Enum DropInfo.Cause (1.42.0)

public enum DropInfo.Cause extends Enum<DropInfo.Cause> implements ProtocolMessageEnum

Drop cause types:

Protobuf enum google.cloud.networkmanagement.v1beta1.DropInfo.Cause

Implements

ProtocolMessageEnum

Static Fields

NameDescription
CAUSE_UNSPECIFIED

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CAUSE_UNSPECIFIED_VALUE

Cause is unspecified.

CAUSE_UNSPECIFIED = 0;

CLOUD_FUNCTION_NOT_ACTIVE

Packet could be dropped because the Cloud Function is not in an active status.

CLOUD_FUNCTION_NOT_ACTIVE = 22;

CLOUD_FUNCTION_NOT_ACTIVE_VALUE

Packet could be dropped because the Cloud Function is not in an active status.

CLOUD_FUNCTION_NOT_ACTIVE = 22;

CLOUD_NAT_NO_ADDRESSES

Packet sent to Cloud Nat without active NAT IPs.

CLOUD_NAT_NO_ADDRESSES = 40;

CLOUD_NAT_NO_ADDRESSES_VALUE

Packet sent to Cloud Nat without active NAT IPs.

CLOUD_NAT_NO_ADDRESSES = 40;

CLOUD_RUN_REVISION_NOT_READY

Packet sent from a Cloud Run revision that is not ready.

CLOUD_RUN_REVISION_NOT_READY = 29;

CLOUD_RUN_REVISION_NOT_READY_VALUE

Packet sent from a Cloud Run revision that is not ready.

CLOUD_RUN_REVISION_NOT_READY = 29;

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC

Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33;

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC_VALUE

Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses.

CLOUD_SQL_INSTANCE_NOT_CONFIGURED_FOR_EXTERNAL_TRAFFIC = 33;

CLOUD_SQL_INSTANCE_NOT_RUNNING

Packet sent from or to a Cloud SQL instance that is not in running state.

CLOUD_SQL_INSTANCE_NOT_RUNNING = 28;

CLOUD_SQL_INSTANCE_NOT_RUNNING_VALUE

Packet sent from or to a Cloud SQL instance that is not in running state.

CLOUD_SQL_INSTANCE_NOT_RUNNING = 28;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS_VALUE

Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address.

CLOUD_SQL_INSTANCE_NO_IP_ADDRESS = 21;

CLOUD_SQL_INSTANCE_NO_ROUTE

Packet was dropped because there is no route from a Cloud SQL instance to a destination network.

CLOUD_SQL_INSTANCE_NO_ROUTE = 35;

CLOUD_SQL_INSTANCE_NO_ROUTE_VALUE

Packet was dropped because there is no route from a Cloud SQL instance to a destination network.

CLOUD_SQL_INSTANCE_NO_ROUTE = 35;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS_VALUE

Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details.

CLOUD_SQL_INSTANCE_UNAUTHORIZED_ACCESS = 17;

CLOUD_SQL_PSC_NEG_UNSUPPORTED

The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.

CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58;

CLOUD_SQL_PSC_NEG_UNSUPPORTED_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported.

CLOUD_SQL_PSC_NEG_UNSUPPORTED = 58;

DROPPED_INSIDE_CLOUD_SQL_SERVICE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_CLOUD_SQL_SERVICE_VALUE

Packet was dropped inside Cloud SQL Service.

DROPPED_INSIDE_CLOUD_SQL_SERVICE = 19;

DROPPED_INSIDE_GKE_SERVICE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

DROPPED_INSIDE_GKE_SERVICE_VALUE

Packet was dropped inside Google Kubernetes Engine Service.

DROPPED_INSIDE_GKE_SERVICE = 18;

DROPPED_INSIDE_PSC_SERVICE_PRODUCER

Packet was dropped inside Private Service Connect service producer.

DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37;

DROPPED_INSIDE_PSC_SERVICE_PRODUCER_VALUE

Packet was dropped inside Private Service Connect service producer.

