Modern Kubernetes environments are complex. Debugging a misconfigured component often requires searching logs, tracing deployments, or examining configuration files deployed weeks ago. What if you could just ask the component what it’s running with live?
With the Kubernetes v1.33 release, Kubelet now exposes a /flagz endpoint, providing real-time introspection into the exact command-line flags it's running with. This enhancement (as part of KEP-4828: Component Flagz) marks a step forward in observability and operational transparency.
The goal is simple but powerful: expose the runtime flags of core Kubernetes components, on demand.
This is especially useful for:
Debugging: You suspect a feature isn’t enabled or configured correctly? Don’t grep logs, just curl /flagz.
Auditing: After upgrading or restarting a component, verify the actual runtime state reflects your intent.
Supportability: If you operate large-scale clusters, this offers a clear lens into how each node is configured, without SSHing or relying on historical manifests.
The /flagz enhancement aligns with a broader push in Kubernetes to make core component internals more observable via standard endpoints (/livez, /readyz, /configz, and now /flagz). Future versions may expand this capability to other components such as kube-apiserver, kube-controller-manager, scheduler, and kube-proxy.
Expect versioned schemas (e.g., /flagz?version=2) for programmatic compatibility.
It may integrate with broader debugging tooling or diagnostics dashboards.
Adoption across more components is likely.
Try it out in v1.33 with:
And see what your nodes are really running with, live, from the inside.
If you manage clusters, debug configuration drift, or support multi-tenant platforms, /flagz is a small addition that will likely save you hours.
FAQs
What is the /flagz endpoint introduced in Kubernetes v1.33?
/flagz is a new HTTP(S) endpoint exposed by the Kubelet that displays its active command-line flags at runtime. It allows operators to introspect live configuration without accessing logs or manifests, improving transparency and debugging.
How do I enable the /flagz endpoint in Kubelet?
You must enable the ComponentFlagz feature gate on the Kubelet. Once enabled, the Kubelet will expose the /flagz endpoint alongside standard health endpoints like /livez and /readyz.
Who can access the /flagz endpoint and is it secure?
Access is restricted to users in the system:monitoring group. The endpoint follows the same RBAC model as other introspection endpoints, ensuring controlled, read-only access to configuration details.
What are the current limitations of /flagz?
It is not enabled by default
The output is unstructured plain text, not intended for automation
It should be used for one-off inspection, not continuous monitoring
What is the broader goal behind introducing /flagz?
The /flagz endpoint is part of a larger observability effort (like /livez, /readyz, and /configz) to make Kubernetes components self-report their runtime state. It supports easier debugging, auditability, and eventual integration with diagnostics tools.
Like what you read? Support my work so I can keep writing more for you.
A small act of support goes a long way. You're helping me stay consistent and keep the content flowing.
Learn. Build. Ship. Together
40+
Technical blog posts
8+ years
Industry experience in DevOps & Infra
100+
YouTube subscribers
1500+
Developers on the newsletter
title: Kubernetes Flagzdescription: Command line flags that Kubernetes component was started with.address=0.0.0.0anonymous-auth=truecontainer-runtime-endpoint=unix:///var/run/containerd/containerd.sockcpu-cfs-quota=trueenable-server=true...
kubectl get --raw "/api/v1/nodes/<node-name>/proxy/flagz"