Skip to content

Releases: splunk/splunk-operator

0.2.2 Beta

10 Feb 01:44
09d2f6e
Compare
Choose a tag to compare
0.2.2 Beta Pre-release
Pre-release
  • This release depends upon changes made concurrently in the Splunk Enterprise container images. You should use the splunk/splunk:8.1.2 image with it, or alternatively any release version 8.1.0 or later

  • This release updates the CRDs which may require updates to the custom resources being used in existing deployments

  • CSPL-526 - Enhanced ingress documentation with guidelines on ingesting data into the K8S cluster using ingress controllers(istio, nginx)

  • CSPL-564 - Changed the way licenseMasterRef is configured on the ClusterMaster and IndexerCluster CRDs

  • CSPL-609 - Added a shortname stdaln for the Standalone CRD

  • CSPL-637 - Updated Splunk port names to conform with Istio ingress controllers convention

  • CSPL-660 - Separated storage class specifications for etc and var volumes

  • CSPL-663 - Optimize deployment of Splunk apps on SHC using new parameter defaultsUrlApps

  • CSPL-694 - Avoid unnecessary pod resets

  • CSPL-720 - Added support to configure a custom service account per Splunk Enterprise CRD

  • CSPL-721 - Mounted etc and var as emptyDirs volumes on the monitoring console

0.2.1 Beta

16 Dec 01:30
57ac7a1
Compare
Choose a tag to compare
0.2.1 Beta Pre-release
Pre-release
  • This release depends upon changes made concurrently in the Splunk Enterprise container images. You must use the latest splunk/splunk:edge nightly image with it, or alternatively any release version 8.1.0 or later

  • CSPL-529 - Fixed incorrect deletion of Indexer PVCs upon deletion of ClusterMaster

  • CSPL 466 - Fixed infinite reconcile loop of the Operator when an Indexer Cluster is created with peers < SF, RF

  • CSPL-532 - Fixed a race condition where changing the idxc.secret on the global secret object could result in an infinite loop of container restarts

  • Increased code coverage

  • CSPL-534 - Fixed unnecessary pod recycles on scale up/down

  • CSPL-592 - Initiate a pod recycle on change of environment variables of containers

  • CSPL-658 - Fixed incorrect change of Indexer state from Configured to New in the Monitoring Console

0.2.0 Beta

20 Oct 18:32
f1fe9b8
Compare
Choose a tag to compare
0.2.0 Beta Pre-release
Pre-release
  • This release depends upon changes made concurrently in the Splunk Enterprise container images. You must use the latest splunk/splunk:edge nightly image with it, or alternatively any release version 8.1.0 or later.

  • The API has been updated to v1beta1, with one new Custom Resource Definition added: ClusterMaster. Refer the revised Custom Resources and Examples documentation for details on all the changes. This is a major update and is not backward-compatible. You will have to completely remove any older versions, and any resources managed by the operator, before upgrading to this release.

  • Password management has been enhanced to make use of a centralized approach to create & maintain Splunk secrets within a Kubernetes Cluster. Refer PasswordManagement.md for more details in Setup & Usage

  • Introduction of SmartStore Index management feature. With this update, SmartStore-enabled Indexes can be configured through Custom resources. For more details, refer to SmartStore.md

  • Added support for deployment of Multi-site Indexer Cluster. This release introduces a new ClusterMaster Custom Resource, thus allowing the Cluster Master to have it's own resource specifications. Further, the ClusterMaster & IndexerCluster Custom Resources can together be used to configure both Single & Multi-site Indexer clusters. For more details see Examples.md & MultisiteExamples.md

  • Feature to automatically add a configured Monitoring Console pod within a namespace. With this release, a Monitoring Console pod is automatically configured & also has the ability to reconfigure itself based on the changes within the namespace. For more details, refer to Examples.md

  • Introduction of Ginkgo based test framework for CI/CD pipeline. Smoke Test cases added to validate the fundamental use cases related to Splunk custom resources. For more details, refer to README.md

  • Feature to enable Ephermal storage support for Splunk volumes

  • Add provision to enable custom ports on Splunk containers

0.1.0 Alpha

24 Mar 00:18
Compare
Choose a tag to compare
0.1.0 Alpha Pre-release
Pre-release
  • This release depends upon changes made concurrently in the Splunk
    Enterprise container images. You must use the latest splunk/splunk:edge
    nightly image with it, or alternatively any release version 8.0.3 or later.

  • The API has been updated to v1alpha2, and involves the replacement of
    the SplunkEnterprise custom resource with 5 new custom resources:
    Spark, LicenseMaster, Standalone, SearchHeadCluster and IndexerCluster.
    Please read the revised Custom Resources and
    Examples documentation for details on all the changes. This
    is a major update and is not backwards-compatible. You will have to
    completely remove any older versions, and any resources managed by the
    operator, before upgrading to this release.

  • Scaling, upgrades and other updates are now more actively managed for the
    SearchHeadCluster and IndexerCluster resources. This helps protect against
    data loss and maximizes availability while changes are being made. You can
    now also use the "kubectl scale" command, and Horizontal Pod Autoscalers
    with all resources (except LicenseMaster, which always uses a single Pod).

  • A new serviceTemplate spec parameter has been added for all Splunk Enterprise
    custom resources. This may be used to define a template the operator uses for
    the creation of (non headless) services.

  • Splunk Enterprise clusters may now be created without having to provide a
    license file via the licenseURL parameter. When no license is provided,
    a default trial license will now be used.

  • Annotations and labels from the managed custom resources are now appended
    to any corresponding Pod and Service objects that the operator creates.

  • A unique pass4SymmKey secret will now be randomly generated, to resolve
    cluster master warnings about using the default value.

  • Integrated with CircleCI and Coverall for CICD and code coverage, and
    added a bunch of unit tests to bring coverage up to over 90%.