Skip to content

testenv: improve EKS multi-container e2e (IRSA, exec, S3 auth)#1739

Draft
vivekr-splunk wants to merge 6 commits intosplunk:developfrom
vivekr-splunk:vivek/e2e-multicontainer-harness
Draft

testenv: improve EKS multi-container e2e (IRSA, exec, S3 auth)#1739
vivekr-splunk wants to merge 6 commits intosplunk:developfrom
vivekr-splunk:vivek/e2e-multicontainer-harness

Conversation

@vivekr-splunk
Copy link
Collaborator

Draft: EKS-focused e2e improvements for multi-container pods.

Includes:

  • IRSA serviceAccount annotation wiring for EKS testenv
  • kubectl exec default container fixes for multi-container
  • safer S3 creds handling (avoid empty secrets; allow IAM auth)
  • metrics bind collision avoidance
  • related-image env plumbing for init/sidecar images

Notes:

  • Intentionally avoids CRD/controller-gen regen noise.

- Gate via SPLUNK_POD_ARCH=multi-container\n- Inject splunk-init and splunk-sidecar using RELATED_IMAGE_SPLUNK_INIT/SIDECAR\n- Rewire splunk probes to kubelet httpGet against sidecar pod health endpoints\n- Ensure only the splunk container receives splunk env/probes/resources
- Add skaffold config with ecr-vivek profile (linux/amd64)\n- Add kustomize overlay to avoid make/sed placeholders and enable multi-container pods\n- Add ECR login/repo helper scripts\n- Document workflows
- Add config/skaffold overlay to replace make/sed placeholder envs\n- Point default skaffold manifests to config/skaffold
…overlay

- Parameterize operator ENVIRONMENT/NAMESPACE for test harness\n- Avoid hardcoding RELATED_IMAGE_SPLUNK_ENTERPRISE in skaffold overlays
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant