Module: Google::Cloud::NetworkManagement::V1::Step::State
- Defined in:
- proto_docs/google/cloud/networkmanagement/v1/trace.rb
Overview
Type of states that are defined in the network state machine. Each step in the packet trace is in a specific state.
Constant Summary collapse
- STATE_UNSPECIFIED =
Unspecified state.
0
- START_FROM_INSTANCE =
Initial state: packet originating from a Compute Engine instance. An InstanceInfo is populated with starting instance information.
1
- START_FROM_INTERNET =
Initial state: packet originating from the internet. The endpoint information is populated.
2
- START_FROM_GOOGLE_SERVICE =
Initial state: packet originating from a Google service. Some Google services, such as health check probers or Identity Aware Proxy use special routes, outside VPC routing configuration to reach Compute Engine Instances.
27
- START_FROM_PRIVATE_NETWORK =
Initial state: packet originating from a VPC or on-premises network with internal source IP. If the source is a VPC network visible to the user, a NetworkInfo is populated with details of the network.
3
- START_FROM_GKE_MASTER =
Initial state: packet originating from a Google Kubernetes Engine cluster master. A GKEMasterInfo is populated with starting instance information.
21
- START_FROM_CLOUD_SQL_INSTANCE =
Initial state: packet originating from a Cloud SQL instance. A CloudSQLInstanceInfo is populated with starting instance information.
22
- START_FROM_CLOUD_FUNCTION =
Initial state: packet originating from a Cloud Function. A CloudFunctionInfo is populated with starting function information.
23
- START_FROM_APP_ENGINE_VERSION =
Initial state: packet originating from an App Engine service version. An AppEngineVersionInfo is populated with starting version information.
25
- START_FROM_CLOUD_RUN_REVISION =
Initial state: packet originating from a Cloud Run revision. A CloudRunRevisionInfo is populated with starting revision information.
26
- APPLY_INGRESS_FIREWALL_RULE =
Config checking state: verify ingress firewall rule.
4
- APPLY_EGRESS_FIREWALL_RULE =
Config checking state: verify egress firewall rule.
5
- APPLY_ROUTE =
Config checking state: verify route.
6
- APPLY_FORWARDING_RULE =
Config checking state: match forwarding rule.
7
- SPOOFING_APPROVED =
Config checking state: packet sent or received under foreign IP address and allowed.
8
- ARRIVE_AT_INSTANCE =
Forwarding state: arriving at a Compute Engine instance.
9
- ARRIVE_AT_INTERNAL_LOAD_BALANCER =
Forwarding state: arriving at a Compute Engine internal load balancer.
10
- ARRIVE_AT_EXTERNAL_LOAD_BALANCER =
Forwarding state: arriving at a Compute Engine external load balancer.
11
- ARRIVE_AT_VPN_GATEWAY =
Forwarding state: arriving at a Cloud VPN gateway.
12
- ARRIVE_AT_VPN_TUNNEL =
Forwarding state: arriving at a Cloud VPN tunnel.
13
- ARRIVE_AT_VPC_CONNECTOR =
Forwarding state: arriving at a VPC connector.
24
- NAT =
Transition state: packet header translated.
14
- PROXY_CONNECTION =
Transition state: original connection is terminated and a new proxied connection is initiated.
15
- DELIVER =
Final state: packet could be delivered.
16
- DROP =
Final state: packet could be dropped.
17
- FORWARD =
Final state: packet could be forwarded to a network with an unknown configuration.
18
- ABORT =
Final state: analysis is aborted.
19
- VIEWER_PERMISSION_MISSING =
Special state: viewer of the test result does not have permission to see the configuration in this step.
20