DirectorySecurity AdvisoriesPricing
/
Sign in
Directory
argo-fips-exec logoFIPS

argo-fips-exec

Last changed

Request a free trial

Contact our team to test out this image for free. Please also indicate any other images you would like to evaluate.

Tags
Overview
Comparison
Provenance
Specifications
SBOM
Vulnerabilities
Advisories

Images for working with Argo workflows

Download this Image

The image is available on cgr.dev:

docker pull cgr.dev/chainguard/argo:latest

Versions

docker pull cgr.dev/chainguard/argo-exec
docker pull cgr.dev/chainguard/argo-cli
docker pull cgr.dev/chainguard/argo-workflowcontroller

Using argo

Argo provides two upstream methods for installing, helm, and raw manifests.

The Chainguard Images for Argo are designed to be a drop in replacement for either method. To use them, simply replace the appropriate image: path with the Chainguard specific Argo image. Below is an example values file for doing this with helm:


images:
  tag: "latest"
controller:
  image:
    # -- Registry to use for the controller
    registry: cgr.dev
    # -- Registry to use for the controller
    repository: chainguard/argo-workflow-controller
executor:
  image:
    # -- Registry to use for the Workflow Executors
    registry: cgr.dev
    # -- Repository to use for the Workflow Executors
    repository: chainguard/argo-exec
server:
  # -- Deploy the Argo Server
  image:
    # -- Registry to use for the server
    registry: cgr.dev
    # -- Repository to use for the server
    repository: chainguard/argo-cli

Using the above values, the helm commands become:

helm repo add argo https://argoproj.github.io/argo-helm

helm install argo-workflows argo/argo-workflows \
	--namespace argo-workflows \
	--create-namespace \
	--set images.tag="latest" \
	--set global.image.tag="latest" \
  --set controller.image.registry="cgr.dev" \
  --set controller.image.repository="chainguard/argo-workflow-controller" \
  --set executor.image.registry="cgr.dev" \
  --set executor.image.repository="chainguard/argo-exec" \
  --set server.image.registry="cgr.dev" \
  --set server.image.repository="chainguard/argo-cli"
Licenses

Chainguard's container images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" tag of this image:

    For a complete list of licenses, please refer to this Image's SBOM.

    Software license agreement

    Compliance

    Chainguard Containers are SLSA Level 3 compliant with detailed metadata and documentation about how it was built. We generate build provenance and a Software Bill of Materials (SBOM) for each release, with complete visibility into the software supply chain.

    SLSA compliance at Chainguard

    This image helps reduce time and effort in establishing PCI DSS 4.0 compliance with low-to-no CVEs.

    PCI DSS at Chainguard

    This is a FIPS validated image for FedRAMP compliance.

    This image is STIG hardened and scanned against the DISA General Purpose Operating System SRG with reports available.

    Learn more about STIGsGet started with STIGs

    Related images
    argo-exec logo
    argo-exec

    Category
    FIPS
    STIG

    The trusted source for open source

    Talk to an expert
    © 2025 Chainguard. All Rights Reserved.
    PrivacyTerms

    Product

    Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing