Hybrid and Multi-account DNS – ANS-C01 Study Guide

THE AWS CERTIFIED ADVANCED NETWORKING – SPECIALTY EXAM OBJECTIVES COVERED IN THIS CHAPTER MAY INCLUDE, BUT ARE NOT LIMITED TO, THE FOLLOWING:

  • Domain 2: Network Implementation 

Objective 2.3: Implement complex hybrid and multi-account DNS architectures.

Implementing Hybrid and Multi-account DNS Architectures

In this chapter, we will expand on the DNS and Route 53 topics covered in Chapter 2, “Domain Name Services,” with the primary focus on implementing Route 53 and its features. We will use the AWS web console and configure the many features of Route 53. Since owning a domain name and hosting it on Route 53 is a chargeable service, you will have to decide whether you want to purchase your own domain or just follow along with the examples in this chapter.

You will gain skills in configuring Route 53 zones, records, traffic management, and security, as well as how to work with centralized and decentralized configurations and how to set up Route 53 monitoring and logging. With this practical knowledge, you will have the skills to answer the DNS objectives on the exam and also to work with Route 53 in the real world.

Route 53 Hosted Zones

When working with standard DNS applications, you will configure zone files. A zone file is a collection of records that are managed as a group and belong to a single domain name. In Route 53, the concept is the same, but the name is slightly different as it is referred to by AWS as a hosted zone. A hosted zone is a container that contains the various types of DNS records. The hosted zone is part of a domain or subdomain such as tipofthehat.com or production.tipofthehat.com. The hosted zone and domain share the same name in the AWS Route 53 console, as shown in Figure 3.1.

FIGURE 3.1 Route 53 hosted zones

Hosted zones are either external and public-facing or internal to an AWS VPC, called a private zone. Public and private hosted zones are defined when configuring the zones in the Route 53 console, CLI, or API.

Private Hosted Zones

In Chapter 2, you learned that private hosted zones are used to store records for your internal, non-Internet hosts. Route 53 will respond to queries that are for resources running inside your VPC. Every zone can support services and servers in multiple VPCs if the zone is associated with the VPC. The private hosted zone is used strictly to route internally in your VPC and can connect to services such as ELB, an EC2 instance, or any service that has an IP address endpoint. Once the private hosted zone is created, resource records can be added to define your endpoints.

To route traffic inside your VPC using DNS, you must create a private hosted zone, as shown in Figure 3.2, and place the resource records inside of the zone.

FIGURE 3.2 Route 53 private hosted zones