Amazon Route 53 - AWS Cheat Sheet
Amazon Route 53 - AWS Cheat Sheet
Home » AWS Cheat Sheets » AWS Networking & Content Delivery » Amazon Route 53
Hosted Zones
Health Checks
Records
Routing Policies
Traffic Flow
Route 53 Resolver
Charges
X
JoinRoute 53aprovides
us for a worldwide
live info session distributed
on 06 APR DNStoservice.
learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Route 53 is located alongside all edge locations.
Health checks verify Internet connected resources are reachable, available, and functional.
Route 53 can be used to route Internet traffic for domains registered with another domain registrar (any
domain).
When you register a domain with Route 53 it becomes the authoritative DNS server for that domain and creates
a public hosted zone.
To make Route 53 the authoritative DNS for an existing domain without transferring the domain create a Route
53 public hosted zone and change the DNS Name Servers on the existing provider to the Route 53 Name
Servers.
Changes to Name Servers may not take effect for up to 48 hours due to the DNS record Time To Live (TTL)
values.
You can transfer domains to Route 53 only if the Top-Level Domain (TLD) is supported.
You can transfer a domain from Route 53 to another registrar by contacting AWS support.
You can transfer a domain to another account in AWS however it does not migrate the hosted zone by default
(optional).
It is possible to have the domain registered in one AWS account and the hosted zone in another AWS account.
You can control management access to your Amazon Route 53 hosted zone by using IAM.
There is a default limit of 50 domain names, but this can be increased by contacting support.
Private DNS is a Route 53 feature that lets you have authoritative DNS within your VPCs without exposing your
DNS records (including the name of the resource and its IP address(es) to the Internet.
You can use the AWS Management Console or API to register new domain names with Route 53.
Hosted Zones
A hosted zone is a collection of records for a specified domain.
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
A hosted zone is analogous to a traditional DNS zone file; it represents a collection of records that can be
managed together.
Amazon Route 53 automatically creates the Name Server (NS) and Start of Authority (SOA) records for the
hosted zones.
Amazon Route 53 creates a set of 4 unique name servers (a delegation set) within each hosted zone.
You can create multiple hosted zones with the same name and different records.
NS servers are specified by Fully Qualified Domain Name (FQDN), but you can get the IP addresses from the
command line (e.g. dig or nslookup).
For private hosted zones you can see a list of VPCs in each region and must select one.
For private hosted zones you must set the following VPC settings to “true”:
enableDnsHostname.
enableDnsSupport.
You cannot automatically register EC2 instances with private hosted zones (would need to be scripted).
Endpoints.
Status of other health checks.
Status of a CloudWatch alarm.
To associate a Route 53 private hosted zone in one AWS account (Account A) with a virtual private cloud that
belongs to another AWS account (Account B), follow these steps using the AWS CLI:
1. From an instance in Account A, authorize the association between the private hosted zone in Account A and
the virtual private cloud in Account B.
2. From an instance in Account B, create the association between the private hosted zone in Account A and
the virtual private cloud in Account B.
3. Delete the association authorization after the association is created.
Health Checks
Health checks check the instance health by connecting to it.
Endpoints.
Status of other health checks.
Status of a CloudWatch alarm.
HTTP: Route 53 tries to establish a TCP connection. If successful, Route 53 submits an HTTP request and
waits for an HTTP status code of 200 or greater and less than 400.
HTTPS: Route 53 tries to establish a TCP connection. If successful, Route 53 submits an HTTPS request
and waits for an HTTP status code of 200 or greater and less than 400.
HTTP_STR_MATCH: Route 53 tries to establish a TCP connection. If successful, Route 53 submits an HTTP
request and searches the first 5,120 bytes of the response body for the string that you specify
in SearchString.
HTTPS_STR_MATCH: Route 53 tries to establish a TCP connection. If successful, Route 53 submits
an HTTPS request and searches the first 5,120 bytes of the response body for the string that you specify
in SearchString.
TCP: Route 53 tries to establish a TCP connection.
CLOUDWATCH_METRIC: The health check is associated with a CloudWatch alarm. If the state of the alarm
is OK, the health check is considered healthy. If the state is ALARM, the health check is considered
unhealthy. If CloudWatch doesn’t have sufficient data to determine whether the state is OK or ALARM, the
health check status depends on the setting for InsufficientDataHealthStatus: Healthy, Unhealthy,
or LastKnownStatus.
CALCULATED: For health checks that monitor the status of other health checks, Route 53 adds up the
number of health checks that Route 53 health checkers consider to be healthy and compares that number
with the value of HealthThreshold. X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Records
Amazon Route 53 currently supports the following DNS record types:
A (address record).
AAAA (IPv6 address record).
CNAME (canonical name record).
CAA (certification authority authorization).
MX (mail exchange record).
NAPTR (name authority pointer record).
NS (name server record).
PTR (pointer record).
SOA (start of authority record).
SPF (sender policy framework).
SRV (service locator).
TXT (text record).
Alias (an Amazon Route 53-specific virtual record).
Alias records are used to map resource record sets in your hosted zone to Amazon Elastic Load Balancing load
balancers, Amazon CloudFront distributions, AWS Elastic Beanstalk environments, or Amazon S3 buckets that
are configured as websites.
You can use Alias records to map custom domain names (such as api.example.com) both to API Gateway
custom regional APIs and edge-optimized APIs and to Amazon VPC interface endpoints.
You cannot set the TTL for Alias records for ELB, S3, or Elastic Beanstalk environment (uses the service’s
default).
Alias records work like a CNAME record in that you can map one DNS name (e.g. example.com) to another
‘target’ DNS name (e.g. elb1234.elb.amazonaws.com).
An Alias record can be used for resolving apex / naked domain names (e.g. example.com rather than
sub.example.com).
A CNAME record can’t be used for resolving apex / naked domain names.
Route 53 supports wildcard entries for all record types, except NS records. X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will between
The following table details the differences elevateAlias
yourand
cloud career
CNAME records:
CNAME Records Alias Records
Route 53 charges for Route 53 doesn’t charge for alias queries to AWS
CNAME queries resources
You can’t create a CNAME You can create an alias record at the zone apex
record at the top node of a (however you can’t route to a CNAME at the zone apex)
DNS namespace (zone
apex)
A CNAME record redirects Route 53 follows the pointer in an alias record only when
queries for a domain name the record type also matches
regardless of record type
A CNAME can point to any An alias record can only point to a CloudFront
DNS record that is hosted distribution, Elastic Beanstalk environment, ELB, S3
anywhere bucket as a static website, or to another record in the
same hosted zone that you’re creating the alias record
in
A CNAME record is visible An alias record is only visible in the Route 53 console or
in the answer section of a the Route 53 API
reply from a Route 53 DNS
server
A CNAME record is followed An alias record is only followed inside Route 53. This
by a recursive resolver means that both the alias record and its target must
exist in Route 53
Routing Policies
Routing policies determine how Route 53 responds to queries.
The following table highlights the key function of each type of routing policy:
The following diagram depicts an Amazon Route 53 Simple routing policy configuration:
Failover:
The following diagram depicts an Amazon Route 53 Failover routing policy configuration:
The following diagram depicts an Amazon Route 53 Geolocation routing policy configuration:
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Geo-proximity routing policy (requires Route Flow):
Use for routing traffic based on the location of resources and, optionally, shift traffic from resources in one
location to resources in another.
Focused on improving performance by routing to the region with the lowest latency.
You create latency records for your resources in multiple EC2 locations.
The following diagram depicts an Amazon Route 53 Latency based routing policy configuration:
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Multi-value Answer Routing Policy
Use for responding to DNS queries with up to eight healthy records selected at random.
The following diagram depicts an Amazon Route 53 Multivalue routing policy configuration:
The following diagram depicts an Amazon Route 53 Weighted routing policy configuration:
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Traffic Flow
Route 53 Traffic Flow provides Global Traffic Management (GTM) services.
Traffic flow policies allow you to create routing configurations for resources using routing types such as failover
and geolocation.
Create policies that route traffic based on specific constraints, including latency, endpoint health, load, geo-
proximity, and geography.
Scenarios include:
Amazon Route 53 Traffic Flow also includes a versioning feature that allows you to maintain a history of
changes to your routing policies, and easily roll back to a previous policy version using the console or API.
Route 53 Resolver
Route 53 Resolver is a set of features that enable bi-directional querying between on-premises and AWS over
private connections.
There are a couple of ways to provide resolution of Microsoft Active Directory Domain Controller DNS zones and
AWS records: X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Define an outbound Amazon Route 53 Resolver. Set a conditional forwarding rule for the Active Directory
domain to the Active Directory servers. Configure the DNS settings in the VPC DHCP options set to use the
AmazonProvidedDNS servers.
Configure the DHCP options set associated with the VPC to assign the IP addresses of the Domain
Controllers as DNS servers. Update the DNS service on the Active Directory servers to forward all non-
authoritative queries to the VPC Resolver.
Charges
You pay per hosted zone per month (no partial months).
A hosted zone deleted within 12 hours of creation is not charged (queries are charged).
Queries.
Traffic Flow.
Health Checks.
Route 53 Resolver ENIs + queries.
Domain names.
Alias records are free of charge when the records are mapped to one of the following:
Health checks are charged with different prices for AWS vs non-AWS endpoints.
You do not pay for the records that you add to your hosted zones.
Related posts:
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career
Categories: AWS Cheat Sheets, AWS Developer Associate, AWS Networking & Content
Delivery, AWS Networking & Content Delivery (DVA), AWS Networking & Content
Delivery (SAA), AWS Networking & Content Delivery (SAP), AWS Networking &
Content Delivery (SOA), AWS Solutions Architect Associate, AWS Solutions
Architect Professional, AWS SysOps Administrator Associate
FAQ Contact us
Your Email
Subscribe
Follow Terms
Twitter Sitemap
X
Join us for a live info session on 06 APR to learn about our Cloud Mastery Bootcamp that
will elevate your cloud career