Conformance Suites¶
Kubernetes conformance is backed by declared suites and manifest-driven test ownership.
Purpose¶
Use this page when you need to understand which Kubernetes checks Atlas runs, what each suite is meant to prove, and which outputs become release evidence.
Source of Truth¶
ops/k8s/tests/manifest.jsonops/k8s/tests/suites.jsonops/k8s/tests/ownership.jsonops/k8s/tests/goldens/k8s-conformance-report.sample.jsonops/schema/k8s/conformance-report.schema.json
What Is Governed¶
The Kubernetes conformance program has three governing layers:
manifest.jsondefines the test inventory, timeout budget, expected failure modes, group membership, and quarantine rulessuites.jsongroups those tests into operator-facing validation lanes such assmoke,resilience,graceful-degradation,api-protection, andfullownership.jsonmaps each script family to a responsible domain such aschart,server,store,observability, orstack
Suite Taxonomy¶
Atlas currently defines these suite classes:
smokeis the fast install and invariant gate for readiness, autoscaling, observability wiring, PodDisruptionBudget coverage, and basic sanityresiliencefocuses on availability, disruption tolerance, rolling restart safety, and autoscaling behaviorgraceful-degradationproves survival behaviors such as cached-only mode and store outage handlingapi-protectionchecks rate limiting, admission control, and overload protection pathsfullis the broad integration suite used when release confidence requires the whole declared test surface
Operator Workflow¶
- Start from
ops/k8s/install-matrix.jsonto identify the suite expected for the target profile. - Use
ops/k8s/tests/manifest.jsonto confirm which scripts cover the change surface and what failure modes they are expected to catch. - Use
ops/k8s/tests/ownership.jsonto route failures to the correct owner. - Record the resulting report in the schema-backed conformance format.
- Treat missing or failing release-gate suites as blockers for promotion.
How to Read the Evidence¶
The sample report in
ops/k8s/tests/goldens/k8s-conformance-report.sample.json shows the canonical
evidence shape:
run_ididentifies the validation attemptsuite_idnames the suite that ranstatusis the top-level verdictfailed_sectionslists broken sections that need reviewsections.*records pass or fail results for areas such asconfigmap,networkpolicy,pdb,probes, and observability wiring
Pass means the governed contract still holds for the suite scope. Fail means the surface is unsafe or ambiguous and must be fixed, quarantined with an issue, or explicitly removed from the release decision.
Failure Modes¶
- a required script is missing from the manifest for a changed resource
- a script is quarantined without an issue or beyond the allowed TTL
- a suite passes informally but no schema-backed report is produced
- ownership is unclear, so release-blocking failures bounce across teams
- the changed template surface is not represented in the selected suite
Evidence Produced¶
Each conformance run should produce:
- the suite selection and run identifier
- a report that matches
ops/schema/k8s/conformance-report.schema.json - section-level failures or missing coverage notes
- ownership mapping for follow-up
- release review notes when a suite is release-blocking
Related Contracts and Assets¶
ops/k8s/tests/manifest.jsonops/k8s/tests/ownership.jsonops/schema/k8s/conformance-report.schema.jsonops/k8s/tests/suites.jsonops/k8s/tests/goldens/k8s-conformance-report.sample.json