Class: Google::Cloud::NetworkManagement::V1::Step
- Inherits:
-
Object
- Object
- Google::Cloud::NetworkManagement::V1::Step
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/networkmanagement/v1/trace.rb
Overview
A simulated forwarding path is composed of multiple steps. Each step has a well-defined state and an associated configuration.
Defined Under Namespace
Modules: State
Instance Attribute Summary collapse
-
#abort ⇒ ::Google::Cloud::NetworkManagement::V1::AbortInfo
Display information of the final state "abort" and reason.
-
#app_engine_version ⇒ ::Google::Cloud::NetworkManagement::V1::AppEngineVersionInfo
Display information of an App Engine service version.
-
#causes_drop ⇒ ::Boolean
This is a step that leads to the final state Drop.
-
#cloud_function ⇒ ::Google::Cloud::NetworkManagement::V1::CloudFunctionInfo
Display information of a Cloud Function.
-
#cloud_run_revision ⇒ ::Google::Cloud::NetworkManagement::V1::CloudRunRevisionInfo
Display information of a Cloud Run revision.
-
#cloud_sql_instance ⇒ ::Google::Cloud::NetworkManagement::V1::CloudSQLInstanceInfo
Display information of a Cloud SQL instance.
-
#deliver ⇒ ::Google::Cloud::NetworkManagement::V1::DeliverInfo
Display information of the final state "deliver" and reason.
-
#description ⇒ ::String
A description of the step.
-
#drop ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo
Display information of the final state "drop" and reason.
-
#endpoint ⇒ ::Google::Cloud::NetworkManagement::V1::EndpointInfo
Display information of the source and destination under analysis.
-
#firewall ⇒ ::Google::Cloud::NetworkManagement::V1::FirewallInfo
Display information of a Compute Engine firewall rule.
-
#forward ⇒ ::Google::Cloud::NetworkManagement::V1::ForwardInfo
Display information of the final state "forward" and reason.
-
#forwarding_rule ⇒ ::Google::Cloud::NetworkManagement::V1::ForwardingRuleInfo
Display information of a Compute Engine forwarding rule.
-
#gke_master ⇒ ::Google::Cloud::NetworkManagement::V1::GKEMasterInfo
Display information of a Google Kubernetes Engine cluster master.
-
#google_service ⇒ ::Google::Cloud::NetworkManagement::V1::GoogleServiceInfo
Display information of a Google service.
-
#instance ⇒ ::Google::Cloud::NetworkManagement::V1::InstanceInfo
Display information of a Compute Engine instance.
-
#load_balancer ⇒ ::Google::Cloud::NetworkManagement::V1::LoadBalancerInfo
Display information of the load balancers.
-
#network ⇒ ::Google::Cloud::NetworkManagement::V1::NetworkInfo
Display information of a Google Cloud network.
-
#project_id ⇒ ::String
Project ID that contains the configuration this step is validating.
-
#route ⇒ ::Google::Cloud::NetworkManagement::V1::RouteInfo
Display information of a Compute Engine route.
-
#state ⇒ ::Google::Cloud::NetworkManagement::V1::Step::State
Each step is in one of the pre-defined states.
-
#vpc_connector ⇒ ::Google::Cloud::NetworkManagement::V1::VpcConnectorInfo
Display information of a VPC connector.
-
#vpn_gateway ⇒ ::Google::Cloud::NetworkManagement::V1::VpnGatewayInfo
Display information of a Compute Engine VPN gateway.
-
#vpn_tunnel ⇒ ::Google::Cloud::NetworkManagement::V1::VpnTunnelInfo
Display information of a Compute Engine VPN tunnel.
Instance Attribute Details
#abort ⇒ ::Google::Cloud::NetworkManagement::V1::AbortInfo
Returns Display information of the final state "abort" and reason.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#app_engine_version ⇒ ::Google::Cloud::NetworkManagement::V1::AppEngineVersionInfo
Returns Display information of an App Engine service version.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#causes_drop ⇒ ::Boolean
Returns This is a step that leads to the final state Drop.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#cloud_function ⇒ ::Google::Cloud::NetworkManagement::V1::CloudFunctionInfo
Returns Display information of a Cloud Function.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#cloud_run_revision ⇒ ::Google::Cloud::NetworkManagement::V1::CloudRunRevisionInfo
Returns Display information of a Cloud Run revision.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#cloud_sql_instance ⇒ ::Google::Cloud::NetworkManagement::V1::CloudSQLInstanceInfo
Returns Display information of a Cloud SQL instance.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#deliver ⇒ ::Google::Cloud::NetworkManagement::V1::DeliverInfo
Returns Display information of the final state "deliver" and reason.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#description ⇒ ::String
Returns A description of the step. Usually this is a summary of the state.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#drop ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo
Returns Display information of the final state "drop" and reason.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#endpoint ⇒ ::Google::Cloud::NetworkManagement::V1::EndpointInfo
Returns Display information of the source and destination under analysis. The endpoint information in an intermediate state may differ with the initial input, as it might be modified by state like NAT, or Connection Proxy.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#firewall ⇒ ::Google::Cloud::NetworkManagement::V1::FirewallInfo
Returns Display information of a Compute Engine firewall rule.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#forward ⇒ ::Google::Cloud::NetworkManagement::V1::ForwardInfo
Returns Display information of the final state "forward" and reason.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#forwarding_rule ⇒ ::Google::Cloud::NetworkManagement::V1::ForwardingRuleInfo
