Enum DropInfo.Cause (1.55.0)

public enum DropInfo.Cause extends Enum<DropInfo.Cause> implements ProtocolMessageEnum

Drop cause types:

Protobuf enum google.cloud.networkmanagement.v1.DropInfo.Cause

Implements

ProtocolMessageEnum

Static Fields

Name Description
BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED

Packet is dropped due to a backend service named port not being defined on the instance group level.

BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66;

BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED_VALUE

Packet is dropped due to a backend service named port not being defined on the instance group level.

BACKEND_SERVICE_NAMED_PORT_NOT_DEFINED = 66;

CAUSE_UNSPECIFIED

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CAUSE_UNSPECIFIED_VALUE

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CLOUD_FUNCTION_NOT_ACTIVE

Packet could be dropped because the Cloud Function is not in an active status.

CLOUD_FUNCTION_NOT_ACTIVE = 22;

CLOUD_FUNCTION_NOT_ACTIVE_VALUE

Packet could be dropped because the Cloud Function is not in an active status.

CLOUD_FUNCTION_NOT_ACTIVE = 22;

CLOUD_NAT_NO_ADDRESSES

Packet sent to Cloud Nat without active NAT IPs.

CLOUD_NAT_NO_ADDRESSES = 40;

CLOUD_NAT_NO_ADDRESSES_VALUE

Packet sent to Cloud Nat without active NAT IPs.

CLOUD_NAT_NO_ADDRESSES = 40;

CLOUD_RUN_REVISION_NOT_READY

Packet sent from a Cloud Run revision that is not ready.

CLOUD_RUN_REVISION_NOT_READY = 29;

CLOUD_RUN_REVISION_NOT_READY_VALUE

Packet sent from a Cloud Run revision that is not ready.

CLOUD_RUN_REVISION_NOT_READY = 29;

CLOUD_SQL_CONNECTOR_REQUIRED

Packet was dropped because the Cloud SQL instance requires all connections to use Cloud SQL connectors and to target the Cloud SQL proxy port (3307).

CLOUD_SQL_CONNECTOR_REQUIRED = 63;

CLOUD_SQL_CONNECTOR_REQUIRED_VALUE

Packet was dropped because the Cloud SQL instance requires all connections to use Cloud SQL connectors and to target the Cloud SQL proxy port (3307).

CLOUD_SQL_CONNECTOR_REQUIRED = 63;

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC

Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33;

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC_VALUE

Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33;

CLOUD_SQL_INSTANCE_NOT_RUNNING

Packet sent from or to a Cloud SQL instance that is not in running state.

CLOUD_SQL_INSTANCE_NOT_RUNNING = 28;

CLOUD_SQL_INSTANCE_NOT_RUNNING_VALUE

Packet sent from or to a Cloud SQL instance that is not in running state.

CLOUD_SQL_INSTANCE_NOT_RUNNING = 28;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS_VALUE

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_NO_ROUTE

Packet was dropped because there is no route from a Cloud SQL instance to a destination network.

CLOUD_SQL_INSTANCE_NO_ROUTE = 35;

CLOUD_SQL_INSTANCE_NO_ROUTE_VALUE

Packet was dropped because there is no route from a Cloud SQL instance to a destination network.

CLOUD_SQL_INSTANCE_NO_ROUTE = 35;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS_VALUE

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

CLOUD_SQL_PSC_NEG_UNSUPPORTED

The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.

CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58;

CLOUD_SQL_PSC_NEG_UNSUPPORTED_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.

CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58;

DESTINATION_IS_PRIVATE_NAT_IP_RANGE

Packet is dropped due to a destination IP range being part of a Private NAT IP range.

DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67;

DESTINATION_IS_PRIVATE_NAT_IP_RANGE_VALUE

Packet is dropped due to a destination IP range being part of a Private NAT IP range.

DESTINATION_IS_PRIVATE_NAT_IP_RANGE = 67;

DROPPED_INSIDE_CLOUD_SQL_SERVICE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_CLOUD_SQL_SERVICE_VALUE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_GKE_SERVICE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

DROPPED_INSIDE_GKE_SERVICE_VALUE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE

Packet is dropped inside a Google-managed service due to being delivered in return trace to an endpoint that doesn't match the endpoint the packet was sent from in forward trace. Used only for return traces.

DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62;

DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE_VALUE

Packet is dropped inside a Google-managed service due to being delivered in return trace to an endpoint that doesn't match the endpoint the packet was sent from in forward trace. Used only for return traces.

DROPPED_INSIDE_GOOGLE_MANAGED_SERVICE = 62;

DROPPED_INSIDE_PSC_SERVICE_PRODUCER

Packet was dropped inside Private Service Connect service producer.

DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37;

DROPPED_INSIDE_PSC_SERVICE_PRODUCER_VALUE

Packet was dropped inside Private Service Connect service producer.

DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37;

DROPPED_INSIDE_REDIS_CLUSTER_SERVICE

Generic drop cause for a packet being dropped inside a Redis Cluster service project.

DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75;

DROPPED_INSIDE_REDIS_CLUSTER_SERVICE_VALUE

Generic drop cause for a packet being dropped inside a Redis Cluster service project.

DROPPED_INSIDE_REDIS_CLUSTER_SERVICE = 75;

DROPPED_INSIDE_REDIS_INSTANCE_SERVICE

Generic drop cause for a packet being dropped inside a Redis Instance service project.

DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70;

DROPPED_INSIDE_REDIS_INSTANCE_SERVICE_VALUE

Generic drop cause for a packet being dropped inside a Redis Instance service project.

DROPPED_INSIDE_REDIS_INSTANCE_SERVICE = 70;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK_VALUE

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_RULE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FIREWALL_RULE_VALUE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FOREIGN_IP_DISALLOWED

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FOREIGN_IP_DISALLOWED_VALUE

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FORWARDING_RULE_MISMATCH

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_MISMATCH_VALUE

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_NO_INSTANCES

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

FORWARDING_RULE_NO_INSTANCES_VALUE

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

FORWARDING_RULE_REGION_MISMATCH

Packet could be dropped because it was sent from a different region to a regional forwarding without global access.

FORWARDING_RULE_REGION_MISMATCH = 25;

FORWARDING_RULE_REGION_MISMATCH_VALUE

Packet could be dropped because it was sent from a different region to a regional forwarding without global access.

FORWARDING_RULE_REGION_MISMATCH = 25;

GKE_CLUSTER_NOT_RUNNING

Packet sent from or to a GKE cluster that is not in running state.

GKE_CLUSTER_NOT_RUNNING = 27;

GKE_CLUSTER_NOT_RUNNING_VALUE

Packet sent from or to a GKE cluster that is not in running state.

GKE_CLUSTER_NOT_RUNNING = 27;

GKE_CONTROL_PLANE_NO_ROUTE

Packet was dropped because there is no route from a GKE cluster control plane to a destination network.

GKE_CONTROL_PLANE_NO_ROUTE = 32;

GKE_CONTROL_PLANE_NO_ROUTE_VALUE

Packet was dropped because there is no route from a GKE cluster control plane to a destination network.

GKE_CONTROL_PLANE_NO_ROUTE = 32;

GKE_CONTROL_PLANE_REGION_MISMATCH

Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.

GKE_CONTROL_PLANE_REGION_MISMATCH = 30;

GKE_CONTROL_PLANE_REGION_MISMATCH_VALUE

Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.

GKE_CONTROL_PLANE_REGION_MISMATCH = 30;

GKE_MASTER_UNAUTHORIZED_ACCESS

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GKE_MASTER_UNAUTHORIZED_ACCESS_VALUE

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GKE_PSC_ENDPOINT_MISSING

Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GKE_PSC_ENDPOINT_MISSING = 36;

GKE_PSC_ENDPOINT_MISSING_VALUE

Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GKE_PSC_ENDPOINT_MISSING = 36;

GOOGLE_MANAGED_SERVICE_NO_PEERING

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

GOOGLE_MANAGED_SERVICE_NO_PEERING_VALUE

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT

Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38;

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT_VALUE

Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38;

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED

The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55;

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED_VALUE

The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55;

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED

The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56;

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED_VALUE

The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56;

INSTANCE_NOT_RUNNING

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

INSTANCE_NOT_RUNNING_VALUE

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

LOAD_BALANCER_BACKEND_INVALID_NETWORK

Packet is dropped due to a load balancer backend instance not having a network interface in the network expected by the load balancer.

LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65;

LOAD_BALANCER_BACKEND_INVALID_NETWORK_VALUE

Packet is dropped due to a load balancer backend instance not having a network interface in the network expected by the load balancer.

LOAD_BALANCER_BACKEND_INVALID_NETWORK = 65;

LOAD_BALANCER_HAS_NO_PROXY_SUBNET

Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.

LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39;

LOAD_BALANCER_HAS_NO_PROXY_SUBNET_VALUE

Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.

LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39;

NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION

Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix advertised via BGP by the Cloud Router.

NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80;

NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION_VALUE

Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix advertised via BGP by the Cloud Router.

NO_ADVERTISED_ROUTE_TO_GCP_DESTINATION = 80;

NO_EXTERNAL_ADDRESS

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_EXTERNAL_ADDRESS_VALUE

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION

Packet from the unknown peered network is dropped due to no known route from the source network to the destination IP address.

NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82;

NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION_VALUE

Packet from the unknown peered network is dropped due to no known route from the source network to the destination IP address.

NO_KNOWN_ROUTE_FROM_PEERED_NETWORK_TO_DESTINATION = 82;

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT

No NAT subnets are defined for the PSC service attachment.

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57;

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT_VALUE

No NAT subnets are defined for the PSC service attachment.

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57;

NO_ROUTE

Dropped due to no matching routes.

NO_ROUTE = 4;

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS

Packet is sent from the Internet to the private IPv6 address.

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44;

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS_VALUE

Packet is sent from the Internet to the private IPv6 address.

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44;

NO_ROUTE_VALUE

Dropped due to no matching routes.

NO_ROUTE = 4;

NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION

Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix included to the local traffic selector of the VPN tunnel.

NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81;

NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION_VALUE

Packet from the non-GCP (on-prem) or unknown GCP network is dropped due to the destination IP address not belonging to any IP prefix included to the local traffic selector of the VPN tunnel.

NO_TRAFFIC_SELECTOR_TO_GCP_DESTINATION = 81;

PRIVATE_GOOGLE_ACCESS_DISALLOWED

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled in the subnet.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_GOOGLE_ACCESS_DISALLOWED_VALUE

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled in the subnet.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED

Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47;

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED_VALUE

Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47;

PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED

Sending packets processed by the Private NAT Gateways to the Private Service Connect endpoints is not supported.

PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83;

PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED_VALUE

Sending packets processed by the Private NAT Gateways to the Private Service Connect endpoints is not supported.

PRIVATE_NAT_TO_PSC_ENDPOINT_UNSUPPORTED = 83;

PRIVATE_TRAFFIC_TO_INTERNET

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

PRIVATE_TRAFFIC_TO_INTERNET_VALUE

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

PSC_CONNECTION_NOT_ACCEPTED

The Private Service Connect endpoint is in a project that is not approved to connect to the service.

PSC_CONNECTION_NOT_ACCEPTED = 26;

PSC_CONNECTION_NOT_ACCEPTED_VALUE

The Private Service Connect endpoint is in a project that is not approved to connect to the service.

PSC_CONNECTION_NOT_ACCEPTED = 26;

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK

The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41;

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK_VALUE

The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41;

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48;

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48;

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54;

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54;

PSC_TRANSITIVITY_NOT_PROPAGATED

PSC endpoint is accessed via NCC, but PSC transitivity configuration is not yet propagated.

PSC_TRANSITIVITY_NOT_PROPAGATED = 64;

PSC_TRANSITIVITY_NOT_PROPAGATED_VALUE

PSC endpoint is accessed via NCC, but PSC transitivity configuration is not yet propagated.

PSC_TRANSITIVITY_NOT_PROPAGATED = 64;

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION

Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34;

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION_VALUE

Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34;

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION

Packet sent from a public GKE cluster control plane to a private IP address.

