This page shows examples of invalid or inconsistent configurations of Google Cloud resources that you might encounter when troubleshooting your network with Connectivity Tests.
For instructions about how to run tests, see Create and run Connectivity Tests.
For a description of testing to and from common network source and destination types, see Common use cases.
Detect an invalid configuration
There are many different types of invalid configurations; that is, configurations that are not correct or that have been updated and are no longer valid.
One example is a virtual machine (VM) instance that has been configured as a NAT gateway, but which has been deleted or migrated. In this case, the route to the VM instance still exists.
In the following diagram, VM1 in Network 1 should be able to access data on
VM2, VM3, and VM4 in Network 2 through a VM instance named nat_vm_1.
However, nat_vm_1 no longer exists because it has migrated to a new VM,
nat_vm_2.
The configured route from VM1 to the other three VM instances still
points to nat_vm_1 as the next hop. However, because nat_vm_1 no longer
exists and there is no route to nat_vm_2, VM1 can't communicate with the
other VM instances.
A Connectivity Test run fromVM1 to VM2 reveals that the
traffic between VM1 and the other VM instances has been dropped due to an
invalid next hop for the route to the other VMs.
In contrast, in the use case for an
inconsistent configuration,
VM3 is missing a network tag, making the load balancer configuration
inconsistent
across the load balancer backends. However, the configuration for VM3 itself
is valid because configuring a VM instance doesn't require a tag.
Detect an inconsistent configuration
You can also use Connectivity Tests to routinely validate inconsistent configurations. These configurations might not be causing any current connectivity issues, but might unintentionally reduce network redundancy or cause performance issues in the future.
The load balancer is configured to send traffic to an external IP address of
35.184.176.28. The traffic to that address is distributed across three
backends: VM1, VM2, and VM3. However, because of a missing network tag
on
VM3, the Virtual Private Cloud (VPC) firewall rule allows traffic from
external IP ranges to VM1 and VM2, but denies that traffic to VM3.
The following trace from the allowed source ranges configured for the load
balancer to the destination external IP address of the load balancer shows the
intended configuration and the inconsistency. VM1 and VM2 are reachable,
but
VM3 is unreachable. Only the two backends are reachable because VM3 has
failed the health check.