-
Notifications
You must be signed in to change notification settings - Fork 0
539 explain subnet name #858
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 13 commits
Commits
Show all changes
26 commits
Select commit
Hold shift + click to select a range
7b67836
minor refactoring
ShiriMoran f21e285
minor refactoring
ShiriMoran ed34099
update err message
ShiriMoran 1afad6f
connected subnet option
ShiriMoran 7c492ad
added 1st test
ShiriMoran efba466
revert committed by mistake
ShiriMoran ce67207
revert committed by mistake
ShiriMoran a720106
test with multiple endpoints in subnet
ShiriMoran 7df916f
test with multiple endpoints in subnet
ShiriMoran 02138aa
test in multi vpc context of subnet to subnet
ShiriMoran d7cc0a2
added clarification comment
ShiriMoran 474e080
added aws test; found a bug - still not clear if in explain or in con…
ShiriMoran 1331ccc
bug fix
ShiriMoran 0ff2fd8
CR: update help and readme
ShiriMoran 68f48ed
Merge branch 'main' into 539_explain_subnet_name
ShiriMoran a28d5b0
merge with main
ShiriMoran f95627b
merge with main
ShiriMoran 7835f22
Update cmd/analyzer/subcmds/explain.go
ShiriMoran c911fce
linux vs windows
ShiriMoran 8887a65
dedicated error message for subnet with no endpoints
ShiriMoran db983fc
added dedicated test to subnet with no endpoints
ShiriMoran 21b4843
fix typos
ShiriMoran 7ea223b
Update docs/vpcanalyzer_explain.md
ShiriMoran a6c28f9
CR
ShiriMoran 6cf728f
Merge remote-tracking branch 'origin/539_explain_subnet_name' into 53…
ShiriMoran 884329f
CR
ShiriMoran File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
62 changes: 62 additions & 0 deletions
62
pkg/awsvpc/examples/out/explain_out/subnet_to_subnet_all_vpcs_explain_detail.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,62 @@ | ||
Explaining connectivity from private2 to private1 within mixed | ||
Interpreted source: r1[10.240.48.198] | ||
Interpreted destination: q2[10.240.32.122], q1[10.240.32.91] | ||
============================================================== | ||
|
||
Connections from r1[10.240.48.198] to q1[10.240.32.91]: No Connections | ||
|
||
Path: | ||
r1[10.240.48.198] -> security group GroupId:22 -> network ACL acl1 -> subnet private2 -> | ||
subnet private1 -> network ACL acl1 -> security group GroupId:15 -> q1[10.240.32.91] | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is disabled; The relevant rules are: | ||
Egress: | ||
security group GroupId:22 allows connection with the following allow rules | ||
Outbound index: 0, direction: outbound, target: 0.0.0.0/0, conns: protocol: tcp, dstPorts: 9080-9080 | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: outbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
|
||
Ingress: | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: inbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
security group GroupId:15 allows connection with the following allow rules | ||
Inbound index: 0, direction: inbound, target: 0.0.0.0/0, conns: protocol: udp, dstPorts: 0-65535 | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
||
Connections from r1[10.240.48.198] to q2[10.240.32.122]: protocol: TCP dst-ports: 9080 | ||
|
||
Path: | ||
r1[10.240.48.198] -> security group GroupId:22 -> network ACL acl1 -> subnet private2 -> | ||
subnet private1 -> network ACL acl1 -> security group GroupId:9 -> q2[10.240.32.122] | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is enabled; The relevant rules are: | ||
Egress: | ||
security group GroupId:22 allows connection with the following allow rules | ||
Outbound index: 0, direction: outbound, target: 0.0.0.0/0, conns: protocol: tcp, dstPorts: 9080-9080 | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: outbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
|
||
Ingress: | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: inbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
security group GroupId:9 allows connection with the following allow rules | ||
Inbound index: 0, direction: inbound, target: 10.240.0.0/18, conns: protocol: all | ||
|
||
TCP response is enabled; The relevant rules are: | ||
Egress: | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: outbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
|
||
Ingress: | ||
network ACL acl1 allows connection with the following allow rules | ||
ruleNumber: 20, direction: inbound ,cidr: 10.240.32.0/19, action: allow, conn: all | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
65 changes: 65 additions & 0 deletions
65
pkg/ibmvpc/examples/out/explain_out/externalToSubnet_all_vpcs_explain_detail.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
Explaining connectivity from 161.26.0.0 to subnet3-ky within test-vpc1-ky | ||
Interpreted source: 161.26.0.0 (external) | ||
Interpreted destination: vsi3a-ky[10.240.30.5], vsi3b-ky[10.240.30.4], db-endpoint-gateway-ky[10.240.30.6] | ||
========================================================================= | ||
|
||
No connections from Public Internet 161.26.0.0/32 to db-endpoint-gateway-ky[10.240.30.6]; | ||
