Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
192 commits
Select commit Hold shift + click to select a range
0e36568
CSPL-3551 Init IngestorCluster CR implementation
kasiakoziol Jul 24, 2025
2cca0d7
CSPL-3551 Enhancing Ingestor inputs
kasiakoziol Jul 25, 2025
f747ab4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Jul 29, 2025
9a7503c
fix
kasiakoziol Jul 29, 2025
7134350
fix
kasiakoziol Jul 29, 2025
44349fa
CSPL-3551 Adding tests
kasiakoziol Jul 29, 2025
e71ea9c
CSPL-3551 Mound defaults and update them with no Splunk restart
kasiakoziol Jul 31, 2025
14ccef4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Jul 31, 2025
8876d0e
CSPL-3551 Fixing code after tests
kasiakoziol Aug 1, 2025
5c31cab
CSPL-3895-indexercluster (#1562)
Igor-splunk Aug 7, 2025
0c9e908
CSPL-3551 Applying fixes do Indexer integration
kasiakoziol Aug 7, 2025
89f9eb4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 11, 2025
d885a73
CSPL-3551 Fixes
kasiakoziol Aug 11, 2025
56aa780
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 18, 2025
1c77634
CSPL-3551 Fixes
kasiakoziol Aug 19, 2025
fb4e87f
CSPL-3560 Initial docs for I&I separation
kasiakoziol Aug 26, 2025
3e376d8
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 29, 2025
e62f381
CSPL-3551 Update documentation to reflect on Grafana
kasiakoziol Sep 1, 2025
84d8491
CSPL-3556 Unit tests
kasiakoziol Sep 10, 2025
c3b3aa6
CSPL-3972 Addressing TODOs
kasiakoziol Sep 11, 2025
2af9061
CSPL-3972 Addressing TODOs
kasiakoziol Sep 11, 2025
053352d
CSPL-3551 Moving default from types to controller code
kasiakoziol Sep 11, 2025
e844286
CSPL-3551 Applying previous changes to IndexerCluster
kasiakoziol Sep 18, 2025
500cdfa
CSPL-3551 Moving validations to separate function and adding validati…
kasiakoziol Sep 19, 2025
4b064a6
CSPL-3551 Making sure all inputs are put into status
kasiakoziol Sep 19, 2025
9c6cd69
CSPL-3551 Update of conf files when queue name or type change
kasiakoziol Sep 22, 2025
759b09b
CSPL-3551 Unit tests
kasiakoziol Sep 23, 2025
20d9d6c
CSPL-4003 Helm charts support for bus and pipeline configs
kasiakoziol Sep 29, 2025
f9fb45a
CSPL-4003 Docs update
kasiakoziol Oct 1, 2025
c5e4c2b
CSPL-4003 Addressing comments
kasiakoziol Oct 2, 2025
2de618a
CSPL-3558 Integ tests init
kasiakoziol Oct 2, 2025
0393139
CSPL-3558 Adding extra validation for integraion test
kasiakoziol Oct 2, 2025
4d3865c
CSPL-3558 Refactoring
kasiakoziol Oct 2, 2025
c354062
CSPL-3558 Adding scenario for update and delete
kasiakoziol Oct 3, 2025
c204d52
CSPL-3558 Adding helm test
kasiakoziol Oct 3, 2025
027c039
CSPL-3558 Update of k8s version
kasiakoziol Oct 3, 2025
c5a97dc
CSPL-3558 Fix metrics-server installation issues after k8s version up…
