Class: Google::Cloud::NetworkManagement::V1::DropInfo
- Inherits:
-
Object
- Object
- Google::Cloud::NetworkManagement::V1::DropInfo
- Extended by:
- Protobuf::MessageExts::ClassMethods
- Includes:
- Protobuf::MessageExts
- Defined in:
- proto_docs/google/cloud/networkmanagement/v1/trace.rb
Overview
Details of the final state "drop" and associated resource.
Defined Under Namespace
Modules: Cause
Instance Attribute Summary collapse
-
#cause ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo::Cause
Cause that the packet is dropped.
-
#destination_geolocation_code ⇒ ::String
Geolocation (region code) of the destination IP address (if relevant).
-
#destination_ip ⇒ ::String
Destination IP address of the dropped packet (if relevant).
-
#region ⇒ ::String
Region of the dropped packet (if relevant).
-
#resource_uri ⇒ ::String
URI of the resource that caused the drop.
-
#source_geolocation_code ⇒ ::String
Geolocation (region code) of the source IP address (if relevant).
-
#source_ip ⇒ ::String
Source IP address of the dropped packet (if relevant).
Instance Attribute Details
#cause ⇒ ::Google::Cloud::NetworkManagement::V1::DropInfo::Cause
Returns Cause that the packet is dropped.
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#destination_geolocation_code ⇒ ::String
Returns Geolocation (region code) of the destination IP address (if relevant).
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#destination_ip ⇒ ::String
Returns Destination IP address of the dropped packet (if relevant).
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#region ⇒ ::String
Returns Region of the dropped packet (if relevant).
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#resource_uri ⇒ ::String
Returns URI of the resource that caused the drop.
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#source_geolocation_code ⇒ ::String
Returns Geolocation (region code) of the source IP address (if relevant).
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |
#source_ip ⇒ ::String
Returns Source IP address of the dropped packet (if relevant).
1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 |
# File 'proto_docs/google/cloud/networkmanagement/v1/trace.rb', line 1591 class DropInfo include ::Google::Protobuf::MessageExts extend ::Google::Protobuf::MessageExts::ClassMethods # Drop cause types: module Cause # Cause is unspecified. CAUSE_UNSPECIFIED = 0 # Destination external address cannot be resolved to a known target. If # the address is used in a Google Cloud project, provide the project ID # as test input. UNKNOWN_EXTERNAL_ADDRESS = 1 # A Compute Engine instance can only send or receive a packet with a # foreign IP address if ip_forward is enabled. FOREIGN_IP_DISALLOWED = 2 # Dropped due to a firewall rule, unless allowed due to connection # tracking. FIREWALL_RULE = 3 # Dropped due to no matching routes. NO_ROUTE = 4 # Dropped due to invalid route. Route's next hop is a blackhole. ROUTE_BLACKHOLE = 5 # Packet is sent to a wrong (unintended) network. Example: you trace a # packet from VM1:Network1 to VM2:Network2, however, the route configured # in Network1 sends the packet destined for VM2's IP address to Network3. ROUTE_WRONG_NETWORK = 6 # Route's next hop IP address cannot be resolved to a GCP resource. ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42 # Route's next hop resource is not found. ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43 # Route's next hop instance doesn't have a NIC in the route's network. ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49 # Route's next hop IP address is not a primary IP address of the next hop # instance. ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50 # Route's next hop forwarding rule doesn't match next hop IP address. ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51 # Route's next hop VPN tunnel is down (does not have valid IKE SAs). ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52 # Route's next hop forwarding rule type is invalid (it's not a forwarding # rule of the internal passthrough load balancer). ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53 # Packet is sent from the Internet to the private IPv6 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44 # Packet is sent from the Internet to the private IPv4 address. NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV4_ADDRESS = 109 # Packet is sent from the external IPv6 source address of an instance to # the private IPv6 address of an instance. NO_ROUTE_FROM_EXTERNAL_IPV6_SOURCE_TO_PRIVATE_IPV6_ADDRESS = 98 # The packet does not match a policy-based VPN tunnel local selector. VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45 # The packet does not match a policy-based VPN tunnel remote selector. VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46 # Packet with internal destination address sent to the internet gateway. PRIVATE_TRAFFIC_TO_INTERNET = 7 # Endpoint with only an internal IP address tries to access Google API and # services, but Private Google Access is not enabled in the subnet or is # not applicable. PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8 # Source endpoint tries to access Google API and services through the VPN # tunnel to another network, but Private Google Access needs to be enabled # in the source endpoint network. PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47 # Endpoint with only an internal IP address tries to access external hosts, # but there is no matching Cloud NAT gateway in the subnet. NO_EXTERNAL_ADDRESS = 9 # Destination internal address cannot be resolved to a known target. If # this is a shared VPC scenario, verify if the service project ID is # provided as test input. Otherwise, verify if the IP address is being # used in the project. UNKNOWN_INTERNAL_ADDRESS = 10 # Forwarding rule's protocol and ports do not match the packet header. FORWARDING_RULE_MISMATCH = 11 # Forwarding rule does not have backends configured. FORWARDING_RULE_NO_INSTANCES = 12 # Firewalls block the health check probes to the backends and cause # the backends to be unavailable for traffic from the load balancer. # For more details, see [Health check firewall # rules](https://cloud.google.com/load-balancing/docs/health-checks#firewall_rules). FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13 # Matching ingress firewall rules by network tags for packets sent via # serverless VPC direct egress is unsupported. Behavior is undefined. # https://cloud.google.com/run/docs/configuring/vpc-direct-vpc#limitations INGRESS_FIREWALL_TAGS_UNSUPPORTED_BY_DIRECT_VPC_EGRESS = 85 # Packet is sent from or to a Compute Engine instance that is not in a # running state. INSTANCE_NOT_RUNNING = 14 # Packet sent from or to a GKE cluster that is not in running state. GKE_CLUSTER_NOT_RUNNING = 27 # Packet sent from or to a GKE Pod that is not in running state. GKE_POD_NOT_RUNNING = 103 # Packet sent from or to a Cloud SQL instance that is not in running state. CLOUD_SQL_INSTANCE_NOT_RUNNING = 28 # Packet sent from or to a Redis Instance that is not in running state. REDIS_INSTANCE_NOT_RUNNING = 68 # Packet sent from or to a Redis Cluster that is not in running state. REDIS_CLUSTER_NOT_RUNNING = 69 # The type of traffic is blocked and the user cannot configure a firewall # rule to enable it. See [Always blocked # traffic](https://cloud.google.com/vpc/docs/firewalls#blockedtraffic) for # more details. TRAFFIC_TYPE_BLOCKED = 15 # Access to Google Kubernetes Engine cluster master's endpoint is not # authorized. See [Access to the cluster # endpoints](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#access_to_the_cluster_endpoints) # for more details. GKE_MASTER_UNAUTHORIZED_ACCESS = 16 # Access to the Cloud SQL instance endpoint is not authorized. # See [Authorizing with authorized # networks](https://cloud.google.com/sql/docs/mysql/authorize-networks) for # more details. CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17 # Packet was dropped inside Google Kubernetes Engine Service. DROPPED_INSIDE_GKE_SERVICE = 18 # Packet was dropped inside Cloud SQL Service. DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19 # Packet was dropped because there is no peering between the originating # network and the Google Managed Services Network. GOOGLE_MANAGED_SERVICE_NO_PEERING = 20 # Packet was dropped because the Google-managed service uses Private # Service Connect (PSC), but the PSC endpoint is not found in the project. GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38 # Packet was dropped because the GKE cluster uses Private Service Connect # (PSC), but the PSC endpoint is not found in the project. GKE_PSC_ENDPOINT_MISSING = 36 # Packet was dropped because the Cloud SQL instance has neither a private # nor a public IP address. CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21 # Packet was dropped because a GKE cluster private endpoint is # unreachable from a region different from the cluster's region. GKE_CONTROL_PLANE_REGION_MISMATCH = 30 # Packet sent from a public GKE cluster control plane to a private # IP address. PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31 # Packet was dropped because there is no route from a GKE cluster # control plane to a destination