connection is blocked at ingress and because there is no resource for external connectivity | ||
|
||
Ingress: network ACL acl3-ky allows connection; security group sg3-ky does not allow connection | ||
|
||
Path: | ||
Public Internet 161.26.0.0/32 -> | ||
| no resource for external connectivity | | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is disabled; The relevant rules are: | ||
Ingress: | ||
network ACL acl3-ky allows connection with the following allow rules | ||
direction: inbound, name: inbound, priority: 1, action: allow, source: 0.0.0.0/0 , destination: 0.0.0.0/0, conn: all | ||
security group sg3-ky has no relevant allow rules | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
||
No connections from Public Internet 161.26.0.0/32 to vsi3a-ky[10.240.30.5]; | ||
connection is blocked at ingress and because there is no resource for external connectivity | ||
|
||
Ingress: network ACL acl3-ky allows connection; security group sg3-ky does not allow connection | ||
|
||
Path: | ||
Public Internet 161.26.0.0/32 -> | ||
| no resource for external connectivity | | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is disabled; The relevant rules are: | ||
Ingress: | ||
network ACL acl3-ky allows connection with the following allow rules | ||
direction: inbound, name: inbound, priority: 1, action: allow, source: 0.0.0.0/0 , destination: 0.0.0.0/0, conn: all | ||
security group sg3-ky has no relevant allow rules | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
||
No connections from Public Internet 161.26.0.0/32 to vsi3b-ky[10.240.30.4]; | ||
connection is blocked at ingress and because there is no resource for external connectivity | ||
|
||
Ingress: network ACL acl3-ky allows connection; security group sg2-ky does not allow connection | ||
|
||
Path: | ||
Public Internet 161.26.0.0/32 -> | ||
| no resource for external connectivity | | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is disabled; The relevant rules are: | ||
Ingress: | ||
network ACL acl3-ky allows connection with the following allow rules | ||
direction: inbound, name: inbound, priority: 1, action: allow, source: 0.0.0.0/0 , destination: 0.0.0.0/0, conn: all | ||
security group sg2-ky has no relevant allow rules | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
31 changes: 31 additions & 0 deletions
31
pkg/ibmvpc/examples/out/explain_out/subnetToVsiSingleVpc_all_vpcs_explain_detail.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
Explaining connectivity from subnet1-ky to 10.240.20.4 within test-vpc1-ky | ||
Interpreted source: vsi1-ky[10.240.10.4] | ||
Interpreted destination: vsi2-ky[10.240.20.4] | ||
========================================================================== | ||
|
||
No connections from vsi1-ky[10.240.10.4] to vsi2-ky[10.240.20.4]; | ||
connection is blocked at egress | ||
|
||
Egress: security group sg1-ky does not allow connection; network ACL acl1-ky allows connection | ||
Ingress: network ACL acl2-ky allows connection; security group sg2-ky allows connection | ||
|
||
Path: | ||
vsi1-ky[10.240.10.4] -> | security group sg1-ky | | ||
|
||
|
||
Details: | ||
~~~~~~~~ | ||
Path is disabled; The relevant rules are: | ||
Egress: | ||
security group sg1-ky has no relevant allow rules | ||
network ACL acl1-ky allows connection with the following allow rules | ||
direction: outbound, name: outbound, priority: 1, action: allow, source: 0.0.0.0/0 , destination: 0.0.0.0/0, conn: all | ||
|
||
Ingress: | ||
network ACL acl2-ky allows connection with the following allow rules | ||
direction: inbound, name: inbound, priority: 1, action: allow, source: 0.0.0.0/0 , destination: 0.0.0.0/0, conn: all | ||
security group sg2-ky allows connection with the following allow rules | ||
direction: inbound, id: id:147, remote: sg1-ky (10.240.10.4/32), local: 0.0.0.0/0, conns: protocol: all | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
17 changes: 17 additions & 0 deletions
17
pkg/ibmvpc/examples/out/explain_out/tgwSubnetToSubnet_all_vpcs_explain.txt
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
Explaining connectivity from test-vpc1-ky/subnet11-ky to subnet32-ky | ||
Interpreted source: test-vpc1-ky/vsi11-ky[10.240.11.4] | ||
Interpreted destination: test-vpc3-ky/vsi32-ky[10.240.128.4] | ||
==================================================================== | ||
|
||
No connections from test-vpc1-ky/vsi11-ky[10.240.11.4] to test-vpc3-ky/vsi32-ky[10.240.128.4]; | ||
connection is blocked at egress | ||
|
||
Egress: security group sg11-ky allows connection; network ACL acl11-ky blocks connection | ||
cross-vpc-connection: transit-connection tg_connection3 of transit-gateway local-tg-ky allows connection | ||
Ingress: network ACL acl31-ky allows connection; security group sg31-ky allows connection | ||
|
||
Path: | ||
vsi11-ky[10.240.11.4] -> security group sg11-ky -> | network ACL acl11-ky | | ||
|
||
------------------------------------------------------------------------------------------------------------------------ | ||
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.