Stay organized with collections
Save and categorize content based on your preferences.
Resolving sidecar proxies issues in Cloud Service Mesh
This section explains common Cloud Service Mesh sidecar proxies problems and how to
resolve them.
If you need additional assistance, see Getting support.
The istio-proxy container is killed because of a OOM event
In this section we assume that the istio-proxy container is not killed by a
SystemOOM event, and the kubernetes node is not in MemoryPressure condition.
The istio-proxy sidecar container has by default resource limits.
If the istio-proxy container gets killed with Reason: OOMKilled it is necessary
to understand why Envoy is consuming the memory.
If you are facing a production outage, a quick workaround is to raise the limits
for all containers using IstioOperator:
If you are facing this issue with specific workloads, you can change the limit
just on those workloads by adding the following
annotations.
sidecar.istio.io/proxyMemory
sidecar.istio.io/proxyMemoryLimit
Please make sure you don't have limits that are lower of the default values.
The long term solution is to reduce the memory footprint of your istio-proxy
sidecar containers. By default all sidecar proxies are programmed with the
necessary configuration to reach any other workload instance in the mesh.
Istio provides the custom resource definition Sidecar
to limit the number of endpoints programmed to sidecar proxies, and therefore
reduce the memory consumption of the istio-proxy container.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-28 UTC."],[],[],null,["# Resolving sidecar proxies issues in Cloud Service Mesh\n======================================================\n\nThis section explains common Cloud Service Mesh sidecar proxies problems and how to\nresolve them.\nIf you need additional assistance, see [Getting support](/service-mesh/docs/getting-support).\n\nThe `istio-proxy` container is killed because of a OOM event\n------------------------------------------------------------\n\nIn this section we assume that the `istio-proxy` container is not killed by a\n`SystemOOM` event, and the kubernetes node is not in `MemoryPressure` condition.\nThe `istio-proxy` sidecar container has by default [resource limits](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#requests-and-limits).\nIf the istio-proxy container gets killed with `Reason: OOMKilled` it is necessary\nto understand why Envoy is consuming the memory.\n\nIf you are facing a production outage, a quick workaround is to raise the limits\nfor all containers using `IstioOperator`: \n\n ---\n apiVersion: install.istio.io/v1alpha1\n kind: IstioOperator\n spec:\n values:\n global:\n proxy:\n resources:\n requests:\n memory: 128Mi\n limits:\n memory: 1Gi\n\nIf you are facing this issue with specific workloads, you can change the limit\njust on those workloads by adding the following\n[annotations](https://istio.io/v1.26/docs/reference/config/annotations/).\n\n- `sidecar.istio.io/proxyMemory`\n- `sidecar.istio.io/proxyMemoryLimit`\n\nPlease make sure you don't have limits that are lower of the default values.\n| **Note:** because this container is injected at the Pod creation, this setting will be effective only for newly created Pods.\n\nThe long term solution is to reduce the memory footprint of your `istio-proxy`\nsidecar containers. By default all sidecar proxies are programmed with the\nnecessary configuration to reach any other workload instance in the mesh.\nIstio provides the [custom resource definition `Sidecar`](https://istio.io/v1.26/docs/reference/config/networking/sidecar/)\nto limit the number of endpoints programmed to sidecar proxies, and therefore\nreduce the memory consumption of the `istio-proxy` container."]]