network. GKE_CONTROL_PLANE_NO_ROUTE = 32 # Packet sent from a Cloud SQL instance to an external IP address is not # allowed. The Cloud SQL instance is not configured to send packets to # external IP addresses. CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33 # Packet sent from a Cloud SQL instance with only a public IP address to a # private IP address. PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34 # Packet was dropped because there is no route from a Cloud SQL # instance to a destination network. CLOUD_SQL_INSTANCE_NO_ROUTE = 35 # Packet was dropped because the Cloud SQL instance requires all # connections to use Cloud SQL connectors and to target the Cloud SQL proxy # port (3307). CLOUD_SQL_CONNECTOR_REQUIRED = 63 # Packet could be dropped because the Cloud Function is not in an active # status. CLOUD_FUNCTION_NOT_ACTIVE = 22 # Packet could be dropped because no VPC connector is set. VPC_CONNECTOR_NOT_SET = 23 # Packet could be dropped because the VPC connector is not in a running # state. VPC_CONNECTOR_NOT_RUNNING = 24 # Packet could be dropped because the traffic from the serverless service # to the VPC connector is not allowed. VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60 # Packet could be dropped because the health check traffic to the VPC # connector is not allowed. VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61 # Packet could be dropped because it was sent from a different region # to a regional forwarding without global access. FORWARDING_RULE_REGION_MISMATCH = 25 # The Private Service Connect endpoint is in a project that is not approved # to connect to the service. PSC_CONNECTION_NOT_ACCEPTED = 26 # The packet is sent to the Private Service Connect endpoint over the # peering, but [it's not # supported](https://cloud.google.com/vpc/docs/configure-private-service-connect-services#on-premises). PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule does not have # global access enabled. PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48 # The packet is sent to the Private Service Connect backend (network # endpoint group), but the producer PSC forwarding rule has multiple ports # specified. PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54 # The packet is sent to the Private Service Connect backend (network # endpoint group) targeting a Cloud SQL service attachment, but this # configuration is not supported. CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58 # No NAT subnets are defined for the PSC service attachment. NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57 # PSC endpoint is accessed via NCC, but PSC transitivity configuration is # not yet propagated. PSC_TRANSITIVITY_NOT_PROPAGATED = 64 # The packet sent from the hybrid NEG proxy matches a non-dynamic route, # but such a configuration is not supported. HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55 # The packet sent from the hybrid NEG proxy matches a dynamic route with a # next hop in a different region, but such a configuration is not # supported. HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56 # Packet sent from a Cloud Run revision that is not ready. CLOUD_RUN_REVISION_NOT_READY = 29 # Packet was dropped inside Private Service Connect service producer. DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37 # Packet sent to a load balancer, which requires a proxy-only subnet and # the subnet is not found. LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39 # Packet sent to Cloud Nat without active NAT IPs. CLOUD_NAT_NO_ADDRESSES = 40 # Packet is stuck in a routing loop. ROUTING_LOOP = 59 # Packet is dropped inside a Google-managed service due to being delivered # in return trace to an endpoint that doesn't match the endpoint the packet # was sent from in forward trace. Used only for return traces. DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62 # Packet is dropped due to a load balancer backend instance not having a # network interface in the network expected by the load balancer. LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65 # Packet is dropped due to a backend service named port not being defined # on the instance group level. BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66 # Packet is dropped due to a destination IP range being part of a Private # NAT IP range. DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67 # Generic drop cause for a packet being dropped inside a Redis Instance # service project. DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70 # Packet is dropped due to an unsupported port being used to connect to a # Redis