Class: Google::Cloud::NetworkManagement::V1::DropInfo

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/networkmanagement/v1/trace.rb

Overview

Details of the final state "drop" and associated resource.

Defined Under Namespace

Modules: Cause

Instance Attribute Summary collapse

Instance Attribute Details

#cause::Google::Cloud::NetworkManagement::V1::DropInfo::Cause

Returns Cause that the packet is dropped.

Returns:



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#destination_geolocation_code::String

Returns Geolocation (region code) of the destination IP address (if relevant).

Returns:

  • (::String)

    Geolocation (region code) of the destination IP address (if relevant).



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#destination_ip::String

Returns Destination IP address of the dropped packet (if relevant).

Returns:

  • (::String)

    Destination IP address of the dropped packet (if relevant).



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#region::String

Returns Region of the dropped packet (if relevant).

Returns:

  • (::String)

    Region of the dropped packet (if relevant).



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#resource_uri::String

Returns URI of the resource that caused the drop.

Returns:

  • (::String)

    URI of the resource that caused the drop.



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#source_geolocation_code::String

Returns Geolocation (region code) of the source IP address (if relevant).

Returns:

  • (::String)

    Geolocation (region code) of the source IP address (if relevant).



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end

#source_ip::String

Returns Source IP address of the dropped packet (if relevant).

Returns:

  • (::String)

    Source IP address of the dropped packet (if relevant).



1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591

class DropInfo
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # Drop cause types:
  module Cause
    # Cause is unspecified.
    CAUSE_UNSPECIFIED = 0

    # Destination external address cannot be resolved to a known target. If
    # the address is used in a Google Cloud project, provide the project ID
    # as test input.
    UNKNOWN_EXTERNAL_ADDRESS = 1

    # A Compute Engine instance can only send or receive a packet with a
    # foreign IP address if ip_forward is enabled.
    FOREIGN_IP_DISALLOWED = 2

    # Dropped due to a firewall rule, unless allowed due to connection
    # tracking.
    FIREWALL_RULE = 3

    # Dropped due to no matching routes.
    NO_ROUTE = 4

    # Dropped due to invalid route. Route's next hop is a blackhole.
    ROUTE_BLACKHOLE = 5

    # Packet is sent to a wrong (unintended) network. Example: you trace a
    # packet from VM1:Network1 to VM2:Network2, however, the route configured
    # in Network1 sends the packet destined for VM2's IP address to Network3.
    ROUTE_WRONG_NETWORK = 6

    # Route's next hop IP address cannot be resolved to a GCP resource.
    ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42

    # Route's next hop resource is not found.
    ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43

    # Route's next hop instance doesn't have a NIC in the route's network.
    ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49

    # Route's next hop IP address is not a primary IP address of the next hop
    # instance.
    ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50

    # Route's next hop forwarding rule doesn't match next hop IP address.
    ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51

    # Route's next hop VPN tunnel is down (does not have valid IKE SAs).
    ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52

    # Route's next hop forwarding rule type is invalid (it's not a forwarding
    # rule of the internal passthrough load balancer).
    ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53

    # Packet is sent from the Internet to the private IPv6 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44

    # Packet is sent from the Internet to the private IPv4 address.
    NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109

    # Packet is sent from the external IPv6 source address of an instance to
    # the private IPv6 address of an instance.
    NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98

    # The packet does not match a policy-based VPN tunnel local selector.
    VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45

    # The packet does not match a policy-based VPN tunnel remote selector.
    VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46

    # Packet with internal destination address sent to the internet gateway.
    PRIVATE_TRAFFIC_TO_INTERNET = 7

    # Endpoint with only an internal IP address tries to access Google API and
    # services, but Private Google Access is not enabled in the subnet or is
    # not applicable.
    PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8

    # Source endpoint tries to access Google API and services through the VPN
    # tunnel to another network, but Private Google Access needs to be enabled
    # in the source endpoint network.
    PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47

    # Endpoint with only an internal IP address tries to access external hosts,
    # but there is no matching Cloud NAT gateway in the subnet.
    NO_EXTERNAL_ADDRESS = 9

    # Destination internal address cannot be resolved to a known target. If
    # this is a shared VPC scenario, verify if the service project ID is
    # provided as test input. Otherwise, verify if the IP address is being
    # used in the project.
    UNKNOWN_INTERNAL_ADDRESS = 10

    # Forwarding rule's protocol and ports do not match the packet header.
    FORWARDING_RULE_MISMATCH = 11

    # Forwarding rule does not have backends configured.
    FORWARDING_RULE_NO_INSTANCES = 12

    # Firewalls block the health check probes to the backends and cause
    # the backends to be unavailable for traffic from the load balancer.
    # For more details, see [Health check firewall
    # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules).
    FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13

    # Matching ingress firewall rules by network tags for packets sent via
    # serverless VPC direct egress is unsupported. Behavior is undefined.
    # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations
    INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85

    # Packet is sent from or to a Compute Engine instance that is not in a
    # running state.
    INSTANCE_NOT_RUNNING = 14

    # Packet sent from or to a GKE cluster that is not in running state.
    GKE_CLUSTER_NOT_RUNNING = 27

    # Packet sent from or to a GKE Pod that is not in running state.
    GKE_POD_NOT_RUNNING = 103

    # Packet sent from or to a Cloud SQL instance that is not in running state.
    CLOUD_SQL_INSTANCE_NOT_RUNNING = 28

    # Packet sent from or to a Redis Instance that is not in running state.
    REDIS_INSTANCE_NOT_RUNNING = 68

    # Packet sent from or to a Redis Cluster that is not in running state.
    REDIS_CLUSTER_NOT_RUNNING = 69

    # The type of traffic is blocked and the user cannot configure a firewall
    # rule to enable it. See [Always blocked
    # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for
    # more details.
    TRAFFIC_TYPE_BLOCKED = 15

    # Access to Google Kubernetes Engine cluster master's endpoint is not
    # authorized. See [Access to the cluster
    # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints)
    # for more details.
    GKE_MASTER_UNAUTHORIZED_ACCESS = 16

    # Access to the Cloud SQL instance endpoint is not authorized.
    # See [Authorizing with authorized
    # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for
    # more details.
    CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17

    # Packet was dropped inside Google Kubernetes Engine Service.
    DROPPED_INSIDE_GKE_SERVICE = 18

    # Packet was dropped inside Cloud SQL Service.
    DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19

    # Packet was dropped because there is no peering between the originating
    # network and the Google Managed Services Network.
    GOOGLE_MANAGED_SERVICE_NO_PEERING = 20

    # Packet was dropped because the Google-managed service uses Private
    # Service Connect (PSC), but the PSC endpoint is not found in the project.
    GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38

    # Packet was dropped because the GKE cluster uses Private Service Connect
    # (PSC), but the PSC endpoint is not found in the project.
    GKE_PSC_ENDPOINT_MISSING = 36

    # Packet was dropped because the Cloud SQL instance has neither a private
    # nor a public IP address.
    CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21

    # Packet was dropped because a GKE cluster private endpoint is
    # unreachable from a region different from the cluster's region.
    GKE_CONTROL_PLANE_REGION_MISMATCH = 30

    # Packet sent from a public GKE cluster control plane to a private
    # IP address.
    PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31

    # Packet was dropped because there is no route from a GKE cluster
    # control plane to a destination network.
    GKE_CONTROL_PLANE_NO_ROUTE = 32

    # Packet sent from a Cloud SQL instance to an external IP address is not
    # allowed. The Cloud SQL instance is not configured to send packets to
    # external IP addresses.
    CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33

    # Packet sent from a Cloud SQL instance with only a public IP address to a
    # private IP address.
    PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34

    # Packet was dropped because there is no route from a Cloud SQL
    # instance to a destination network.
    CLOUD_SQL_INSTANCE_NO_ROUTE = 35

    # Packet was dropped because the Cloud SQL instance requires all
    # connections to use Cloud SQL connectors and to target the Cloud SQL proxy
    # port (3307).
    CLOUD_SQL_CONNECTOR_REQUIRED = 63

    # Packet could be dropped because the Cloud Function is not in an active
    # status.
    CLOUD_FUNCTION_NOT_ACTIVE = 22

    # Packet could be dropped because no VPC connector is set.
    VPC_CONNECTOR_NOT_SET = 23

    # Packet could be dropped because the VPC connector is not in a running
    # state.
    VPC_CONNECTOR_NOT_RUNNING = 24

    # Packet could be dropped because the traffic from the serverless service
    # to the VPC connector is not allowed.
    VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60

    # Packet could be dropped because the health check traffic to the VPC
    # connector is not allowed.
    VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61

    # Packet could be dropped because it was sent from a different region
    # to a regional forwarding without global access.
    FORWARDING_RULE_REGION_MISMATCH = 25

    # The Private Service Connect endpoint is in a project that is not approved
    # to connect to the service.
    PSC_CONNECTION_NOT_ACCEPTED = 26

    # The packet is sent to the Private Service Connect endpoint over the
    # peering, but [it's not
    # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises).
    PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule does not have
    # global access enabled.
    PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group), but the producer PSC forwarding rule has multiple ports
    # specified.
    PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54

    # The packet is sent to the Private Service Connect backend (network
    # endpoint group) targeting a Cloud SQL service attachment, but this
    # configuration is not supported.
    CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58

    # No NAT subnets are defined for the PSC service attachment.
    NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57

    # PSC endpoint is accessed via NCC, but PSC transitivity configuration is
    # not yet propagated.
    PSC_TRANSITIVITY_NOT_PROPAGATED = 64

    # The packet sent from the hybrid NEG proxy matches a non-dynamic route,
    # but such a configuration is not supported.
    HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55

    # The packet sent from the hybrid NEG proxy matches a dynamic route with a
    # next hop in a different region, but such a configuration is not
    # supported.
    HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56

    # Packet sent from a Cloud Run revision that is not ready.
    CLOUD_RUN_REVISION_NOT_READY = 29

    # Packet was dropped inside Private Service Connect service producer.
    DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37

    # Packet sent to a load balancer, which requires a proxy-only subnet and
    # the subnet is not found.
    LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39

    # Packet sent to Cloud Nat without active NAT IPs.
    CLOUD_NAT_NO_ADDRESSES = 40

    # Packet is stuck in a routing loop.
    ROUTING_LOOP = 59

    # Packet is dropped inside a Google-managed service due to being delivered
    # in return trace to an endpoint that doesn't match the endpoint the packet
    # was sent from in forward trace. Used only for return traces.
    DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62

    # Packet is dropped due to a load balancer backend instance not having a
    # network interface in the network expected by the load balancer.
    LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65

    # Packet is dropped due to a backend service named port not being defined
    # on the instance group level.
    BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66

    # Packet is dropped due to a destination IP range being part of a Private
    # NAT IP range.
    DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67

    # Generic drop cause for a packet being dropped inside a Redis Instance
    # service project.
    DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Instance. Port 6379 should be used to connect to a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PORT = 71

    # Packet is dropped due to connecting from PUPI address to a PSA based
    # Redis Instance.
    REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72

    # Packet is dropped due to no route to the destination network.
    REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73

    # Redis Instance does not have an external IP address.
    REDIS_INSTANCE_NO_EXTERNAL_IP = 74

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Instance. Only TCP connections are accepted by a Redis Instance.
    REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78

    # Generic drop cause for a packet being dropped inside a Redis Cluster
    # service project.
    DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75

    # Packet is dropped due to an unsupported port being used to connect to a
    # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to
    # a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PORT = 76

    # Redis Cluster does not have an external IP address.
    REDIS_CLUSTER_NO_EXTERNAL_IP = 77

    # Packet is dropped due to an unsupported protocol being used to connect to
    # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.
    REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix advertised
    # via BGP by the Cloud Router.
    NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80

    # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due
    # to the destination IP address not belonging to any IP prefix included to
    # the local traffic selector of the VPN tunnel.
    NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81

    # Packet from the unknown peered network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82

    # Sending packets processed by the Private NAT Gateways to the Private
    # Service Connect endpoints is not supported.
    PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83

    # Packet is sent to the PSC port mapping service, but its destination port
    # does not match any port mapping rules.
    PSC_PORT_MAPPING_PORT_MISMATCH = 86

    # Sending packets directly to the PSC port mapping service without going
    # through the PSC connection is not supported.
    PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to matching a route of an unsupported type.
    UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88

    # Packet could be dropped because hybrid endpoint like a VPN gateway or
    # Interconnect is not allowed to send traffic to the Internet.
    TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89

    # Packet with destination IP address within the reserved NAT64 range is
    # dropped due to no matching NAT gateway in the subnet.
    NO_MATCHING_NAT64_GATEWAY = 90

    # Packet is dropped due to matching a Private NAT64 gateway with no rules
    # for source IPv6 addresses.
    NO_CONFIGURED_PRIVATE_NAT64_RULE = 107

    # Packet is dropped due to being sent to a backend of a passthrough load
    # balancer that doesn't use the same IP version as the frontend.
    LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96

    # Packet from the unknown NCC network is dropped due to no known route
    # from the source network to the destination IP address.
    NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97

    # Packet is dropped by Cloud NAT due to using an unsupported protocol.
    CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99

    # Packet is dropped due to using an unsupported protocol (any other than
    # UDP) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100

    # Packet is dropped due to using an unsupported port (any other than
    # 6081) for L2 Interconnect.
    L2_INTERCONNECT_UNSUPPORTED_PORT = 101

    # Packet is dropped due to destination IP not matching the appliance
    # mapping IPs configured on the L2 Interconnect attachment.
    L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102

    # Packet could be dropped because it matches a route associated with an NCC
    # spoke in the hybrid subnet context, but such a configuration is not
    # supported.
    NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104

    # Packet is dropped because the region of the hybrid subnet is different
    # from the region of the next hop of the route matched within this hybrid
    # subnet.
    HYBRID_SUBNET_REGION_MISMATCH = 105

    # Packet is dropped because no matching route was found in the hybrid
    # subnet.
    HYBRID_SUBNET_NO_ROUTE = 106

    # Packet is dropped by GKE Network Policy.
    GKE_NETWORK_POLICY = 108

    # Packet is dropped because there is no valid matching route from the
    # network of the Google-managed service to the destination.
    NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110
  end
end