2026-04-17T21:22:05.751991Z info FLAG: --concurrency="0" 2026-04-17T21:22:05.752010Z info FLAG: --domain="openshift-ingress.svc.cluster.local" 2026-04-17T21:22:05.752014Z info FLAG: --help="false" 2026-04-17T21:22:05.752016Z info FLAG: --log_as_json="false" 2026-04-17T21:22:05.752018Z info FLAG: --log_caller="" 2026-04-17T21:22:05.752021Z info FLAG: --log_output_level="default:info" 2026-04-17T21:22:05.752023Z info FLAG: --log_stacktrace_level="default:none" 2026-04-17T21:22:05.752029Z info FLAG: --log_target="[stdout]" 2026-04-17T21:22:05.752031Z info FLAG: --meshConfig="./etc/istio/config/mesh" 2026-04-17T21:22:05.752033Z info FLAG: --outlierLogPath="" 2026-04-17T21:22:05.752035Z info FLAG: --profiling="true" 2026-04-17T21:22:05.752038Z info FLAG: --proxyComponentLogLevel="misc:error" 2026-04-17T21:22:05.752040Z info FLAG: --proxyLogLevel="warning" 2026-04-17T21:22:05.752042Z info FLAG: --serviceCluster="istio-proxy" 2026-04-17T21:22:05.752044Z info FLAG: --stsPort="0" 2026-04-17T21:22:05.752046Z info FLAG: --templateFile="" 2026-04-17T21:22:05.752049Z info FLAG: --tokenManagerPlugin="" 2026-04-17T21:22:05.752051Z info FLAG: --vklog="0" 2026-04-17T21:22:05.752054Z info Version 1.26.2-4b1e497cd1c6b51e6a45e6c0abe9aab6bb19e0a8-Clean 2026-04-17T21:22:05.752060Z info Set max file descriptors (ulimit -n) to: 1048576 2026-04-17T21:22:05.752278Z info Proxy role ips=[10.134.0.38] type=router id=data-science-gateway-data-science-gateway-class-5cb8b776cf29wcr.openshift-ingress domain=openshift-ingress.svc.cluster.local 2026-04-17T21:22:05.752336Z info Apply proxy config from env {"discoveryAddress":"istiod-openshift-gateway.openshift-ingress.svc:15012","proxyHeaders":{"server":{"disabled":true},"envoyDebugHeaders":{"disabled":true},"metadataExchangeHeaders":{"mode":"IN_MESH"}}} 2026-04-17T21:22:05.753391Z info cpu limit detected as 2, setting concurrency 2026-04-17T21:22:05.753686Z info Effective config: binaryPath: /usr/local/bin/envoy concurrency: 2 configPath: ./etc/istio/proxy controlPlaneAuthPolicy: MUTUAL_TLS discoveryAddress: istiod-openshift-gateway.openshift-ingress.svc:15012 drainDuration: 45s proxyAdminPort: 15000 proxyHeaders: envoyDebugHeaders: disabled: true metadataExchangeHeaders: mode: IN_MESH server: disabled: true serviceCluster: istio-proxy statNameLength: 189 statusPort: 15020 terminationDrainDuration: 5s 2026-04-17T21:22:05.753697Z info JWT policy is third-party-jwt 2026-04-17T21:22:05.753700Z info using credential fetcher of JWT type in cluster.local trust domain 2026-04-17T21:22:05.755252Z info Starting default Istio SDS Server 2026-04-17T21:22:05.755278Z info CA Endpoint istiod-openshift-gateway.openshift-ingress.svc:15012, provider Citadel 2026-04-17T21:22:05.755303Z info Using CA istiod-openshift-gateway.openshift-ingress.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem 2026-04-17T21:22:05.756115Z info Opening status port 15020 2026-04-17T21:22:05.756621Z info xdsproxy Initializing with upstream address "istiod-openshift-gateway.openshift-ingress.svc:15012" and cluster "Kubernetes" 2026-04-17T21:22:05.757304Z info sds Starting SDS grpc server 2026-04-17T21:22:05.757321Z info sds Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket" 2026-04-17T21:22:05.757992Z info Pilot SAN: [istiod-openshift-gateway.openshift-ingress.svc] 2026-04-17T21:22:05.758864Z info Starting proxy agent 2026-04-17T21:22:05.758895Z info Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --skip-deprecated-logs --concurrency 2] 2026-04-17T21:22:05.815492Z warning envoy main external/envoy/source/server/server.cc:874 Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future. thread=8 2026-04-17T21:22:05.815827Z warning envoy main external/envoy/source/server/server.cc:970 There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor. thread=8 2026-04-17T21:22:05.821959Z info xdsproxy connected to delta upstream XDS server: istiod-openshift-gateway.openshift-ingress.svc:15012 id=1 2026-04-17T21:22:05.898639Z info ads ADS: new connection for node:1 2026-04-17T21:22:05.899411Z info ads ADS: new connection for node:2 2026-04-17T21:22:05.998645Z info cache generated new workload certificate resourceName=default latency=241.155222ms ttl=23h59m59.001359855s 2026-04-17T21:22:05.998677Z info cache Root cert has changed, start rotating root cert 2026-04-17T21:22:05.998722Z info cache returned workload trust anchor from cache ttl=23h59m59.001278759s 2026-04-17T21:22:05.998747Z info cache returned workload trust anchor from cache ttl=23h59m59.001253564s 2026-04-17T21:22:05.998827Z info cache returned workload certificate from cache ttl=23h59m59.001177432s 2026-04-17T21:22:05.999166Z info cache returned workload trust anchor from cache ttl=23h59m59.000834929s 2026-04-17T21:22:07.684563Z info Readiness succeeded in 1.934788817s 2026-04-17T21:22:07.684840Z info Envoy proxy is ready 2026-04-17T21:25:15.030877Z info ads ADS: new connection for node:3 2026-04-17T21:25:15.031032Z info cache adding watcher for file certificate /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt 2026-04-17T21:25:15.031060Z info cache read certificate from file resource=file-root:/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt