You can elect to hide your WHOIS information from the public so when a WHOIS query is made, the registrar information (Amazon Web Services) is returned and not your personal data. If you do not hide your personal data, you will most likely get a fair amount of spam in your inbox.
WHOIS is widely used and available to anyone on the Internet. Anyone can perform a WHOIS query for a domain and get back all of the contact information for that domain. The WHOIS command is available in many operating systems, and it’s also available as a web application on many websites.
The ICANN is the organization that manages and coordinates the Internet namespaces and IP addressing for the Internet. ICANN coordinates all domain registrations for the Internet worldwide.
After your registration is completed with AWS, they will supply the following information to you:
You can set the domain to autorenew, and the renewal charges will be applied to your AWS account. If you disable autorenewals, then, as it says, the domain will not be renewed and will expire on the expiration date, making it no longer available on the Internet. If the domain has expired, the name will be available for anyone to register and use.
In this chapter, you learned about DNS and the Amazon-specific offering called Route 53. DNS is a name-to-IP resolution service that is used extensively in both public and private networks. You learned about the DNS architecture and hierarchy and the basic functions of DNS systems including the root, top-level, and domain name servers. We discussed what a resolver is and how it queries various name servers to obtain an IP when given a domain name. Zones were also introduced as containers that store records for the domain, and then you learned about the various types of records used in DNS.
Route 53 is a fully managed service that includes a 100 percent uptime service-level agreement and many advanced features that extend its functionality beyond basic DNS services.
Various DNS internals were discussed such as TTL timers and the delegation of zones to distribute DNS operations. DNSSEC is a feature that was added to DNS to provide encryption and authentication for security. As a part of DNSSEC, we briefly discussed public key encryption and the types of security keys that are used in DNSSEC.
Route 53 is integrated with many AWS services for logging and monitoring its operations. These services include CloudTrail, CloudWatch, and Redshift. Advanced features of Route 53 include the addition of Alias records, resolvers, health checking, and a Route 53 firewall.
Traffic routing policies determine how resolution records are returned to the resolver and include simple, multivalue, latency, failover, weighted, and round-robin routing options. Geolocation and geo-proximity routing were discussed as a method to route requests to specific locations based on where the originator and destination are located from each other.
We also learned about service integrations with Route 53 and other services such as VPCs, CloudFront, load balancers, health checking, and the Application Recovery Controller.
Hybrid Route 53 is when we interconnect your on-premise DNS system to Route 53 in a VPC for both internal and external name resolution using public and private hosted zones. Next, we discussed how Route 53 can be implemented in multi-account and multiregion AWS deployments.
Global traffic operations were discussed, and failure architectures were introduced.
Finally, you learned how to use Route 53 to register a domain for your use.