kasiakoziol Oct 6, 2025
fc28db0
CSPL-3558 Adding additional tests
kasiakoziol Oct 7, 2025
a7ae40f
CSPL-3558 Fixing helm tests
kasiakoziol Oct 9, 2025
d3b2ad6
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Oct 13, 2025
3325113
Merge branch 'CSPL-3551-ingestion-cr' into feature/CSPL-3551-ingestio…
kasiakoziol Oct 13, 2025
13b8f4f
Merge branch 'feature/CSPL-3551-ingestion-cr-todos' into feature/CSPL…
kasiakoziol Oct 13, 2025
4622102
CSPL-3558 Fix tests after merge
kasiakoziol Oct 13, 2025
9fbcb4a
CSPL-3558 Fix helm tests
kasiakoziol Oct 16, 2025
7480ed8
CSPL-4022 Remove pipeline config from inputs
kasiakoziol Oct 17, 2025
d21a9a3
CSPL-4022 Remove bus inputs
kasiakoziol Oct 20, 2025
7edb81b
CSPL-4022 Introduce BusConfiguration CR
kasiakoziol Oct 22, 2025
a5b2db3
CSPL-4022 Update docs and tests
kasiakoziol Oct 22, 2025
9f57abc
CSPL-4022 Update ns reference for BusConfiguration
kasiakoziol Oct 23, 2025
10a4fc0
CSPL-4022 Fixing tests and adding bus config to ingestor controller
kasiakoziol Oct 23, 2025
db02bfd
CSPL-4022 Fix update behaviour
kasiakoziol Oct 23, 2025
ceb2c71
CSPL-4022 Docs update
kasiakoziol Oct 27, 2025
6618a3f
Merge pull request #1600 from splunk/feature/CSPL-4022-move-inputs-to-cr
kasiakoziol Oct 28, 2025
d7f367b
CSPL-4022 Fix failing tests
kasiakoziol Oct 28, 2025
25b76a3
Merge pull request #1593 from splunk/feature/CSPL-3558-integ-tests
kasiakoziol Oct 28, 2025
c6cea58
Merge pull request #1576 from splunk/feature/CSPL-3551-ingestion-cr-t…
kasiakoziol Oct 28, 2025
192d3bf
CSPL-4022 Fix tests
kasiakoziol Oct 29, 2025
c6972f7
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Oct 29, 2025
cfd3cd7
CSPL-4022 Addressing PR comments
kasiakoziol Oct 29, 2025
5843632
CSPL-4022 Address comments
kasiakoziol Oct 29, 2025
4e37060
CSPL-4022 Fix helm tests
kasiakoziol Oct 29, 2025
5dd2edc
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Dec 3, 2025
f92da7b
style: fix code format with gofmt
Dec 5, 2025
c1ad439
CSPL-4358 Splitting BusConfiguration into Bus and LargeMessageStore
kasiakoziol Dec 12, 2025
cb8daf2
CSPL-4358 Update docs
kasiakoziol Dec 12, 2025
61c0387
CSPL-4358 Addressing comments
kasiakoziol Dec 12, 2025
3eb98f7
CSPL-4358 Adding more validations
kasiakoziol Dec 15, 2025
254cbf0
CSPL-4360 Secret reference added for Bus CR
kasiakoziol Dec 16, 2025
f992c40
CSPL-4360 Fix failing tests
kasiakoziol Dec 16, 2025
143dbe0
CSPL-4360 Add Splunk restart
kasiakoziol Dec 16, 2025
3c7b2d7
CSPL-4360 Fix failing tests
kasiakoziol Dec 16, 2025
e4e083a
CSPL-4360 Fix failing tests
kasiakoziol Dec 17, 2025
3cb9148
CSPL-4360 Fix errors with failing validation on status
kasiakoziol Dec 17, 2025
efb8978
CSPL-3964: Upgrading operator sdk.
