--- apiVersion: v1 items: - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 service.beta.openshift.io/serving-cert-secret-name: data-science-gateway-service-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 creationTimestamp: "2026-04-17T17:16:17Z" labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: data-science-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"6afe64d6-6e86-42a8-9e5e-1d9f6fcaa323"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-17T17:16:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:16:17Z" name: data-science-gateway-data-science-gateway-class namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: data-science-gateway uid: 6afe64d6-6e86-42a8-9e5e-1d9f6fcaa323 resourceVersion: "16422" uid: d646b2e2-87cf-4c6b-aba3-02ed9eec71f7 spec: clusterIP: 172.31.163.241 clusterIPs: - 172.31.163.241 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port port: 15021 protocol: TCP targetPort: 15021 - appProtocol: https name: https port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: data-science-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: meta.helm.sh/release-name: openshift-gateway-istiod meta.helm.sh/release-namespace: openshift-ingress creationTimestamp: "2026-04-17T17:16:12Z" labels: app: istiod app.kubernetes.io/instance: openshift-gateway-istiod app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: istiod app.kubernetes.io/part-of: istio app.kubernetes.io/version: 1.26.2 helm.sh/chart: istiod-1.26.2 istio: pilot istio.io/rev: openshift-gateway managed-by: sail-operator operator.istio.io/component: Pilot release: openshift-gateway-istiod managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:meta.helm.sh/release-name: {} f:meta.helm.sh/release-namespace: {} f:labels: .: {} f:app: {} f:app.kubernetes.io/instance: {} f:app.kubernetes.io/managed-by: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:app.kubernetes.io/version: {} f:helm.sh/chart: {} f:istio: {} f:istio.io/rev: {} f:managed-by: {} f:operator.istio.io/component: {} f:release: {} f:ownerReferences: .: {} k:{"uid":"218146de-3cea-4283-a3c0-3f4d869a8e50"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15010,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15012,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15014,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: sail-operator operation: Update time: "2026-04-17T17:16:12Z" name: istiod-openshift-gateway namespace: openshift-ingress ownerReferences: - apiVersion: sailoperator.io/v1 blockOwnerDeletion: true controller: true kind: IstioRevision name: openshift-gateway uid: 218146de-3cea-4283-a3c0-3f4d869a8e50 resourceVersion: "16291" uid: 222b9711-2c2b-4ad8-9a47-044bdc01c6bf spec: clusterIP: 172.31.219.208 clusterIPs: - 172.31.219.208 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: grpc-xds port: 15010 protocol: TCP targetPort: 15010 - name: https-dns port: 15012 protocol: TCP targetPort: 15012 - name: https-webhook port: 443 protocol: TCP targetPort: 15017 - name: http-monitoring port: 15014 protocol: TCP targetPort: 15014 selector: app: istiod istio.io/rev: openshift-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: platform.opendatahub.io/instance.generation: "2" platform.opendatahub.io/instance.name: default-gateway platform.opendatahub.io/instance.uid: d9e64e75-5e9f-41e6-8cc8-70276f598ff0 platform.opendatahub.io/type: Open Data Hub platform.opendatahub.io/version: 3.4.0-ea.1 service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 service.beta.openshift.io/serving-cert-secret-name: kube-auth-proxy-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 creationTimestamp: "2026-04-17T17:15:27Z" labels: app: kube-auth-proxy app.kubernetes.io/component: authentication platform.opendatahub.io/part-of: gatewayconfig managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:platform.opendatahub.io/instance.generation: {} f:platform.opendatahub.io/instance.name: {} f:platform.opendatahub.io/instance.uid: {} f:platform.opendatahub.io/type: {} f:platform.opendatahub.io/version: {} f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:app: {} f:app.kubernetes.io/component: {} f:platform.opendatahub.io/part-of: {} f:ownerReferences: k:{"uid":"d9e64e75-5e9f-41e6-8cc8-70276f598ff0"}: {} f:spec: f:ports: k:{"port":8443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} k:{"port":9000,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} f:selector: {} manager: gatewayconfig operation: Apply time: "2026-04-17T17:16:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:15:27Z" name: kube-auth-proxy namespace: openshift-ingress