Returns Display information of a Compute Engine forwarding rule.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#gke_master ⇒ ::Google::Cloud::NetworkManagement::V1::GKEMasterInfo
Returns Display information of a Google Kubernetes Engine cluster master.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#google_service ⇒ ::Google::Cloud::NetworkManagement::V1::GoogleServiceInfo
Returns Display information of a Google service.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#instance ⇒ ::Google::Cloud::NetworkManagement::V1::InstanceInfo
Returns Display information of a Compute Engine instance.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#load_balancer ⇒ ::Google::Cloud::NetworkManagement::V1::LoadBalancerInfo
Returns Display information of the load balancers.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#network ⇒ ::Google::Cloud::NetworkManagement::V1::NetworkInfo
Returns Display information of a Google Cloud network.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#project_id ⇒ ::String
Returns Project ID that contains the configuration this step is validating.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#route ⇒ ::Google::Cloud::NetworkManagement::V1::RouteInfo
Returns Display information of a Compute Engine route.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#state ⇒ ::Google::Cloud::NetworkManagement::V1::Step::State
Returns Each step is in one of the pre-defined states.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#vpc_connector ⇒ ::Google::Cloud::NetworkManagement::V1::VpcConnectorInfo
Returns Display information of a VPC connector.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#vpn_gateway ⇒ ::Google::Cloud::NetworkManagement::V1::VpnGatewayInfo
Returns Display information of a Compute Engine VPN gateway.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |
#vpn_tunnel ⇒ ::Google::Cloud::NetworkManagement::V1::VpnTunnelInfo
Returns Display information of a Compute Engine VPN tunnel.
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 131 class Step include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Type of states that are defined in the network state machine. # Each step in the packet trace is in a specific state. module State # Unspecified state. STATE_UNSPECIFIED = 0 # Initial state: packet originating from a Compute Engine instance. # An InstanceInfo is populated with starting instance information. START_FROM_INSTANCE = 1 # Initial state: packet originating from the internet. # The endpoint information is populated. START_FROM_INTERNET = 2 # Initial state: packet originating from a Google service. Some Google # services, such as health check probers or Identity Aware Proxy use # special routes, outside VPC routing configuration to reach Compute Engine # Instances. START_FROM_GOOGLE_SERVICE = 27 # Initial state: packet originating from a VPC or on-premises network # with internal source IP. # If the source is a VPC network visible to the user, a NetworkInfo # is populated with details of the network. START_FROM_PRIVATE_NETWORK = 3 # Initial state: packet originating from a Google Kubernetes Engine cluster # master. A GKEMasterInfo is populated with starting instance information. START_FROM_GKE_MASTER = 21 # Initial state: packet originating from a Cloud SQL instance. # A CloudSQLInstanceInfo is populated with starting instance information. START_FROM_CLOUD_SQL_INSTANCE = 22 # Initial state: packet originating from a Cloud Function. # A CloudFunctionInfo is populated with starting function information. START_FROM_CLOUD_FUNCTION = 23 # Initial state: packet originating from an App Engine service version. # An AppEngineVersionInfo is populated with starting version information. START_FROM_APP_ENGINE_VERSION = 25 # Initial state: packet originating from a Cloud Run revision. # A CloudRunRevisionInfo is populated with starting revision information. START_FROM_CLOUD_RUN_REVISION = 26 # Config checking state: verify ingress firewall rule. APPLY_INGRESS_FIREWALL_RULE = 4 # Config checking state: verify egress firewall rule. APPLY_EGRESS_FIREWALL_RULE = 5 # Config checking state: verify route. APPLY_ROUTE = 6 # Config checking state: match forwarding rule. APPLY_FORWARDING_RULE = 7 # Config checking state: packet sent or received under foreign IP # address and allowed. SPOOFING_APPROVED = 8 # Forwarding state: arriving at a Compute Engine instance. ARRIVE_AT_INSTANCE = 9 # Forwarding state: arriving at a Compute Engine internal load balancer. ARRIVE_AT_INTERNAL_LOAD_BALANCER = 10 # Forwarding state: arriving at a Compute Engine external load balancer. ARRIVE_AT_EXTERNAL_LOAD_BALANCER = 11 # Forwarding state: arriving at a Cloud VPN gateway. ARRIVE_AT_VPN_GATEWAY = 12 # Forwarding state: arriving at a Cloud VPN tunnel. ARRIVE_AT_VPN_TUNNEL = 13 # Forwarding state: arriving at a VPC connector. ARRIVE_AT_VPC_CONNECTOR = 24 # Transition state: packet header translated. NAT = 14 # Transition state: original connection is terminated and a new proxied # connection is initiated. PROXY_CONNECTION = 15 # Final state: packet could be delivered. DELIVER = 16 # Final state: packet could be dropped. DROP = 17 # Final state: packet could be forwarded to a network with an unknown # configuration. FORWARD = 18 # Final state: analysis is aborted. ABORT = 19 # Special state: viewer of the test result does not have permission to # see the configuration in this step. VIEWER_PERMISSION_MISSING = 20 end end |