gabrielm-splunk Dec 11, 2025
5fcc685
CSPL-3964: Rebasing off of latest develop with golang upgrade changes…
gabrielm-splunk Dec 18, 2025
ba73a87
CSPL-4358 Rename Bus to Queue
kasiakoziol Dec 19, 2025
b6f5b0b
CSPL-4358 Rename LargeMessageStore to ObjectStorage
kasiakoziol Dec 19, 2025
607632f
CSPL-4358 Making region authRegion and optional, simplifying endpoint
kasiakoziol Dec 19, 2025
30a82c6
Merge branch 'feature/CSPL-4358-split-bus-into-2-crs' into feature/CS…
kasiakoziol Dec 19, 2025
fafed27
CSPL-4360 Fixing tests after merge
kasiakoziol Dec 19, 2025
e0a10ba
CSPL-4360 Fix validation that fails for status
kasiakoziol Dec 19, 2025
155b21a
CSPL-4360 Fix failing to get k8s secret
kasiakoziol Dec 19, 2025
f8afd5a
CSPL-4360 Fix failing integ and helm tests
kasiakoziol Dec 22, 2025
47d1a35
CSPL-4360 Fixing failing tests due to incorrect secret ref
kasiakoziol Jan 8, 2026
532ca28
CSPL-4360 Addressing comments
kasiakoziol Jan 13, 2026
5c6e786
CSPL-4360 Addressing secret value change and removing redundant contr…
kasiakoziol Jan 13, 2026
42dc8e8
CSPL-4360 Update of docs, helm tests and validations
kasiakoziol Jan 13, 2026
c50984b
CSPL-4360 Add secret watch and fix controller tests
kasiakoziol Jan 13, 2026
d22dabe
ISSUE-1661 Add deployerNodeAffinity and deployerResourceSpec to SHC h…
kasiakoziol Jan 21, 2026
21a4f7d
support AWS S3 region parsing for 4-part regions (#1602)
Igor-splunk Jan 22, 2026
620a05f
CSPL-3964: adding golangci linter to project, temporarily with a ton …
gabrielm-splunk Jan 22, 2026
19b677e
ISSUE-1661 Address comments
kasiakoziol Jan 22, 2026
e5d9ec8
CSPL-3964: adding back some webhook-related changes that were missed …
gabrielm-splunk Jan 22, 2026
463cd88
Merge pull request #1637 from ductrung-nguyen/fix/code-format
kubabuczak Jan 23, 2026
6d82816
Merge pull request #1668 from splunk/feature/ISSUE-1661-missing-input…
kasiakoziol Jan 26, 2026
e81280c
CSPL-4360 Update docs
kasiakoziol Jan 28, 2026
edf2618
Initial commit
minjieqiu Jan 29, 2026
d29aed1
CSPL-4360 Restart Splunk when SA changed
kasiakoziol Jan 29, 2026
075c6d6
CSPL-4337: Migrate k8s events to recorder (#1653)
Igor-splunk Jan 29, 2026
656737b
Add more unit tests
minjieqiu Jan 29, 2026
4db7a4a
CSPL-3964: removing reference to branch for GH int-test-workflow
gabrielm-splunk Jan 30, 2026
930784e
fix test
minjieqiu Jan 30, 2026
694e766
Pass test mode as false in testing
minjieqiu Jan 30, 2026
a01170d
fix
minjieqiu Jan 30, 2026
7092e25
cleanup
minjieqiu Jan 31, 2026
8829919
Merge pull request #1642 from splunk/CSPL-3964_Upgrade-operator-sdk
gabrielm-splunk Feb 3, 2026
f7c5c88
Set value for test and sokVersion
minjieqiu Feb 4, 2026
bcf5434
Address some comments
minjieqiu Feb 4, 2026
ddd3186
fix
minjieqiu Feb 4, 2026
ce04e3b
Update CLA check workflow
kubabuczak Feb 4, 2026
d0e0f5e
Update deployment telemetry
minjieqiu Feb 5, 2026
2dc1851
Fix unit test
minjieqiu Feb 6, 2026
82480ef
fix
minjieqiu Feb 6, 2026
dc08f44
Address comment for renaming sok app and fix
minjieqiu Feb 6, 2026
381df2c
fix int test
minjieqiu Feb 8, 2026
0009f50
fix int test
minjieqiu Feb 8, 2026
9c8dcbd
Set version in make
minjieqiu Feb 9, 2026
52ff612
Merge pull request #1649 from splunk/feature/CSPL-4360-secret-ref-ing…
kasiakoziol Feb 9, 2026
4ebe9d8
Addressing comments
kasiakoziol Feb 9, 2026
04d7ad1
Merge pull request #1673 from splunk/make-cla-check-clearer
kubabuczak Feb 9, 2026
7cec815
vuln-61143 upgrade opentelemtry-go from 1.33 to 1.40
kasiakoziol Feb 9, 2026
533a09c
CSPL-4510: ubi8, golang version upgrades (#1690)
rlieberman-splunk Feb 9, 2026
dd931e4
Merge branch 'develop' into vuln-61143-openetelemetry-go
kasiakoziol Feb 10, 2026
e95f0c5
Merge pull request #1643 from splunk/feature/CSPL-4358-split-bus-into…
kasiakoziol Feb 10, 2026
d768efa
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 10, 2026
ed76ae9
Addressing changes from recent PRs
kasiakoziol Feb 10, 2026
03bce3d
Formatting fix
kasiakoziol Feb 10, 2026
7e2f0d0
