Results

By type

          2025-04-02T14:59:50.481389Z	info	FLAG: --concurrency="0"
2025-04-02T14:59:50.481409Z	info	FLAG: --domain="onap.svc.cluster.local"
2025-04-02T14:59:50.481414Z	info	FLAG: --help="false"
2025-04-02T14:59:50.481418Z	info	FLAG: --log_as_json="false"
2025-04-02T14:59:50.481421Z	info	FLAG: --log_caller=""
2025-04-02T14:59:50.481424Z	info	FLAG: --log_output_level="default:info"
2025-04-02T14:59:50.481427Z	info	FLAG: --log_stacktrace_level="default:none"
2025-04-02T14:59:50.481437Z	info	FLAG: --log_target="[stdout]"
2025-04-02T14:59:50.481440Z	info	FLAG: --meshConfig="./etc/istio/config/mesh"
2025-04-02T14:59:50.481443Z	info	FLAG: --outlierLogPath=""
2025-04-02T14:59:50.481446Z	info	FLAG: --profiling="true"
2025-04-02T14:59:50.481449Z	info	FLAG: --proxyComponentLogLevel="misc:error"
2025-04-02T14:59:50.481452Z	info	FLAG: --proxyLogLevel="warning"
2025-04-02T14:59:50.481456Z	info	FLAG: --serviceCluster="istio-proxy"
2025-04-02T14:59:50.481459Z	info	FLAG: --stsPort="0"
2025-04-02T14:59:50.481462Z	info	FLAG: --templateFile=""
2025-04-02T14:59:50.481469Z	info	FLAG: --tokenManagerPlugin=""
2025-04-02T14:59:50.481497Z	info	FLAG: --vklog="0"
2025-04-02T14:59:50.481503Z	info	Version 1.24.1-5c178358f9c61c50d3d6149a0b05a609a0d7defd-Clean
2025-04-02T14:59:50.481511Z	info	Set max file descriptors (ulimit -n) to: 1048576
2025-04-02T14:59:50.481658Z	info	Proxy role	ips=[10.233.69.198] type=sidecar id=onap-aai-schema-service-54fcbcbc69-7rt8s.onap domain=onap.svc.cluster.local
2025-04-02T14:59:50.481741Z	info	Apply proxy config from env {}

2025-04-02T14:59:50.483176Z	info	cpu limit detected as 2, setting concurrency
2025-04-02T14:59:50.484816Z	info	Effective config: binaryPath: /usr/local/bin/envoy
concurrency: 2
configPath: ./etc/istio/proxy
controlPlaneAuthPolicy: MUTUAL_TLS
discoveryAddress: istiod.istio-system.svc:15012
drainDuration: 45s
proxyAdminPort: 15000
serviceCluster: istio-proxy
statNameLength: 189
statusPort: 15020
terminationDrainDuration: 5s

2025-04-02T14:59:50.484835Z	info	JWT policy is third-party-jwt
2025-04-02T14:59:50.484843Z	info	using credential fetcher of JWT type in cluster.local trust domain
2025-04-02T14:59:50.687605Z	info	Starting default Istio SDS Server
2025-04-02T14:59:50.687599Z	info	Opening status port 15020
2025-04-02T14:59:50.687633Z	info	CA Endpoint istiod.istio-system.svc:15012, provider Citadel
2025-04-02T14:59:50.687657Z	info	Using CA istiod.istio-system.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem
2025-04-02T14:59:50.688385Z	info	xdsproxy	Initializing with upstream address "istiod.istio-system.svc:15012" and cluster "Kubernetes"
2025-04-02T14:59:50.688733Z	info	sds	Starting SDS grpc server
2025-04-02T14:59:50.688747Z	info	sds	Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket"
2025-04-02T14:59:50.690412Z	info	Pilot SAN: [istiod.istio-system.svc]
2025-04-02T14:59:50.691460Z	info	Starting proxy agent
2025-04-02T14:59:50.691495Z	info	Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --concurrency 2]
2025-04-02T14:59:50.695846Z	info	starting Http service at 127.0.0.1:15004
2025-04-02T14:59:50.736179Z	warning	envoy main external/envoy/source/server/server.cc:852	Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future.	thread=12
2025-04-02T14:59:50.737086Z	warning	envoy main external/envoy/source/server/server.cc:948	There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor.	thread=12
2025-04-02T14:59:50.748406Z	info	xdsproxy	connected to delta upstream XDS server: istiod.istio-system.svc:15012	id=1
2025-04-02T14:59:50.751427Z	info	cache	generated new workload certificate	resourceName=default latency=62.579411ms ttl=23h59m59.248576544s
2025-04-02T14:59:50.751450Z	info	cache	Root cert has changed, start rotating root cert
2025-04-02T14:59:50.751482Z	info	cache	returned workload trust anchor from cache	ttl=23h59m59.248518337s
2025-04-02T14:59:50.808317Z	info	ads	ADS: new connection for node:1
2025-04-02T14:59:50.808386Z	info	cache	returned workload certificate from cache	ttl=23h59m59.191614693s
2025-04-02T14:59:50.809053Z	info	ads	ADS: new connection for node:2
2025-04-02T14:59:50.809118Z	info	cache	returned workload trust anchor from cache	ttl=23h59m59.190882686s
2025-04-02T14:59:51.644737Z	info	Readiness succeeded in 1.16396459s
2025-04-02T14:59:51.645031Z	info	Envoy proxy is ready
2025-04-02T15:28:18.010015Z	info	xdsproxy	connected to delta upstream XDS server: istiod.istio-system.svc:15012	id=2
2025-04-02T15:56:38.333059Z	info	xdsproxy	connected to delta upstream XDS server: istiod.istio-system.svc:15012	id=3
2025-04-02T16:27:22.785643Z	info	xdsproxy	connected to delta upstream XDS server: istiod.istio-system.svc:15012	id=4