DROPPED_INSIDE_PSC_SERVICE_PRODUCER = 37;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK_VALUE

Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules.

FIREWALL_BLOCKING_LOAD_BALANCER_BACKEND_HEALTH_CHECK = 13;

FIREWALL_RULE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FIREWALL_RULE_VALUE

Dropped due to a firewall rule, unless allowed due to connection tracking.

FIREWALL_RULE = 3;

FOREIGN_IP_DISALLOWED

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FOREIGN_IP_DISALLOWED_VALUE

A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled.

FOREIGN_IP_DISALLOWED = 2;

FORWARDING_RULE_MISMATCH

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_MISMATCH_VALUE

Forwarding rule's protocol and ports do not match the packet header.

FORWARDING_RULE_MISMATCH = 11;

FORWARDING_RULE_NO_INSTANCES

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

FORWARDING_RULE_NO_INSTANCES_VALUE

Forwarding rule does not have backends configured.

FORWARDING_RULE_NO_INSTANCES = 12;

FORWARDING_RULE_REGION_MISMATCH

Packet could be dropped because it was sent from a different region to a regional forwarding without global access.

FORWARDING_RULE_REGION_MISMATCH = 25;

FORWARDING_RULE_REGION_MISMATCH_VALUE

Packet could be dropped because it was sent from a different region to a regional forwarding without global access.

FORWARDING_RULE_REGION_MISMATCH = 25;

GKE_CLUSTER_NOT_RUNNING

Packet sent from or to a GKE cluster that is not in running state.

GKE_CLUSTER_NOT_RUNNING = 27;

GKE_CLUSTER_NOT_RUNNING_VALUE

Packet sent from or to a GKE cluster that is not in running state.

GKE_CLUSTER_NOT_RUNNING = 27;

GKE_CONTROL_PLANE_NO_ROUTE

Packet was dropped because there is no route from a GKE cluster control plane to a destination network.

GKE_CONTROL_PLANE_NO_ROUTE = 32;

GKE_CONTROL_PLANE_NO_ROUTE_VALUE

Packet was dropped because there is no route from a GKE cluster control plane to a destination network.

GKE_CONTROL_PLANE_NO_ROUTE = 32;

GKE_CONTROL_PLANE_REGION_MISMATCH

Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.

GKE_CONTROL_PLANE_REGION_MISMATCH = 30;

GKE_CONTROL_PLANE_REGION_MISMATCH_VALUE

Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region.

GKE_CONTROL_PLANE_REGION_MISMATCH = 30;

GKE_MASTER_UNAUTHORIZED_ACCESS

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GKE_MASTER_UNAUTHORIZED_ACCESS_VALUE

Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details.

GKE_MASTER_UNAUTHORIZED_ACCESS = 16;

GKE_PSC_ENDPOINT_MISSING

Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GKE_PSC_ENDPOINT_MISSING = 36;

GKE_PSC_ENDPOINT_MISSING_VALUE

Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GKE_PSC_ENDPOINT_MISSING = 36;

GOOGLE_MANAGED_SERVICE_NO_PEERING

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

GOOGLE_MANAGED_SERVICE_NO_PEERING_VALUE

Packet was dropped because there is no peering between the originating network and the Google Managed Services Network.

GOOGLE_MANAGED_SERVICE_NO_PEERING = 20;

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT

Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38;

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT_VALUE

Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project.

GOOGLE_MANAGED_SERVICE_NO_PSC_ENDPOINT = 38;

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED

The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55;

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED_VALUE

The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported.

HYBRID_NEG_NON_DYNAMIC_ROUTE_MATCHED = 55;

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED

The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56;

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED_VALUE

The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported.

HYBRID_NEG_NON_LOCAL_DYNAMIC_ROUTE_MATCHED = 56;

INSTANCE_NOT_RUNNING

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

INSTANCE_NOT_RUNNING_VALUE

Packet is sent from or to a Compute Engine instance that is not in a running state.

