envoy.appmesh.cpu.utilization
CPU utilization percentageDimensions:None
Technical Annotations (45)
Configuration Parameters (18)
container_spec_cpu_quotahealthCheck.timeoutrecommended: 5healthCheck.intervalrecommended: 5healthCheck.retriesrecommended: 3healthCheck.startPeriodrecommended: 10concurrencyrecommended: 2accessLogging.disabledrecommended: truetracing.disableSpanReportingrecommended: truetrafficPolicy.connectionPool.http.maxRequestsPerConnectionrecommended: 0trafficPolicy.connectionPool.http.h2UpgradePolicyrecommended: UPGRADEtrafficPolicy.connectionPool.tcp.tcpKeepalive.timerecommended: 7200straffic.sidecar.istio.io/excludeOutboundPortsrecommended: 5432,6379,9200traffic.sidecar.istio.io/excludeInboundPortsrecommended: 15090sidecar.istio.io/proxyCPUrecommended: 50msidecar.istio.io/proxyCPULimitrecommended: 200mtrafficPolicy.outlierDetection.intervalrecommended: 30strafficPolicy.outlierDetection.consecutive5xxErrorsrecommended: 5trafficPolicy.outlierDetection.baseEjectionTimerecommended: 60sError Signatures (2)
Health check exceeded timeout (2s)log patternExitCode: -1exit codeCLI Commands (4)
curl -s http://localhost:9901/server_info | grep state | grep -q LIVEdiagnostickubectl exec -it deploy/my-app -c istio-proxy -- curl -s localhost:15000/stats | grep "server.concurrency\|server.total_connections"diagnostickubectl exec -it deploy/my-app -c istio-proxy -- cat /sys/fs/cgroup/cpu/cpu.statdiagnostickubectl top pods -n my-namespace --containers | grep istio-proxy | sort -k3 -hdiagnosticTechnical References (21)
Lua filterscomponentHPAcomponentcontainer_cpu_usage_seconds_totalcomponentlocalhost:9901/server_infocomponentworker threadsconceptevent loopconceptxDSprotocolistiodcomponentSidecar resourcecomponentTelemetry resourcecomponenttagOverridescomponentmTLSprotocolDestinationRulecomponentprotocol sniffingconceptPostgreSQLcomponentRediscomponentElasticsearchcomponent/sys/fs/cgroup/cpu/cpu.statfile pathistio-proxycomponentoutlierDetectioncomponentVirtualServicecomponentRelated Insights (13)
High CPU utilization from filters or TLS handshakeswarning
▸
Service CPU saturation above 85% causes request drops and latency increasecritical
▸
Healthcheck timeout too aggressive for Envoy admin API under loadwarning
▸
Excessive worker threads cause unnecessary baseline CPU consumptionwarning
▸
Large xDS configuration updates cause CPU spikeswarning
▸
Telemetry collection consumes excessive CPU per requestwarning
▸
mTLS handshakes are the biggest CPU consumerwarning
▸
Protocol sniffing adds CPU overhead per new connectioninfo
▸
Non-mesh traffic unnecessarily consumes sidecar CPUinfo
▸
Insufficient CPU limits cause sidecar throttlingwarning
▸
Frequent health checks generate constant background CPU usageinfo
▸
Complex routing rules with regex are expensive per requestinfo
▸
Health check connection draining causes CPU spikewarning
▸