Results

By type

          2025-04-02T15:04:44.571918Z	info	FLAG: --concurrency="0"
2025-04-02T15:04:44.572656Z	info	FLAG: --domain="onap.svc.cluster.local"
2025-04-02T15:04:44.572744Z	info	FLAG: --help="false"
2025-04-02T15:04:44.572877Z	info	FLAG: --log_as_json="false"
2025-04-02T15:04:44.572942Z	info	FLAG: --log_caller=""
2025-04-02T15:04:44.573300Z	info	FLAG: --log_output_level="default:info"
2025-04-02T15:04:44.573363Z	info	FLAG: --log_stacktrace_level="default:none"
2025-04-02T15:04:44.573440Z	info	FLAG: --log_target="[stdout]"
2025-04-02T15:04:44.573524Z	info	FLAG: --meshConfig="./etc/istio/config/mesh"
2025-04-02T15:04:44.573564Z	info	FLAG: --outlierLogPath=""
2025-04-02T15:04:44.573622Z	info	FLAG: --profiling="true"
2025-04-02T15:04:44.573727Z	info	FLAG: --proxyComponentLogLevel="misc:error"
2025-04-02T15:04:44.573794Z	info	FLAG: --proxyLogLevel="warning"
2025-04-02T15:04:44.573919Z	info	FLAG: --serviceCluster="istio-proxy"
2025-04-02T15:04:44.573997Z	info	FLAG: --stsPort="0"
2025-04-02T15:04:44.574046Z	info	FLAG: --templateFile=""
2025-04-02T15:04:44.574108Z	info	FLAG: --tokenManagerPlugin=""
2025-04-02T15:04:44.574180Z	info	FLAG: --vklog="0"
2025-04-02T15:04:44.574263Z	info	Version 1.24.1-5c178358f9c61c50d3d6149a0b05a609a0d7defd-Clean
2025-04-02T15:04:44.574339Z	info	Set max file descriptors (ulimit -n) to: 1048576
2025-04-02T15:04:44.574785Z	info	Proxy role	ips=[10.233.66.185] type=sidecar id=onap-uui-intent-analysis-init-postgres-rmhm4.onap domain=onap.svc.cluster.local
2025-04-02T15:04:44.574995Z	info	Apply proxy config from env {}

2025-04-02T15:04:44.600920Z	info	cpu limit detected as 2, setting concurrency
2025-04-02T15:04:44.602943Z	info	Effective config: binaryPath: /usr/local/bin/envoy
concurrency: 2
configPath: ./etc/istio/proxy
controlPlaneAuthPolicy: MUTUAL_TLS
discoveryAddress: istiod.istio-system.svc:15012
drainDuration: 45s
proxyAdminPort: 15000
serviceCluster: istio-proxy
statNameLength: 189
statusPort: 15020
terminationDrainDuration: 5s

2025-04-02T15:04:44.603497Z	info	JWT policy is third-party-jwt
2025-04-02T15:04:44.603514Z	info	using credential fetcher of JWT type in cluster.local trust domain
2025-04-02T15:04:44.807821Z	info	Starting default Istio SDS Server
2025-04-02T15:04:44.807874Z	info	CA Endpoint istiod.istio-system.svc:15012, provider Citadel
2025-04-02T15:04:44.807911Z	info	Using CA istiod.istio-system.svc:15012 cert with certs: var/run/secrets/istio/root-cert.pem
2025-04-02T15:04:44.808188Z	info	Opening status port 15020
2025-04-02T15:04:44.816865Z	info	xdsproxy	Initializing with upstream address "istiod.istio-system.svc:15012" and cluster "Kubernetes"
2025-04-02T15:04:44.821157Z	info	Pilot SAN: [istiod.istio-system.svc]
2025-04-02T15:04:44.823429Z	info	Starting proxy agent
2025-04-02T15:04:44.823550Z	info	Envoy command: [-c etc/istio/proxy/envoy-rev.json --drain-time-s 45 --drain-strategy immediate --local-address-ip-version v4 --file-flush-interval-msec 1000 --disable-hot-restart --allow-unknown-static-fields -l warning --component-log-level misc:error --concurrency 2]
2025-04-02T15:04:44.831669Z	info	starting Http service at 127.0.0.1:15004
2025-04-02T15:04:44.831744Z	info	sds	Starting SDS grpc server
2025-04-02T15:04:44.831778Z	info	sds	Starting SDS server for workload certificates, will listen on "var/run/secrets/workload-spiffe-uds/socket"
2025-04-02T15:04:44.954887Z	warning	envoy main external/envoy/source/server/server.cc:852	Usage of the deprecated runtime key overload.global_downstream_max_connections, consider switching to `envoy.resource_monitors.global_downstream_max_connections` instead.This runtime key will be removed in future.	thread=14
2025-04-02T15:04:44.971447Z	warning	envoy main external/envoy/source/server/server.cc:948	There is no configured limit to the number of allowed active downstream connections. Configure a limit in `envoy.resource_monitors.global_downstream_max_connections` resource monitor.	thread=14
2025-04-02T15:04:45.100464Z	info	xdsproxy	connected to delta upstream XDS server: istiod.istio-system.svc:15012	id=1
2025-04-02T15:04:45.273691Z	info	cache	generated new workload certificate	resourceName=default latency=461.415277ms ttl=23h59m44.726317442s
2025-04-02T15:04:45.273753Z	info	cache	Root cert has changed, start rotating root cert
2025-04-02T15:04:45.273850Z	info	cache	returned workload trust anchor from cache	ttl=23h59m44.726152913s
2025-04-02T15:04:45.473241Z	info	ads	ADS: new connection for node:1
2025-04-02T15:04:45.473375Z	info	cache	returned workload certificate from cache	ttl=23h59m44.526629159s
2025-04-02T15:04:45.474510Z	info	ads	ADS: new connection for node:2
2025-04-02T15:04:45.475550Z	info	cache	returned workload trust anchor from cache	ttl=23h59m44.524453208s
2025-04-02T15:04:46.086420Z	info	Readiness succeeded in 1.516360156s
2025-04-02T15:04:46.087031Z	info	Envoy proxy is ready
2025-04-02T15:05:14.601041Z	info	handling /drain, starting drain
2025-04-02T15:05:14.601140Z	info	Agent draining proxy
2025-04-02T15:05:14.621271Z	info	Status server has successfully terminated
2025-04-02T15:05:14.621266Z	info	Agent draining Proxy for termination
2025-04-02T15:05:14.621337Z	info	Agent already drained, exiting immediately
2025-04-02T15:05:14.621349Z	info	Agent has successfully terminated
2025-04-02T15:05:14.621373Z	warn	Aborting proxy
2025-04-02T15:05:14.621738Z	info	ads	ADS: "" 2 terminated
2025-04-02T15:05:14.621836Z	info	ads	ADS: "" 1 terminated