Kubernetes 4
Kubernetes 4
kube-scheduler [flags]
Options
--allow-metric-labels stringToString Default: []
The map from metric-label to value allow-list of this label. The key's format is
<MetricName>,<LabelName>. The value's format is
<allowed_value>,<allowed_value>...e.g. metric1,label1='v1,v2,v3',
metric1,label2='v1,v2,v3' metric2,label1='v1,v2,v3'.
--allow-metric-labels-manifest string
The path to the manifest file that contains the allow-list mapping. The format of
the file is the same as the flag --allow-metric-labels. Note that the flag --allow-
metric-labels will override the manifest file.
--authentication-kubeconfig string
kubeconfig file pointing at the 'core' kubernetes server with enough rights to
create tokenreviews.authentication.k8s.io. This is optional. If empty, all token
requests are considered to be anonymous and no client CA is looked up in the
cluster.
--authentication-skip-lookup
If false, the authentication-kubeconfig will be used to lookup missing
authentication configuration from the cluster.
--authorization-kubeconfig string
kubeconfig file pointing at the 'core' kubernetes server with enough rights to
create subjectaccessreviews.authorization.k8s.io. This is optional. If empty, all
requests not skipped by authorization are forbidden.
--azure-container-registry-config string
Path to the file containing Azure container registry configuration information.
--cert-dir string
The directory where the TLS certs are located. If --tls-cert-file and --tls-
private-key-file are provided, this flag will be ignored.
--client-ca-file string
If set, any request presenting a client certificate signed by one of the
authorities in the client-ca-file is authenticated with an identity corresponding
to the CommonName of the client certificate.
--config string
The path to the configuration file.
--disabled-metrics strings
This flag provides an escape hatch for misbehaving metrics. You must provide the
fully qualified metric name in order to disable it. Disclaimer: disabling metrics
is higher in precedence than showing hidden metrics.
-h, --help
help for kube-scheduler
--http2-max-streams-per-connection int
The limit that the server gives to clients for the maximum number of streams in an
HTTP/2 connection. Zero means to use golang's default.
--kubeconfig string
DEPRECATED: path to kubeconfig file with authorization and master location
information. This parameter is ignored if a config file is specified in --config.
--master string
The address of the Kubernetes API server (overrides any value in kubeconfig)
--permit-address-sharing
If true, SO_REUSEADDR will be used when binding the port. This allows binding to
wildcard IPs like 0.0.0.0 and specific IPs in parallel, and it avoids waiting for
the kernel to release sockets in TIME_WAIT state. [default=false]
--permit-port-sharing
If true, SO_REUSEPORT will be used when binding the port, which allows more than
one instance to bind on the same address and port. [default=false]
--requestheader-allowed-names strings
List of client certificate common names to allow to provide usernames in headers
specified by --requestheader-username-headers. If empty, any client certificate
validated by the authorities in --requestheader-client-ca-file is allowed.
--requestheader-client-ca-file string
Root certificate bundle to use to verify client certificates on incoming requests
before trusting usernames in headers specified by --requestheader-username-headers.
WARNING: generally do not depend on authorization being already done for incoming
requests.
--show-hidden-metrics-for-version string
The previous version for which you want to show hidden metrics. Only the previous
minor version is meaningful, other values will not be allowed. The format is
<major>.<minor>, e.g.: '1.16'. The purpose of this format is make sure you have the
opportunity to notice if the next release hides additional metrics, rather than
being surprised when they are permanently removed in the release after that.
--tls-cert-file string
File containing the default x509 Certificate for HTTPS. (CA cert, if any,
concatenated after server cert). If HTTPS serving is enabled, and --tls-cert-file
and --tls-private-key-file are not provided, a self-signed certificate and key are
generated for the public address and saved to the directory specified by --cert-
dir.
--tls-cipher-suites strings
Comma-separated list of cipher suites for the server. If omitted, the default Go
cipher suites will be used.
Preferred values: TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384,
TLS_CHACHA20_POLY1305_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA,
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA,
TLS_RSA_WITH_AES_256_GCM_SHA384.
Insecure values: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256,
TLS_RSA_WITH_RC4_128_SHA.
--tls-min-version string
Minimum TLS version supported. Possible values: VersionTLS10, VersionTLS11,
VersionTLS12, VersionTLS13
--tls-private-key-file string
File containing the default x509 private key matching --tls-cert-file.
--tls-sni-cert-key string
A pair of x509 certificate and private key file paths, optionally suffixed with a
list of domain patterns which are fully qualified domain names, possibly with
prefixed wildcard segments. The domain patterns also allow IP addresses, but IPs
should only be used if the apiserver has visibility to the IP address requested by
a client. If no domain patterns are provided, the names of the certificate are
extracted. Non-wildcard matches trump over wildcard matches, explicit domain
patterns trump over extracted names. For multiple key/certificate pairs, use the --
tls-sni-cert-key multiple times. Examples: "example.crt,example.key" or
"foo.crt,foo.key:*.foo.com,foo.com".
--version version[=true]
--version, --version=raw prints version information and quits; --version=vX.Y.Z...
sets the reported version
--vmodule pattern=N,...
comma-separated list of pattern=N settings for file-filtered logging (only works
for text log format)
--write-config-to string
If set, write the configuration values to this file and exit.
If you plan to report an issue with this page, mention that the page is auto-
generated in your issue description. The fix may need to happen elsewhere in the
Kubernetes project.
Feedback
Was this page helpful?
Last modified December 14, 2023 at 8:49 AM PST: Update component reference for
v1.29 (519eec1bf6)
Documentation
Blog
Training
Partners
Community
Case Studies
© 2024 The Kubernetes Authors | Documentation Distributed under CC BY 4.0
Copyright © 2024 The Linux Foundation ®. All rights reserved. The Linux Foundation
has registered trademarks and uses trademarks. For a list of trademarks of The
Linux Foundation, please see our Trademark Usage page
ICP license: 京 ICP 备 17074266 号-3