--- apiVersion: v1 items: - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 service.beta.openshift.io/serving-cert-secret-name: data-science-gateway-service-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 creationTimestamp: "2026-04-21T04:31:57Z" labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: data-science-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"aaff47c5-f09b-4d2c-a2e7-372b8b411048"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-21T04:31:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:31:57Z" name: data-science-gateway-data-science-gateway-class namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: data-science-gateway uid: aaff47c5-f09b-4d2c-a2e7-372b8b411048 resourceVersion: "16151" uid: e985d56a-5d7d-45f2-a52b-1bc0e71ed0d0 spec: clusterIP: 172.31.117.90 clusterIPs: - 172.31.117.90 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port port: 15021 protocol: TCP targetPort: 15021 - appProtocol: https name: https port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: data-science-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: meta.helm.sh/release-name: openshift-gateway-istiod meta.helm.sh/release-namespace: openshift-ingress creationTimestamp: "2026-04-21T04:31:53Z" labels: app: istiod app.kubernetes.io/instance: openshift-gateway-istiod app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: istiod app.kubernetes.io/part-of: istio app.kubernetes.io/version: 1.26.2 helm.sh/chart: istiod-1.26.2 istio: pilot istio.io/rev: openshift-gateway managed-by: sail-operator operator.istio.io/component: Pilot release: openshift-gateway-istiod managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:meta.helm.sh/release-name: {} f:meta.helm.sh/release-namespace: {} f:labels: .: {} f:app: {} f:app.kubernetes.io/instance: {} f:app.kubernetes.io/managed-by: {} f:app.kubernetes.io/name: {} f:app.kubernetes.io/part-of: {} f:app.kubernetes.io/version: {} f:helm.sh/chart: {} f:istio: {} f:istio.io/rev: {} f:managed-by: {} f:operator.istio.io/component: {} f:release: {} f:ownerReferences: .: {} k:{"uid":"826c4b4e-8d40-4113-87ed-7083721c9c63"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15010,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15012,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":15014,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: sail-operator operation: Update time: "2026-04-21T04:31:53Z" name: istiod-openshift-gateway namespace: openshift-ingress ownerReferences: - apiVersion: sailoperator.io/v1 blockOwnerDeletion: true controller: true kind: IstioRevision name: openshift-gateway uid: 826c4b4e-8d40-4113-87ed-7083721c9c63 resourceVersion: "15633" uid: 1fd7f50e-5ce4-420a-a442-2940bacc6e0d spec: clusterIP: 172.31.216.131 clusterIPs: - 172.31.216.131 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: grpc-xds port: 15010 protocol: TCP targetPort: 15010 - name: https-dns port: 15012 protocol: TCP targetPort: 15012 - name: https-webhook port: 443 protocol: TCP targetPort: 15017 - name: http-monitoring port: 15014 protocol: TCP targetPort: 15014 selector: app: istiod istio.io/rev: openshift-gateway sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: annotations: platform.opendatahub.io/instance.generation: "2" platform.opendatahub.io/instance.name: default-gateway platform.opendatahub.io/instance.uid: 1b5d32c6-b10f-4a81-a40b-2ce405bbe0e4 platform.opendatahub.io/type: Open Data Hub platform.opendatahub.io/version: 3.4.0-ea.1 service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 service.beta.openshift.io/serving-cert-secret-name: kube-auth-proxy-tls service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 creationTimestamp: "2026-04-21T04:31:24Z" labels: app: kube-auth-proxy app.kubernetes.io/component: authentication platform.opendatahub.io/part-of: gatewayconfig managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:platform.opendatahub.io/instance.generation: {} f:platform.opendatahub.io/instance.name: {} f:platform.opendatahub.io/instance.uid: {} f:platform.opendatahub.io/type: {} f:platform.opendatahub.io/version: {} f:service.beta.openshift.io/serving-cert-secret-name: {} f:labels: f:app: {} f:app.kubernetes.io/component: {} f:platform.opendatahub.io/part-of: {} f:ownerReferences: k:{"uid":"1b5d32c6-b10f-4a81-a40b-2ce405bbe0e4"}: {} f:spec: f:ports: k:{"port":8443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} k:{"port":9000,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:targetPort: {} f:selector: {} manager: gatewayconfig operation: Apply time: "2026-04-21T04:31:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:31:24Z" name: kube-auth-proxy namespace: openshift-ingress ownerReferences: - apiVersion: services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion: true controller: true kind: GatewayConfig name: default-gateway uid: 1b5d32c6-b10f-4a81-a40b-2ce405bbe0e4 resourceVersion: "16160" uid: 2cd3a2d2-ff3f-40bc-93dc-76a31161aae8 spec: clusterIP: 172.31.130.5 clusterIPs: - 172.31.130.5 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: https port: 8443 protocol: TCP targetPort: 8443 - name: metrics port: 9000 protocol: TCP targetPort: 9000 selector: app: kube-auth-proxy sessionAffinity: None type: ClusterIP status: loadBalancer: {} - apiVersion: v1 kind: Service metadata: creationTimestamp: "2026-04-21T04:33:56Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: gateway.istio.io/managed: openshift.io-gateway-controller-v1 gateway.networking.k8s.io/gateway-name: maas-default-gateway managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: {} f:labels: f:gateway.istio.io/managed: {} f:gateway.networking.k8s.io/gateway-name: {} f:ownerReferences: k:{"uid":"6a5e5632-3ed6-49e5-843f-246334c052bc"}: {} f:spec: f:ipFamilyPolicy: {} f:ports: k:{"port":80,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":443,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} k:{"port":15021,"protocol":"TCP"}: .: {} f:appProtocol: {} f:name: {} f:port: {} f:protocol: {} f:selector: {} f:type: {} manager: openshift.io/gateway-controller/v1 operation: Apply time: "2026-04-21T04:33:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-21T04:34:00Z" name: maas-default-gateway-openshift-default namespace: openshift-ingress ownerReferences: - apiVersion: gateway.networking.k8s.io/v1beta1 kind: Gateway name: maas-default-gateway uid: 6a5e5632-3ed6-49e5-843f-246334c052bc resourceVersion: "21422" uid: 149f40b3-0b1c-436a-bb2e-223684f1ea96 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.7.236 clusterIPs: - 172.31.7.236 externalTrafficPolicy: Cluster internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: PreferDualStack ports: - appProtocol: tcp name: status-port nodePort: 30316 port: 15021 protocol: TCP targetPort: 15021 - appProtocol: http name: http nodePort: 32043 port: 80 protocol: TCP targetPort: 80 - appProtocol: https name: https nodePort: 30418 port: 443 protocol: TCP targetPort: 443 selector: gateway.networking.k8s.io/gateway-name: maas-default-gateway sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a149f40b30b1c436abb2e223684f1ea9-651325154.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: "5" service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: "4" service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: "2" service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: '*' traffic-policy.network.alpha.openshift.io/local-with-fallback: "" creationTimestamp: "2026-04-21T04:20:07Z" finalizers: - service.kubernetes.io/load-balancer-cleanup labels: app: router ingresscontroller.operator.openshift.io/owning-ingresscontroller: default router: router-default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-healthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-interval: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-timeout: {} f:service.beta.kubernetes.io/aws-load-balancer-healthcheck-unhealthy-threshold: {} f:service.beta.kubernetes.io/aws-load-balancer-proxy-protocol: {} f:traffic-policy.network.alpha.openshift.io/local-with-fallback: {} f:labels: .: {} f:app: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:router: {} f:ownerReferences: .: {} k:{"uid":"e1ffc775-0eae-4bdc-aa50-e0f71f0dfb98"}: {} f:spec: f:allocateLoadBalancerNodePorts: {} f:externalTrafficPolicy: {} f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-21T04:20:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:finalizers: .: {} v:"service.kubernetes.io/load-balancer-cleanup": {} f:status: f:loadBalancer: f:ingress: {} manager: aws-cloud-controller-manager operation: Update subresource: status time: "2026-04-21T04:20:34Z" name: router-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: e1ffc775-0eae-4bdc-aa50-e0f71f0dfb98 resourceVersion: "3006" uid: 32e425f3-d18e-421e-a720-5f4e580f8e18 spec: allocateLoadBalancerNodePorts: true clusterIP: 172.31.216.174 clusterIPs: - 172.31.216.174 externalTrafficPolicy: Local healthCheckNodePort: 32639 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http nodePort: 31643 port: 80 protocol: TCP targetPort: http - name: https nodePort: 31609 port: 443 protocol: TCP targetPort: https selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: LoadBalancer status: loadBalancer: ingress: - hostname: a32e425f3d18e421ea7205f4e580f8e1-1666663575.us-east-1.elb.amazonaws.com - apiVersion: v1 kind: Service metadata: annotations: service.alpha.openshift.io/serving-cert-secret-name: router-metrics-certs-default service.alpha.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1776745562 creationTimestamp: "2026-04-21T04:20:07Z" labels: ingresscontroller.operator.openshift.io/owning-ingresscontroller: default managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:service.alpha.openshift.io/serving-cert-secret-name: {} f:labels: .: {} f:ingresscontroller.operator.openshift.io/owning-ingresscontroller: {} f:ownerReferences: .: {} k:{"uid":"e1ffc775-0eae-4bdc-aa50-e0f71f0dfb98"}: {} f:spec: f:internalTrafficPolicy: {} f:ports: .: {} k:{"port":80,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":443,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} k:{"port":1936,"protocol":"TCP"}: .: {} f:name: {} f:port: {} f:protocol: {} f:targetPort: {} f:selector: {} f:sessionAffinity: {} f:type: {} manager: ingress-operator operation: Update time: "2026-04-21T04:20:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:service.alpha.openshift.io/serving-cert-signed-by: {} f:service.beta.openshift.io/serving-cert-signed-by: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:26:13Z" name: router-internal-default namespace: openshift-ingress ownerReferences: - apiVersion: apps/v1 controller: true kind: Deployment name: router-default uid: e1ffc775-0eae-4bdc-aa50-e0f71f0dfb98 resourceVersion: "7756" uid: 3d0f5359-4bcb-4b8c-9043-891c29ff06dc spec: clusterIP: 172.31.186.117 clusterIPs: - 172.31.186.117 internalTrafficPolicy: Cluster ipFamilies: - IPv4 ipFamilyPolicy: SingleStack ports: - name: http port: 80 protocol: TCP targetPort: http - name: https port: 443 protocol: TCP targetPort: https - name: metrics port: 1936 protocol: TCP targetPort: metrics selector: ingresscontroller.operator.openshift.io/deployment-ingresscontroller: default sessionAffinity: None type: ClusterIP status: loadBalancer: {} kind: ServiceList metadata: resourceVersion: "27346"