--- apiVersion: v1 items: - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 service.beta.openshift.io/serving-cert-secret-name: data-science-gateway-service-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 creationTimestamp: "2026-04-20T21:56:03Z" labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: data-science-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"9b70614c-92e4-40e3-99b5-1c3f8b6442a5"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-20T21:56:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:56:04Z" name: data-science-gateway-data-science-gateway-class namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: data-science-gateway uid: 9b70614c-92e4-40e3-99b5-1c3f8b6442a5 resourceVersion: "16422" uid: 8fa0568d-2ea7-400c-8ce8-93e1b1b0874d spec: clusterIP: 172.31.41.175 clusterIPs: - 172.31.41.175 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port port: 15021 protocol: TCP targetPort: 15021 - appProtocol: https name: https port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: data-science-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: meta.helm.sh/release-name: openshift-gateway-istiod meta.helm.sh/release-namespace: openshift-ingress creationTimestamp: "2026-04-20T21:55:59Z" labels: app: istiod app.kubernetes.io/instance: openshift-gateway-istiod app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: istiod app.kubernetes.io/part-of: istio app.kubernetes.io/version: 1.26.2 helm.sh/chart: istiod-1.26.2 istio: pilot istio.io/rev: openshift-gateway managed-by: sail-operator operator.istio.io/component: Pilot release: openshift-gateway-istiod managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:meta.helm.sh/release-name: {} f:meta.helm.sh/release-namespace: {} f:labels: .: {} f:app: {} f:app.kubernetes.io/instance: {} f:app.kubernetes.io/managed-by: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:app.kubernetes.io/version: {} f:helm.sh/chart: {} f:istio: {} f:istio.io/rev: {} f:managed-by: {} f:operator.istio.io/component: {} f:release: {} f:ownerReferences: .: {} k:{"uid":"2aa3a0b7-39a5-4fc2-a1c1-c3ca9e8aea2d"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15010,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15012,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15014,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: sail-operator operation: Update time: "2026-04-20T21:55:59Z" name: istiod-openshift-gateway namespace: openshift-ingress ownerReferences: - apiVersion: sailoperator.io/v1 blockOwnerDeletion: true controller: true kind: IstioRevision name: openshift-gateway uid: 2aa3a0b7-39a5-4fc2-a1c1-c3ca9e8aea2d resourceVersion: "15833" uid: 359a568c-9117-4f23-8b9f-aaf9c1ddcfb7 spec: clusterIP: 172.31.163.28 clusterIPs: - 172.31.163.28 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: grpc-xds port: 15010 protocol: TCP targetPort: 15010 - name: https-dns port: 15012 protocol: TCP targetPort: 15012 - name: https-webhook port: 443 protocol: TCP targetPort: 15017 - name: http-monitoring port: 15014 protocol: TCP targetPort: 15014 selector: app: istiod istio.io/rev: openshift-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: platform.opendatahub.io/instance.generation: "2" platform.opendatahub.io/instance.name: default-gateway platform.opendatahub.io/instance.uid: 39658dc6-f312-4955-b9ef-a3413e9dae6f platform.opendatahub.io/type: Open Data Hub platform.opendatahub.io/version: 3.4.0-ea.1 service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 service.beta.openshift.io/serving-cert-secret-name: kube-auth-proxy-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 creationTimestamp: "2026-04-20T21:55:28Z" labels: app: kube-auth-proxy app.kubernetes.io/component: authentication platform.opendatahub.io/part-of: gatewayconfig managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:platform.opendatahub.io/instance.generation: {} f:platform.opendatahub.io/instance.name: {} f:platform.opendatahub.io/instance.uid: {} f:platform.opendatahub.io/type: {} f:platform.opendatahub.io/version: {} f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:app: {} f:app.kubernetes.io/component: {} f:platform.opendatahub.io/part-of: {} f:ownerReferences: k:{"uid":"39658dc6-f312-4955-b9ef-a3413e9dae6f"}: {} f:spec: f:ports: k:{"port":8443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} k:{"port":9000,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} f:selector: {} manager: gatewayconfig operation: Apply time: "2026-04-20T21:56:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:55:28Z" name: kube-auth-proxy namespace: openshift-ingress ownerReferences: - apiVersion: services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion: true controller: true kind: GatewayConfig name: default-gateway uid: 39658dc6-f312-4955-b9ef-a3413e9dae6f resourceVersion: "16402" uid: 09bb7e13-1747-4102-99e7-3da15b57ef40 spec: clusterIP: 172.31.169.104 clusterIPs: - 172.31.169.104 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: https port: 8443 protocol: TCP targetPort: 8443 - name: metrics port: 9000 protocol: TCP targetPort: 9000 selector: app: kube-auth-proxy sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: creationTimestamp: "2026-04-20T21:57:40Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: maas-default-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"27fbb560-90fa-4b1a-a768-86f19054e99f"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":80,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-20T21:57:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-20T21:57:43Z" name: maas-default-gateway-openshift-default namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: maas-default-gateway uid: 27fbb560-90fa-4b1a-a768-86f19054e99f resourceVersion: "20810" uid: 94888478-fe68-46b3-921a-c8509ba8c297 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.114.81 clusterIPs: - 172.31.114.81 externalTrafficPolicy: Cluster internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port nodePort: 30824 port: 15021 protocol: TCP targetPort: 15021 - appProtocol: http name: http nodePort: 31883 port: 80 protocol: TCP targetPort: 80 - appProtocol: https name: https nodePort: 31226 port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: maas-default-gateway sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a94888478fe6846b3921ac8509ba8c29-300051296.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: "5" service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: "4" service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: '*' traffic-policy.network.alpha.openshift.io/local-with-fallback: "" creationTimestamp: "2026-04-20T21:43:37Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: app: router ingresscontroller.operator.openshift.io/owning-ingresscontroller: default router: router-default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: {} f:traffic-policy.network.alpha.openshift.io/local-with-fallback: {} f:labels: .: {} f:app: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:router: {} f:ownerReferences: .: {} k:{"uid":"4c0ddbbd-2809-47f8-8d19-530608cf8031"}: {} f:spec: f:allocateLoadBalancerNodePorts: {} f:externalTrafficPolicy: {} f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-20T21:43:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-20T21:43:52Z" name: router-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 4c0ddbbd-2809-47f8-8d19-530608cf8031 resourceVersion: "2609" uid: 9923ca9b-a3ff-4522-a7b3-80c9ee8a4061 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.173.1 clusterIPs: - 172.31.173.1 externalTrafficPolicy: Local healthCheckNodePort: 30977 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http nodePort: 32645 port: 80 protocol: TCP targetPort: http - name: https nodePort: 31203 port: 443 protocol: TCP targetPort: https selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a9923ca9ba3ff4522a7b380c9ee8a406-1099878960.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-secret-name: router-metrics-certs-default service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776721778 creationTimestamp: "2026-04-20T21:43:37Z" labels: ingresscontroller.operator.openshift.io/owning-ingresscontroller: default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.alpha.openshift.io/serving-cert-secret-name: {} f:labels: .: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:ownerReferences: .: {} k:{"uid":"4c0ddbbd-2809-47f8-8d19-530608cf8031"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":1936,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-20T21:43:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-20T21:49:47Z" name: router-internal-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 4c0ddbbd-2809-47f8-8d19-530608cf8031 resourceVersion: "7763" uid: 15cc4228-98ae-4439-81e2-eab869acd388 spec: clusterIP: 172.31.37.71 clusterIPs: - 172.31.37.71 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http port: 80 protocol: TCP targetPort: http - name: https port: 443 protocol: TCP targetPort: https - name: metrics port: 1936 protocol: TCP targetPort: metrics selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: ClusterIP status: loadBalancer: {} kind: ServiceList metadata: resourceVersion: "46399"