Enum DropInfo.Cause (1.9.0)

public enum DropInfo.Cause extends Enum<DropInfo.Cause> implements ProtocolMessageEnum

Drop cause types:

Protobuf enum google.cloud.networkmanagement.v1.DropInfo.Cause

Implements

ProtocolMessageEnum

Static Fields

NameDescription
CAUSE_UNSPECIFIED

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CAUSE_UNSPECIFIED_VALUE

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS_VALUE

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS_VALUE

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

DROPPED_INSIDE_CLOUD_SQL_SERVICE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_CLOUD_SQL_SERVICE_VALUE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_GKE_SERVICE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

DROPPED_INSIDE_GKE_SERVICE_VALUE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK_VALUE

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_RULE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FIREWALL_RULE_VALUE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FOREIGN_IP_DISALLOWED

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FOREIGN_IP_DISALLOWED_VALUE

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FORWARDING_RULE_MISMATCH

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_MISMATCH_VALUE

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_NO_INSTANCES

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

FORWARDING_RULE_NO_INSTANCES_VALUE

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

GKE_MASTER_UNAUTHORIZED_ACCESS

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GKE_MASTER_UNAUTHORIZED_ACCESS_VALUE

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GOOGLE_MANAGED_SERVICE_NO_PEERING

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

GOOGLE_MANAGED_SERVICE_NO_PEERING_VALUE

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

INSTANCE_NOT_RUNNING

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

INSTANCE_NOT_RUNNING_VALUE

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

NO_EXTERNAL_ADDRESS

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_EXTERNAL_ADDRESS_VALUE

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_ROUTE

Dropped due to no routes.

NO_ROUTE = 4;

NO_ROUTE_VALUE

Dropped due to no routes.

NO_ROUTE = 4;

PRIVATE_GOOGLE_ACCESS_DISALLOWED

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_GOOGLE_ACCESS_DISALLOWED_VALUE

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_TRAFFIC_TO_INTERNET

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

PRIVATE_TRAFFIC_TO_INTERNET_VALUE

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

ROUTE_BLACKHOLE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_BLACKHOLE_VALUE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_WRONG_NETWORK

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP addresss to Network3.

ROUTE_WRONG_NETWORK = 6;

ROUTE_WRONG_NETWORK_VALUE

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP addresss to Network3.

ROUTE_WRONG_NETWORK = 6;

TRAFFIC_TYPE_BLOCKED

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

TRAFFIC_TYPE_BLOCKED_VALUE

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

UNKNOWN_EXTERNAL_ADDRESS

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_EXTERNAL_ADDRESS_VALUE

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_INTERNAL_ADDRESS

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNKNOWN_INTERNAL_ADDRESS_VALUE

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNRECOGNIZED

Static Methods

NameDescription
forNumber(int value)
getDescriptor()
internalGetValueMap()
valueOf(Descriptors.EnumValueDescriptor desc)
valueOf(int value)

Deprecated. Use #forNumber(int) instead.

valueOf(String name)
values()

Methods

NameDescription
getDescriptorForType()
getNumber()
getValueDescriptor()