Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
93 commits
Select commit Hold shift + click to select a range
0e36568
CSPL-3551 Init IngestorCluster CR implementation
kasiakoziol Jul 24, 2025
2cca0d7
CSPL-3551 Enhancing Ingestor inputs
kasiakoziol Jul 25, 2025
f747ab4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Jul 29, 2025
9a7503c
fix
kasiakoziol Jul 29, 2025
7134350
fix
kasiakoziol Jul 29, 2025
44349fa
CSPL-3551 Adding tests
kasiakoziol Jul 29, 2025
e71ea9c
CSPL-3551 Mound defaults and update them with no Splunk restart
kasiakoziol Jul 31, 2025
14ccef4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Jul 31, 2025
8876d0e
CSPL-3551 Fixing code after tests
kasiakoziol Aug 1, 2025
5c31cab
CSPL-3895-indexercluster (#1562)
Igor-splunk Aug 7, 2025
0c9e908
CSPL-3551 Applying fixes do Indexer integration
kasiakoziol Aug 7, 2025
89f9eb4
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 11, 2025
d885a73
CSPL-3551 Fixes
kasiakoziol Aug 11, 2025
56aa780
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 18, 2025
1c77634
CSPL-3551 Fixes
kasiakoziol Aug 19, 2025
fb4e87f
CSPL-3560 Initial docs for I&I separation
kasiakoziol Aug 26, 2025
3e376d8
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Aug 29, 2025
e62f381
CSPL-3551 Update documentation to reflect on Grafana
kasiakoziol Sep 1, 2025
84d8491
CSPL-3556 Unit tests
kasiakoziol Sep 10, 2025
c3b3aa6
CSPL-3972 Addressing TODOs
kasiakoziol Sep 11, 2025
2af9061
CSPL-3972 Addressing TODOs
kasiakoziol Sep 11, 2025
053352d
CSPL-3551 Moving default from types to controller code
kasiakoziol Sep 11, 2025
e844286
CSPL-3551 Applying previous changes to IndexerCluster
kasiakoziol Sep 18, 2025
500cdfa
CSPL-3551 Moving validations to separate function and adding validati…
kasiakoziol Sep 19, 2025
4b064a6
CSPL-3551 Making sure all inputs are put into status
kasiakoziol Sep 19, 2025
9c6cd69
CSPL-3551 Update of conf files when queue name or type change
kasiakoziol Sep 22, 2025
759b09b
CSPL-3551 Unit tests
kasiakoziol Sep 23, 2025
20d9d6c
CSPL-4003 Helm charts support for bus and pipeline configs
kasiakoziol Sep 29, 2025
f9fb45a
CSPL-4003 Docs update
kasiakoziol Oct 1, 2025
c5e4c2b
CSPL-4003 Addressing comments
kasiakoziol Oct 2, 2025
2de618a
CSPL-3558 Integ tests init
kasiakoziol Oct 2, 2025
0393139
CSPL-3558 Adding extra validation for integraion test
kasiakoziol Oct 2, 2025
4d3865c
CSPL-3558 Refactoring
kasiakoziol Oct 2, 2025
c354062
CSPL-3558 Adding scenario for update and delete
kasiakoziol Oct 3, 2025
c204d52
CSPL-3558 Adding helm test
kasiakoziol Oct 3, 2025
027c039
CSPL-3558 Update of k8s version
kasiakoziol Oct 3, 2025
c5a97dc
CSPL-3558 Fix metrics-server installation issues after k8s version up…
kasiakoziol Oct 6, 2025
fc28db0
CSPL-3558 Adding additional tests
kasiakoziol Oct 7, 2025
a7ae40f
CSPL-3558 Fixing helm tests
kasiakoziol Oct 9, 2025
d3b2ad6
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Oct 13, 2025
3325113
Merge branch 'CSPL-3551-ingestion-cr' into feature/CSPL-3551-ingestio…
kasiakoziol Oct 13, 2025
13b8f4f
Merge branch 'feature/CSPL-3551-ingestion-cr-todos' into feature/CSPL…
kasiakoziol Oct 13, 2025
4622102
CSPL-3558 Fix tests after merge
kasiakoziol Oct 13, 2025
9fbcb4a
CSPL-3558 Fix helm tests
kasiakoziol Oct 16, 2025
7480ed8
CSPL-4022 Remove pipeline config from inputs
kasiakoziol Oct 17, 2025
d21a9a3
CSPL-4022 Remove bus inputs
kasiakoziol Oct 20, 2025
7edb81b
CSPL-4022 Introduce BusConfiguration CR
kasiakoziol Oct 22, 2025
a5b2db3
CSPL-4022 Update docs and tests
kasiakoziol Oct 22, 2025
9f57abc
CSPL-4022 Update ns reference for BusConfiguration
kasiakoziol Oct 23, 2025
10a4fc0
CSPL-4022 Fixing tests and adding bus config to ingestor controller
kasiakoziol Oct 23, 2025
db02bfd
CSPL-4022 Fix update behaviour
kasiakoziol Oct 23, 2025
ceb2c71
CSPL-4022 Docs update
kasiakoziol Oct 27, 2025
6618a3f
Merge pull request #1600 from splunk/feature/CSPL-4022-move-inputs-to-cr
kasiakoziol Oct 28, 2025
d7f367b
CSPL-4022 Fix failing tests
kasiakoziol Oct 28, 2025
25b76a3
Merge pull request #1593 from splunk/feature/CSPL-3558-integ-tests
kasiakoziol Oct 28, 2025
c6cea58
Merge pull request #1576 from splunk/feature/CSPL-3551-ingestion-cr-t…
kasiakoziol Oct 28, 2025
192d3bf
CSPL-4022 Fix tests