INSTANCE_NOT_RUNNING = 14;

LOAD_BALANCER_HAS_NO_PROXY_SUBNET

Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.

LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39;

LOAD_BALANCER_HAS_NO_PROXY_SUBNET_VALUE

Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found.

LOAD_BALANCER_HAS_NO_PROXY_SUBNET = 39;

NO_EXTERNAL_ADDRESS

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_EXTERNAL_ADDRESS_VALUE

Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection.

NO_EXTERNAL_ADDRESS = 9;

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT

No NAT subnets are defined for the PSC service attachment.

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57;

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT_VALUE

No NAT subnets are defined for the PSC service attachment.

NO_NAT_SUBNETS_FOR_PSC_SERVICE_ATTACHMENT = 57;

NO_ROUTE

Dropped due to no matching routes.

NO_ROUTE = 4;

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS

Packet is sent from the Internet to the private IPv6 address.

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44;

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS_VALUE

Packet is sent from the Internet to the private IPv6 address.

NO_ROUTE_FROM_INTERNET_TO_PRIVATE_IPV6_ADDRESS = 44;

NO_ROUTE_VALUE

Dropped due to no matching routes.

NO_ROUTE = 4;

PRIVATE_GOOGLE_ACCESS_DISALLOWED

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled in the subnet.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_GOOGLE_ACCESS_DISALLOWED_VALUE

Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled in the subnet.

PRIVATE_GOOGLE_ACCESS_DISALLOWED = 8;

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED

Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47;

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED_VALUE

Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network.

PRIVATE_GOOGLE_ACCESS_VIA_VPN_TUNNEL_UNSUPPORTED = 47;

PRIVATE_TRAFFIC_TO_INTERNET

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

PRIVATE_TRAFFIC_TO_INTERNET_VALUE

Packet with internal destination address sent to the internet gateway.

PRIVATE_TRAFFIC_TO_INTERNET = 7;

PSC_CONNECTION_NOT_ACCEPTED

The Private Service Connect endpoint is in a project that is not approved to connect to the service.

PSC_CONNECTION_NOT_ACCEPTED = 26;

PSC_CONNECTION_NOT_ACCEPTED_VALUE

The Private Service Connect endpoint is in a project that is not approved to connect to the service.

PSC_CONNECTION_NOT_ACCEPTED = 26;

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK

The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41;

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK_VALUE

The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported.

PSC_ENDPOINT_ACCESSED_FROM_PEERED_NETWORK = 41;

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48;

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled.

PSC_NEG_PRODUCER_ENDPOINT_NO_GLOBAL_ACCESS = 48;

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54;

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS_VALUE

The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified.

PSC_NEG_PRODUCER_FORWARDING_RULE_MULTIPLE_PORTS = 54;

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION

Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34;

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION_VALUE

Packet sent from a Cloud SQL instance with only a public IP address to a private IP address.

PUBLIC_CLOUD_SQL_INSTANCE_TO_PRIVATE_DESTINATION = 34;

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION

Packet sent from a public GKE cluster control plane to a private IP address.

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31;

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION_VALUE

Packet sent from a public GKE cluster control plane to a private IP address.

PUBLIC_GKE_CONTROL_PLANE_TO_PRIVATE_DESTINATION = 31;

ROUTE_BLACKHOLE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_BLACKHOLE_VALUE

Dropped due to invalid route. Route's next hop is a blackhole.

ROUTE_BLACKHOLE = 5;

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH

Route's next hop forwarding rule doesn't match next hop IP address.

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51;

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH_VALUE

Route's next hop forwarding rule doesn't match next hop IP address.

ROUTE_NEXT_HOP_FORWARDING_RULE_IP_MISMATCH = 51;

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID

Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53;

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID_VALUE

Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer).

