Stay organized with collectionsSave and categorize content based on your preferences.
Resolving sidecar proxies issues in Cloud Service Mesh
This section explains common Cloud Service Mesh sidecar proxies problems and how to
resolve them.
If you need additional assistance, seeGetting support.
Theistio-proxycontainer is killed because of a OOM event
In this section we assume that theistio-proxycontainer is not killed by aSystemOOMevent, and the kubernetes node is not inMemoryPressurecondition.
Theistio-proxysidecar container has by defaultresource limits.
If the istio-proxy container gets killed withReason: OOMKilledit is necessary
to understand why Envoy is consuming the memory.
If you are facing a production outage, a quick workaround is to raise the limits
for all containers usingIstioOperator:
If you are facing this issue with specific workloads, you can change the limit
just on those workloads by adding the followingannotations.
sidecar.istio.io/proxyMemory
sidecar.istio.io/proxyMemoryLimit
Please make sure you don't have limits that are lower of the default values.
The long term solution is to reduce the memory footprint of youristio-proxysidecar containers. By default all sidecar proxies are programmed with the
necessary configuration to reach any other workload instance in the mesh.
Istio provides thecustom resource definitionSidecarto limit the number of endpoints programmed to sidecar proxies, and therefore
reduce the memory consumption of theistio-proxycontainer.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["Resolving sidecar proxies issues in Cloud Service Mesh\n\nThis section explains common Cloud Service Mesh sidecar proxies problems and how to\nresolve them.\nIf you need additional assistance, see [Getting support](/service-mesh/docs/getting-support).\n\nThe `istio-proxy` container is killed because of a OOM event\n\nIn this section we assume that the `istio-proxy` container is not killed by a\n`SystemOOM` event, and the kubernetes node is not in `MemoryPressure` condition.\nThe `istio-proxy` sidecar container has by default [resource limits](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits).\nIf the istio-proxy container gets killed with `Reason: OOMKilled` it is necessary\nto understand why Envoy is consuming the memory.\n\nIf you are facing a production outage, a quick workaround is to raise the limits\nfor all containers using `IstioOperator`: \n\n ---\n apiVersion: install.istio.io/v1alpha1\n kind: IstioOperator\n spec:\n values:\n global:\n proxy:\n resources:\n requests:\n memory: 128Mi\n limits:\n memory: 1Gi\n\nIf you are facing this issue with specific workloads, you can change the limit\njust on those workloads by adding the following\n[annotations](https://istio.io/v1.26/docs/reference/config/annotations/).\n\n- `sidecar.istio.io/proxyMemory`\n- `sidecar.istio.io/proxyMemoryLimit`\n\nPlease make sure you don't have limits that are lower of the default values.\n| **Note:** because this container is injected at the Pod creation, this setting will be effective only for newly created Pods.\n\nThe long term solution is to reduce the memory footprint of your `istio-proxy`\nsidecar containers. By default all sidecar proxies are programmed with the\nnecessary configuration to reach any other workload instance in the mesh.\nIstio provides the [custom resource definition `Sidecar`](https://istio.io/v1.26/docs/reference/config/networking/sidecar/)\nto limit the number of endpoints programmed to sidecar proxies, and therefore\nreduce the memory consumption of the `istio-proxy` container."]]