--- apiVersion: v1 items: - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 service.beta.openshift.io/serving-cert-secret-name: data-science-gateway-service-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 creationTimestamp: "2026-04-17T17:35:09Z" labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: data-science-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"cf601af4-9ed4-4077-b682-cd7a6237b426"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-17T17:35:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:35:09Z" name: data-science-gateway-data-science-gateway-class namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: data-science-gateway uid: cf601af4-9ed4-4077-b682-cd7a6237b426 resourceVersion: "15650" uid: 569bd00b-3278-48ad-a138-807df6dfe89b spec: clusterIP: 172.31.83.100 clusterIPs: - 172.31.83.100 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port port: 15021 protocol: TCP targetPort: 15021 - appProtocol: https name: https port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: data-science-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: meta.helm.sh/release-name: openshift-gateway-istiod meta.helm.sh/release-namespace: openshift-ingress creationTimestamp: "2026-04-17T17:35:05Z" labels: app: istiod app.kubernetes.io/instance: openshift-gateway-istiod app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: istiod app.kubernetes.io/part-of: istio app.kubernetes.io/version: 1.26.2 helm.sh/chart: istiod-1.26.2 istio: pilot istio.io/rev: openshift-gateway managed-by: sail-operator operator.istio.io/component: Pilot release: openshift-gateway-istiod managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:meta.helm.sh/release-name: {} f:meta.helm.sh/release-namespace: {} f:labels: .: {} f:app: {} f:app.kubernetes.io/instance: {} f:app.kubernetes.io/managed-by: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:app.kubernetes.io/version: {} f:helm.sh/chart: {} f:istio: {} f:istio.io/rev: {} f:managed-by: {} f:operator.istio.io/component: {} f:release: {} f:ownerReferences: .: {} k:{"uid":"10971414-bf0a-4b2f-819c-04d5e6695497"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15010,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15012,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15014,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: sail-operator operation: Update time: "2026-04-17T17:35:05Z" name: istiod-openshift-gateway namespace: openshift-ingress ownerReferences: - apiVersion: sailoperator.io/v1 blockOwnerDeletion: true controller: true kind: IstioRevision name: openshift-gateway uid: 10971414-bf0a-4b2f-819c-04d5e6695497 resourceVersion: "15474" uid: bc59c305-848e-4757-912e-b3950d6e90b5 spec: clusterIP: 172.31.233.238 clusterIPs: - 172.31.233.238 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: grpc-xds port: 15010 protocol: TCP targetPort: 15010 - name: https-dns port: 15012 protocol: TCP targetPort: 15012 - name: https-webhook port: 443 protocol: TCP targetPort: 15017 - name: http-monitoring port: 15014 protocol: TCP targetPort: 15014 selector: app: istiod istio.io/rev: openshift-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: platform.opendatahub.io/instance.generation: "2" platform.opendatahub.io/instance.name: default-gateway platform.opendatahub.io/instance.uid: 09a85e55-1f55-48cc-9c4f-937bf26b6310 platform.opendatahub.io/type: Open Data Hub platform.opendatahub.io/version: 3.4.0-ea.1 service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 service.beta.openshift.io/serving-cert-secret-name: kube-auth-proxy-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 creationTimestamp: "2026-04-17T17:34:44Z" labels: app: kube-auth-proxy app.kubernetes.io/component: authentication platform.opendatahub.io/part-of: gatewayconfig managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:platform.opendatahub.io/instance.generation: {} f:platform.opendatahub.io/instance.name: {} f:platform.opendatahub.io/instance.uid: {} f:platform.opendatahub.io/type: {} f:platform.opendatahub.io/version: {} f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:app: {} f:app.kubernetes.io/component: {} f:platform.opendatahub.io/part-of: {} f:ownerReferences: k:{"uid":"09a85e55-1f55-48cc-9c4f-937bf26b6310"}: {} f:spec: f:ports: k:{"port":8443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} k:{"port":9000,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} f:selector: {} manager: gatewayconfig operation: Apply time: "2026-04-17T17:35:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:34:44Z" name: kube-auth-proxy namespace: openshift-ingress ownerReferences: - apiVersion: services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion: true controller: true kind: GatewayConfig name: default-gateway uid: 09a85e55-1f55-48cc-9c4f-937bf26b6310 resourceVersion: "15653" uid: a9d1cdd5-297e-48b4-ba29-32ab5a018b71 spec: clusterIP: 172.31.187.100 clusterIPs: - 172.31.187.100 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: https port: 8443 protocol: TCP targetPort: 8443 - name: metrics port: 9000 protocol: TCP targetPort: 9000 selector: app: kube-auth-proxy sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: creationTimestamp: "2026-04-17T17:37:21Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: maas-default-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"bfd652e9-dfe2-4a43-8c87-9273abecd79e"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":80,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-17T17:37:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-17T17:37:25Z" name: maas-default-gateway-openshift-default namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: maas-default-gateway uid: bfd652e9-dfe2-4a43-8c87-9273abecd79e resourceVersion: "21179" uid: b15cbada-2690-4b72-97ae-0b6520d8035c spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.64.49 clusterIPs: - 172.31.64.49 externalTrafficPolicy: Cluster internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port nodePort: 30118 port: 15021 protocol: TCP targetPort: 15021 - appProtocol: http name: http nodePort: 32751 port: 80 protocol: TCP targetPort: 80 - appProtocol: https name: https nodePort: 30110 port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: maas-default-gateway sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: ab15cbada26904b7297ae0b6520d8035-1821418578.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: "5" service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: "4" service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: '*' traffic-policy.network.alpha.openshift.io/local-with-fallback: "" creationTimestamp: "2026-04-17T17:22:33Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: app: router ingresscontroller.operator.openshift.io/owning-ingresscontroller: default router: router-default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: {} f:traffic-policy.network.alpha.openshift.io/local-with-fallback: {} f:labels: .: {} f:app: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:router: {} f:ownerReferences: .: {} k:{"uid":"fd1c439e-4686-439d-a3d4-d3b0ba045eed"}: {} f:spec: f:allocateLoadBalancerNodePorts: {} f:externalTrafficPolicy: {} f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-17T17:22:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-17T17:23:01Z" name: router-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: fd1c439e-4686-439d-a3d4-d3b0ba045eed resourceVersion: "3764" uid: 70903c2a-05ce-498f-b026-7bed176c4d8d spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.194.122 clusterIPs: - 172.31.194.122 externalTrafficPolicy: Local healthCheckNodePort: 30264 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http nodePort: 31769 port: 80 protocol: TCP targetPort: http - name: https nodePort: 31182 port: 443 protocol: TCP targetPort: https selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a70903c2a05ce498fb0267bed176c4d8-1990586741.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-secret-name: router-metrics-certs-default service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776446912 creationTimestamp: "2026-04-17T17:22:33Z" labels: ingresscontroller.operator.openshift.io/owning-ingresscontroller: default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.alpha.openshift.io/serving-cert-secret-name: {} f:labels: .: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:ownerReferences: .: {} k:{"uid":"fd1c439e-4686-439d-a3d4-d3b0ba045eed"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":1936,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-17T17:22:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:28:42Z" name: router-internal-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: fd1c439e-4686-439d-a3d4-d3b0ba045eed resourceVersion: "7693" uid: 53c33200-69b1-4834-be28-698e83045769 spec: clusterIP: 172.31.135.235 clusterIPs: - 172.31.135.235 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http port: 80 protocol: TCP targetPort: http - name: https port: 443 protocol: TCP targetPort: https - name: metrics port: 1936 protocol: TCP targetPort: metrics selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: ClusterIP status: loadBalancer: {} kind: ServiceList metadata: resourceVersion: "45933"