DirectorySecurity AdvisoriesPricing
Sign in
Directory
azurefile-csi-driver logoHELM

azurefile-csi-driver

Helm chart
Last changed
Request a free trial

Contact our team to test out this Helm chart and related images for free. Please also indicate any other images you would like to evaluate.

Overview
Chart versions
Default values
Chart metadata
Images

Tag:

1
image:
2
baseRepo: mcr.microsoft.com
3
azurefile:
4
repository: cgr.dev/chainguard-private/azurefile-csi
5
tag: "1.35"
6
pullPolicy: IfNotPresent
7
csiProvisioner:
8
repository: cgr.dev/chainguard-private/kubernetes-csi-external-provisioner
9
tag: latest@sha256:3ce49e127de9fb7a0d805ac4e3048616dc751fc4fbe5d78cdb698b3a7a23f618
10
pullPolicy: IfNotPresent
11
csiResizer:
12
repository: cgr.dev/chainguard-private/kubernetes-csi-external-resizer
13
tag: latest@sha256:baf258fcc6107951aa9c17fcc9ce8c89198db967a7e53a5ed0e03cc1ed750d50
14
pullPolicy: IfNotPresent
15
livenessProbe:
16
repository: cgr.dev/chainguard-private/kubernetes-csi-livenessprobe
17
tag: latest@sha256:22a0de2184c13cd470b78a7c1a6443305e39e646e5229832c1fcd395e5f742aa
18
pullPolicy: IfNotPresent
19
nodeDriverRegistrar:
20
repository: cgr.dev/chainguard-private/kubernetes-csi-node-driver-registrar
21
tag: latest@sha256:93f65084168e747618cb104fa4f1212807db37aed3f9b2fd18f69e6e00382ab7
22
pullPolicy: IfNotPresent
23
## Reference to one or more secrets to be used when pulling images
24
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
25
imagePullSecrets: []
26
# - name: myRegistryKeySecretName
27
28
# -- Custom labels to add into metadata
29
customLabels: {}
30
# k8s-app: azurefile-csi-driver
31
32
serviceAccount:
33
create: true # When true, service accounts will be created for you. Set to false if you want to use your own.
34
controller: csi-azurefile-controller-sa # Name of Service Account to be created or used
35
node: csi-azurefile-node-sa # Name of Service Account to be created or used
36
snapshotController: csi-snapshot-controller-sa # Name of Service Account to be created or used
37
rbac:
38
create: true
39
name: azurefile
40
controller:
41
name: csi-azurefile-controller
42
cloudConfigSecretName: azure-cloud-provider
43
cloudConfigSecretNamespace: kube-system
44
allowEmptyCloudConfig: true
45
replicas: 2
46
strategyType: RollingUpdate
47
hostNetwork: true # this setting could be disabled if controller does not depend on MSI setting
48
metricsPort: 29614
49
livenessProbe:
50
healthPort: 29612
51
runOnMaster: false
52
runOnControlPlane: false
53
attachRequired: false
54
logLevel: 5
55
labels: {}
56
annotations: {}
57
podLabels: {}
58
podAnnotations: {}
59
resources:
60
csiProvisioner:
61
limits:
62
cpu: 1
63
memory: 500Mi
64
requests:
65
cpu: 10m
66
memory: 20Mi
67
csiResizer:
68
limits:
69
cpu: 1
70
memory: 500Mi
71
requests:
72
cpu: 10m
73
memory: 20Mi
74
csiSnapshotter:
75
limits:
76
cpu: 1
77
memory: 400Mi
78
requests:
79
cpu: 10m
80
memory: 20Mi
81
livenessProbe:
82
limits:
83
cpu: 1
84
memory: 100Mi
85
requests:
86
cpu: 10m
87
memory: 20Mi
88
azfilesrefresh:
89
limits:
90
cpu: 1
91
memory: 100Mi
92
requests:
93
cpu: 10m
94
memory: 20Mi
95
azurefile:
96
limits:
97
cpu: 2
98
memory: 800Mi
99
requests:
100
cpu: 10m
101
memory: 20Mi
102
kubeconfig: ""
103
affinity: {}
104
nodeSelector: {}
105
tolerations:
106
- key: "node-role.kubernetes.io/master"
107
operator: "Exists"
108
effect: "NoSchedule"
109
- key: "node-role.kubernetes.io/controlplane"
110
operator: "Exists"
111
effect: "NoSchedule"
112
- key: "node-role.kubernetes.io/control-plane"
113
operator: "Exists"
114
effect: "NoSchedule"
115
- key: "CriticalAddonsOnly"
116
operator: "Exists"
117
effect: "NoSchedule"
118
node:
119
strategyType: RollingUpdate
120
maxUnavailable: 1
121
cloudConfigSecretName: azure-cloud-provider
122
cloudConfigSecretNamespace: kube-system
123
allowEmptyCloudConfig: true
124
allowInlineVolumeKeyAccessWithIdentity: false
125
enableKataCCMount: false
126
enableManagedIdentityAuth: true
127
metricsPort: 29615
128
livenessProbe:
129
healthPort: 29613
