<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>DNS Check Blog</title>
    <description>DNS Check enables you to easily monitor, share and troubleshoot DNS records.
</description>
    <link>https://www.dnscheck.co/blog/</link>
    <atom:link href="https://www.dnscheck.co/blog/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Sat, 18 Apr 2026 20:13:21 -0400</pubDate>
    <lastBuildDate>Sat, 18 Apr 2026 20:13:21 -0400</lastBuildDate>
    <generator>Jekyll v4.4.1</generator>
    
      <item>
        <title>New Features: Team Members and Additional Email Recipients</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/team-members-table.png&quot; width=&quot;751&quot; height=&quot;492&quot; alt=&quot;Screenshot of the Team Members page showing the team members table with columns for email, role, last sign-in date, and action buttons&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;DNS Check now supports two features for Enterprise accounts that make it easier to work as a team: &lt;a href=&quot;/team-members&quot;&gt;Team Members&lt;/a&gt; and &lt;a href=&quot;/notifications#additional-email-recipients-enterprise-accounts&quot;&gt;Additional Email Recipients&lt;/a&gt;. Team Members lets multiple people log in and work with your DNS records using their own credentials. Additional Email Recipients sends notification emails to people who need to stay informed but don&apos;t need to log in.&lt;/p&gt;

&lt;!--more--&gt;

&lt;h2 id=&quot;team-members&quot;&gt;Team Members&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;/team-members&quot;&gt;Team Members&lt;/a&gt; feature lets you invite other people to log in and work with your DNS Check account. Each team member gets their own email and password, so there&apos;s no need to share a single set of credentials. This is useful when multiple people on your team need to view, create, or manage DNS records.&lt;/p&gt;

&lt;h3 id=&quot;roles&quot;&gt;Roles&lt;/h3&gt;

&lt;p&gt;Each team member has one of three roles to control what they can access:&lt;/p&gt;

&lt;table style=&quot;margin: 20px 0; border-collapse: collapse; width: 100%;&quot;&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;Role&lt;/th&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;DNS Records&lt;/th&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;Account Settings&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Admin&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;View, create, edit, delete&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;Full access&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Manager&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;View, create, edit, delete&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;No access&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;&lt;strong&gt;Viewer&lt;/strong&gt;&lt;/td&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;View only&lt;/td&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;No access&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;strong&gt;Admin&lt;/strong&gt; team members see the same interface as the account owner and can access all account-level settings, including billing, notification configuration, integrations, and API keys. &lt;strong&gt;Manager&lt;/strong&gt; team members can manage DNS records, but can&apos;t access account settings. &lt;strong&gt;Viewer&lt;/strong&gt; team members can only view DNS records and their status, which is useful for stakeholders who need visibility without the ability to make changes.&lt;/p&gt;

&lt;h3 id=&quot;adding-team-members&quot;&gt;Adding Team Members&lt;/h3&gt;

&lt;p&gt;To add a team member, click the user icon in the top navigation bar and select &lt;strong&gt;&lt;a href=&quot;/team-member-settings&quot;&gt;Team Members&lt;/a&gt;&lt;/strong&gt;. From there, click &lt;strong&gt;Add team member&lt;/strong&gt;, enter their email address, and select a role.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/team-members-add-form.png&quot; width=&quot;606&quot; height=&quot;358&quot; alt=&quot;Screenshot of the Add Team Member form with fields for email address and role selection&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The team member receives an email invitation with a link to set their password. Once they set their password, they can log in and start working with your DNS records. You can change a team member&apos;s role or remove them from the Team Members page.&lt;/p&gt;

&lt;p&gt;The number of team members you can add depends on your &lt;a href=&quot;/features&quot;&gt;Enterprise plan tier&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;additional-email-recipients&quot;&gt;Additional Email Recipients&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;/notifications#additional-email-recipients-enterprise-accounts&quot;&gt;Additional Email Recipients&lt;/a&gt; feature lets you send DNS Check notification emails to additional email addresses beyond your primary account email. This is designed for people or services that need to receive alerts about DNS record changes but don&apos;t need to log in to DNS Check.&lt;/p&gt;

&lt;h3 id=&quot;setting-up-recipients&quot;&gt;Setting Up Recipients&lt;/h3&gt;

&lt;p&gt;To add a recipient, go to the &lt;a href=&quot;/notification-options?tab=email&quot;&gt;Email tab on your Notification Settings page&lt;/a&gt;, find the &lt;strong&gt;Additional Email Recipients&lt;/strong&gt; section, and click the &lt;strong&gt;Add email recipient&lt;/strong&gt; button.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/add-email-recipient-form.png&quot; width=&quot;591&quot; height=&quot;295&quot; alt=&quot;Screenshot of the Add Email Recipient form&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The recipient receives a confirmation email and must click the confirmation link before they start receiving notifications. This confirmation step prevents unwanted emails from being sent to addresses that didn&apos;t opt in.&lt;/p&gt;

&lt;h3 id=&quot;managing-recipients&quot;&gt;Managing Recipients&lt;/h3&gt;

&lt;p&gt;Once added, you can manage recipients from the Notification Settings page:&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/additional-email-recipients-table.png&quot; width=&quot;926&quot; height=&quot;388&quot; alt=&quot;Screenshot showing a table of additional email recipients with columns for email address, confirmation status, enabled state, and action buttons for resending confirmation, enabling/disabling, and deleting recipients&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;For each recipient, you can:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Resend confirmation&lt;/strong&gt; if the recipient didn&apos;t receive the confirmation email&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Enable/Disable&lt;/strong&gt; to temporarily pause notifications without removing the recipient&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Delete&lt;/strong&gt; the recipient&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Recipients can also unsubscribe themselves using the unsubscribe link included in every notification email.&lt;/p&gt;

&lt;p&gt;You can turn notifications to your primary account email address on and off by toggling the &lt;strong&gt;Send notifications to&lt;/strong&gt; control on the Email tab of your Notification Settings.&lt;/p&gt;

&lt;h2 id=&quot;when-to-use-each-feature&quot;&gt;When to Use Each Feature&lt;/h2&gt;

&lt;p&gt;These two features serve different needs:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Team Members&lt;/strong&gt; is for people who need to log in to DNS Check, whether to view DNS record status, create new records, or manage account settings. Each team member has their own credentials and a defined level of access.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Additional Email Recipients&lt;/strong&gt; is for people who need to receive notification emails, such as an on-call distribution list, a manager who wants to stay informed, or a ticketing system that ingests emails.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can use both features together. For example, you might add your software developers and sysadmins as team members with the Manager role so they can create and edit records, add cyber security team members with the Viewer role so they can check status without making changes, and add an ops mailing list as an additional email recipient so the broader team gets notified about DNS issues.&lt;/p&gt;

&lt;h2 id=&quot;get-started&quot;&gt;Get Started&lt;/h2&gt;

&lt;p&gt;Team Members and Additional Email Recipients are available now for all Enterprise accounts. To start using them, log in and visit the &lt;a href=&quot;/team-members&quot;&gt;Team Members&lt;/a&gt; page and your &lt;a href=&quot;/notifications&quot;&gt;Notification Settings&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you&apos;re not yet using DNS Check, &lt;a href=&quot;/signup&quot;&gt;create a free account&lt;/a&gt; to start monitoring your DNS records. Free accounts can monitor up to 10 DNS records with email notifications. To unlock Team Members, Additional Email Recipients, and other Enterprise features, visit our &lt;a href=&quot;/features&quot;&gt;Features&lt;/a&gt; page to find the right plan for your team.&lt;/p&gt;
</description>
        <pubDate>Mon, 06 Apr 2026 04:00:00 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2026/04/06/team-members-and-additional-email-recipients.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2026/04/06/team-members-and-additional-email-recipients.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Monitor Load Balanced DNS Records with CIDR Ranges</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/a-record-load-balancer.png&quot; width=&quot;606&quot; height=&quot;429&quot; alt=&quot;Creating a new A record load balancer in DNS Check with Cloudflare CIDR IP ranges entered in a multi-line text area&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;DNS Check&apos;s &lt;a href=&quot;/load-balancer-record-monitor&quot;&gt;load balancer monitoring&lt;/a&gt; now supports CIDR notation, making it practical to monitor domains served by CDNs and cloud providers that use large IP pools. Instead of listing every possible IP address a provider might return, you can enter CIDR ranges like &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;104.16.0.0/13&lt;/code&gt; and DNS Check will verify that responses fall within those ranges.&lt;/p&gt;

&lt;!--more--&gt;

&lt;h2 id=&quot;how-load-balancer-monitoring-works&quot;&gt;How Load Balancer Monitoring Works&lt;/h2&gt;

&lt;p&gt;Before diving into the CIDR improvements, here&apos;s a quick overview of how DNS Check monitors load-balanced records.&lt;/p&gt;

&lt;p&gt;Many DNS configurations return multiple IP addresses for a single domain name. This is DNS-based load balancing: traffic is distributed across servers for performance, redundancy, or geographic routing. When you query a load-balanced domain, you might get back one, some, or all of its configured addresses, often in a different order each time.&lt;/p&gt;

&lt;p&gt;DNS Check handles this by letting you enter the full set of valid IP addresses or hostnames for a load-balanced record. Each time the record is checked, DNS Check compares the response to your list. If every returned address appears in your list, the check passes. If any returned address isn&apos;t in the list, the check fails. The order doesn&apos;t matter, and partial responses (a subset of your list) are fine.&lt;/p&gt;

&lt;p&gt;This approach works well for load balancers with a small, fixed set of IPs. But some providers rotate responses across hundreds or thousands of addresses, which is where CIDR support comes in.&lt;/p&gt;

&lt;h2 id=&quot;cidr-range-monitoring&quot;&gt;CIDR Range Monitoring&lt;/h2&gt;

&lt;p&gt;Providers like Cloudflare, Fastly, and other CDNs serve content from large IP pools. A Cloudflare-proxied domain might resolve to any address within several /13 or /20 ranges. Listing individual IPs would be impractical and fragile, as providers regularly add and rotate addresses within their published ranges.&lt;/p&gt;

&lt;p&gt;With CIDR support, you can enter ranges like &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;104.16.0.0/13&lt;/code&gt; directly in the &quot;IP addresses&quot; field. DNS Check then verifies that each IP returned in a DNS response falls within one of the specified CIDR ranges. This works for both IPv4 (A record) and IPv6 (AAAA record) load balancers.&lt;/p&gt;

&lt;p&gt;For example, Cloudflare &lt;a href=&quot;https://www.cloudflare.com/ips/&quot;&gt;publishes its IP ranges&lt;/a&gt;. You can enter these ranges as load balancer addresses in DNS Check to monitor any Cloudflare-proxied domain. If a DNS query returns &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;104.21.35.12&lt;/code&gt;, DNS Check confirms that the address falls within &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;104.16.0.0/13&lt;/code&gt; and the check passes. If a query returns an IP outside all specified ranges, the check fails and you&apos;re notified, which could indicate a DNS hijack, misconfiguration, or an unexpected provider change.&lt;/p&gt;

&lt;p&gt;You can also mix individual IP addresses and CIDR ranges in the same load balancer. Each entry, whether a single IP or a CIDR range, counts as one of the 30 allowed entries per load balancer.&lt;/p&gt;

&lt;h2 id=&quot;paste-ip-lists-directly&quot;&gt;Paste IP Lists Directly&lt;/h2&gt;

&lt;p&gt;To make setup even faster, the &quot;IP addresses&quot; field now accepts newline-delimited input in addition to comma-separated values. This means you can copy a list of IP ranges from a provider&apos;s website and paste it directly into DNS Check without reformatting.&lt;/p&gt;

&lt;p&gt;For example, visiting &lt;a href=&quot;https://www.cloudflare.com/ips/&quot;&gt;cloudflare.com/ips&lt;/a&gt; and copying the IPv4 ranges gives you a newline-separated list. Paste it into the &quot;IP addresses&quot; field as-is, and DNS Check converts the newlines to commas when the record is saved. The field is now a multi-line text area to support this workflow.&lt;/p&gt;

&lt;h2 id=&quot;getting-started&quot;&gt;Getting Started&lt;/h2&gt;

&lt;p&gt;Load balancer monitoring with CIDR support is available now for all paid DNS Check accounts. To set up a CIDR-based load balancer check:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;Navigate to your DNS record group and click &quot;Add DNS record&quot;&lt;/li&gt;
  &lt;li&gt;Select a load balancer type from the dropdown (e.g., &quot;A record balancer&quot; or &quot;AAAA record balancer&quot;)&lt;/li&gt;
  &lt;li&gt;Enter the domain name you want to monitor in the &quot;Name&quot; field&lt;/li&gt;
  &lt;li&gt;Enter your CIDR ranges in the &quot;IP addresses&quot; field, separated by commas or newlines&lt;/li&gt;
  &lt;li&gt;Save the record&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The screenshot at the top of this post shows an example of this form with Cloudflare&apos;s IPv4 CIDR ranges entered as addresses.&lt;/p&gt;

&lt;p&gt;DNS Check immediately begins monitoring. If any DNS response returns an address outside your specified ranges, you&apos;ll be notified through your configured &lt;a href=&quot;/notifications&quot;&gt;notification channels&lt;/a&gt;: email, Slack, PagerDuty, webhooks, and more.&lt;/p&gt;

&lt;p&gt;For complete documentation on load balancer monitoring, visit our &lt;a href=&quot;/load-balancer-record-monitor&quot;&gt;Monitoring Load Balancer DNS Records&lt;/a&gt; page.&lt;/p&gt;
</description>
        <pubDate>Sat, 07 Feb 2026 10:00:00 -0500</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2026/02/07/cidr-load-balancer-monitoring.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2026/02/07/cidr-load-balancer-monitoring.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Guided DNS Troubleshooting, Full History, and UI Improvements</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/suggested-fix-report.png&quot; width=&quot;912&quot; height=&quot;889&quot; alt=&quot;Suggested fix report showing the typo to fix in an SPF record in DNS. The characters to delete are crossed out and highlighted in red. The character to add is highlighted in green. The overall match percentage of the identified record is shown as 97%.&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;We&apos;re kicking off 2026 by shipping improvements that make DNS troubleshooting faster and more intuitive. When a DNS check fails, you&apos;ll now see exactly what needs to change to fix it, and you&apos;ll have complete visibility into your DNS record behavior over time.&lt;/p&gt;

&lt;h2 id=&quot;suggested-fix-report&quot;&gt;Suggested Fix Report&lt;/h2&gt;

&lt;p&gt;When a DNS record check fails, the new &lt;a href=&quot;/troubleshoot-dns-records&quot;&gt;Suggested fix report&lt;/a&gt; shows exactly what action you need to take. Instead of manually comparing &quot;Expected&quot; vs &quot;Found&quot; records character-by-character, DNS Check now performs that comparison for you and presents clear guidance.&lt;/p&gt;

&lt;!--more--&gt;

&lt;p&gt;&lt;strong&gt;Create this record&lt;/strong&gt;: When an expected DNS record is completely missing from your DNS configuration, the report displays the full record you need to create, highlighted in green. This makes it immediately clear that the record doesn&apos;t exist and needs to be added.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Update this record&lt;/strong&gt;: When a DNS record exists but contains a typo or hasn&apos;t yet incorporated a minor update, the report highlights the exact characters that are incorrect. Incorrect characters are highlighted in red strikethrough, while the correct replacement characters are highlighted green. A match percentage helps confirm when a difference is likely a typo rather than a completely wrong value.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Delete this record&lt;/strong&gt;: For exclusive DNS checks where extra unwanted records exist alongside the correct one, the report shows which records to delete, highlighted in red.&lt;/p&gt;

&lt;p&gt;This improvement is particularly valuable for long SPF or TXT records where a single typo can be buried in a string of dozens of characters. What previously required careful manual comparison now takes a glance.&lt;/p&gt;

&lt;h2 id=&quot;complete-dns-record-history&quot;&gt;Complete DNS Record History&lt;/h2&gt;

&lt;p&gt;Previously, the &quot;Notification History&quot; report only showed state changes that triggered email notifications. This created gaps in your visibility when notifications were disabled, when &quot;suppress notification of pass&quot; was enabled, or during initial record setup.&lt;/p&gt;

&lt;p&gt;DNS Check now records all state changes, regardless of whether a notification was sent. The report was renamed to &quot;History&quot; to reflect this broader scope. You can now see:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Initial check results when a new DNS record is first added&lt;/li&gt;
  &lt;li&gt;ServFail errors (even when the delay slider, described below, prevents email notifications)&lt;/li&gt;
  &lt;li&gt;All transitions, not just those that triggered emails or other notices&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This complete history makes troubleshooting easier because you can see exactly what happened to a DNS record over time, independent of your notification preferences.&lt;/p&gt;

&lt;h2 id=&quot;redesigned-notification-settings&quot;&gt;Redesigned Notification Settings&lt;/h2&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/notification-settings-sidebar-and-email.png&quot; width=&quot;742&quot; height=&quot;642&quot; alt=&quot;Notification settings page showing a sidebar navigation on the left with Email, Webhooks, Slack, PagerDuty, and other integration options, and the main content area on the right displaying email notification configuration options&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The notification settings interface was redesigned for better usability on both desktop and mobile devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Improved navigation&lt;/strong&gt;: Desktop displays a sidebar for quick access to each notification type. Mobile uses a drill-down navigation pattern that makes better use of limited screen space.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ServFail delay slider&lt;/strong&gt;: The ServFail delay setting is now an interactive slider with a value bubble and contextual description, replacing the previous text input. This makes it easier to understand and adjust the amount of time DNS Check waits before alerting on ServFail errors.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/suppress-servfail-error-notifications.png&quot; width=&quot;434&quot; height=&quot;286&quot; alt=&quot;Interactive slider control for ServFail error notifications, with a value bubble and description explaining the delay behavior&quot; class=&quot;screenshot&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Better mobile experience&lt;/strong&gt;: Dropdown menus auto-scroll into view, action buttons stack vertically for easier tapping, and touch targets on buttons and toggle switches are larger.&lt;/p&gt;

&lt;h2 id=&quot;additional-improvements&quot;&gt;Additional Improvements&lt;/h2&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Pass/fail feedback when adding DNS records&lt;/strong&gt;: You now see diagnostic notifications when creating DNS records, confirming whether the newly added record passes or fails its initial check.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Responsive DNS Record History view&lt;/strong&gt;: The history view adapts better to mobile screens, matching the responsive design already used for viewing DNS record groups.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Visual feedback on rechecks&lt;/strong&gt;: A subtle fade effect now highlights when DNS record status updates after a recheck, making it clear that a refresh occurred.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These updates are available now for all DNS Check accounts. For questions about these features, visit our &lt;a href=&quot;/faq&quot;&gt;FAQ&lt;/a&gt; or &lt;a href=&quot;/contact&quot;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Sat, 03 Jan 2026 14:22:00 -0500</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2026/01/03/guided-dns-troubleshooting-record-history-improve-ui.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2026/01/03/guided-dns-troubleshooting-record-history-improve-ui.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Detect DNS Record Creation: Planned or Rogue</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/create-inverted-wildcard-dns-record.png&quot; width=&quot;587&quot; height=&quot;441&quot; alt=&quot;Form showing fields for creating a new monitored DNS record that will trigger a notification as soon as the DNS record is created&quot; style=&quot;max-width: 100%; height: auto; border: 1px solid #ddd; margin-bottom: 20px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;We&apos;re excited to announce one of our most frequently requested features: &lt;strong&gt;inverted DNS checks&lt;/strong&gt;. This new capability allows you to detect when DNS records are created (whether they&apos;re planned infrastructure changes or rogue records) and prevent unwanted values from appearing in your DNS configuration.&lt;/p&gt;

&lt;h2 id=&quot;understanding-inverted-checks&quot;&gt;Understanding Inverted Checks&lt;/h2&gt;

&lt;p&gt;Traditional DNS monitoring follows straightforward logic: the check passes when your DNS records match the expected configuration. An A record check for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;example.com&lt;/code&gt; pointing to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;192.0.2.100&lt;/code&gt; passes when DNS queries return that specific IP address and fails when the record is absent or returns a different value.&lt;/p&gt;

&lt;p&gt;Inverted checks reverse this logic. When you enable the &quot;Invert check&quot; option, the check passes when the DNS record is &lt;strong&gt;not&lt;/strong&gt; found or when it exists with a value that differs from the specified value. This inverted logic addresses common operational scenarios that traditional monitoring systems can&apos;t handle.&lt;/p&gt;

&lt;!--more--&gt;

&lt;h2 id=&quot;use-case-1-monitoring-for-record-creation&quot;&gt;Use Case 1: Monitoring for Record Creation&lt;/h2&gt;

&lt;p&gt;The most common use case for inverted checks is monitoring for DNS record creation. You need to know when a DNS record that doesn&apos;t currently exist gets added to your zone, but traditional DNS monitoring can only alert you when existing records disappear or change values.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario:&lt;/strong&gt; You&apos;re planning to create a new subdomain for a staging environment at &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;staging.example.com&lt;/code&gt;. The DNS record doesn&apos;t exist yet, but you want to be notified immediately when your team adds it to DNS so you can verify the configuration is correct.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;staging.example.com&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;A&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;*&lt;/code&gt; (wildcard match)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Invert check&lt;/strong&gt;: Enabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Behavior:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Passing state&lt;/strong&gt;: DNS queries return NXDomain (the record doesn&apos;t exist)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Failing state&lt;/strong&gt;: Any A record for &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;staging.example.com&lt;/code&gt; is found, triggering a notification&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The wildcard value (&lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;*&lt;/code&gt;) matches any IP address. With invert enabled, the check passes while no record exists and fails once any A record appears, regardless of its value. This gives you immediate visibility when the record gets created.&lt;/p&gt;

&lt;p&gt;For DevOps and security teams, this enables:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Monitoring planned infrastructure additions&lt;/li&gt;
  &lt;li&gt;Catching rogue DNS record creation&lt;/li&gt;
  &lt;li&gt;Tracking when external parties add DNS records to delegated zones&lt;/li&gt;
  &lt;li&gt;Detecting when deprecated subdomains get recreated&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id=&quot;monitoring-domain-registration&quot;&gt;Monitoring Domain Registration&lt;/h3&gt;

&lt;p&gt;A specialized application of record creation monitoring is tracking when unregistered domains get registered. This helps organizations monitor domains they plan to acquire or detect when competitors or malicious actors register similar domains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario:&lt;/strong&gt; You&apos;re planning to acquire &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;example-startup.com&lt;/code&gt;, but it&apos;s currently unregistered. You want to be notified immediately if someone else registers it before you complete your acquisition.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;example-startup.com&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;NS&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;*&lt;/code&gt; (wildcard match)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Invert check&lt;/strong&gt;: Enabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Behavior:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Passing state&lt;/strong&gt;: DNS queries return NXDomain (domain not registered)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Failing state&lt;/strong&gt;: NS records appear, indicating the domain was registered and name servers configured&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When a domain is unregistered, queries for its NS records return NXDomain. Once someone registers the domain and configures authoritative name servers, NS records appear in DNS. An inverted NS check with a wildcard value detects this transition, alerting you to the registration.&lt;/p&gt;

&lt;p&gt;This monitoring approach works because domain registrations typically include name server configuration. While some registrars and TLDs technically allow registration without immediate name server configuration, most domains have NS records configured shortly after registration to make the domain functional. While the domain owner might delay adding A, MX, or other records, NS records typically appear soon after registration completes.&lt;/p&gt;

&lt;h2 id=&quot;use-case-2-detecting-unwanted-values&quot;&gt;Use Case 2: Detecting Unwanted Values&lt;/h2&gt;

