public enum DropInfo.Types.Cause
Reference documentation and code samples for the Network Management v1 API enum DropInfo.Types.Cause.
Drop cause types:
Namespace
Google.Cloud.NetworkManagement.V1Assembly
Google.Cloud.NetworkManagement.V1.dll
Fields |
|
---|---|
Name | Description |
CloudFunctionNotActive |
Packet could be dropped because the Cloud Function is not in an active status. |
CloudNatNoAddresses |
Packet sent to Cloud Nat without active NAT IPs. |
CloudRunRevisionNotReady |
Packet sent from a Cloud Run revision that is not ready. |
CloudSqlInstanceNoIpAddress |
Packet was dropped because the Cloud SQL instance has neither a private nor a public IP address. |
CloudSqlInstanceNoRoute |
Packet was dropped because there is no route from a Cloud SQL instance to a destination network. |
CloudSqlInstanceNotConfiguredForExternalTraffic |
Packet sent from a Cloud SQL instance to an external IP address is not allowed. The Cloud SQL instance is not configured to send packets to external IP addresses. |
CloudSqlInstanceNotRunning |
Packet sent from or to a Cloud SQL instance that is not in running state. |
CloudSqlInstanceUnauthorizedAccess |
Access to the Cloud SQL instance endpoint is not authorized. See Authorizing with authorized networks for more details. |
CloudSqlPscNegUnsupported |
The packet is sent to the Private Service Connect backend (network endpoint group) targeting a Cloud SQL service attachment, but this configuration is not supported. |
DroppedInsideCloudSqlService |
Packet was dropped inside Cloud SQL Service. |
DroppedInsideGkeService |
Packet was dropped inside Google Kubernetes Engine Service. |
DroppedInsidePscServiceProducer |
Packet was dropped inside Private Service Connect service producer. |
FirewallBlockingLoadBalancerBackendHealthCheck |
Firewalls block the health check probes to the backends and cause the backends to be unavailable for traffic from the load balancer. For more details, see Health check firewall rules. |
FirewallRule |
Dropped due to a firewall rule, unless allowed due to connection tracking. |
ForeignIpDisallowed |
A Compute Engine instance can only send or receive a packet with a foreign IP address if ip_forward is enabled. |
ForwardingRuleMismatch |
Forwarding rule's protocol and ports do not match the packet header. |
ForwardingRuleNoInstances |
Forwarding rule does not have backends configured. |
ForwardingRuleRegionMismatch |
Packet could be dropped because it was sent from a different region to a regional forwarding without global access. |
GkeClusterNotRunning |
Packet sent from or to a GKE cluster that is not in running state. |
GkeControlPlaneNoRoute |
Packet was dropped because there is no route from a GKE cluster control plane to a destination network. |
GkeControlPlaneRegionMismatch |
Packet was dropped because a GKE cluster private endpoint is unreachable from a region different from the cluster's region. |
GkeMasterUnauthorizedAccess |
Access to Google Kubernetes Engine cluster master's endpoint is not authorized. See Access to the cluster endpoints for more details. |
GkePscEndpointMissing |
Packet was dropped because the GKE cluster uses Private Service Connect (PSC), but the PSC endpoint is not found in the project. |
GoogleManagedServiceNoPeering |
Packet was dropped because there is no peering between the originating network and the Google Managed Services Network. |
GoogleManagedServiceNoPscEndpoint |
Packet was dropped because the Google-managed service uses Private Service Connect (PSC), but the PSC endpoint is not found in the project. |
HybridNegNonDynamicRouteMatched |
The packet sent from the hybrid NEG proxy matches a non-dynamic route, but such a configuration is not supported. |
HybridNegNonLocalDynamicRouteMatched |
The packet sent from the hybrid NEG proxy matches a dynamic route with a next hop in a different region, but such a configuration is not supported. |
InstanceNotRunning |
Packet is sent from or to a Compute Engine instance that is not in a running state. |
LoadBalancerHasNoProxySubnet |
Packet sent to a load balancer, which requires a proxy-only subnet and the subnet is not found. |
NoExternalAddress |
Instance with only an internal IP address tries to access external hosts, but Cloud NAT is not enabled in the subnet, unless special configurations on a VM allow this connection. |
NoNatSubnetsForPscServiceAttachment |
No NAT subnets are defined for the PSC service attachment. |
NoRoute |
Dropped due to no matching routes. |
NoRouteFromInternetToPrivateIpv6Address |
Packet is sent from the Internet to the private IPv6 address. |
PrivateGoogleAccessDisallowed |
Instance with only an internal IP address tries to access Google API and services, but private Google access is not enabled in the subnet. |
PrivateGoogleAccessViaVpnTunnelUnsupported |
Source endpoint tries to access Google API and services through the VPN tunnel to another network, but Private Google Access needs to be enabled in the source endpoint network. |
PrivateTrafficToInternet |
Packet with internal destination address sent to the internet gateway. |
PscConnectionNotAccepted |
The Private Service Connect endpoint is in a project that is not approved to connect to the service. |
PscEndpointAccessedFromPeeredNetwork |
The packet is sent to the Private Service Connect endpoint over the peering, but it's not supported. |
PscNegProducerEndpointNoGlobalAccess |
The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule does not have global access enabled. |
PscNegProducerForwardingRuleMultiplePorts |
The packet is sent to the Private Service Connect backend (network endpoint group), but the producer PSC forwarding rule has multiple ports specified. |
PublicCloudSqlInstanceToPrivateDestination |
Packet sent from a Cloud SQL instance with only a public IP address to a private IP address. |
PublicGkeControlPlaneToPrivateDestination |
Packet sent from a public GKE cluster control plane to a private IP address. |
RouteBlackhole |
Dropped due to invalid route. Route's next hop is a blackhole. |
RouteNextHopForwardingRuleIpMismatch |
Route's next hop forwarding rule doesn't match next hop IP address. |
RouteNextHopForwardingRuleTypeInvalid |
Route's next hop forwarding rule type is invalid (it's not a forwarding rule of the internal passthrough load balancer). |
RouteNextHopInstanceNonPrimaryIp |
Route's next hop IP address is not a primary IP address of the next hop instance. |
RouteNextHopInstanceWrongNetwork |
Route's next hop instance doesn't have a NIC in the route's network. |
RouteNextHopIpAddressNotResolved |
Route's next hop IP address cannot be resolved to a GCP resource. |
RouteNextHopResourceNotFound |
Route's next hop resource is not found. |
RouteNextHopVpnTunnelNotEstablished |
Route's next hop VPN tunnel is down (does not have valid IKE SAs). |
RouteWrongNetwork |
Packet is sent to a wrong (unintended) network. Example: you trace a packet from VM1:Network1 to VM2:Network2, however, the route configured in Network1 sends the packet destined for VM2's IP address to Network3. |
RoutingLoop |
Packet is stuck in a routing loop. |
TrafficTypeBlocked |
The type of traffic is blocked and the user cannot configure a firewall rule to enable it. See Always blocked traffic for more details. |
UnknownExternalAddress |
Destination external address cannot be resolved to a known target. If the address is used in a Google Cloud project, provide the project ID as test input. |
UnknownInternalAddress |
Destination internal address cannot be resolved to a known target. If this is a shared VPC scenario, verify if the service project ID is provided as test input. Otherwise, verify if the IP address is being used in the project. |
Unspecified |
Cause is unspecified. |
VpcConnectorNotRunning |
Packet could be dropped because the VPC connector is not in a running state. |
VpcConnectorNotSet |
Packet could be dropped because no VPC connector is set. |
VpnTunnelLocalSelectorMismatch |
The packet does not match a policy-based VPN tunnel local selector. |
VpnTunnelRemoteSelectorMismatch |
The packet does not match a policy-based VPN tunnel remote selector. |