1# Default values for aws-ebs-csi-driver.
2# This is a YAML-formatted file.
3# Declare variables to be passed into your templates.
6 repository: cgr.dev/chainguard-private/aws-ebs-csi-driver-fips
7 # Overrides the image tag whose default is v{{ .Chart.AppVersion }}
8 tag: latest@sha256:997b14b909bccde2e6425a858cb2b3635fff40252a114472d4144ff7e486df14
9 pullPolicy: IfNotPresent
10# -- Custom labels to add into metadata
12# k8s-app: aws-ebs-csi-driver
14# Instruct the AWS SDK to use AWS FIPS endpoints, and deploy container built with Boring Crypto (a FIPS-validated cryptographic library) instead of the Go default
16# The EBS CSI Driver FIPS images have not undergone FIPS certification, and no official guarantee is made about the compliance of these images under the FIPS standard
17# Users relying on these images for FIPS compliance should perform their own independent evaluation
23 pullPolicy: IfNotPresent
24 repository: cgr.dev/chainguard-private/kubernetes-csi-external-provisioner-fips
25 tag: latest@sha256:e5ca2ebb88e4a721f06073099ac47573091639c029abbd1010b14fbe411c39f3
27 # Additional parameters provided by csi-provisioner.
29 # Grant additional permissions to csi-provisioner
30 additionalClusterRoleRules:
32 # Tune leader lease election for csi-provisioner.
33 # Leader election is on by default.
36 # Optional values to tune lease behavior.
37 # The arguments provided must be in an acceptable time.ParseDuration format.
38 # Ref: https://pkg.go.dev/flag#Duration
39 # leaseDuration: "15s"
40 # renewDeadline: "10s"
45 readOnlyRootFilesystem: true
46 allowPrivilegeEscalation: false
50 pullPolicy: IfNotPresent
51 repository: cgr.dev/chainguard-private/kubernetes-csi-external-attacher-fips
52 tag: latest@sha256:6e2c0ae8b113bbb80106d0fbc637bc61e7414b6bc9d394ab49b5e5d2eaf91263
53 # Tune leader lease election for csi-attacher.
54 # Leader election is on by default.
57 # Optional values to tune lease behavior.
58 # The arguments provided must be in an acceptable time.ParseDuration format.
59 # Ref: https://pkg.go.dev/flag#Duration
60 # leaseDuration: "15s"
61 # renewDeadline: "10s"
64 # Additional parameters provided by csi-attacher.
66 # Grant additional permissions to csi-attacher
67 additionalClusterRoleRules: []
72 readOnlyRootFilesystem: true
73 allowPrivilegeEscalation: false
75 # Enables the snapshotter sidecar even if the snapshot CRDs are not installed
79 pullPolicy: IfNotPresent
80 repository: cgr.dev/chainguard-private/kubernetes-csi-external-snapshotter-fips
81 tag: latest@sha256:88b213231092e071f5710cc54896e546744700b773f9771e419bf31110a2f8b9
83 # Additional parameters provided by csi-snapshotter.
85 # Grant additional permissions to csi-snapshotter
86 additionalClusterRoleRules: []
91 readOnlyRootFilesystem: true
92 allowPrivilegeEscalation: false
94 # ALPHA: Enable the metadata-labeler sidecar to label Kubernetes Nodes with
95 # information from the EC2 API (e.g. number of ENIs)
96 # Also requires using metadata-labeler as the node's metadata source
99 # Additional parameters provided by metadataLabeler.
103 readOnlyRootFilesystem: true
104 allowPrivilegeEscalation: false
107 pullPolicy: IfNotPresent
108 repository: cgr.dev/chainguard-private/kubernetes-csi-livenessprobe-fips
109 tag: latest@sha256:3ad97923fd698216d5a5e40e1b4d802336a0b2658ca179c4f8ff825bed3e616f
110 # Additional parameters provided by livenessprobe.
114 readOnlyRootFilesystem: true
115 allowPrivilegeEscalation: false
119 pullPolicy: IfNotPresent
120 repository: cgr.dev/chainguard-private/kubernetes-csi-external-resizer-fips
121 tag: latest@sha256:a84f36a3169eea246d5f4f7b348036260e99b33cd2b9b3a3ae6452ffc92afee1
122 # Tune leader lease election for csi-resizer.
123 # Leader election is on by default.
126 # Optional values to tune lease behavior.
127 # The arguments provided must be in an acceptable time.ParseDuration format.
128 # Ref: https://pkg.go.dev/flag#Duration
129 # leaseDuration: "15s"
130 # renewDeadline: "10s"
133 # Additional parameters provided by csi-resizer.
135 # Grant additional permissions to csi-resizer
136 additionalClusterRoleRules: []
141 readOnlyRootFilesystem: true
142 allowPrivilegeEscalation: false
146 pullPolicy: IfNotPresent
147 repository: cgr.dev/chainguard-private/kubernetes-csi-node-driver-registrar-fips
148 tag: latest@sha256:01e778be6ebb5e90920d19fc03d59f7f65e79fbeb071325658e07ce2ff099436
150 # The port the health probe is bound to.