130
nodeDriverRegistrar:
131
healthPort: 29617
132
livenessProbe:
133
initialDelaySeconds: 20
134
timeoutSeconds: 10
135
periodSeconds: 20
136
failureThreshold: 2
137
logLevel: 5
138
azurefileProxy:
139
enabled: true
140
installAznfsMount: true
141
migrateK8sRepo: false
142
snapshot:
143
enabled: false
144
image:
145
csiSnapshotter:
146
repository: cgr.dev/chainguard-private/kubernetes-csi-external-snapshotter
147
tag: latest
148
pullPolicy: IfNotPresent
149
csiSnapshotController:
150
repository: cgr.dev/chainguard-private/kubernetes-csi-external-snapshot-controller
151
tag: latest@sha256:ada1b4b548547e799d2ba138a6218eeac4d5f091c3578d68738be34cc98b878e
152
pullPolicy: IfNotPresent
153
snapshotController:
154
name: csi-snapshot-controller
155
replicas: 2
156
strategyType: RollingUpdate
157
labels: {}
158
annotations: {}
159
podLabels: {}
160
podAnnotations: {}
161
resources:
162
limits:
163
cpu: 1
164
memory: 500Mi
165
requests:
166
cpu: 10m
167
memory: 20Mi
168
feature:
169
enableGetVolumeStats: true
170
enableVolumeMountGroup: true
171
fsGroupPolicy: ReadWriteOnceWithFSType
172
driver:
173
name: file.csi.azure.com
174
customUserAgent: ""
175
userAgentSuffix: "OSS-helm"
176
azureGoSDKLogLevel: "" # available values: ""(no logs), DEBUG, INFO, WARNING, ERROR
177
httpsProxy: ""
178
httpProxy: ""
179
linux:
180
enabled: true
181
dsName: csi-azurefile-node # daemonset name
182
dnsPolicy: Default # available values: Default, ClusterFirst, ClusterFirstWithHostNet, None
183
kubelet: /var/lib/kubelet
184
kubeconfig: ""
185
distro: debian # available values: debian, fedora
186
mountPermissions: 0777
187
labels: {}
188
annotations: {}
189
podLabels: {}
190
podAnnotations: {}
191
resources:
192
livenessProbe:
193
limits:
194
memory: 100Mi
195
requests:
196
cpu: 10m
197
memory: 20Mi
198
nodeDriverRegistrar:
199
limits:
200
memory: 100Mi
201
requests:
202
cpu: 10m
203
memory: 20Mi
204
azurefile:
205
limits:
206
memory: 400Mi
207
requests:
208
cpu: 10m
209
memory: 20Mi
210
tolerations:
211
- operator: "Exists"
212
nodeSelector: {}
213
affinity: {}
214
nodeAffinity:
215
requiredDuringSchedulingIgnoredDuringExecution:
216
nodeSelectorTerms:
217
- matchExpressions:
218
- key: type
219
operator: NotIn
220
values:
221
- virtual-kubelet
222
windows:
223
enabled: true
224
useHostProcessContainers: true
225
dsName: csi-azurefile-node-win # daemonset name
226
kubelet: 'C:\var\lib\kubelet'
227
kubeconfig: ""
228
enableRegistrationProbe: true
229
labels: {}
230
annotations: {}
231
podLabels: {}
232
podAnnotations: {}
233
resources:
234
livenessProbe:
235
limits:
236
memory: 150Mi
237
requests:
238
cpu: 10m
239
memory: 40Mi
240
nodeDriverRegistrar:
241
limits:
242
memory: 150Mi
243
requests:
244
cpu: 30m
245
memory: 40Mi
246
azurefile:
247
limits:
248
memory: 600Mi
249
requests:
250
cpu: 10m
251
memory: 40Mi
252
tolerations:
253
- key: "node.kubernetes.io/os"
254
operator: "Exists"
255
effect: "NoSchedule"
256
nodeSelector: {}
257
affinity: {}
258
nodeAffinity:
259
requiredDuringSchedulingIgnoredDuringExecution:
260
nodeSelectorTerms:
261
- matchExpressions:
262
- key: type
263
operator: NotIn
264
values:
265
- virtual-kubelet
266
workloadIdentity:
267
clientID: ""
268
# [optional] If the AAD application or user-assigned managed identity is not in the same tenant as the cluster
269
# then set tenantID with the application or user-assigned managed identity tenant ID
270
tenantID: ""
271
azureCredentialFileConfigMap: azure-cred-file
272

The trusted source for open source

Talk to an expert
PrivacyTerms

Product

Chainguard ContainersChainguard LibrariesChainguard VMsChainguard OS PackagesChainguard ActionsChainguard Agent SkillsIntegrationsPricing
© 2026 Chainguard, Inc. All Rights Reserved.
Chainguard® and the Chainguard logo are registered trademarks of Chainguard, Inc. in the United States and/or other countries.
The other respective trademarks mentioned on this page are owned by the respective companies and use of them does not imply any affiliation or endorsement.