By type
2025-04-02T15:00:18.588542Z info FLAG: --concurrency="0"
2025-04-02T15:00:18.594258Z info FLAG: --domain="onap.svc.cluster.local"
2025-04-02T15:00:18.594296Z info FLAG: --help="false"
2025-04-02T15:00:18.594308Z info FLAG: --log_as_json="false"
2025-04-02T15:00:18.594317Z info FLAG: --log_caller=""
2025-04-02T15:00:18.594325Z info FLAG: --log_output_level="default:info"
2025-04-02T15:00:18.594334Z info FLAG: --log_stacktrace_level="default:none"
2025-04-02T15:00:18.594362Z info FLAG: --log_target="[stdout]"
2025-04-02T15:00:18.594374Z info FLAG: --meshConfig="./etc/istio/config/mesh"
2025-04-02T15:00:18.594383Z info FLAG: --outlierLogPath=""
2025-04-02T15:00:18.594391Z info FLAG: --profiling="true"
2025-04-02T15:00:18.594400Z info FLAG: --proxyComponentLogLevel="misc:error"
2025-04-02T15:00:18.594409Z info FLAG: --proxyLogLevel="warning"
2025-04-02T15:00:18.594417Z info FLAG: --serviceCluster="istio-proxy"
2025-04-02T15:00:18.594427Z info FLAG: --stsPort="0"
2025-04-02T15:00:18.594435Z info FLAG: --templateFile=""
2025-04-02T15:00:18.594444Z info FLAG: --tokenManagerPlugin=""
2025-04-02T15:00:18.594454Z info FLAG: --vklog="0"
2025-04-02T15:00:18.594464Z info Version 1.24.1-5c178358f9c61c50d3d6149a0b05a609a0d7defd-Clean
2025-04-02T15:00:18.594479Z info Set max file descriptors (ulimit -n) to: 1048576
2025-04-02T15:00:18.594863Z info Proxy role ips=[10.233.71.155] type=sidecar id=onap-multicloud-776854594d-d285v.onap domain=onap.svc.cluster.local
2025-04-02T15:00:18.594984Z info Apply proxy config from env {}
2025-04-02T15:00:18.598127Z info cpu limit detected as 2, setting concurrency
2025-04-02T15:00:18.598664Z info Effective config: binaryPath: /usr/local/bin/envoy
concurrency: 2
configPath: ./etc/istio/proxy
controlPlaneAuthPolicy: MUTUAL_TLS
discoveryAddress: istiod.istio-system.svc:15012
drainDuration: 45s
proxyAdminPort: 15000
serviceCluster: istio-proxy
statNameLength: 189
statusPort: 15020
terminationDrainDuration: 5s
2025-04-02T15:00:18.598690Z info JWT policy is third-party-jwt
2025-04-02T15:00:18.598708Z info using credential fetcher of JWT type in cluster.local trust domain
2025-04-02T15:00:18.802376Z info Starting default Istio SDS Server
2025-04-02T15:00:18.802432Z info CA Endpoint istiod.istio-system.svc:15012, provider Citadel
2025-04-02T15:00:18.802386Z info Opening status port 15020
2025-04-02T15:00:18.802473Z info Using CA istiod.istio-system.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem
2025-04-02T15:00:18.803737Z info xdsproxy Initializing with upstream address "istiod.istio-system.svc:15012" and cluster "Kubernetes"
2025-04-02T15:00:18.806838Z info Pilot SAN: [istiod.istio-system.svc]
2025-04-02T15:00:18.808781Z info Starting proxy agent
2025-04-02T15:00:18.808849Z info Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --concurrency 2]
2025-04-02T15:00:18.810861Z info sds Starting SDS grpc server
2025-04-02T15:00:18.810927Z info sds Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket"
2025-04-02T15:00:18.811258Z info starting Http service at 127.0.0.1:15004
2025-04-02T15:00:18.926238Z warning envoy main external/envoy/source/server/server.cc:852 Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future. thread=12
2025-04-02T15:00:18.929456Z warning envoy main external/envoy/source/server/server.cc:948 There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor. thread=12
2025-04-02T15:00:18.939738Z info xdsproxy connected to delta upstream XDS server: istiod.istio-system.svc:15012 id=1
2025-04-02T15:00:19.141174Z info ads ADS: new connection for node:1
2025-04-02T15:00:19.143307Z info ads ADS: new connection for node:2
2025-04-02T15:00:19.244910Z info cache generated new workload certificate resourceName=default latency=439.896576ms ttl=23h59m59.755101481s
2025-04-02T15:00:19.245290Z info cache Root cert has changed, start rotating root cert
2025-04-02T15:00:19.245657Z info cache returned workload certificate from cache ttl=23h59m59.754349037s
2025-04-02T15:00:19.245885Z info cache returned workload trust anchor from cache ttl=23h59m59.754119951s
2025-04-02T15:00:19.246158Z info cache returned workload trust anchor from cache ttl=23h59m59.753845624s
2025-04-02T15:00:19.247068Z info cache returned workload trust anchor from cache ttl=23h59m59.752935131s
2025-04-02T15:00:20.358082Z info Readiness succeeded in 1.771081282s
2025-04-02T15:00:20.359312Z info Envoy proxy is ready
2025-04-02T15:01:17.345303Z error Request to probe app failed: Get "http://10.233.71.155:9001/api/multicloud/v0/swagger.json": context deadline exceeded (Client.Timeout exceeded while awaiting headers), original URL path = /app-health/multicloud/readyz
app URL path = /api/multicloud/v0/swagger.json
2025-04-02T15:01:17.345492Z error Request to probe app failed: Get "http://10.233.71.155:9001/api/multicloud/v0/swagger.json": context deadline exceeded (Client.Timeout exceeded while awaiting headers), original URL path = /app-health/multicloud/livez
app URL path = /api/multicloud/v0/swagger.json
2025-04-02T15:27:44.052311Z info xdsproxy connected to delta upstream XDS server: istiod.istio-system.svc:15012 id=2
2025-04-02T15:59:11.862534Z info xdsproxy connected to delta upstream XDS server: istiod.istio-system.svc:15012 id=3
2025-04-02T16:03:15.772200Z info xdsproxy connected to delta upstream XDS server: istiod.istio-system.svc:15012 id=4
2025-04-02T16:35:11.992482Z info xdsproxy connected to delta upstream XDS server: istiod.istio-system.svc:15012 id=5