152 # Additional parameters provided by node-driver-registrar.
156 readOnlyRootFilesystem: true
157 allowPrivilegeEscalation: false
162 initialDelaySeconds: 30
168 pullPolicy: IfNotPresent
169 repository: cgr.dev/chainguard-private/aws-volume-modifier-for-k8s-fips
170 tag: latest@sha256:d5e1e98910b4d3f9515563ad4df2942af6eba6a3e63ddedb74d5e0208d553b16
173 # Optional values to tune lease behavior.
174 # The arguments provided must be in an acceptable time.ParseDuration format.
175 # Ref: https://pkg.go.dev/flag#Duration
176 # leaseDuration: "15s"
177 # renewDeadline: "10s"
180 # Additional parameters provided by volume-modifier-for-k8s.
186 readOnlyRootFilesystem: true
187 allowPrivilegeEscalation: false
197 accessKey: access_key
200 volumeModificationFeature:
202 # Enable support for node-local volumes that use pre-attached EBS volumes
203 enableNodeLocalVolumes: false
204 # Additional parameters provided by aws-ebs-csi-driver controller.
210 preferredDuringSchedulingIgnoredDuringExecution:
214 - key: eks.amazonaws.com/compute-type
221 preferredDuringSchedulingIgnoredDuringExecution:
229 topologyKey: kubernetes.io/hostname
231 # The default filesystem type of the volume to provision when fstype is unspecified in the StorageClass.
232 # If the default is not set and fstype is unset in the StorageClass, then no fstype will be set
235 # Use envFrom to reference ConfigMaps and Secrets across all containers in the deployment
237 # If set, add pv/pvc metadata to plugin create and modify requests as parameters.
238 extraCreateMetadata: true
239 # Extra volume tags to attach to each dynamically provisioned volume.
246 # (deprecated) The TCP network address where the prometheus metrics endpoint
247 # will run (example: `:8080` which corresponds to port 8080 on local host).
248 # The default is empty string, which means metrics endpoint is disabled.
251 # If metrics are enabled, add prometheus.io/scrape and prometheus.io/port
252 # annotations to the metrics services.
253 enablePrometheusAnnotations: true
255 # Enables the ServiceMonitor resource even if the prometheus-operator CRDs are not installed
257 # Additional labels for ServiceMonitor object
260 # If set to true, AWS API call metrics will be exported to the following
261 # TCP endpoint: "0.0.0.0:3301"
263 # ID of the Kubernetes cluster used for tagging provisioned EBS volumes (optional).
266 userAgentExtra: "helm"
268 deploymentAnnotations: {}
272 # Warning: Disabling PodDisruptionBudget may lead to delays in stateful workloads starting due to controller
273 # pod restarts or evictions.
275 # unhealthyPodEvictionPolicy:
276 # Configure the maxUnavailable or minAvailable for the PDB
277 # If either parameter is non-null, no default is used for both
280 priorityClassName: system-cluster-critical
281 # AWS region to use. If not specified then the region will be looked up via the AWS EC2 metadata
287 revisionHistoryLimit: 10
294 # type: RollingUpdate
305 # A service account will be created for you if set to true. Set to false if you want to use your own.
307 name: ebs-csi-controller-sa
309 ## Enable if EKS IAM for SA is used
310 # eks.amazonaws.com/role-arn: arn:<partition>:iam::<account>:role/ebs-csi-role
311 automountServiceAccountToken: true
313 - key: CriticalAddonsOnly
317 tolerationSeconds: 300
318 # TSCs without the label selector stanza
322 # topologySpreadConstraints:
324 # topologyKey: topology.kubernetes.io/zone
325 # whenUnsatisfiable: ScheduleAnyway
327 # topologyKey: kubernetes.io/hostname
328 # whenUnsatisfiable: ScheduleAnyway
329 topologySpreadConstraints: []
330 # securityContext on the controller pod
336 # Add additional volume mounts on the controller with controller.volumes and controller.volumeMounts
338 # Add additional volumes to be mounted onto the controller:
344 # And add mount paths for those additional volumes:
346 # mountPath: /mount/path
348 # securityContext on the controller container (see sidecars for securityContext on sidecar containers)
349 containerSecurityContext:
352 readOnlyRootFilesystem: true
353 allowPrivilegeEscalation: false
355 # containers to be run before the controller's container starts.
360 # image: public.ecr.aws/amazonlinux/amazonlinux
361 # command: [ 'sh', '-c', "sleep 20" ]
362 # Enable opentelemetry tracing for the plugin running on the daemonset
364 # otelServiceName: ebs-csi-controller
365 # otelExporterEndpoint: "http://localhost:4317"
367 # dnsConfig for the controller pods
370 # Enable SELinux-only optimizations on the EBS CSI Driver node pods
371 # Must only be set true if all linux nodes in the DaemonSet have SELinux enabled
375 kubeletPath: /var/lib/kubelet
379 # If metrics are enabled, add prometheus.io/scrape and prometheus.io/port
380 # annotations to the metrics services.