Merge pull request #1692 from splunk/vuln-61143-openetelemetry-go
kasiakoziol Feb 10, 2026
a350d59
Add agents.md file (#1675)
rlieberman-splunk Feb 10, 2026
4a7305c
fix: fix long execution time unit tests
Dec 5, 2025
e32487f
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 11, 2026
7d7a55e
Addressing PR comments
kasiakoziol Feb 11, 2026
76a0110
Address comments
minjieqiu Feb 12, 2026
bb988ff
Increase test coverage
minjieqiu Feb 12, 2026
23ac8e8
fix unit test
minjieqiu Feb 12, 2026
4011c5b
CSPL-4344: Add License Expired Event (#1679)
Igor-splunk Feb 12, 2026
b879d5f
CSPL-4324 Emitting events for passwords, secrets, app fw, CM, scaling…
kasiakoziol Feb 12, 2026
538770a
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 12, 2026
7c6409c
Address comments
kasiakoziol Feb 12, 2026
cdc7e40
Addressing comments
kasiakoziol Feb 12, 2026
c086d58
Fix pipeline issues
kasiakoziol Feb 12, 2026
9e6903b
Add more tests
minjieqiu Feb 12, 2026
2bb94bc
Reverting
kasiakoziol Feb 12, 2026
06ca952
resolve conflicts
minjieqiu Feb 12, 2026
77df860
fix
minjieqiu Feb 12, 2026
c977bdc
more tests
minjieqiu Feb 13, 2026
389a3ea
Refactoring according to comments
kasiakoziol Feb 13, 2026
77df63f
Validation webhook implementation (#1682)
patrykw-splunk Feb 13, 2026
24ed789
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 13, 2026
c731e5e
refactor: rename function for clarity in secrets.go
kubabuczak Feb 13, 2026
e47ab3f
Merge pull request #1694 from splunk/fix-unit-tests
kubabuczak Feb 13, 2026
c6fbe46
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 13, 2026
cef4f68
CSPL-4372: docs: add maintainer workflow for external contributions i…
kubabuczak Feb 13, 2026
5306a09
Set test to false before release
minjieqiu Feb 13, 2026
ce57208
CSPL-4375 don't execute tests on non-relevant changes
kubabuczak Feb 17, 2026
2e9abb9
Adjust paths for ignored files in pull requests and pushes for clarity.
kubabuczak Feb 17, 2026
3f70321
Merge pull request #1702 from splunk/CSPL-4375-exclude-tests-when-not…
kubabuczak Feb 17, 2026
24a92ca
Merge pull request #1697 from splunk/CSPL-4372-add-contribution-testi…
kubabuczak Feb 17, 2026
d7d9a71
Resolve merge conflict
minjieqiu Feb 17, 2026
c059cf3
upgrade golang version to 1.25.7 (#1705)
rlieberman-splunk Feb 17, 2026
02eb7aa
fix
minjieqiu Feb 18, 2026
4f4b5d7
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 18, 2026
f02d02c
CSPL-4513 Refactoring of existing events
kasiakoziol Feb 18, 2026
1227b29
CSPL-4513 Adding events and tests for them for Index & Ingestion sepa…
kasiakoziol Feb 18, 2026
9db1784
Fix formatting issues
kasiakoziol Feb 18, 2026
d413ee8
Merge pull request #1677 from splunk/feature/telemetry1
minjieqiu Feb 18, 2026
f4b68cf
Logs
kasiakoziol Feb 18, 2026
3098f32
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 18, 2026
0fb0e6f
Fmt fix
kasiakoziol Feb 18, 2026
f0410e4
Merge branch 'CSPL-3551-ingestion-cr' into feature/cspl-4513-events-f…
kasiakoziol Feb 18, 2026
c2a877d
Update requeue timer from 1 day to 6 hour
minjieqiu Feb 19, 2026
9dc8b62
update comment
minjieqiu Feb 19, 2026
6e7a718
CSPL-4513 Extra logs
kasiakoziol Feb 19, 2026
029e2f6
CSPL-4513 Moving to slog and extra tests
kasiakoziol Feb 19, 2026
c4b5ad3
CSPL-4513 Fixing ScaledUp/Down events
kasiakoziol Feb 20, 2026
7bef9e3
CSPL-4002 Update Ansible role to ingestor (from standalone) for Inges…
kasiakoziol Feb 20, 2026
7b5154f
Merge branch 'CSPL-3551-ingestion-cr' into feature/cspl-4513-events-f…
kasiakoziol Feb 20, 2026
8f41f63
CSPL-3549 Splunk Operator Enhancement – Ingestion and Indexing Separa…
kasiakoziol Feb 20, 2026
e7504b7
Merge branch 'develop' into feature/cspl-4513-events-for-index-ingest…
kasiakoziol Feb 20, 2026
e3f19b9
Merge pull request #1709 from splunk/feature/updatetimer
minjieqiu Feb 20, 2026
14d99b5
CSPL-4513 Address comments
kasiakoziol Feb 23, 2026
528ac31
Add sqs_smartubus_cp to providers (#1716)
kasiakoziol Feb 24, 2026
2fa9090
Merge branch 'develop' into feature/cspl-4513-events-for-index-ingest…
kasiakoziol Feb 24, 2026
e4cd5b7
Fix bundle target after Helm CRD removal
vivekr-splunk Feb 24, 2026
d9eaecb
ci: make Coveralls upload non-blocking during outages
vivekr-splunk Feb 25, 2026
2e65b5d
adding parallel work for formatting and unit test
vivekr-splunk Feb 25, 2026
76f6658
Merge pull request #1722 from splunk/fix/remove-stale-crd-copy-step
gabrielm-splunk Feb 26, 2026
7fa8698
Fix app_tel_for_sok app.conf install stanza header (#1724)
mmarod Feb 26, 2026
cb7d7f7
Merge branch 'develop' into feature/cspl-4513-events-for-index-ingest…
kasiakoziol Feb 26, 2026
f807ffc
Merge branch 'feature/slog-as-default-logger' into feature/cspl-4513-…
kasiakoziol Feb 26, 2026
10d7853
CSPL-4513 Addressing Igor's changes
kasiakoziol Feb 26, 2026
2e7f07f
Merge branch 'feature/slog-as-default-logger' into feature/cspl-4513-…
kasiakoziol Feb 26, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .biased_lang_exclude
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ config/examples/licensemaster/default.yaml
config/rbac/licensemaster_editor_role.yaml
config/rbac/licensemaster_viewer_role.yaml
config/samples/enterprise_v3_licensemaster.yaml
config/webhook/manifests.yaml
tools/make_bundle.sh
config/samples/kustomization.yaml
config/manifests/bases/splunk-operator.clusterserviceversion.yaml
Expand Down
6 changes: 3 additions & 3 deletions .env
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
OPERATOR_SDK_VERSION=v1.39.0
REVIEWERS=vivekr-splunk,rlieberman-splunk,patrykw-splunk,Igor-splunk,kasiakoziol,kubabuczak
GO_VERSION=1.25.5
OPERATOR_SDK_VERSION=v1.42.0
REVIEWERS=vivekr-splunk,rlieberman-splunk,patrykw-splunk,Igor-splunk,kasiakoziol,kubabuczak,gabrielm-splunk,minjieqiu,qingw-splunk
GO_VERSION=1.25.7
AWSCLI_URL=https://awscli.amazonaws.com/awscli-exe-linux-x86_64-2.8.6.zip
KUBECTL_VERSION=v1.29.1
AZ_CLI_VERSION=2.79.0
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,7 @@ jobs:
- name: Run Unit Tests
run: make test
- name: Run Code Coverage
if: ${{ secrets.COVERALLS_TOKEN != '' }}
run: goveralls -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
- name: Upload Coverage artifacts
uses: actions/upload-artifact@v4.4.0
Expand Down Expand Up @@ -121,6 +122,7 @@ jobs:
appframeworksS1,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -146,6 +148,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-AL2023-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-al2023
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-RHEL-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-rhel
Expand All @@ -94,6 +95,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-RHEL-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-rhel
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
4 changes: 4 additions & 0 deletions .github/workflows/arm-Ubuntu-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,7 @@ jobs:
- name: Run Unit Tests
run: make test
- name: Run Code Coverage
if: ${{ secrets.COVERALLS_TOKEN != '' }}
run: goveralls -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
- name: Upload Coverage artifacts
uses: actions/upload-artifact@v4.4.0
Expand Down Expand Up @@ -121,6 +122,7 @@ jobs:
appframeworksS1,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -146,6 +148,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-Ubuntu-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-ubuntu
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
25 changes: 20 additions & 5 deletions .github/workflows/build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,17 @@ permissions:
id-token: write
pull-requests: write
on:
pull_request: {}
pull_request:
paths-ignore:
- 'docs/**'
- '*.md'
push:
branches:
- main
- develop
paths-ignore:
- 'docs/**'
- '*.md'
jobs:
check-formating:
runs-on: ubuntu-latest
Expand All @@ -23,12 +29,17 @@ jobs:
with:
go-version: ${{ steps.dotenv.outputs.GO_VERSION }}
- name: Check Source formatting
run: make fmt && if [[ $? -ne 0 ]]; then false; fi
run: |
UNFORMATTED=$(gofmt -l .)
