You are viewing documentation for Kubernetes version: v1.20
Kubernetes v1.20 documentation is no longer actively maintained. The version you are currently viewing is a static snapshot. For up-to-date documentation, see the latest version.
kube-proxy
Synopsis
The Kubernetes network proxy runs on each node. This reflects services as defined in the Kubernetes API on each node and can do simple TCP, UDP, and SCTP stream forwarding or round robin TCP, UDP, and SCTP forwarding across a set of backends. Service cluster IPs and ports are currently found through Docker-links-compatible environment variables specifying ports opened by the service proxy. There is an optional addon that provides cluster DNS for these cluster IPs. The user must create a service with the apiserver API to configure the proxy.
kube-proxy [flags]
Options
--azure-container-registry-config string | |
Path to the file containing Azure container registry configuration information. | |
--bind-address string Default: 0.0.0.0 | |
The IP address for the proxy server to serve on (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) | |
--bind-address-hard-fail | |
If true kube-proxy will treat failure to bind to a port as fatal and exit | |
--cleanup | |
If true cleanup iptables and ipvs rules and exit. | |
--cluster-cidr string | |
The CIDR range of pods in the cluster. When configured, traffic sent to a Service cluster IP from outside this range will be masqueraded and traffic sent from pods to an external LoadBalancer IP will be directed to the respective cluster IP instead | |
--config string | |
The path to the configuration file. | |
--config-sync-period duration Default: 15m0s | |
How often configuration from the apiserver is refreshed. Must be greater than 0. | |
--conntrack-max-per-core int32 Default: 32768 | |
Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). | |
--conntrack-min int32 Default: 131072 | |
Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). | |
--conntrack-tcp-timeout-close-wait duration Default: 1h0m0s | |
NAT timeout for TCP connections in the CLOSE_WAIT state | |
--conntrack-tcp-timeout-established duration Default: 24h0m0s | |
Idle timeout for established TCP connections (0 to leave as-is) | |
--detect-local-mode LocalMode | |
Mode to use to detect local traffic | |
--feature-gates <comma-separated 'key=True|False' pairs> | |
A set of key=value pairs that describe feature gates for alpha/experimental features. Options are: | |
--healthz-bind-address ipport Default: 0.0.0.0:10256 | |
The IP address with port for the health check server to serve on (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. | |
-h, --help | |
help for kube-proxy | |
--hostname-override string | |
If non-empty, will use this string as identification instead of the actual hostname. | |
--iptables-masquerade-bit int32 Default: 14 | |
If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. | |
--iptables-min-sync-period duration Default: 1s | |
The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). | |
--iptables-sync-period duration Default: 30s | |
The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. | |
--ipvs-exclude-cidrs strings | |
A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. | |
--ipvs-min-sync-period duration | |
The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). | |
--ipvs-scheduler string | |
The ipvs scheduler type when proxy mode is ipvs | |
--ipvs-strict-arp | |
Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 | |
--ipvs-sync-period duration Default: 30s | |
The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. | |
--ipvs-tcp-timeout duration | |
The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). | |
--ipvs-tcpfin-timeout duration | |
The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). | |
--ipvs-udp-timeout duration | |
The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). | |
--kube-api-burst int32 Default: 10 | |
Burst to use while talking with kubernetes apiserver | |
--kube-api-content-type string Default: "application/vnd.kubernetes.protobuf" | |
Content type of requests sent to apiserver. | |
--kube-api-qps float Default: 5 | |
QPS to use while talking with kubernetes apiserver | |
--kubeconfig string | |
Path to kubeconfig file with authorization information (the master location can be overridden by the master flag). | |
--log-flush-frequency duration Default: 5s | |
Maximum number of seconds between log flushes | |
--masquerade-all | |
If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) | |
--master string | |
The address of the Kubernetes API server (overrides any value in kubeconfig) | |
--metrics-bind-address ipport Default: 127.0.0.1:10249 | |
The IP address with port for the metrics server to serve on (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. | |
--nodeport-addresses strings | |
A string slice of values which specify the addresses to use for NodePorts. Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. | |
--oom-score-adj int32 Default: -999 | |
The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] | |
--profiling | |
If true enables profiling via web interface on /debug/pprof handler. | |
--proxy-mode ProxyMode | |
Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs' or 'kernelspace' (windows). If blank, use the best-available proxy (currently iptables). If the iptables proxy is selected, regardless of how, but the system's kernel or iptables versions are insufficient, this always falls back to the userspace proxy. | |
--proxy-port-range port-range | |
Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) that may be consumed in order to proxy service traffic. If (unspecified, 0, or 0-0) then ports will be randomly chosen. | |
--show-hidden-metrics-for-version string | |
The previous version for which you want to show hidden metrics. Only the previous minor version is meaningful, other values will not be allowed. The format is ., e.g.: '1.16'. The purpose of this format is make sure you have the opportunity to notice if the next release hides additional metrics, rather than being surprised when they are permanently removed in the release after that. | |
--udp-timeout duration Default: 250ms | |
How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). Must be greater than 0. Only applicable for proxy-mode=userspace | |
--version version[=true] | |
Print version information and quit | |
--write-config-to string | |
If set, write the default configuration values to this file and exit. |