Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

🎁 Get 20% Off - Christmas Big Sale on All Practice Exams, Video Courses, and eBooks!

Amazon Route 53

Amazon Route 53

Last updated on November 14, 2024

Amazon Route 53 Cheat Sheet

  • A highly available and scalable Domain Name System (DNS) web service used for domain registration, DNS routing, and health checking.

Key Features

  • Resolver
  • Traffic flow
  • Latency based routing
  • Geo DNS
  • Private DNS for Amazon VPC
  • DNS Failover
  • Health Checks and Monitoring
  • Domain Registration
  • CloudFront and S3 Zone Apex Support
  • Amazon ELB Integration

Domain Registration

  • Choose a domain name and confirm that it’s available, then register the domain name with Route 53. The service automatically makes itself the DNS service for the domain by doing the following:
    • Creates a hosted zone that has the same name as your domain.
    • Assigns a set of four name servers to the hosted zone. When someone uses a browser to access your website, such as www.example.com, these name servers tell the browser where to find your resources, such as a web server or an S3 bucket.
    • Gets the name servers from the hosted zone and adds them to the domain.
  • Tutorials dojo strip
  • If you already registered a domain name with another registrar, you can choose to transfer the domain registration to Route 53.
  • Enable DNSSEC signing on new or existing public hosted zones. DNSSEC provides data integrity verification and
    data origin authentication for DNS.
  • You can also configure DNSSEC on domain registration.

Routing Internet Traffic to your Website or Web Application

  • Use the Route 53 console to register a domain name and configure Route 53 to route internet traffic to your website or web application.
  • After you register your domain name, Route 53 automatically creates a public hosted zone that has the same name as the domain.
  • To route traffic to your resources, you create records, also known as resource record sets, in your hosted zone.
  • You can create special Route 53 records, called alias records, that route traffic to S3 buckets, CloudFront distributions, and other AWS resources.
  • Each record includes information about how you want to route traffic for your domain, such as:
    • Name – name of the record corresponds with the domain name or subdomain name that you want Route 53 to route traffic for.
    • Type – determines the type of resource that you want traffic to be routed to.
    • Value
  • How traffic is routed

AWS Training Amazon Route 53
Route 53 Health Checks

    • How it works

AWS Training Amazon Route 53

    • Create a health check and specify values that define how you want the health check to work, such as:
      • The IP address or domain name of the endpoint that you want Route 53 to monitor.
      • The protocol that you want Route 53 to use to perform the check: HTTP, HTTPS, or TCP.
      • The request interval you want Route 53 to send a request to the endpoint.
      • How many consecutive times the endpoint must fail to respond to requests before Route 53 considers it unhealthy. This is the failure threshold.
    • You can configure a health check to check the health of one or more other health checks.
    • You can configure a health check to check the status of a CloudWatch alarm so that you can be notified on the basis of a broad range of criteria.

Know the following Concepts

  • Domain Registration Concepts – domain name, domain registrar, domain registry, domain reseller, top-level domain
  • DNS Concepts
    • Alias record – a type of record that you can create to route traffic to AWS resources.
    • DNS query
    • DNS resolver
    • Domain Name System (DNS)
    • Private DNS
    • Hosted zone – a container for records, which includes information about how to route traffic for a domain and all of its subdomains.
    • Name servers – servers in the DNS that help to translate domain names into the IP addresses that computers use to communicate with one another.
    • Record (DNS record) – an object in a hosted zone that you use to define how you want to route traffic for the domain or a subdomain.
    • Routing policy
    • Subdomain
    • Time to live (TTL)
  • Health Checking Concepts
    • DNS failover – a method for routing traffic away from unhealthy resources and to healthy resources.
    • endpoint
    • health check

Routing Policies

  • Simple routing policy – route internet traffic to a single resource that performs a given function for your domain. You can’t create multiple records that have the same name and type, but you can specify multiple values in the same record, such as multiple IP addresses.
  • Failover routing policy – use when you want to configure active-passive failover.
  • Geolocation routing policy – use when you want to route internet traffic to your resources based on the location of your users.
  • Geoproximity routing policy – use when you want to route traffic based on the location of your resources and, optionally, shift traffic from resources in one location to resources in another.
    • You can also optionally choose to route more traffic or less to a given resource by specifying a value, known as a bias. A bias expands or shrinks the size of the geographic region from which traffic is routed to a resource.
    • The effect of changing the bias for your resources depends on a number of factors, including the following:
      • The number of resources that you have.
      • How close the resources are to one another.
      • The number of users that you have near the border area between geographic regions.
  • Latency routing policy – use when you have resources in multiple locations and you want to route traffic to the resource that provides the best latency.
  • IP-based routing policy – use when you want to route traffic based on your users’ locations, and know where the IP address or traffic is coming from. 
  • Multivalue answer routing policy – use when you want Route 53 to respond to DNS queries with up to eight healthy records selected at random.
  • Weighted routing policy – use to route traffic to multiple resources in proportions that you specify.
  • When you register a domain or transfer domain registration to Route 53, it configures the domain to renew automatically. The automatic renewal period is typically one year, although the registries for some top-level domains (TLDs) have longer renewal periods.
  • When you register a domain with Route 53, it creates a hosted zone that has the same name as the domain, assigns four name servers to the hosted zone, and updates the domain to use those name servers.

Hosted Zones

  • Route 53 automatically creates the Name Server (NS) and Start of Authority (SOA) records for the hosted zones.
  • Route 53 creates a set of 4 unique name servers (a delegation set) within each hosted zone.
  • Public hosted zone – route internet traffic to your resources
  • Private hosted zone – route traffic within an Amazon VPC. You create a private hosted zone, and specify the VPCs that you want to associate with the hosted zone.
    • To use private hosted zones, you must set the following VPC settings to true:
      • enableDnsHostnames
      • enableDnsSupport
    • In a private hosted zone, you can associate Route 53 health checks only with failover, multivalue answer, weighted, latency, and, geolocation records.
    • You can use the following routing policies when you create records in a private hosted zone:
      • Simple
      • Failover
      • Multivalue answer
      • Weighted
      • Latency-based
      • Geolocation

Records

  • Create records in a hosted zone. Records define where you want to route traffic for each domain name or subdomain name. The name of each record in a hosted zone must end with the name of the hosted zone.
  • Alias Records
    • Route 53 alias records provide a Route 53–specific extension to DNS functionality. Alias records let you route traffic to selected AWS resources. They also let you route traffic from one record in a hosted zone to another record.
    • You can create an alias record at the top node of a DNS namespace, also known as the zone apex.
  • CNAME Record
    • You cannot create an alias record at the top node of a DNS namespace using a CNAME record.
  • Alias records vs CNAME records

CNAME Records

Alias Records

You can’t create a CNAME record at the zone apex.

You can create an alias record at the zone apex. Alias records must have the same type as the record you’re routing traffic to.

Route 53 charges for CNAME queries.

Route 53 doesn’t charge for alias queries to AWS resources.

A CNAME record redirects queries for a domain name regardless of record type.

Route 53 responds to a DNS query only when the name and type of the alias record matches the name and type in the query.

A CNAME record can point to any DNS record that is hosted anywhere.

An alias record can only point to selected AWS resources or to another record in the hosted zone that you’re creating the alias record in.

A CNAME record appears as a CNAME record in response to dig or Name Server (NS) lookup queries.

An alias record appears as the record type that you specified when you created the record, such as A or AAAA.

  • You can use IAM policy conditions to grant users fine-grained access to updating resource record sets.
  • You can also combine any of the granular permissions to create permissions.

Supported DNS Record Types

  • A Record Type – the value for an A record is an IPv4 address in dotted decimal notation.
  • AAAA Record Type – the value for an AAAA record is an IPv6 address in colon-separated hexadecimal format.
  • CAA Record Type – lets you specify which certificate authorities (CAs) are allowed to issue certificates for a domain or subdomain.
  • CNAME Record Type – a CNAME Value element is the same format as a domain name.
  • DS Record Type – represents key tag, algorithm, digest type, and digest of the zone key.
  • MX Record Type – each value for an MX record actually contains two values, priority and domain name.
  • NAPTR Record Type – converts one value to another or replaces one value with another.
  • NS Record Type – identifies the name servers for the hosted zone. The value for an NS record is the domain name of a name server.
  • PTR Record Type – is the same format as a domain name.
  • SOA Record Type – provides information about a domain and the corresponding Amazon Route 53 hosted zone.
  • SPF Record Type – a list of all authorized hostnames or IP addresses that are allowed to send an email on behalf of your domain.
  • SRV Record Type – represents priority, weight, port, and domain name.
  • TXT Record Type – contains text information for sources outside your domain.

DNS Domain Name Format

  • Names of domains, hosted zones, and records consist of a series of labels separated by dots, which can be up to 63 bytes long. The total length of a domain name cannot exceed 255 bytes, including the dots.
  • You can create hosted zones and records that include * in the name.

Using Traffic Flow to Route DNS Traffic

  • You use the visual editor to create a traffic policy. A traffic policy includes information about the routing configuration that you want to create:
    • the routing policies that you want to use
    • resources that you want to route DNS traffic to, such as the IP address of each EC2 instance and the domain name of each ELB load balancer.
  • Create a policy record where you specify the hosted zone in which you want to create the configuration that you defined in your traffic policy. It’s also where you specify the DNS name that you want to associate the configuration with.

Route 53 Resolvers

  • Resolver answers DNS queries for VPC domain names such as domain names for EC2 instances or ELB load balancers, and performs recursive lookups against public name servers for all other domain names.
  • DNS resolvers on your network can forward DNS queries to Resolver in a specified VPC. You can also configure Resolver to forward queries that it receives from EC2 instances in your VPCs to DNS resolvers on your network.
  • Resolver is regional.
  • An inbound endpoint specifies the VPC that queries pass through on the way from your network to Resolver.
  • To forward DNS queries that originate on EC2 instances in one or more VPCs to your network, you create an outbound endpoint and one or more rules.
  • Route 53 Resolver DNS Firewall is a managed firewall that lets you block DNS queries made from known malicious domains and allow queries from trusted domains. This is achieved through the use of “blocklists” and “allowlists”.

Route 53 Health Checks and DNS Failover

  • Each health check that you create can monitor one of the following:
    • The health of a specified resource, such as a web server
    • The status of other health checks
    • The status of an Amazon CloudWatch alarm
  • Each health checker evaluates the health of the endpoint based on two values:
    • Response time
    • Whether the endpoint responds to a number of consecutive health checks that you specify (the failure threshold)
  • Types of health checks
    • HTTP and HTTPS health checks – Route 53 must be able to establish a TCP connection with the endpoint within four seconds. In addition, the endpoint must respond with an HTTP status code of 2xx or 3xx within two seconds after connecting.
    • TCP health checks – Route 53 must be able to establish a TCP connection with the endpoint within ten seconds.
    • HTTP and HTTPS health checks with string matching – Route 53 must be able to establish a TCP connection with the endpoint within four seconds, and the endpoint must respond with an HTTP status code of 2xx or 3xx within two seconds after connecting. After a Route 53 health checker receives the HTTP status code, it must receive the response body from the endpoint within the next two seconds.
  • Health-checking features to route traffic only to the healthy resources:
    • Check the health of EC2 instances and other resources (non-alias records)
    • Evaluate the health of an AWS resource (alias records)
  • Two types of failover configurations
    • Active-Active Failover – all the records that have the same name, the same type, and the same routing policy are active unless Route 53 considers them unhealthy. Use this failover configuration when you want all of your resources to be available the majority of the time.
    • Active-Passive Failover – use this failover configuration when you want a primary resource or group of resources to be available the majority of the time and you want a secondary resource or group of resources to be on standby in case all the primary resources become unavailable. When responding to queries, Route 53 includes only the healthy primary resources.
  • To create an active-passive failover configuration with one primary record and one secondary record, you just create the records and specify Failover for the routing policy.
  • To configure active-passive failover with multiple resources for the primary or secondary record, create records with the same name, type, and routing policy for your primary resources. If you’re using AWS resources that you can create alias records for, specify Yes for Evaluate Target Health.
  • You can also use weighted records for active-passive failover, with caveats.
  • You can configure Amazon Route 53 to log information about the queries that Route 53 receives. Query logging is available only for public hosted zones.

Authentication and Access Control

  • Authenticate with IAM before allowing to perform any operation on Route 53 resources.
  • Every AWS resource is owned by an AWS account, and permissions to create or access a resource are governed by permissions policies. A permissions policy specifies who has access to what.

Amazon Route 53 Monitoring

  • The Route 53 dashboard provides detailed information about the status of your domain registrations, including:
    • Status of new domain registrations
    • Status of domain transfers to Route 53
    • List of domains that are approaching the expiration date
  • Free AWS Courses
  • You can use Amazon CloudWatch metrics to see the number of DNS queries served for each of your Route 53 public hosted zones. With these metrics, you can see at a glance the activity level of each hosted zone to monitor changes in traffic.
  • You can monitor your resources by creating Route 53 health checks, which use CloudWatch to collect and process raw data into readable, near real-time metrics.
  • Log API calls with CloudTrail

Amazon Route 53 Pricing

  • A hosted zone is charged at the time it’s created and on the first day of each subsequent month. To allow testing, a hosted zone that is deleted within 12 hours of creation is not charged, however, any queries on that hosted zone will still incur charges.
  • Billion queries / month
  • Queries to Alias records are provided at no additional cost to current Route 53 customers when the records are mapped to the following AWS resource types:
    • Elastic Load Balancers
    • Amazon CloudFront distributions
    • AWS Elastic Beanstalk environments
    • API Gateways
    • VPC endpoints
    • Amazon S3 buckets that are configured as website endpoints
  • Traffic flow policy record / month
  • Pricing for domain names varies by Top Level Domain (TLD)

Amazon Route 53 Tutorials on YouTube:
https://www.youtube.com/user/AmazonWebServices/search?query=Route+53

Note: If you are studying for the AWS Certified Advanced Networking Specialty exam, we highly recommend that you take our AWS Certified Advanced Networking – Specialty Practice Exams and read our Advanced Networking Specialty exam study guide.

AWS Certified Advanced Networking Specialty Practice Exams

Validate Your Knowledge

Question 1

A company is building its customer web portal in multiple EC2 instances behind an Application Load Balancer. The portal must be accessible on www.tutorialsdojo.com as well as on its tutorialsdojo.com root domain.

How should the Network Engineer set up Amazon Route 53 to satisfy this requirement?

  1. Set up an Alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.
  2. Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.
  3. Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create an Alias A record that points to the ALB.
  4. Set up a non-alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.

Correct Answer: 1

Amazon Route 53 alias records provide a Route 53–specific extension to DNS functionality. Alias records let you route traffic to selected AWS resources, such as CloudFront distributions and Amazon S3 bucket. They also let you route traffic from one record in a hosted zone to another record.

Unlike a CNAME record, you can create an alias record at the top node of a DNS namespace, also known as the zone apex. For example, if you register the DNS name tutorialsdojo.com, the zone apex is tutorialsdojo.com. You can’t create a CNAME record for tutorialsdojo.com, but you can create an alias record for tutorialsdojo.com that routes traffic to www.tutorialsdojo.com.

When Route 53 receives a DNS query for an alias record, Route 53 responds with the applicable value for that resource:

A CloudFront distribution – Route 53 responds with one or more IP addresses for CloudFront edge servers that can serve your content.

An Elastic Beanstalk environment – Route 53 responds with one or more IP addresses for the environment.

An ELB load balancer – Route 53 responds with one or more IP addresses for the load balancer.

An Amazon S3 bucket that is configured as a static website – Route 53 responds with one IP address for the Amazon S3 bucket.

Another Route 53 record in the same hosted zone – Route 53 responds as if the query is for the record that is referenced by the alias record.

Hence, the correct answer is: Set up an Alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB.

The option that says: Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB is incorrect. Although the configuration for the subdomain is correct, you still can’t create a CNAME record for the root domain or zone apex. You have to set up an Alias A record instead.

The option that says: Set up a CNAME Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create an Alias A record that points to the ALB is incorrect because you can’t create a CNAME record for the root domain or zone apex. The subdomain configuration is technically correct because you can set up an Alias A record for your subdomain in Route 53. The issue here is the use of a CNAME record in the zone apex.

The option that says: Set up a non-alias A Record for tutorialsdojo.com with the ALB as the target. For the www.tutorialsdojo.com subdomain, create a CNAME record that points to the ALB is incorrect because a non-alias A Record can only accept IP addresses and not the DNS name of the ALB.

References:
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/routing-to-elb-load-balancer.html

Note: This question was extracted from our AWS Certified Advanced Networking Specialty Practice Exams.

Question 2

A Network Engineer has been tasked to protect the company’s publicly accessible online customer portal and to secure the clients’ sensitive financial information. Hackers must be prevented from intercepting DNS queries and from replacing the actual IP addresses of the website with unauthorized IP addresses in the DNS resolvers. The solution should protect the users from being routed to the IP addresses provided by the attackers in the spoofed response that could potentially direct them to fake or phishing websites.

What should the Engineer do to satisfy this requirement?

  1. Enable Domain Name System Security Extensions (DNSSEC) in Amazon Route 53.
  2. Enable Server Name Indication (SNI) in Amazon Route 53.
  3. Set up a private hosted zone in Amazon Route 53 and launch a BIND DNS Server.
  4. Set up Perfect Forward Secrecy (PFS) using Diffie-Hellman (DH) group 2 to prevent DNS spoofing.

Correct Answer: 1

Attackers sometimes hijack traffic to Internet endpoints such as web servers by intercepting DNS queries and returning their own IP addresses to DNS resolvers in place of the actual IP addresses for those endpoints. Users are then routed to the IP addresses provided by the attackers in the spoofed response, for example, to fake websites.

You can protect your domain from this type of attack, known as DNS spoofing or a man-in-the-middle attack, by configuring Domain Name System Security Extensions (DNSSEC), a protocol for securing DNS traffic.

When you configure DNSSEC for your domain, a DNS resolver establishes a chain of trust for responses from intermediate resolvers. The chain of trust begins with the TLD registry for the domain (your domain’s parent zone) and ends with the authoritative name servers at your DNS service provider. Not all DNS resolvers support DNSSEC. Resolvers that don’t support DNSSEC don’t perform any signature or authenticity validation.

Hence, the correct answer is: Enable Domain Name System Security Extensions (DNSSEC) in Amazon Route 53.

The option that says: Enable Server Name Indication (SNI) in Amazon Route 53 is incorrect because this feature is primarily used to support multiple TLS certificates for your web applications and not for protecting against DNS Spoofing or man-in-the-middle attacks.

The option that says: Set up a private hosted zone in Amazon Route 53 and launch a BIND DNS Server is incorrect because a private hosted zone is just a container that holds information about how you want Amazon Route 53 to respond to DNS queries for a specific domain and its subdomains within one or more VPCs. 

The option that says: Set up Perfect Forward Secrecy (PFS) using Diffie-Hellman (DH) group 2 to prevent DNS spoofing is incorrect because this is simply a feature that provides additional safeguards against the eavesdropping of encrypted data through the use of a unique random session key.

References:

https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/domain-configure-dnssec.html
https://aws.amazon.com/route53/faqs/

Note: This question was extracted from our AWS Certified Advanced Networking Specialty Practice Exams.

For more AWS practice exam questions with detailed explanations, visit the Tutorials Dojo Portal:

Tutorials Dojo AWS Practice Tests

Amazon Route 53 Cheat Sheet References:

https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/Welcome.html
https://aws.amazon.com/route53/features/
https://aws.amazon.com/route53/pricing/

Get 20% Off – Christmas Big Sale on All Practice Exams, Video Courses, and eBooks!

Tutorials Dojo portal

Learn AWS with our PlayCloud Hands-On Labs

Tutorials Dojo Exam Study Guide eBooks

tutorials dojo study guide eBook

FREE AWS Exam Readiness Digital Courses

FREE AWS, Azure, GCP Practice Test Samplers

Subscribe to our YouTube Channel

Tutorials Dojo YouTube Channel

Follow Us On Linkedin

Recent Posts

Written by: Jon Bonso

Jon Bonso is the co-founder of Tutorials Dojo, an EdTech startup and an AWS Digital Training Partner that provides high-quality educational materials in the cloud computing space. He graduated from Mapúa Institute of Technology in 2007 with a bachelor's degree in Information Technology. Jon holds 10 AWS Certifications and is also an active AWS Community Builder since 2020.

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, YouTube, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!

View Our AWS, Azure, and GCP Exam Reviewers Check out our FREE courses

Our Community

~98%
passing rate
Around 95-98% of our students pass the AWS Certification exams after training with our courses.
200k+
students
Over 200k enrollees choose Tutorials Dojo in preparing for their AWS Certification exams.
~4.8
ratings
Our courses are highly rated by our enrollees from all over the world.

What our students say about us?