - - File system copy: For file storage, copy data to a temporary location. + 2. Restore data to a newly created cluster. -2. Restore data to newly created cluster. + - Create PersistentVolumeClaims in your new cluster. + - Restore data into the new volumes: + - Init containers: Use init containers to populate data. + - Data import jobs: Run Kubernetes jobs to import data. - - Create PersistentVolumeClaims in your new cluster. - - Restore data into the new volumes: - - Init containers: Use init containers to populate data. - - Data import jobs: Run Kubernetes jobs to import data. +7. Deploy applications to your new cluster. -#### Step 7: Deploy applications to your new cluster +8. Update networking and DNS configurations. -#### Step 8: Update networking and DNS configurations +9. Test and validate deployments. -#### Step 9: Test and validate deployments + Conduct functional, performance, and end-to-end tests to verify that the applications work as expected in the new environment. -Conduct functional, performance, and end-to-end testing to verify the applications work as expected in the new environment. - - - This documentation should be read with Scaleway's HDS agreement and applicable certifications. If you have any questions, contact HDS support for clarification. + + This documentation should be read together with Scaleway's HDS agreement and the applicable certifications. If you have any questions, contact HDS support for clarification. \ No newline at end of file From e2bad77e47eadf66e6a54a827235558f1fe91f71 Mon Sep 17 00:00:00 2001 From: villyes Date: Thu, 7 May 2026 14:44:21 +0200 Subject: [PATCH 3/4] feat(k8s): add SRM MTA-7116 --- ...kubernetes-shared-responsibility-model.mdx | 28 +++++++++---------- 1 file changed, 13 insertions(+), 15 deletions(-) diff --git a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx index 6f8ba62c09..a7f50d6fa5 100644 --- a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx +++ b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx @@ -13,10 +13,10 @@ Scaleway’s managed Kubernetes services, Kapsule and Kosmos, provide a fully ma This model clarifies responsibilities in the following categories: -- “Security of the Cloud”: Scaleway’s responsibility -- “Security in the Cloud”: Customer’s responsibility -- Service‑specific responsibilities for Kapsule and Kosmos -- Specific provisions for Health Data Hosting (HDS) +- **“Security of the Cloud”**: Scaleway’s responsibility +- **“Security in the Cloud”**: Customer’s responsibility +- **Service‑specific responsibilities for Kapsule and Kosmos** +- **Specific provisions for Health Data Hosting (HDS)** Responsibilities vary depending on cluster configuration and the presence of external node providers in Kosmos. @@ -181,20 +181,18 @@ In Kapsule clusters, the control plane and managed node pools are operated by Sc Kosmos extends managed Kubernetes to support multiple infrastructure sources: -#### Scaleway-hosted nodes +- **Scaleway-hosted nodes**: -Scaleway-hosted nodes behave like Kapsule nodes; Scaleway manages node provisioning and image publishing, while users manage workloads and configurations. + - Scaleway-hosted nodes behave like Kapsule nodes; Scaleway manages node provisioning and image publishing, while users manage workloads and configurations. + - While Scaleway manages the host infrastructure, hypervisor, and physical security, customers remain responsible for the workload security, and cluster-level policies - consistent with this Kubernetes SRM. -While Scaleway manages the host infrastructure, hypervisor, and physical security, customers remain responsible for the workload security, and cluster-level policies - consistent with this Kubernetes SRM. + + Kosmos worker nodes hosted on Scaleway infrastructure are provisioned and managed using Scaleway Instances. As such, the underlying compute, lifecycle management, and host-level security follow the [Scaleway Instances Shared Responsibility Model](https://www.scaleway.com/en/docs/instances/reference-content/instances-shared-responsibility-model/). + - - Kosmos worker nodes hosted on Scaleway infrastructure are provisioned and managed using Scaleway Instances. As such, the underlying compute, lifecycle management, and host-level security follow the [Scaleway Instances Shared Responsibility Model](https://www.scaleway.com/en/docs/instances/reference-content/instances-shared-responsibility-model/). - - -#### External nodes - -- Nodes hosted outside of Scaleway are under the full responsibility of the user for OS patching, security hardening, connectivity, and health monitoring. -- Scaleway continues to manage the Kubernetes control plane for the combined cluster. +- **External nodes**: + - Nodes hosted outside of Scaleway are under the full responsibility of the user for OS patching, security hardening, connectivity, and health monitoring. + - Scaleway continues to manage the Kubernetes control plane for the combined cluster. ## Version lifecycle and End‑of‑Support policy From 1d94d14e5b09af64336a6105c8ec3ef3e48f3228 Mon Sep 17 00:00:00 2001 From: villyes Date: Thu, 7 May 2026 14:51:40 +0200 Subject: [PATCH 4/4] feat(k8s): add SRM MTA-7116 --- .../kubernetes-shared-responsibility-model.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx index a7f50d6fa5..75bd0ff549 100644 --- a/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx +++ b/pages/kubernetes/reference-content/kubernetes-shared-responsibility-model.mdx @@ -34,7 +34,7 @@ In the context of Scaleway, a managed Kubernetes service refers to the **Kapsule ## What components of Kubernetes are managed by Scaleway? -Scaleway manages the Kubernetes control plane (either Kapsule or Kosmos), which consists of various components responsible for managing and maintaining the cluster and its state, and scheduling applications. This includes components such as the control plane itself: *etcd*, *API server*, *scheduler*, etc. +Scaleway manages the Kubernetes control plane (either Kapsule or Kosmos), which consists of various components responsible for managing and maintaining the cluster and its state, and scheduling applications. This includes components such as the control plane itself: *etcd*, *API server*, *scheduler*, *cloud controller manager*, *controller manager*. Scaleway takes care of Kubernetes system applications such as CoreDNS, kube-proxy, the Container Networking Interface (CNI), and the Container Storage Interface (CSI), which are required for the normal run of the Kubernetes cluster and its associated resources. Scaleway is also responsible for node provisioning and providing updates of operating system node images. @@ -42,7 +42,7 @@ Scaleway offers support for the latest minor releases and patches, allowing the Furthermore, Scaleway provides information and reminders when older versions reach their end of support, ensuring that users stay informed and upgrade their clusters regularly. - +et ### Components and features handled by Scaleway