2026-04-21T04:45:32.071631Z info FLAG: --concurrency="0" 2026-04-21T04:45:32.071648Z info FLAG: --domain="openshift-ingress.svc.cluster.local" 2026-04-21T04:45:32.071652Z info FLAG: --help="false" 2026-04-21T04:45:32.071655Z info FLAG: --log_as_json="false" 2026-04-21T04:45:32.071657Z info FLAG: --log_caller="" 2026-04-21T04:45:32.071659Z info FLAG: --log_output_level="default:info" 2026-04-21T04:45:32.071661Z info FLAG: --log_stacktrace_level="default:none" 2026-04-21T04:45:32.071669Z info FLAG: --log_target="[stdout]" 2026-04-21T04:45:32.071672Z info FLAG: --meshConfig="./etc/istio/config/mesh" 2026-04-21T04:45:32.071674Z info FLAG: --outlierLogPath="" 2026-04-21T04:45:32.071676Z info FLAG: --profiling="true" 2026-04-21T04:45:32.071679Z info FLAG: --proxyComponentLogLevel="misc:error" 2026-04-21T04:45:32.071681Z info FLAG: --proxyLogLevel="warning" 2026-04-21T04:45:32.071683Z info FLAG: --serviceCluster="istio-proxy" 2026-04-21T04:45:32.071685Z info FLAG: --stsPort="0" 2026-04-21T04:45:32.071687Z info FLAG: --templateFile="" 2026-04-21T04:45:32.071689Z info FLAG: --tokenManagerPlugin="" 2026-04-21T04:45:32.071692Z info FLAG: --vklog="0" 2026-04-21T04:45:32.071694Z info Version 1.26.2-4b1e497cd1c6b51e6a45e6c0abe9aab6bb19e0a8-Clean 2026-04-21T04:45:32.071699Z info Set max file descriptors (ulimit -n) to: 1048576 2026-04-21T04:45:32.071918Z info Proxy role ips=[10.132.0.17] type=router id=data-science-gateway-data-science-gateway-class-55cc67557f7gchz.openshift-ingress domain=openshift-ingress.svc.cluster.local 2026-04-21T04:45:32.071971Z info Apply proxy config from env {"discoveryAddress":"istiod-openshift-gateway.openshift-ingress.svc:15012","proxyHeaders":{"server":{"disabled":true},"envoyDebugHeaders":{"disabled":true},"metadataExchangeHeaders":{"mode":"IN_MESH"}}} 2026-04-21T04:45:32.073149Z info cpu limit detected as 2, setting concurrency 2026-04-21T04:45:32.073425Z info Effective config: binaryPath: /usr/local/bin/envoy concurrency: 2 configPath: ./etc/istio/proxy controlPlaneAuthPolicy: MUTUAL_TLS discoveryAddress: istiod-openshift-gateway.openshift-ingress.svc:15012 drainDuration: 45s proxyAdminPort: 15000 proxyHeaders: envoyDebugHeaders: disabled: true metadataExchangeHeaders: mode: IN_MESH server: disabled: true serviceCluster: istio-proxy statNameLength: 189 statusPort: 15020 terminationDrainDuration: 5s 2026-04-21T04:45:32.073438Z info JWT policy is third-party-jwt 2026-04-21T04:45:32.073443Z info using credential fetcher of JWT type in cluster.local trust domain 2026-04-21T04:45:32.075647Z info Starting default Istio SDS Server 2026-04-21T04:45:32.075680Z info CA Endpoint istiod-openshift-gateway.openshift-ingress.svc:15012, provider Citadel 2026-04-21T04:45:32.075708Z info Using CA istiod-openshift-gateway.openshift-ingress.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem 2026-04-21T04:45:32.076544Z info Opening status port 15020 2026-04-21T04:45:32.077097Z info xdsproxy Initializing with upstream address "istiod-openshift-gateway.openshift-ingress.svc:15012" and cluster "Kubernetes" 2026-04-21T04:45:32.077738Z info sds Starting SDS grpc server 2026-04-21T04:45:32.077752Z info sds Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket" 2026-04-21T04:45:32.078978Z info Pilot SAN: [istiod-openshift-gateway.openshift-ingress.svc] 2026-04-21T04:45:32.079964Z info Starting proxy agent 2026-04-21T04:45:32.079992Z info Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --skip-deprecated-logs --concurrency 2] 2026-04-21T04:45:32.135176Z warning envoy main external/envoy/source/server/server.cc:874 Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future. thread=8 2026-04-21T04:45:32.135453Z warning envoy main external/envoy/source/server/server.cc:970 There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor. thread=8 2026-04-21T04:45:32.142588Z info xdsproxy connected to delta upstream XDS server: istiod-openshift-gateway.openshift-ingress.svc:15012 id=1 2026-04-21T04:45:32.220978Z info ads ADS: new connection for node:1 2026-04-21T04:45:32.221608Z info ads ADS: new connection for node:2 2026-04-21T04:45:32.398781Z info cache generated new workload certificate resourceName=default latency=320.920197ms ttl=23h59m59.601224885s 2026-04-21T04:45:32.398816Z info cache Root cert has changed, start rotating root cert 2026-04-21T04:45:32.398851Z info cache returned workload trust anchor from cache ttl=23h59m59.601149526s 2026-04-21T04:45:32.398852Z info cache returned workload certificate from cache ttl=23h59m59.601154869s 2026-04-21T04:45:32.398953Z info cache returned workload trust anchor from cache ttl=23h59m59.601047752s 2026-04-21T04:45:32.399287Z info cache returned workload trust anchor from cache ttl=23h59m59.600713928s 2026-04-21T04:45:33.454953Z info Readiness succeeded in 1.38604363s 2026-04-21T04:45:33.455215Z info Envoy proxy is ready 2026-04-21T04:50:26.976418Z info ads ADS: new connection for node:3 2026-04-21T04:50:26.976582Z info cache adding watcher for file certificate /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt 2026-04-21T04:50:26.976609Z info cache read certificate from file resource=file-root:/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt