--- apiVersion: v1 items: - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 service.beta.openshift.io/serving-cert-secret-name: data-science-gateway-service-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 creationTimestamp: "2026-04-22T16:06:46Z" labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: data-science-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"19bb7259-4993-4460-b16c-764e0847fe54"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-22T16:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:06:46Z" name: data-science-gateway-data-science-gateway-class namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: data-science-gateway uid: 19bb7259-4993-4460-b16c-764e0847fe54 resourceVersion: "16656" uid: 15c472d6-f548-43d5-8a56-ed811503b1aa spec: clusterIP: 172.31.165.197 clusterIPs: - 172.31.165.197 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port port: 15021 protocol: TCP targetPort: 15021 - appProtocol: https name: https port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: data-science-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: meta.helm.sh/release-name: openshift-gateway-istiod meta.helm.sh/release-namespace: openshift-ingress creationTimestamp: "2026-04-22T16:06:42Z" labels: app: istiod app.kubernetes.io/instance: openshift-gateway-istiod app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: istiod app.kubernetes.io/part-of: istio app.kubernetes.io/version: 1.26.2 helm.sh/chart: istiod-1.26.2 istio: pilot istio.io/rev: openshift-gateway managed-by: sail-operator operator.istio.io/component: Pilot release: openshift-gateway-istiod managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:meta.helm.sh/release-name: {} f:meta.helm.sh/release-namespace: {} f:labels: .: {} f:app: {} f:app.kubernetes.io/instance: {} f:app.kubernetes.io/managed-by: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:app.kubernetes.io/version: {} f:helm.sh/chart: {} f:istio: {} f:istio.io/rev: {} f:managed-by: {} f:operator.istio.io/component: {} f:release: {} f:ownerReferences: .: {} k:{"uid":"bfc9b5d4-601d-43c0-a250-6b79113b9327"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15010,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15012,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15014,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: sail-operator operation: Update time: "2026-04-22T16:06:42Z" name: istiod-openshift-gateway namespace: openshift-ingress ownerReferences: - apiVersion: sailoperator.io/v1 blockOwnerDeletion: true controller: true kind: IstioRevision name: openshift-gateway uid: bfc9b5d4-601d-43c0-a250-6b79113b9327 resourceVersion: "16270" uid: 85b90bf1-c5c1-41e9-929f-d3c68c3c1d3f spec: clusterIP: 172.31.16.199 clusterIPs: - 172.31.16.199 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: grpc-xds port: 15010 protocol: TCP targetPort: 15010 - name: https-dns port: 15012 protocol: TCP targetPort: 15012 - name: https-webhook port: 443 protocol: TCP targetPort: 15017 - name: http-monitoring port: 15014 protocol: TCP targetPort: 15014 selector: app: istiod istio.io/rev: openshift-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: platform.opendatahub.io/instance.generation: "2" platform.opendatahub.io/instance.name: default-gateway platform.opendatahub.io/instance.uid: da26f43c-3737-4f41-a5bb-0472cb176aea platform.opendatahub.io/type: Open Data Hub platform.opendatahub.io/version: 3.4.0-ea.1 service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 service.beta.openshift.io/serving-cert-secret-name: kube-auth-proxy-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 creationTimestamp: "2026-04-22T16:06:11Z" labels: app: kube-auth-proxy app.kubernetes.io/component: authentication platform.opendatahub.io/part-of: gatewayconfig managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:platform.opendatahub.io/instance.generation: {} f:platform.opendatahub.io/instance.name: {} f:platform.opendatahub.io/instance.uid: {} f:platform.opendatahub.io/type: {} f:platform.opendatahub.io/version: {} f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:app: {} f:app.kubernetes.io/component: {} f:platform.opendatahub.io/part-of: {} f:ownerReferences: k:{"uid":"da26f43c-3737-4f41-a5bb-0472cb176aea"}: {} f:spec: f:ports: k:{"port":8443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} k:{"port":9000,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} f:selector: {} manager: gatewayconfig operation: Apply time: "2026-04-22T16:06:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:06:11Z" name: kube-auth-proxy namespace: openshift-ingress