Class: Google::Cloud::NetworkManagement::V1::DropInfo

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/networkmanagement/v1/trace.rb

Overview

Details of the final state "drop" and associated resource.

Defined Under Namespace

Modules: Cause

Instance Attribute Summary collapse

Instance Attribute Details

#cause::Google::Cloud::NetworkManagement::V1::DropInfo::Cause

Returns Cause that the packet is dropped.

Returns:



788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 788

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP addresss to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Instance with only an internal IP address tries to access Google API and
    # services, but private Google access is not enabled.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Instance with only an internal IP address tries to access external hosts,
    # but Cloud NAT is not enabled in the subnet, unless special configurations
    # on a VM allow this connection. For more details, see [Special
    # configurations for VM
    # instances](https://cloud.google.com/vpc/docs/special-configurations).
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21
  end
end

#resource_uri::String

Returns URI of the resource that caused the drop.

Returns:

  • (::String)

    URI of the resource that caused the drop.



788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 788

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP addresss to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Instance with only an internal IP address tries to access Google API and
    # services, but private Google access is not enabled.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Instance with only an internal IP address tries to access external hosts,
    # but Cloud NAT is not enabled in the subnet, unless special configurations
    # on a VM allow this connection. For more details, see [Special
    # configurations for VM
    # instances](https://cloud.google.com/vpc/docs/special-configurations).
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21
  end
end