When traffic flows through your cluster’s routes, the Access Proxy is the gatekeeper. It examines requests, handles TLS termination, manages authentication, and passes each call deeper into OpenShift’s services. Every decision it makes is recorded — if you know where to look.
To view Access Proxy logs in OpenShift, start with the cluster’s networking components. If you use the default HAProxy-based router, the logs are available from the router pods running in the openshift-ingress namespace. Run:
oc logs <router-pod-name> -n openshift-ingress
This will show raw proxy access logs: client IP, request path, status code, bytes served, and timings. These records reveal performance bottlenecks, failed auth attempts, and misrouted paths instantly.
For clusters with custom Access Proxy configurations, logs may be streamed to a centralized logging stack such as Elasticsearch, Loki, or OpenShift’s built-in EFK stack. In this setup, query against the ingress or HAProxy labels to isolate proxy traffic. Use filters for status >= 400 to find errors fast.