ownerReferences: - apiVersion: services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion: true controller: true kind: GatewayConfig name: default-gateway uid: da26f43c-3737-4f41-a5bb-0472cb176aea resourceVersion: "16641" uid: 47a9a559-30ea-4edd-ab83-3f011724f76c spec: clusterIP: 172.31.23.233 clusterIPs: - 172.31.23.233 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: https port: 8443 protocol: TCP targetPort: 8443 - name: metrics port: 9000 protocol: TCP targetPort: 9000 selector: app: kube-auth-proxy sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: creationTimestamp: "2026-04-22T16:08:35Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: maas-default-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"8cd60c82-c58f-4116-ac6c-112ebc60d328"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":80,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-22T16:08:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-22T16:08:39Z" name: maas-default-gateway-openshift-default namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: maas-default-gateway uid: 8cd60c82-c58f-4116-ac6c-112ebc60d328 resourceVersion: "21496" uid: e1e09f2f-1e74-44fc-aee5-09268d806ac9 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.212.173 clusterIPs: - 172.31.212.173 externalTrafficPolicy: Cluster internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port nodePort: 31559 port: 15021 protocol: TCP targetPort: 15021 - appProtocol: http name: http nodePort: 31841 port: 80 protocol: TCP targetPort: 80 - appProtocol: https name: https nodePort: 31898 port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: maas-default-gateway sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: ae1e09f2f1e7444fcaee509268d806ac-1543253055.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: "5" service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: "4" service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: '*' traffic-policy.network.alpha.openshift.io/local-with-fallback: "" creationTimestamp: "2026-04-22T15:53:59Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: app: router ingresscontroller.operator.openshift.io/owning-ingresscontroller: default router: router-default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: {} f:traffic-policy.network.alpha.openshift.io/local-with-fallback: {} f:labels: .: {} f:app: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:router: {} f:ownerReferences: .: {} k:{"uid":"4dd86ca0-288d-4ad3-afa4-4ba636a56272"}: {} f:spec: f:allocateLoadBalancerNodePorts: {} f:externalTrafficPolicy: {} f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-22T15:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-22T15:54:45Z" name: router-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 4dd86ca0-288d-4ad3-afa4-4ba636a56272 resourceVersion: "4275" uid: 0ee22621-982c-4fd5-a340-04c45c4bb60f spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.6.193 clusterIPs: - 172.31.6.193 externalTrafficPolicy: Local healthCheckNodePort: 31078 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http nodePort: 31804 port: 80 protocol: TCP targetPort: http - name: https nodePort: 30503 port: 443 protocol: TCP targetPort: https selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a0ee22621982c4fd5a34004c45c4bb60-1014196532.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-secret-name: router-metrics-certs-default service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776873601 creationTimestamp: "2026-04-22T15:53:59Z" labels: ingresscontroller.operator.openshift.io/owning-ingresscontroller: default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.alpha.openshift.io/serving-cert-secret-name: {} f:labels: .: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:ownerReferences: .: {} k:{"uid":"4dd86ca0-288d-4ad3-afa4-4ba636a56272"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":1936,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-22T15:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:00:12Z" name: router-internal-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 4dd86ca0-288d-4ad3-afa4-4ba636a56272 resourceVersion: "7600" uid: ff6e4ee0-a7a7-4e31-a670-5c1190d73618 spec: clusterIP: 172.31.191.50 clusterIPs: - 172.31.191.50 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http port: 80 protocol: TCP targetPort: http - name: https port: 443 protocol: TCP targetPort: https - name: metrics port: 1936 protocol: TCP targetPort: metrics selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: ClusterIP status: loadBalancer: {} kind: ServiceList metadata: resourceVersion: "27057"