2026-04-17T20:22:00.901484Z info FLAG: --concurrency="0" 2026-04-17T20:22:00.901504Z info FLAG: --domain="openshift-ingress.svc.cluster.local" 2026-04-17T20:22:00.901509Z info FLAG: --help="false" 2026-04-17T20:22:00.901513Z info FLAG: --log_as_json="false" 2026-04-17T20:22:00.901516Z info FLAG: --log_caller="" 2026-04-17T20:22:00.901518Z info FLAG: --log_output_level="default:info" 2026-04-17T20:22:00.901521Z info FLAG: --log_stacktrace_level="default:none" 2026-04-17T20:22:00.901529Z info FLAG: --log_target="[stdout]" 2026-04-17T20:22:00.901532Z info FLAG: --meshConfig="./etc/istio/config/mesh" 2026-04-17T20:22:00.901535Z info FLAG: --outlierLogPath="" 2026-04-17T20:22:00.901537Z info FLAG: --profiling="true" 2026-04-17T20:22:00.901540Z info FLAG: --proxyComponentLogLevel="misc:error" 2026-04-17T20:22:00.901544Z info FLAG: --proxyLogLevel="warning" 2026-04-17T20:22:00.901547Z info FLAG: --serviceCluster="istio-proxy" 2026-04-17T20:22:00.901550Z info FLAG: --stsPort="0" 2026-04-17T20:22:00.901553Z info FLAG: --templateFile="" 2026-04-17T20:22:00.901556Z info FLAG: --tokenManagerPlugin="" 2026-04-17T20:22:00.901559Z info FLAG: --vklog="0" 2026-04-17T20:22:00.901563Z info Version 1.26.2-4b1e497cd1c6b51e6a45e6c0abe9aab6bb19e0a8-Clean 2026-04-17T20:22:00.901569Z info Set max file descriptors (ulimit -n) to: 1048576 2026-04-17T20:22:00.901845Z info Proxy role ips=[10.133.0.37] type=router id=data-science-gateway-data-science-gateway-class-5cb8b776cfgdlbj.openshift-ingress domain=openshift-ingress.svc.cluster.local 2026-04-17T20:22:00.901926Z info Apply proxy config from env {"discoveryAddress":"istiod-openshift-gateway.openshift-ingress.svc:15012","proxyHeaders":{"server":{"disabled":true},"envoyDebugHeaders":{"disabled":true},"metadataExchangeHeaders":{"mode":"IN_MESH"}}} 2026-04-17T20:22:00.903193Z info cpu limit detected as 2, setting concurrency 2026-04-17T20:22:00.903496Z info Effective config: binaryPath: /usr/local/bin/envoy concurrency: 2 configPath: ./etc/istio/proxy controlPlaneAuthPolicy: MUTUAL_TLS discoveryAddress: istiod-openshift-gateway.openshift-ingress.svc:15012 drainDuration: 45s proxyAdminPort: 15000 proxyHeaders: envoyDebugHeaders: disabled: true metadataExchangeHeaders: mode: IN_MESH server: disabled: true serviceCluster: istio-proxy statNameLength: 189 statusPort: 15020 terminationDrainDuration: 5s 2026-04-17T20:22:00.903510Z info JWT policy is third-party-jwt 2026-04-17T20:22:00.903515Z info using credential fetcher of JWT type in cluster.local trust domain 2026-04-17T20:22:00.905960Z info Starting default Istio SDS Server 2026-04-17T20:22:00.905979Z info CA Endpoint istiod-openshift-gateway.openshift-ingress.svc:15012, provider Citadel 2026-04-17T20:22:00.905996Z info Using CA istiod-openshift-gateway.openshift-ingress.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem 2026-04-17T20:22:00.906404Z info Opening status port 15020 2026-04-17T20:22:00.907978Z info xdsproxy Initializing with upstream address "istiod-openshift-gateway.openshift-ingress.svc:15012" and cluster "Kubernetes" 2026-04-17T20:22:00.908290Z info sds Starting SDS grpc server 2026-04-17T20:22:00.908306Z info sds Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket" 2026-04-17T20:22:00.909813Z info Pilot SAN: [istiod-openshift-gateway.openshift-ingress.svc] 2026-04-17T20:22:00.911360Z info Starting proxy agent 2026-04-17T20:22:00.911506Z info Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --skip-deprecated-logs --concurrency 2] 2026-04-17T20:22:00.971291Z warning envoy main external/envoy/source/server/server.cc:874 Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future. thread=8 2026-04-17T20:22:00.971675Z warning envoy main external/envoy/source/server/server.cc:970 There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor. thread=8 2026-04-17T20:22:00.978877Z info xdsproxy connected to delta upstream XDS server: istiod-openshift-gateway.openshift-ingress.svc:15012 id=1 2026-04-17T20:22:01.055067Z info ads ADS: new connection for node:1 2026-04-17T20:22:01.055653Z info ads ADS: new connection for node:2 2026-04-17T20:22:01.212340Z info cache generated new workload certificate resourceName=default latency=303.905306ms ttl=23h59m59.787665547s 2026-04-17T20:22:01.212377Z info cache Root cert has changed, start rotating root cert 2026-04-17T20:22:01.212422Z info cache returned workload trust anchor from cache ttl=23h59m59.787578736s 2026-04-17T20:22:01.212446Z info cache returned workload certificate from cache ttl=23h59m59.787555192s 2026-04-17T20:22:01.212543Z info cache returned workload trust anchor from cache ttl=23h59m59.787461003s 2026-04-17T20:22:01.212916Z info cache returned workload trust anchor from cache ttl=23h59m59.787085391s 2026-04-17T20:22:02.146503Z info Readiness succeeded in 1.249058155s 2026-04-17T20:22:02.146813Z info Envoy proxy is ready 2026-04-17T20:25:44.806723Z info ads ADS: new connection for node:3 2026-04-17T20:25:44.806881Z info cache adding watcher for file certificate /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt 2026-04-17T20:25:44.806906Z info cache read certificate from file resource=file-root:/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt