You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -208,6 +208,7 @@ The following **260** rules are applied by this linter:
208
208
|[E3681<aname="E3681"></a>](../src/cfnlint/rules/resources/elasticloadbalancingv2/TargetGroupTargetTypeRestrictions.py)| Validate target group target type property restrictions | When a TargetGroup target type is lambda or not there are different restrictions on properties. ||[Source]()|`resources`|
209
209
|[E3682<aname="E3682"></a>](../src/cfnlint/rules/resources/rds/DbInstanceAuroraExclusive.py)| Validate when using Aurora certain properies aren't required | When creating an aurora DBInstance don't specify 'AllocatedStorage', 'BackupRetentionPeriod', 'CopyTagsToSnapshot', 'DeletionProtection', 'EnableIAMDatabaseAuthentication', 'MasterUserPassword', or 'StorageEncrypted' ||[Source]()|`resources`|
210
210
|[E3683<aname="E3683"></a>](../src/cfnlint/rules/resources/elasticloadbalancingv2/TargetGroupProtocolRestrictions.py)| Validate target group protocol property restrictions | When a TargetGroup protocol is HTTP/HTTPS or GENEVE there are different restrictions on properties. ||[Source]()|`resources`|
211
+
|[E3684<aname="E3684"></a>](../src/cfnlint/rules/resources/elasticloadbalancingv2/TargetGroupHealthCheckProtocolRestrictions.py)| Validate target group health check protocol property restrictions | When a TargetGroup health check protocol is specified there are restrictions on other properties. ||[Source]()|`resources`|
211
212
|[E3686<aname="E3686"></a>](../src/cfnlint/rules/resources/rds/DbClusterServerlessExclusive.py)| Validate allowed properties when using a serverless RDS DB cluster | Validate that when EngineMode is 'serverless' or 'provisioned' that the appropriate allowed properties are provided. If 'EngineMode' is not provided make sure serverless properties don't exist at all. ||[Source]()|`resources`|
212
213
|[E3687<aname="E3687"></a>](../src/cfnlint/rules/resources/ectwo/SecurityGroupProtocolsAndPortsInclusive.py)| Validate to and from ports based on the protocol | When using icmp, icmpv6, tcp, or udp you have to specify the to and from port ranges ||[Source]()|`resources`|
213
214
|[E3688<aname="E3688"></a>](../src/cfnlint/rules/resources/ectwo/SecurityGroupAllToAndFromPorts.py)| Validate that to and from ports are both -1 | When ToPort or FromPort are -1 the other one must also be -1 ||[Source]()|`resources`|
0 commit comments