kasiakoziol Oct 29, 2025
c6972f7
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Oct 29, 2025
cfd3cd7
CSPL-4022 Addressing PR comments
kasiakoziol Oct 29, 2025
5843632
CSPL-4022 Address comments
kasiakoziol Oct 29, 2025
4e37060
CSPL-4022 Fix helm tests
kasiakoziol Oct 29, 2025
5dd2edc
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Dec 3, 2025
c1ad439
CSPL-4358 Splitting BusConfiguration into Bus and LargeMessageStore
kasiakoziol Dec 12, 2025
cb8daf2
CSPL-4358 Update docs
kasiakoziol Dec 12, 2025
61c0387
CSPL-4358 Addressing comments
kasiakoziol Dec 12, 2025
3eb98f7
CSPL-4358 Adding more validations
kasiakoziol Dec 15, 2025
254cbf0
CSPL-4360 Secret reference added for Bus CR
kasiakoziol Dec 16, 2025
f992c40
CSPL-4360 Fix failing tests
kasiakoziol Dec 16, 2025
143dbe0
CSPL-4360 Add Splunk restart
kasiakoziol Dec 16, 2025
3c7b2d7
CSPL-4360 Fix failing tests
kasiakoziol Dec 16, 2025
e4e083a
CSPL-4360 Fix failing tests
kasiakoziol Dec 17, 2025
3cb9148
CSPL-4360 Fix errors with failing validation on status
kasiakoziol Dec 17, 2025
ba73a87
CSPL-4358 Rename Bus to Queue
kasiakoziol Dec 19, 2025
b6f5b0b
CSPL-4358 Rename LargeMessageStore to ObjectStorage
kasiakoziol Dec 19, 2025
607632f
CSPL-4358 Making region authRegion and optional, simplifying endpoint
kasiakoziol Dec 19, 2025
30a82c6
Merge branch 'feature/CSPL-4358-split-bus-into-2-crs' into feature/CS…
kasiakoziol Dec 19, 2025
fafed27
CSPL-4360 Fixing tests after merge
kasiakoziol Dec 19, 2025
e0a10ba
CSPL-4360 Fix validation that fails for status
kasiakoziol Dec 19, 2025
155b21a
CSPL-4360 Fix failing to get k8s secret
kasiakoziol Dec 19, 2025
f8afd5a
CSPL-4360 Fix failing integ and helm tests
kasiakoziol Dec 22, 2025
47d1a35
CSPL-4360 Fixing failing tests due to incorrect secret ref
kasiakoziol Jan 8, 2026
532ca28
CSPL-4360 Addressing comments
kasiakoziol Jan 13, 2026
5c6e786
CSPL-4360 Addressing secret value change and removing redundant contr…
kasiakoziol Jan 13, 2026
42dc8e8
CSPL-4360 Update of docs, helm tests and validations
kasiakoziol Jan 13, 2026
c50984b
CSPL-4360 Add secret watch and fix controller tests
kasiakoziol Jan 13, 2026
e81280c
CSPL-4360 Update docs
kasiakoziol Jan 28, 2026
d29aed1
CSPL-4360 Restart Splunk when SA changed
kasiakoziol Jan 29, 2026
52ff612
Merge pull request #1649 from splunk/feature/CSPL-4360-secret-ref-ing…
kasiakoziol Feb 9, 2026
4ebe9d8
Addressing comments
kasiakoziol Feb 9, 2026
e95f0c5
Merge pull request #1643 from splunk/feature/CSPL-4358-split-bus-into…
kasiakoziol Feb 10, 2026
d768efa
Merge branch 'develop' into CSPL-3551-ingestion-cr
kasiakoziol Feb 10, 2026
ed76ae9
Addressing changes from recent PRs
kasiakoziol Feb 10, 2026
03bce3d
Formatting fix
kasiakoziol Feb 10, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,7 @@ jobs:
appframeworksS1,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -146,6 +147,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-AL2023-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-al2023
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-RHEL-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-rhel
Expand All @@ -94,6 +95,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-RHEL-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-rhel
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-Ubuntu-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,7 @@ jobs:
appframeworksS1,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -146,6 +147,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/arm-Ubuntu-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-arm-ubuntu
Expand All @@ -93,6 +94,8 @@ jobs:
DEPLOYMENT_TYPE: ""
ARM64: "true"
GRAVITON_TESTING: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -180,6 +180,7 @@ jobs:
managerappframeworkm4,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -203,6 +204,8 @@ jobs:
EKS_SSH_PUBLIC_KEY: ${{ secrets.EKS_SSH_PUBLIC_KEY }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/distroless-build-test-push-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -174,6 +174,7 @@ jobs:
managerappframeworkm4,
managersecret,
managermc,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -197,6 +198,8 @@ jobs:
EKS_SSH_PUBLIC_KEY: ${{ secrets.EKS_SSH_PUBLIC_KEY }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Chekcout code
