2026-05-06T17:18:24.402804Z info FLAG: --concurrency="0" 2026-05-06T17:18:24.402825Z info FLAG: --domain="openshift-ingress.svc.cluster.local" 2026-05-06T17:18:24.402830Z info FLAG: --help="false" 2026-05-06T17:18:24.402834Z info FLAG: --log_as_json="false" 2026-05-06T17:18:24.402836Z info FLAG: --log_caller="" 2026-05-06T17:18:24.402839Z info FLAG: --log_output_level="default:info" 2026-05-06T17:18:24.402843Z info FLAG: --log_stacktrace_level="default:none" 2026-05-06T17:18:24.402850Z info FLAG: --log_target="[stdout]" 2026-05-06T17:18:24.402854Z info FLAG: --meshConfig="./etc/istio/config/mesh" 2026-05-06T17:18:24.402857Z info FLAG: --outlierLogPath="" 2026-05-06T17:18:24.402860Z info FLAG: --profiling="true" 2026-05-06T17:18:24.402864Z info FLAG: --proxyComponentLogLevel="misc:error" 2026-05-06T17:18:24.402867Z info FLAG: --proxyLogLevel="warning" 2026-05-06T17:18:24.402870Z info FLAG: --serviceCluster="istio-proxy" 2026-05-06T17:18:24.402873Z info FLAG: --stsPort="0" 2026-05-06T17:18:24.402876Z info FLAG: --templateFile="" 2026-05-06T17:18:24.402879Z info FLAG: --tokenManagerPlugin="" 2026-05-06T17:18:24.402882Z info FLAG: --vklog="0" 2026-05-06T17:18:24.402886Z info Version 1.26.2-4b1e497cd1c6b51e6a45e6c0abe9aab6bb19e0a8-Clean 2026-05-06T17:18:24.402892Z info Set max file descriptors (ulimit -n) to: 1048576 2026-05-06T17:18:24.403065Z info Proxy role ips=[10.134.0.37] type=router id=maas-default-gateway-openshift-default-7df95f575-cjbmt.openshift-ingress domain=openshift-ingress.svc.cluster.local 2026-05-06T17:18:24.403122Z info Apply proxy config from env {"discoveryAddress":"istiod-openshift-gateway.openshift-ingress.svc:15012","proxyHeaders":{"server":{"disabled":true},"envoyDebugHeaders":{"disabled":true},"metadataExchangeHeaders":{"mode":"IN_MESH"}}} 2026-05-06T17:18:24.404288Z info cpu limit detected as 2, setting concurrency 2026-05-06T17:18:24.404540Z info Effective config: binaryPath: /usr/local/bin/envoy concurrency: 2 configPath: ./etc/istio/proxy controlPlaneAuthPolicy: MUTUAL_TLS discoveryAddress: istiod-openshift-gateway.openshift-ingress.svc:15012 drainDuration: 45s proxyAdminPort: 15000 proxyHeaders: envoyDebugHeaders: disabled: true metadataExchangeHeaders: mode: IN_MESH server: disabled: true serviceCluster: istio-proxy statNameLength: 189 statusPort: 15020 terminationDrainDuration: 5s 2026-05-06T17:18:24.404553Z info JWT policy is third-party-jwt 2026-05-06T17:18:24.404557Z info using credential fetcher of JWT type in cluster.local trust domain 2026-05-06T17:18:24.406040Z info Starting default Istio SDS Server 2026-05-06T17:18:24.406062Z info CA Endpoint istiod-openshift-gateway.openshift-ingress.svc:15012, provider Citadel 2026-05-06T17:18:24.406079Z info Using CA istiod-openshift-gateway.openshift-ingress.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem 2026-05-06T17:18:24.406443Z info Opening status port 15020 2026-05-06T17:18:24.407623Z info xdsproxy Initializing with upstream address "istiod-openshift-gateway.openshift-ingress.svc:15012" and cluster "Kubernetes" 2026-05-06T17:18:24.408897Z info Pilot SAN: [istiod-openshift-gateway.openshift-ingress.svc] 2026-05-06T17:18:24.409774Z info Starting proxy agent 2026-05-06T17:18:24.409809Z info Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --skip-deprecated-logs --concurrency 2] 2026-05-06T17:18:24.417640Z info sds Starting SDS grpc server 2026-05-06T17:18:24.417668Z info sds Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket" 2026-05-06T17:18:24.465693Z warning envoy main external/envoy/source/server/server.cc:874 Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future. thread=9 2026-05-06T17:18:24.466033Z warning envoy main external/envoy/source/server/server.cc:970 There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor. thread=9 2026-05-06T17:18:24.472202Z info xdsproxy connected to delta upstream XDS server: istiod-openshift-gateway.openshift-ingress.svc:15012 id=1 2026-05-06T17:18:24.544555Z info ads ADS: new connection for node:1 2026-05-06T17:18:24.545538Z info ads ADS: new connection for node:2 2026-05-06T17:18:24.559111Z info cache generated new workload certificate resourceName=default latency=151.350753ms ttl=23h59m59.440892355s 2026-05-06T17:18:24.559138Z info cache Root cert has changed, start rotating root cert 2026-05-06T17:18:24.559180Z info cache returned workload trust anchor from cache ttl=23h59m59.440820733s 2026-05-06T17:18:24.559176Z info cache returned workload certificate from cache ttl=23h59m59.440828139s 2026-05-06T17:18:24.559263Z info cache returned workload trust anchor from cache ttl=23h59m59.440737056s 2026-05-06T17:18:24.559576Z info cache returned workload trust anchor from cache ttl=23h59m59.440424406s 2026-05-06T17:18:25.144819Z info Readiness succeeded in 744.25193ms 2026-05-06T17:18:25.145084Z info Envoy proxy is ready 2026-05-06T17:19:13.859848Z info wasm fetching image kuadrant/wasm-shim from registry quay.io with tag v0.12.1 [2026-05-06T17:21:01.201Z] "- - -" 0 NR filter_chain_not_found - "-" 0 0 0 - "-" "-" "-" "-" "-" - - 10.134.0.37:443 100.64.0.2:46078 - - [2026-05-06T17:33:39.876Z] "GET / HTTP/1.1" 404 NR route_not_found - "-" 0 0 0 - "100.64.0.2" "-" "1ce8b210-a1cf-4a74-a834-77a3bd263b4e" "3.209.222.233:80" "-" - - 10.134.0.37:80 100.64.0.2:17134 - - 2026-05-06T17:40:04.262420Z info ads ADS: new connection for node:3 2026-05-06T17:40:04.262560Z info cache adding watcher for file certificate /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt 2026-05-06T17:40:04.262583Z info cache read certificate from file resource=file-root:/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt