2 baseRepo: mcr.microsoft.com
4 repository: cgr.dev/chainguard-private/azurefile-csi
6 pullPolicy: IfNotPresent
8 repository: cgr.dev/chainguard-private/kubernetes-csi-external-provisioner
9 tag: latest@sha256:3ce49e127de9fb7a0d805ac4e3048616dc751fc4fbe5d78cdb698b3a7a23f618
10 pullPolicy: IfNotPresent
12 repository: cgr.dev/chainguard-private/kubernetes-csi-external-resizer
13 tag: latest@sha256:baf258fcc6107951aa9c17fcc9ce8c89198db967a7e53a5ed0e03cc1ed750d50
14 pullPolicy: IfNotPresent
16 repository: cgr.dev/chainguard-private/kubernetes-csi-livenessprobe
17 tag: latest@sha256:22a0de2184c13cd470b78a7c1a6443305e39e646e5229832c1fcd395e5f742aa
18 pullPolicy: IfNotPresent
20 repository: cgr.dev/chainguard-private/kubernetes-csi-node-driver-registrar
21 tag: latest@sha256:93f65084168e747618cb104fa4f1212807db37aed3f9b2fd18f69e6e00382ab7
22 pullPolicy: IfNotPresent
23## Reference to one or more secrets to be used when pulling images
24## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
26# - name: myRegistryKeySecretName
28# -- Custom labels to add into metadata
30# k8s-app: azurefile-csi-driver
33 create: true # When true, service accounts will be created for you. Set to false if you want to use your own.
34 controller: csi-azurefile-controller-sa # Name of Service Account to be created or used
35 node: csi-azurefile-node-sa # Name of Service Account to be created or used
36 snapshotController: csi-snapshot-controller-sa # Name of Service Account to be created or used
41 name: csi-azurefile-controller
42 cloudConfigSecretName: azure-cloud-provider
43 cloudConfigSecretNamespace: kube-system
44 allowEmptyCloudConfig: true
46 strategyType: RollingUpdate
47 hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting
52 runOnControlPlane: false
106 - key: "node-role.kubernetes.io/master"
109 - key: "node-role.kubernetes.io/controlplane"
112 - key: "node-role.kubernetes.io/control-plane"
115 - key: "CriticalAddonsOnly"
119 strategyType: RollingUpdate
121 cloudConfigSecretName: azure-cloud-provider
122 cloudConfigSecretNamespace: kube-system
123 allowEmptyCloudConfig: true
124 allowInlineVolumeKeyAccessWithIdentity: false
125 enableKataCCMount: false
126 enableManagedIdentityAuth: true
133 initialDelaySeconds: 20
140 installAznfsMount: true
141 migrateK8sRepo: false
146 repository: cgr.dev/chainguard-private/kubernetes-csi-external-snapshotter
148 pullPolicy: IfNotPresent
149 csiSnapshotController:
150 repository: cgr.dev/chainguard-private/kubernetes-csi-external-snapshot-controller
151 tag: latest@sha256:ada1b4b548547e799d2ba138a6218eeac4d5f091c3578d68738be34cc98b878e
152 pullPolicy: IfNotPresent
154 name: csi-snapshot-controller
156 strategyType: RollingUpdate
169 enableGetVolumeStats: true
170 enableVolumeMountGroup: true
171 fsGroupPolicy: ReadWriteOnceWithFSType
173 name: file.csi.azure.com
175 userAgentSuffix: "OSS-helm"
176 azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR
181 dsName: csi-azurefile-node # daemonset name
182 dnsPolicy: Default # available values: Default, ClusterFirst, ClusterFirstWithHostNet, None
183 kubelet: /var/lib/kubelet
185 distro: debian # available values: debian, fedora
186 mountPermissions: 0777
215 requiredDuringSchedulingIgnoredDuringExecution:
224 useHostProcessContainers: true
225 dsName: csi-azurefile-node-win # daemonset name
226 kubelet: 'C:\var\lib\kubelet'
228 enableRegistrationProbe: true
253 - key: "node.kubernetes.io/os"
259 requiredDuringSchedulingIgnoredDuringExecution:
268 # [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster
269 # then set tenantID with the application or user-assigned managed identity tenant ID
271azureCredentialFileConfigMap: azure-cred-file