• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

splunk / splunk-operator / 22025752571
85%
main: 87%

Build:
Build:
LAST BUILD BRANCH: CSPL-4518
DEFAULT BRANCH: main
Ran 14 Feb 2026 11:13PM UTC
Jobs 1
Files 48
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

14 Feb 2026 11:03PM UTC coverage: 85.733% (-0.5%) from 86.191%
22025752571

Pull #1699

circleci

vivekr-splunk
Use legacy mode for all Standalone deployments (temporary fix)

This commit temporarily disables Platform SDK StatefulSet creation
and uses legacy mode for all Standalone deployments to ensure
compatibility with existing secret configurations.

Root Cause:
You correctly identified that SDK initialization happens once at
startup, so that's not the issue. The real problem is that the
SDK's secret resolution expects secrets in a specific format/location
that differs from the legacy format used by existing deployments
and smoke tests.

Legacy format:  splunk-{namespace}-secret
SDK expected format: {crName}-credentials (with PlatformConfig)

The SDK SHOULD support the legacy secret format as a fallback, but
implementing that properly requires:
1. Modifying SDK's Kubernetes secret provider to check legacy names
2. Ensuring proper backwards compatibility
3. Testing both formats

Temporary Solution:
Always use getStandaloneStatefulSetLegacy() for now. This ensures:
✅ Smoke tests pass (they use legacy secrets)
✅ Existing deployments work unchanged
✅ SDK infrastructure (CRDs, controllers) still gets deployed
✅ No hanging or timeouts in reconciliation
✅ Fast, predictable behavior

Future Work (TODO):
- Implement SDK secret provider fallback to legacy naming
- Add SecretAdapter integration to handle both formats gracefully
- Enable SDK mode by default once secret compatibility is proven

Changes:
- pkg/splunk/enterprise/standalone.go: Simplified getStandaloneStatefulSet
  to always return legacy implementation
- Removed unused certificate and secret imports
- Added clear TODO for future SDK enablement

This is a pragmatic fix that unblocks testing while we implement
proper SDK secret format compatibility.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
Pull Request #1699: [SPIKE] Platform SDK Integration for Standalone Controller

152 of 248 new or added lines in 4 files covered. (61.29%)

1 existing line in 1 file now uncovered.

11087 of 12932 relevant lines covered (85.73%)

28.88 hits per line

New Missed Lines in Diff

Lines Coverage ∆ File
6
90.48
-2.02% internal/controller/standalone_controller.go
20
84.0
pkg/splunk/enterprise/secret_adapter.go
70
91.12
-3.74% pkg/splunk/enterprise/configuration.go

Uncovered Existing Lines

Lines Coverage ∆ File
1
90.48
-2.02% internal/controller/standalone_controller.go
Jobs
ID Job ID Ran Files Coverage
1 22025752571.1 14 Feb 2026 11:13PM UTC 48
85.73
CircleCI Job
Source Files on build 22025752571
  • Tree
  • List 48
  • Changed 3
  • Source Changed 0
  • Coverage Changed 3
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • CircleCI Build #22025752571
  • Pull Request #1699
  • PR Base - develop (#21989948678)
  • Delete
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc