The DNS status cannot be determined or is unmanaged.
|
Listeners without a configured hostname will not have DNS conditions added to their |
To ensure your gateway infrastructure is properly configured and functioning, review the status conditions of your GatewayClass and Gateway custom resources (CRs). Checking these conditions confirms that the controller has successfully programmed your underlying data plane without routing conflicts.
To verify that your gateway infrastructure is functioning correctly, complete the following tasks:
Understand GatewayClass status conditions to verify that the controller has claimed the class and that your installed API version is compatible.
Review Gateway CR and listener status conditions to pinpoint data plane failures, configuration errors, or negative polarity conflicts.
Query gateway infrastructure status using the CLI to quickly validate your deployment and retrieve assigned IP addresses.
To verify that your GatewayClass custom resource (CR) is valid and ready to provision gateways, review its status conditions. A healthy GatewayClass CR reports a status of True for core conditions like Accepted and SupportedVersion.
| Condition | Status | Description and common reasons |
|---|---|---|
|
|
The |
|
|
The configuration has errors or was rejected. Common reasons include |
|
|
The |
|
|
The installed Gateway API version is compatible with the controller. |
|
|
There is a version mismatch. A common reason is |
|
|
The Cluster Ingress Operator successfully installed the Gateway API controller. |
|
|
The installation failed. |
|
|
The controller has not started the installation yet. |
|
|
The Istio CRDs are installed and actively managed by either the Cluster Ingress Operator or OLM. |
|
|
The CRDs were installed by a third party or have mixed ownership, preventing the controller from managing them. |
|
|
The CRDs are not installed yet. |
To verify that your gateway is configured in the data plane and ready to route traffic, review its gateway-level and listener-level status conditions. A healthy Gateway custom resource (CR) reports a status of True for its Accepted and Programmed conditions.
|
The |
| Condition | Status | Description and common reasons |
|---|---|---|
|
|
The gateway configuration is valid and working properly. |
|
|
The configuration has errors. Common reasons include |
|
|
The controller has not evaluated the gateway yet. |
|
|
The infrastructure is provisioned and the gateway is configured in the data plane, such as a load balancer or proxy. |
|
|
Programming failed or the data plane is not ready. Common reasons include |
|
|
Programming is currently in progress. |
|
|
The cloud load balancer service for the gateway is successfully provisioned. |
|
|
The load balancer service failed to provision or is pending. Common reasons include |
|
|
DNS records for all listeners are functioning correctly. |
|
|
One or more listeners have DNS provisioning issues. |
| Condition | Status | Description and common reasons | ||
|---|---|---|---|---|
|
|
The listener configuration is valid and working properly. |
||
|
|
The listener configuration has errors. |
||
|
|
The listener is successfully configured in the data plane. |
||
|
|
The listener configuration failed in the data plane. |
||
|
|
All references, such as TLS certificates, are found and valid. |
||
|
|
At least one reference is invalid. Common reasons include |
||
|
|
Healthy state. There are no conflicts. |
||
|
|
The listener conflicts with another listener. Common reasons include |
||
|
|
The DNS record for this listener’s hostname is successfully provisioned in all reported zones. |
||
|
|
The DNS record failed to provision. Common reasons include |
||
|
|
The DNS status cannot be determined or is unmanaged.
|
Gateway CR status output showing a DNS failure on one listener# ...
status:
# Gateway-level conditions (LoadBalancer and aggregate DNS status)
conditions:
- type: LoadBalancerReady
status: "True"
reason: LoadBalancerProvisioned
message: "The LoadBalancer service is provisioned"
observedGeneration: 1
lastTransitionTime: "2025-01-12T10:00:00Z"
- type: DNSReady
status: "False"
reason: SomeListenersNotReady
message: "One or more listeners have DNS provisioning issues"
observedGeneration: 1
lastTransitionTime: "2025-01-12T10:00:00Z"
# Listener-level conditions (DNS status per listener)
listeners:
- name: <stage_http>
conditions:
- type: DNSReady
status: "True"
reason: NoFailedZones
message: "The record is provisioned in all reported zones."
observedGeneration: 1
lastTransitionTime: "2025-01-12T10:00:00Z"
- name: <prod_https>
conditions:
- type: DNSReady
status: "False"
reason: FailedZones
message: "The record failed to provision in some zones: [<prod.example.com>]"
observedGeneration: 1
lastTransitionTime: "2025-01-12T10:00:00Z"
To quickly check the health of your gateway infrastructure, query specific status fields using the OKD CLI. You can validate your deployment, check route attachments, and retrieve IP addresses without parsing lengthy YAML manifests.
You have access to the cluster as a user with the cluster-admin role.
You have installed the OpenShift CLI (oc).
Your gateway is deployed in the openshift-ingress namespace.
Your gateway is managed by the gateway controller (openshift.io/gateway-controller/v1).
Run the relevant command for the status information you need to retrieve:
To list all GatewayClass custom resources (CRs) in your cluster, run the following command:
$ oc get gatewayclass
To check if a specific GatewayClass CR has been accepted by the controller, run the following command:
$ oc get gatewayclass <gatewayclass_name> -o jsonpath='{.status.conditions[?(@.type=="Accepted")].status}'
<gatewayclass_name>: Specify the name of your gateway class.
To list all Gateway custom resources (CRs) across all namespaces, run the following command:
$ oc get gateway -A
To check if a specific Gateway CR is successfully programmed in the data plane, run the following command:
$ oc get gateway <gateway_name> -n openshift-ingress -o jsonpath='{.status.conditions[?(@.type=="Programmed")].status}'
<gateway_name>: Specify the name of your gateway.
To retrieve the IP address assigned to a specific Gateway CR, run the following command:
$ oc get gateway <gateway_name> -n openshift-ingress -o jsonpath='{.status.addresses[0].value}'
<gateway_name>: Specify the name of your gateway.
To check the total number of routes attached to a specific Gateway CR, run the following command:
$ oc get gateway <gateway_name> -n openshift-ingress -o jsonpath='{.status.listeners[*].attachedRoutes}'
<gateway_name>: Specify the name of your gateway.
To watch a specific Gateway CR for real-time status changes, run the following command:
$ oc get gateway <gateway_name> -n openshift-ingress -w
<gateway_name>: Specify the name of your gateway.