Class: Google::Cloud::NetworkManagement::V1::DropInfo
- Inherits:
-
Object
- Object
- Google::Cloud::NetworkManagement::V1::DropInfo
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/networkmanagement/v1/trace.rb
Overview
Details of the final state "drop" and associated resource.
Defined Under Namespace
Modules: Cause
Instance Attribute Summary collapse
-
#cause ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo::Cause
Cause that the packet is dropped.
-
#resource_uri ⇒ ::String
URI of the resource that caused the drop.
Instance Attribute Details
#cause ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo::Cause
Returns Cause that the packet is dropped.
788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 788 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP addresss to Network3. ROUTE_WRONG_NETWORK = 6 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Instance with only an internal IP address tries to access Google API and # services, but private Google access is not enabled. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Instance with only an internal IP address tries to access external hosts, # but Cloud NAT is not enabled in the subnet, unless special configurations # on a VM allow this connection. For more details, see [Special # configurations for VM # instances](https://cloud.google.com/vpc/docs/special-configurations). NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 end end |
#resource_uri ⇒ ::String
Returns URI of the resource that caused the drop.
788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 788 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP addresss to Network3. ROUTE_WRONG_NETWORK = 6 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Instance with only an internal IP address tries to access Google API and # services, but private Google access is not enabled. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Instance with only an internal IP address tries to access external hosts, # but Cloud NAT is not enabled in the subnet, unless special configurations # on a VM allow this connection. For more details, see [Special # configurations for VM # instances](https://cloud.google.com/vpc/docs/special-configurations). NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 end end |