uses: actions/checkout@v2
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/distroless-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image-distroless
Expand All @@ -92,6 +93,8 @@ jobs:
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
6 changes: 4 additions & 2 deletions .github/workflows/helm-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -72,6 +72,8 @@ jobs:
HELM_REPO_PATH: "../../../../helm-chart"
INSTALL_OPERATOR: "true"
TEST_VPC_ENDPOINT_URL: ${{ secrets.TEST_VPC_ENDPOINT_URL }}
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- uses: chrisdickinson/setup-yq@3d931309f27270ebbafd53f2daee773a82ea1822
- name: Checking YQ installation
Expand Down Expand Up @@ -113,8 +115,8 @@ jobs:
version: ${{ steps.dotenv.outputs.KUBECTL_VERSION }}
- name: Install kuttl
run: |
sudo curl -LO https://github.com/kudobuilder/kuttl/releases/download/v0.12.0/kuttl_0.12.0_linux_x86_64.tar.gz
sudo tar -xvzf kuttl_0.12.0_linux_x86_64.tar.gz
sudo curl -LO https://github.com/kudobuilder/kuttl/releases/download/v0.22.0/kuttl_0.22.0_linux_x86_64.tar.gz
sudo tar -xvzf kuttl_0.22.0_linux_x86_64.tar.gz
sudo chmod +x kubectl-kuttl
sudo mv kubectl-kuttl /usr/local/bin/kubectl-kuttl
- name: Install Python
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,7 @@ jobs:
managercrcrud,
licensemanager,
managerdeletecr,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image
Expand All @@ -88,6 +89,8 @@ jobs:
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: "true"
DEPLOYMENT_TYPE: ""
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/manual-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ jobs:
managerscaling,
managercrcrud,
licensemanager,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -49,6 +50,8 @@ jobs:
PRIVATE_REGISTRY: ${{ secrets.ECR_REPOSITORY }}
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: ${{ github.event.inputs.CLUSTER_WIDE }}
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/namespace-scope-int-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ jobs:
managerscaling,
managercrcrud,
licensemanager,
indingsep,
]
runs-on: ubuntu-latest
env:
Expand All @@ -44,6 +45,8 @@ jobs:
PRIVATE_REGISTRY: ${{ secrets.ECR_REPOSITORY }}
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: "false"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/nightly-int-test-workflow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@ jobs:
managerscaling,
managercrcrud,
licensemanager,
indingsep,
]
runs-on: ubuntu-latest
needs: build-operator-image
Expand All @@ -86,6 +87,8 @@ jobs:
PRIVATE_REGISTRY: ${{ secrets.ECR_REPOSITORY }}
S3_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
CLUSTER_WIDE: "true"
AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID: ${{ secrets.AWS_INDEX_INGEST_SEP_ACCESS_KEY_ID }}
AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY: ${{ secrets.AWS_INDEX_INGEST_SEP_SECRET_ACCESS_KEY }}
steps:
- name: Set Test Cluster Nodes and Parallel Runs
run: >-
Expand Down
31 changes: 31 additions & 0 deletions PROJECT
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
# Code generated by tool. DO NOT EDIT.
# This file is used to track the info used to scaffold your project
# and allow the plugins properly work.
# More info: https://book.kubebuilder.io/reference/project-config.html
domain: splunk.com
layout:
- go.kubebuilder.io/v4
Expand Down Expand Up @@ -109,4 +113,31 @@ resources:
kind: LicenseManager
path: github.com/splunk/splunk-operator/api/v4
version: v4
- api:
crdVersion: v1
namespaced: true
controller: true
domain: splunk.com
group: enterprise
kind: IngestorCluster
path: github.com/splunk/splunk-operator/api/v4
version: v4
- api:
crdVersion: v1
namespaced: true
controller: true
domain: splunk.com
group: enterprise
kind: Queue
path: github.com/splunk/splunk-operator/api/v4
version: v4
- api:
crdVersion: v1
namespaced: true
controller: true
domain: splunk.com
group: enterprise
kind: ObjectStorage
path: github.com/splunk/splunk-operator/api/v4
version: v4
version: "3"
17 changes: 17 additions & 0 deletions api/v4/indexercluster_types.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,10 +34,21 @@ const (
IndexerClusterPausedAnnotation = "indexercluster.enterprise.splunk.com/paused"
)