ROUTE_NEXT_HOP_FORWARDING_RULE_TYPE_INVALID = 53;

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP

Route's next hop IP address is not a primary IP address of the next hop instance.

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50;

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP_VALUE

Route's next hop IP address is not a primary IP address of the next hop instance.

ROUTE_NEXT_HOP_INSTANCE_NON_PRIMARY_IP = 50;

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK

Route's next hop instance doesn't have a NIC in the route's network.

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49;

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK_VALUE

Route's next hop instance doesn't have a NIC in the route's network.

ROUTE_NEXT_HOP_INSTANCE_WRONG_NETWORK = 49;

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED

Route's next hop IP address cannot be resolved to a GCP resource.

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42;

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED_VALUE

Route's next hop IP address cannot be resolved to a GCP resource.

ROUTE_NEXT_HOP_IP_ADDRESS_NOT_RESOLVED = 42;

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND

Route's next hop resource is not found.

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43;

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND_VALUE

Route's next hop resource is not found.

ROUTE_NEXT_HOP_RESOURCE_NOT_FOUND = 43;

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED

Route's next hop VPN tunnel is down (does not have valid IKE SAs).

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52;

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED_VALUE

Route's next hop VPN tunnel is down (does not have valid IKE SAs).

ROUTE_NEXT_HOP_VPN_TUNNEL_NOT_ESTABLISHED = 52;

ROUTE_WRONG_NETWORK

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.

ROUTE_WRONG_NETWORK = 6;

ROUTE_WRONG_NETWORK_VALUE

Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3.

ROUTE_WRONG_NETWORK = 6;

ROUTING_LOOP

Packet is stuck in a routing loop.

ROUTING_LOOP = 59;

ROUTING_LOOP_VALUE

Packet is stuck in a routing loop.

ROUTING_LOOP = 59;

TRAFFIC_TYPE_BLOCKED

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

TRAFFIC_TYPE_BLOCKED_VALUE

The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details.

TRAFFIC_TYPE_BLOCKED = 15;

UNKNOWN_EXTERNAL_ADDRESS

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_EXTERNAL_ADDRESS_VALUE

Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input.

UNKNOWN_EXTERNAL_ADDRESS = 1;

UNKNOWN_INTERNAL_ADDRESS

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNKNOWN_INTERNAL_ADDRESS_VALUE

Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project.

UNKNOWN_INTERNAL_ADDRESS = 10;

UNRECOGNIZED
VPC_CONNECTOR_NOT_RUNNING

Packet could be dropped because the VPC connector is not in a running state.

VPC_CONNECTOR_NOT_RUNNING = 24;

VPC_CONNECTOR_NOT_RUNNING_VALUE

Packet could be dropped because the VPC connector is not in a running state.

VPC_CONNECTOR_NOT_RUNNING = 24;

VPC_CONNECTOR_NOT_SET

Packet could be dropped because no VPC connector is set.

VPC_CONNECTOR_NOT_SET = 23;

VPC_CONNECTOR_NOT_SET_VALUE

Packet could be dropped because no VPC connector is set.

VPC_CONNECTOR_NOT_SET = 23;

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH

The packet does not match a policy-based VPN tunnel local selector.

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45;

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH_VALUE

The packet does not match a policy-based VPN tunnel local selector.

VPN_TUNNEL_LOCAL_SELECTOR_MISMATCH = 45;

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH

The packet does not match a policy-based VPN tunnel remote selector.

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46;

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH_VALUE

The packet does not match a policy-based VPN tunnel remote selector.

VPN_TUNNEL_REMOTE_SELECTOR_MISMATCH = 46;

Static Methods

NameDescription
forNumber(int value)
getDescriptor()
internalGetValueMap()
valueOf(Descriptors.EnumValueDescriptor desc)
valueOf(int value)

Deprecated. Use #forNumber(int) instead.

valueOf(String name)
values()

Methods

NameDescription
getDescriptorForType()
getNumber()
getValueDescriptor()