381 enablePrometheusAnnotations: true
383 # Enables the ServiceMonitor resource even if the prometheus-operator CRDs are not installed
385 # Additional labels for ServiceMonitor object
392 requiredDuringSchedulingIgnoredDuringExecution:
395 - key: eks.amazonaws.com/compute-type
402 daemonSetAnnotations: {}
405 terminationGracePeriodSeconds: 30
406 tolerateAllTaints: true
410 tolerationSeconds: 300
417 revisionHistoryLimit: 10
422 name: ebs-csi-node-sa
424 ## Enable if EKS IAM for SA is used
425 # eks.amazonaws.com/role-arn: arn:<partition>:iam::<account>:role/ebs-csi-role
426 automountServiceAccountToken: true
427 # Disable mutating permissions for the node service account.
428 # When enabled, some features of the EBS CSI Driver node pods will not function, such as taint removal.
429 # Primarily useful in particularly security-sensitive environments, or on multi-tenant clusters that isolate tenants by node.
430 disableMutation: false
431 # Enable the linux daemonset creation
434 # Comma separated list of metadata sources that override the default used by the EBS CSI Driver. Valid sources include 'imds', 'kubernetes', and (ALPHA) 'metadata-labeler'
436 # Warning: This option will be removed in a future release. It is a temporary workaround for users unable to immediately migrate off of older kernel versions.
437 # Formats XFS volumes with bigtime=0,inobtcount=0,reflink=0, for mounting onto nodes with linux kernel version <= 5.4.
438 # Note that XFS volumes formatted with this option will only have timestamp records until 2038.
440 # The number of attachment slots to reserve for system use (and not to be used for CSI volumes)
441 # When this parameter is not specified (or set to -1), the EBS CSI Driver will attempt to determine the number of reserved slots via heuristic
442 # Cannot be specified at the same time as `node.volumeAttachLimit`
443 reservedVolumeAttachments:
444 # The "maximum number of attachable volumes" per node
445 # Cannot be specified at the same time as `node.reservedVolumeAttachments`
450 maxUnavailable: "10%"
452 # securityContext on the node pod
454 # The node pod must be run as root to bind to the registration/driver sockets
459 # allows you to deploy aws-ebs-csi-node daemonset to separate namespace (make sure namespace exists before deploy)
460 namespaceOverride: ""
461 # Add additional volume mounts on the node pods with node.volumes and node.volumeMounts
463 # Add additional volumes to be mounted onto the node pods:
469 # And add mount paths for those additional volumes:
471 # mountPath: /mount/path
473 # securityContext on the node container (see sidecars for securityContext on sidecar containers)
474 # Privileged containers always run as `Unconfined`, which means that they are not restricted by a seccomp profile.
475 containerSecurityContext:
476 readOnlyRootFilesystem: true
479 # containers to be run before the csi-node's container starts.
484 # image: public.ecr.aws/amazonlinux/amazonlinux
485 # command: [ 'sh', '-c', "sleep 20" ]
486 # Enable opentelemetry tracing for the plugin running on the daemonset
488 # otelServiceName: ebs-csi-node
489 # otelExporterEndpoint: "http://localhost:4317"
491 # dnsConfig for the node pods
494# Additional node DaemonSets, using the node config structure
495# See docs/additional-daemonsets.md for more information
499# node.kubernetes.io/instance-type: c5.large
500# volumeAttachLimit: 15
502# Add StorageClass resources like:
504# # annotation metadata
506# storageclass.kubernetes.io/is-default-class: "true"
509# my-label-is: supercool
510# # defaults to WaitForFirstConsumer
511# volumeBindingMode: WaitForFirstConsumer
512# # defaults to Delete
513# reclaimPolicy: Retain
519volumeSnapshotClasses: []
520# Add VolumeSnapshotClass resources like:
522# # annotation metadata
524# snapshot.storage.kubernetes.io/is-default-class: "true"
527# my-label-is: supercool
528# # deletionPolicy must be specified
529# deletionPolicy: Delete
532# Use old CSIDriver without an fsGroupPolicy set
533# Intended for use with older clusters that cannot easily replace the CSIDriver object
534# This parameter should always be false for new installations
535useOldCSIDriver: false
536# nodeAllocatableUpdatePeriodSeconds updates the node's max attachable volume count by directing Kubelet to periodically call NodeGetInfo at the configured interval.
537# Kubernetes enforces a minimum update interval of 10 seconds. A value of -1 uses a automatically determined value dependent on metadata sources.
538# This parameter is supported in Kubernetes 1.33+ and requires the MutableCSINodeAllocatableCount feature gate to be enabled in kubelet and kube-apiserver.
539nodeAllocatableUpdatePeriodSeconds: -1
540# Deploy EBS CSI Driver without controller and associated resources
541nodeComponentOnly: false
542# Set maximum verbosity for logs of each container and other recommended debugging parameters such as enabling AWS SDK debug logging
546 # Supply a custom image to the ebs-csi-driver-test pod in helm-tester.yaml
547 image: "us-central1-docker.pkg.dev/k8s-staging-test-infra/images/kubekins-e2e:v20260414-5a49ebcf1f-master"