// +kubebuilder:validation:XValidation:rule="has(self.queueRef) == has(self.objectStorageRef)",message="queueRef and objectStorageRef must both be set or both be empty"
// +kubebuilder:validation:XValidation:rule="!has(oldSelf.queueRef) || self.queueRef == oldSelf.queueRef",message="queueRef is immutable once created"
// +kubebuilder:validation:XValidation:rule="!has(oldSelf.objectStorageRef) || self.objectStorageRef == oldSelf.objectStorageRef",message="objectStorageRef is immutable once created"
// IndexerClusterSpec defines the desired state of a Splunk Enterprise indexer cluster
type IndexerClusterSpec struct {
CommonSplunkSpec `json:",inline"`

// +optional
// Queue reference
QueueRef corev1.ObjectReference `json:"queueRef"`

// +optional
// Object Storage reference
ObjectStorageRef corev1.ObjectReference `json:"objectStorageRef"`

// Number of search head pods; a search head cluster will be created if > 1
Replicas int32 `json:"replicas"`
}
Expand Down Expand Up @@ -111,6 +122,12 @@ type IndexerClusterStatus struct {

// Auxiliary message describing CR status
Message string `json:"message"`

// Credential secret version to track changes to the secret and trigger rolling restart of indexer cluster peers when the secret is updated
CredentialSecretVersion string `json:"credentialSecretVersion,omitempty"`

// Service account to track changes to the service account and trigger rolling restart of indexer cluster peers when the service account is updated
ServiceAccount string `json:"serviceAccount,omitempty"`
}

// +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object
Expand Down
Loading
Loading