if [ -n "$UNFORMATTED" ]; then
echo "These files are not formatted:"
echo "$UNFORMATTED"
exit 1
fi
- name: Lint source code
run: make vet && if [[ $? -ne 0 ]]; then false; fi
unit-tests:
runs-on: ubuntu-latest
needs: check-formating
steps:
- uses: actions/checkout@v2
- name: Dotenv Action
Expand All @@ -50,15 +61,16 @@ jobs:
run: |
make test
- name: Run Code Coverage
run: goveralls -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
if: ${{ secrets.COVERALLS_TOKEN != '' }}
run: goveralls -shallow -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
- name: Upload Coverage artifacts
uses: actions/upload-artifact@v4.4.0
with:
name: coverage.out
path: coverage.out
build-operator-image:
runs-on: ubuntu-latest
needs: unit-tests
needs: [check-formating, unit-tests]
env:
SPLUNK_ENTERPRISE_IMAGE: ${{ secrets.SPLUNK_ENTERPRISE_IMAGE }}
SPLUNK_OPERATOR_IMAGE_NAME: splunk/splunk-operator
Expand Down Expand Up @@ -174,6 +186,7 @@ jobs:
managerappframeworkm4,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -197,6 +210,8 @@ jobs:
EKS_SSH_PUBLIC_KEY: ${{ secrets.EKS_SSH_PUBLIC_KEY }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
18 changes: 11 additions & 7 deletions .github/workflows/cla-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,29 +22,33 @@ jobs:
PERSONAL_ACCESS_TOKEN: ${{ secrets.PERSONAL_ACCESS_TOKEN }}
with:
path-to-signatures: "signatures/version1/cla.json"
path-to-document: "https://github.com/splunk/cla-agreement/blob/main/CLA.md" # e.g. a CLA or a DCO document
path-to-document: "https://github.com/splunk/cla-agreement/blob/main/CLA.md"
branch: "main"
allowlist: dependabot[bot]
remote-organization-name: splunk
remote-repository-name: cla-agreement
custom-notsigned-prcomment: "<br/>Thank you for your submission, we really appreciate it. Like many open-source projects, we ask that you sign our [Contribution License Agreement](${input.getPathToDocument()}) before we can accept your contribution. You can sign the CLA by just posting a Pull Request Comment with the exact sentence copied from below.<br/>"
custom-allsigned-prcomment: "⏳ **CLA signed** — now checking Code of Conduct status..."
CodeOfConduct:
runs-on: ubuntu-latest
# CLA and COC jobs both edit the same PR comment to show signing status.
# Run sequentially to avoid race conditions when updating the comment.
needs: ContributorLicenseAgreement
steps:
- name: "COC Assistant"
if: (github.event.comment.body == 'recheck' || github.event.comment.body == 'I have read the Code of Conduct and I hereby accept the Terms') || github.event_name == 'pull_request_target'
if: (github.event.comment.body == 'recheck' || github.event.comment.body == 'I have read the Code of Conduct and I hereby sign the COC') || github.event_name == 'pull_request_target'
uses: cla-assistant/github-action@v2.1.3-beta
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
PERSONAL_ACCESS_TOKEN: ${{ secrets.PERSONAL_ACCESS_TOKEN }}
with:
path-to-signatures: "signatures/version1/coc.json"
path-to-document: "https://github.com/splunk/cla-agreement/blob/main/CODE_OF_CONDUCT.md" # e.g. a COC or a DCO document
path-to-document: "https://github.com/splunk/cla-agreement/blob/main/CODE_OF_CONDUCT.md"
branch: "main"
allowlist: dependabot[bot]
remote-organization-name: splunk
remote-repository-name: cla-agreement
custom-pr-sign-comment: "I have read the Code of Conduct and I hereby accept the Terms"
create-file-commit-message: "For example: Creating file for storing COC Signatures"
custom-pr-sign-comment: "I have read the Code of Conduct and I hereby sign the COC"
signed-commit-message: "$contributorName has signed the COC in #$pullRequestNo"
custom-notsigned-prcomment: "All contributors have NOT signed the COC Document"
custom-allsigned-prcomment: "****CLA Assistant Lite bot**** All contributors have signed the COC ✍️ ✅"
custom-notsigned-prcomment: "<br/>🎉 **CLA signed — one more step to go!**<br/><br/>Please also accept our [Code of Conduct](${input.getPathToDocument()}) by posting a comment with the exact sentence copied from below. This helps us maintain a welcoming community.<br/>"
custom-allsigned-prcomment: "All contributors have signed required documents ✍️ ✅"
18 changes: 14 additions & 4 deletions .github/workflows/distroless-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,17 @@ permissions:
id-token: write
pull-requests: write
on:
pull_request: {}
pull_request:
paths-ignore:
- 'docs/**'
- '*.md'
push:
branches:
- main
- develop
- main
- develop
paths-ignore:
- 'docs/**'
- '*.md'
jobs:
check-formating:
runs-on: ubuntu-latest
Expand Down Expand Up @@ -49,7 +55,8 @@ jobs:
- name: Run Unit Tests
run: make test
- name: Run Code Coverage
run: goveralls -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
if: ${{ secrets.COVERALLS_TOKEN != '' }}
run: goveralls -shallow -coverprofile=coverage.out -service=circle-ci -repotoken ${{ secrets.COVERALLS_TOKEN }}
- name: Upload Coverage artifacts
uses: actions/upload-artifact@v4.4.0
with:
Expand Down Expand Up @@ -174,6 +181,7 @@ jobs:
managerappframeworkm4,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -197,6 +205,8 @@ jobs:
EKS_SSH_PUBLIC_KEY: ${{ secrets.EKS_SSH_PUBLIC_KEY }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
6 changes: 6 additions & 0 deletions .github/workflows/distroless-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ on:
branches:
- develop
- main
paths-ignore:
- 'docs/**'
- '*.md'
jobs:
build-operator-image-distroless:
runs-on: ubuntu-latest
Expand Down Expand Up @@ -69,6 +72,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-distroless
Expand All @@ -92,6 +96,8 @@ jobs:
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
9 changes: 7 additions & 2 deletions .github/workflows/helm-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ on:
- develop
- main
- feature**
paths-ignore:
- 'docs/**'
- '*.md'
workflow_dispatch:
jobs:
build-operator-image:
Expand Down Expand Up @@ -72,6 +75,8 @@ jobs:
HELM_REPO_PATH: "../../../../helm-chart"
INSTALL_OPERATOR: "true"
TEST_VPC_ENDPOINT_URL: ${{ secrets.TEST_VPC_ENDPOINT_URL }}
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- uses: chrisdickinson/setup-yq@3d931309f27270ebbafd53f2daee773a82ea1822
- name: Checking YQ installation
Expand Down Expand Up @@ -113,8 +118,8 @@ jobs:
version: ${{ steps.dotenv.outputs.KUBECTL_VERSION }}
- name: Install kuttl
run: |
sudo curl -LO https://github.com/kudobuilder/kuttl/releases/download/v0.12.0/kuttl_0.12.0_linux_x86_64.tar.gz
sudo tar -xvzf kuttl_0.12.0_linux_x86_64.tar.gz
sudo curl -LO https://github.com/kudobuilder/kuttl/releases/download/v0.22.0/kuttl_0.22.0_linux_x86_64.tar.gz
sudo tar -xvzf kuttl_0.22.0_linux_x86_64.tar.gz
sudo chmod +x kubectl-kuttl
sudo mv kubectl-kuttl /usr/local/bin/kubectl-kuttl
- name: Install Python
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/int-test-azure-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ on:
branches:
- develop
- main
paths-ignore:
- 'docs/**'
- '*.md'
jobs:
build-operator-image:
runs-on: ubuntu-latest
Expand Down
Loading
Loading