Instance. Port 6379 should be used to connect to a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PORT = 71 # Packet is dropped due to connecting from PUPI address to a PSA based # Redis Instance. REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72 # Packet is dropped due to no route to the destination network. REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73 # Redis Instance does not have an external IP address. REDIS_INSTANCE_NO_EXTERNAL_IP = 74 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Instance. Only TCP connections are accepted by a Redis Instance. REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78 # Generic drop cause for a packet being dropped inside a Redis Cluster # service project. DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75 # Packet is dropped due to an unsupported port being used to connect to a # Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to # a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PORT = 76 # Redis Cluster does not have an external IP address. REDIS_CLUSTER_NO_EXTERNAL_IP = 77 # Packet is dropped due to an unsupported protocol being used to connect to # a Redis Cluster. Only TCP connections are accepted by a Redis Cluster. REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix advertised # via BGP by the Cloud Router. NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80 # Packet from the non-GCP (on-prem) or unknown GCP network is dropped due # to the destination IP address not belonging to any IP prefix included to # the local traffic selector of the VPN tunnel. NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81 # Packet from the unknown peered network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82 # Sending packets processed by the Private NAT Gateways to the Private # Service Connect endpoints is not supported. PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83 # Packet is sent to the PSC port mapping service, but its destination port # does not match any port mapping rules. PSC_PORT_MAPPING_PORT_MISMATCH = 86 # Sending packets directly to the PSC port mapping service without going # through the PSC connection is not supported. PSC_PORT_MAPPING_WITHOUT_PSC_CONNECTION_UNSUPPORTED = 87 # Packet with destination IP address within the reserved NAT64 range is # dropped due to matching a route of an unsupported type. UNSUPPORTED_ROUTE_MATCHED_FOR_NAT64_DESTINATION = 88 # Packet could be dropped because hybrid endpoint like a VPN gateway or # Interconnect is not allowed to send traffic to the Internet. TRAFFIC_FROM_HYBRID_ENDPOINT_TO_INTERNET_DISALLOWED = 89 # Packet with destination IP address within the reserved NAT64 range is # dropped due to no matching NAT gateway in the subnet. NO_MATCHING_NAT64_GATEWAY = 90 # Packet is dropped due to matching a Private NAT64 gateway with no rules # for source IPv6 addresses. NO_CONFIGURED_PRIVATE_NAT64_RULE = 107 # Packet is dropped due to being sent to a backend of a passthrough load # balancer that doesn't use the same IP version as the frontend. LOAD_BALANCER_BACKEND_IP_VERSION_MISMATCH = 96 # Packet from the unknown NCC network is dropped due to no known route # from the source network to the destination IP address. NO_KNOWN_ROUTE_FROM_NCC_NETWORK_TO_DESTINATION = 97 # Packet is dropped by Cloud NAT due to using an unsupported protocol. CLOUD_NAT_PROTOCOL_UNSUPPORTED = 99 # Packet is dropped due to using an unsupported protocol (any other than # UDP) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PROTOCOL = 100 # Packet is dropped due to using an unsupported port (any other than # 6081) for L2 Interconnect. L2_INTERCONNECT_UNSUPPORTED_PORT = 101 # Packet is dropped due to destination IP not matching the appliance # mapping IPs configured on the L2 Interconnect attachment. L2_INTERCONNECT_DESTINATION_IP_MISMATCH = 102 # Packet could be dropped because it matches a route associated with an NCC # spoke in the hybrid subnet context, but such a configuration is not # supported. NCC_ROUTE_WITHIN_HYBRID_SUBNET_UNSUPPORTED = 104 # Packet is dropped because the region of the hybrid subnet is different # from the region of the next hop of the route matched within this hybrid # subnet. HYBRID_SUBNET_REGION_MISMATCH = 105 # Packet is dropped because no matching route was found in the hybrid # subnet. HYBRID_SUBNET_NO_ROUTE = 106 # Packet is dropped by GKE Network Policy. GKE_NETWORK_POLICY = 108 # Packet is dropped because there is no valid matching route from the # network of the Google-managed service to the destination. NO_VALID_ROUTE_FROM_GOOGLE_MANAGED_NETWORK_TO_DESTINATION = 110 end end |