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31;

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION_VALUE

Packet sent from a public GKE cluster control plane to a private IP address.

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31;

REDIS_CLUSTER_NOT_RUNNING

Packet sent from or to a Redis Cluster that is not in running state.

REDIS_CLUSTER_NOT_RUNNING = 69;

REDIS_CLUSTER_NOT_RUNNING_VALUE

Packet sent from or to a Redis Cluster that is not in running state.

REDIS_CLUSTER_NOT_RUNNING = 69;

REDIS_CLUSTER_NO_EXTERNAL_IP

Redis Cluster does not have an external IP address.

REDIS_CLUSTER_NO_EXTERNAL_IP = 77;

REDIS_CLUSTER_NO_EXTERNAL_IP_VALUE

Redis Cluster does not have an external IP address.

REDIS_CLUSTER_NO_EXTERNAL_IP = 77;

REDIS_CLUSTER_UNSUPPORTED_PORT

Packet is dropped due to an unsupported port being used to connect to a Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to a Redis Cluster.

REDIS_CLUSTER_UNSUPPORTED_PORT = 76;

REDIS_CLUSTER_UNSUPPORTED_PORT_VALUE

Packet is dropped due to an unsupported port being used to connect to a Redis Cluster. Ports 6379 and 11000 to 13047 should be used to connect to a Redis Cluster.

REDIS_CLUSTER_UNSUPPORTED_PORT = 76;

REDIS_CLUSTER_UNSUPPORTED_PROTOCOL

Packet is dropped due to an unsupported protocol being used to connect to a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.

REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79;

REDIS_CLUSTER_UNSUPPORTED_PROTOCOL_VALUE

Packet is dropped due to an unsupported protocol being used to connect to a Redis Cluster. Only TCP connections are accepted by a Redis Cluster.

REDIS_CLUSTER_UNSUPPORTED_PROTOCOL = 79;

REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS

Packet is dropped due to connecting from PUPI address to a PSA based Redis Instance.

REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72;

REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS_VALUE

Packet is dropped due to connecting from PUPI address to a PSA based Redis Instance.

REDIS_INSTANCE_CONNECTING_FROM_PUPI_ADDRESS = 72;

REDIS_INSTANCE_NOT_RUNNING

Packet sent from or to a Redis Instance that is not in running state.

REDIS_INSTANCE_NOT_RUNNING = 68;

REDIS_INSTANCE_NOT_RUNNING_VALUE

Packet sent from or to a Redis Instance that is not in running state.

REDIS_INSTANCE_NOT_RUNNING = 68;

REDIS_INSTANCE_NO_EXTERNAL_IP

Redis Instance does not have an external IP address.

REDIS_INSTANCE_NO_EXTERNAL_IP = 74;

REDIS_INSTANCE_NO_EXTERNAL_IP_VALUE

Redis Instance does not have an external IP address.

REDIS_INSTANCE_NO_EXTERNAL_IP = 74;

REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK

Packet is dropped due to no route to the destination network.

REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73;

REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK_VALUE

Packet is dropped due to no route to the destination network.

REDIS_INSTANCE_NO_ROUTE_TO_DESTINATION_NETWORK = 73;

REDIS_INSTANCE_UNSUPPORTED_PORT

Packet is dropped due to an unsupported port being used to connect to a Redis Instance. Port 6379 should be used to connect to a Redis Instance.

REDIS_INSTANCE_UNSUPPORTED_PORT = 71;

REDIS_INSTANCE_UNSUPPORTED_PORT_VALUE

Packet is dropped due to an unsupported port being used to connect to a Redis Instance. Port 6379 should be used to connect to a Redis Instance.

REDIS_INSTANCE_UNSUPPORTED_PORT = 71;

REDIS_INSTANCE_UNSUPPORTED_PROTOCOL

Packet is dropped due to an unsupported protocol being used to connect to a Redis Instance. Only TCP connections are accepted by a Redis Instance.

REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78;

REDIS_INSTANCE_UNSUPPORTED_PROTOCOL_VALUE

Packet is dropped due to an unsupported protocol being used to connect to a Redis Instance. Only TCP connections are accepted by a Redis Instance.

REDIS_INSTANCE_UNSUPPORTED_PROTOCOL = 78;

ROUTE_BLACKHOLE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_BLACKHOLE_VALUE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH

Route's next hop forwarding rule doesn't match next hop IP address.

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51;

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH_VALUE

Route's next hop forwarding rule doesn't match next hop IP address.

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51;

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID

Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53;

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID_VALUE

Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53;

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP

Route's next hop IP address is not a primary IP address of the next hop instance.

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50;

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP_VALUE

Route's next hop IP address is not a primary IP address of the next hop instance.

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50;

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK

Route's next hop instance doesn't have a NIC in the route's network.

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49;

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK_VALUE

Route's next hop instance doesn't have a NIC in the route's network.

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49;

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED

Route's next hop IP address cannot be resolved to a GCP resource.

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42;

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED_VALUE

Route's next hop IP address cannot be resolved to a GCP resource.

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42;

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND

Route's next hop resource is not found.

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43;

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND_VALUE

Route's next hop resource is not found.

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43;

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED

Route's next hop VPN tunnel is down (does not have valid IKE SAs).

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52;

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED_VALUE

Route's next hop VPN tunnel is down (does not have valid IKE SAs).

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52;

ROUTE_WRONG_NETWORK

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.

ROUTE_WRONG_NETWORK = 6;

ROUTE_WRONG_NETWORK_VALUE

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.

ROUTE_WRONG_NETWORK = 6;

ROUTING_LOOP

Packet is stuck in a routing loop.

ROUTING_LOOP = 59;

ROUTING_LOOP_VALUE

Packet is stuck in a routing loop.

ROUTING_LOOP = 59;

TRAFFIC_TYPE_BLOCKED

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

TRAFFIC_TYPE_BLOCKED_VALUE

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

UNKNOWN_EXTERNAL_ADDRESS

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_EXTERNAL_ADDRESS_VALUE

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_INTERNAL_ADDRESS

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNKNOWN_INTERNAL_ADDRESS_VALUE

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNRECOGNIZED
VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED

Packet could be dropped because the health check traffic to the VPC connector is not allowed.

VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61;

VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED_VALUE

Packet could be dropped because the health check traffic to the VPC connector is not allowed.

VPC_CONNECTOR_HEALTH_CHECK_TRAFFIC_BLOCKED = 61;

VPC_CONNECTOR_NOT_RUNNING

Packet could be dropped because the VPC connector is not in a running state.

VPC_CONNECTOR_NOT_RUNNING = 24;

VPC_CONNECTOR_NOT_RUNNING_VALUE

Packet could be dropped because the VPC connector is not in a running state.

VPC_CONNECTOR_NOT_RUNNING = 24;

VPC_CONNECTOR_NOT_SET

Packet could be dropped because no VPC connector is set.

VPC_CONNECTOR_NOT_SET = 23;

VPC_CONNECTOR_NOT_SET_VALUE

Packet could be dropped because no VPC connector is set.

VPC_CONNECTOR_NOT_SET = 23;

VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED

Packet could be dropped because the traffic from the serverless service to the VPC connector is not allowed.

VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60;

VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED_VALUE

Packet could be dropped because the traffic from the serverless service to the VPC connector is not allowed.

VPC_CONNECTOR_SERVERLESS_TRAFFIC_BLOCKED = 60;

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH

The packet does not match a policy-based VPN tunnel local selector.

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45;

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH_VALUE

The packet does not match a policy-based VPN tunnel local selector.

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45;

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH

The packet does not match a policy-based VPN tunnel remote selector.

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46;

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH_VALUE

The packet does not match a policy-based VPN tunnel remote selector.

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46;

Static Methods

Name Description
forNumber(int value)
getDescriptor()
internalGetValueMap()
valueOf(Descriptors.EnumValueDescriptor desc)
valueOf(int value)

Deprecated. Use #forNumber(int) instead.

valueOf(String name)
values()

Methods

Name Description
getDescriptorForType()
getNumber()
getValueDescriptor()