ownerReferences: - apiVersion: services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion: true controller: true kind: GatewayConfig name: default-gateway uid: d9e64e75-5e9f-41e6-8cc8-70276f598ff0 resourceVersion: "16430" uid: 3658d614-cee0-4585-abee-cfb98b1e4cfb spec: clusterIP: 172.31.87.183 clusterIPs: - 172.31.87.183 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: https port: 8443 protocol: TCP targetPort: 8443 - name: metrics port: 9000 protocol: TCP targetPort: 9000 selector: app: kube-auth-proxy sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: creationTimestamp: "2026-04-17T17:17:50Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: maas-default-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"3bdf7bd2-1919-443c-b0b5-828e71ad61a3"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":80,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-17T17:17:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-17T17:17:54Z" name: maas-default-gateway-openshift-default namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: maas-default-gateway uid: 3bdf7bd2-1919-443c-b0b5-828e71ad61a3 resourceVersion: "21108" uid: f43a11c3-2635-4dcc-ac30-56c9c8ccbca0 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.147.237 clusterIPs: - 172.31.147.237 externalTrafficPolicy: Cluster internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port nodePort: 31977 port: 15021 protocol: TCP targetPort: 15021 - appProtocol: http name: http nodePort: 30274 port: 80 protocol: TCP targetPort: 80 - appProtocol: https name: https nodePort: 30333 port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: maas-default-gateway sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: af43a11c326354dccac3056c9c8ccbca-1104045613.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: "5" service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: "4" service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: '*' traffic-policy.network.alpha.openshift.io/local-with-fallback: "" creationTimestamp: "2026-04-17T17:03:31Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: app: router ingresscontroller.operator.openshift.io/owning-ingresscontroller: default router: router-default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: {} f:traffic-policy.network.alpha.openshift.io/local-with-fallback: {} f:labels: .: {} f:app: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:router: {} f:ownerReferences: .: {} k:{"uid":"82652044-5f11-4124-856a-ed3768af634b"}: {} f:spec: f:allocateLoadBalancerNodePorts: {} f:externalTrafficPolicy: {} f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-17T17:03:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-17T17:03:36Z" name: router-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 82652044-5f11-4124-856a-ed3768af634b resourceVersion: "2157" uid: dd68aaa9-2994-4907-ab81-c813b04645c5 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.245.105 clusterIPs: - 172.31.245.105 externalTrafficPolicy: Local healthCheckNodePort: 30741 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http nodePort: 32191 port: 80 protocol: TCP targetPort: http - name: https nodePort: 31139 port: 443 protocol: TCP targetPort: https selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: add68aaa929944907ab81c813b04645c-1846199491.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-secret-name: router-metrics-certs-default service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776445780 creationTimestamp: "2026-04-17T17:03:32Z" labels: ingresscontroller.operator.openshift.io/owning-ingresscontroller: default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.alpha.openshift.io/serving-cert-secret-name: {} f:labels: .: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:ownerReferences: .: {} k:{"uid":"82652044-5f11-4124-856a-ed3768af634b"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":1936,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-17T17:03:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:09:50Z" name: router-internal-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: 82652044-5f11-4124-856a-ed3768af634b resourceVersion: "7783" uid: c1d2ee3f-b904-460b-876f-b65b99fbe9ce spec: clusterIP: 172.31.212.183 clusterIPs: - 172.31.212.183 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http port: 80 protocol: TCP targetPort: http - name: https port: 443 protocol: TCP targetPort: https - name: metrics port: 1936 protocol: TCP targetPort: metrics selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: ClusterIP status: loadBalancer: {} kind: ServiceList metadata: resourceVersion: "46180"