&lt;p&gt;The second major use case is detecting when specific problematic values appear in your DNS configuration. This addresses security concerns, helps prevent misconfigurations, and helps maintain DNS hygiene.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario:&lt;/strong&gt; Your organization uses &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;192.0.2.50&lt;/code&gt; for internal development environments, and this IP address should never appear in public DNS records. You want to be alerted immediately if this internal IP leaks into your production DNS configuration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;example.com&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Type&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;A&lt;/code&gt;&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Value&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;192.0.2.50&lt;/code&gt; (the unwanted IP)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Invert check&lt;/strong&gt;: Enabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Behavior:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Passing state&lt;/strong&gt;: DNS returns A records, but &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;192.0.2.50&lt;/code&gt; is not among them&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Failing state&lt;/strong&gt;: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;192.0.2.50&lt;/code&gt; appears in the DNS results, triggering an alert&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Unlike the wildcard approach, this configuration specifies an exact value to avoid. The check passes as long as that specific value doesn&apos;t appear in DNS, even if the record has other values. This gives you precise control over what triggers alerts.&lt;/p&gt;

&lt;p&gt;This pattern helps with:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;Catching internal IP addresses appearing in public DNS&lt;/li&gt;
  &lt;li&gt;Alerting when DNS records revert to old, deprecated values&lt;/li&gt;
  &lt;li&gt;Finding blacklisted IP addresses in your DNS configuration&lt;/li&gt;
  &lt;li&gt;Monitoring for specific problematic CNAME targets or MX servers&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;how-inverted-checks-work&quot;&gt;How Inverted Checks Work&lt;/h2&gt;

&lt;p&gt;The inverted check logic applies to all DNS record types that DNS Check supports: A, AAAA, CNAME, MX, NS, TXT, SOA, SPF, SRV, and ALIAS records. There&apos;s one exception: load balancer records (records with multiple expected values) cannot use inverted checks.&lt;/p&gt;

&lt;table style=&quot;margin: 20px 0; border-collapse: collapse;&quot;&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;Scenario&lt;/th&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;Normal Check&lt;/th&gt;
&lt;th style=&quot;text-align: left; padding: 10px; border-bottom: 2px solid #ddd;&quot;&gt;Inverted Check&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;Record doesn&apos;t exist (NXDomain)&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Fails&lt;/strong&gt; - record not found&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Passes&lt;/strong&gt; - record absent as desired&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;Record exists with expected value&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Passes&lt;/strong&gt; - correct value found&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Fails&lt;/strong&gt; - unwanted value detected&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;Record exists with different value&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Fails&lt;/strong&gt; - wrong value&lt;/td&gt;
&lt;td style=&quot;padding: 10px; border-bottom: 1px solid #ddd;&quot;&gt;&lt;strong&gt;Passes&lt;/strong&gt; - unwanted value absent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;DNS server error (ServFail, timeout)&lt;/td&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;&lt;strong&gt;Fails&lt;/strong&gt; - cannot determine state&lt;/td&gt;
&lt;td style=&quot;padding: 10px;&quot;&gt;&lt;strong&gt;Fails&lt;/strong&gt; - cannot determine state&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;Note that DNS server errors remain failures for both normal and inverted checks. When DNS Check can&apos;t query your name servers due to errors or timeouts, it cannot reliably determine whether the record exists or what values it contains. These ambiguous states generate alerts, ensuring you&apos;re notified of DNS infrastructure problems.&lt;/p&gt;

&lt;h2 id=&quot;special-behavior-with-alias-records&quot;&gt;Special Behavior with ALIAS Records&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;/alias-record-monitor&quot;&gt;ALIAS record monitoring&lt;/a&gt; in DNS Check differs from other record types. Instead of checking a single DNS record, ALIAS checks perform two independent DNS queries and compare the results: one lookup for the ALIAS record name and another for the expected target.&lt;/p&gt;

&lt;p&gt;For regular ALIAS checks, the monitoring passes when both lookups return identical results, confirming the ALIAS mapping works correctly. This ensures the ALIAS record resolves to the expected IP addresses.&lt;/p&gt;

&lt;p&gt;When you enable inverted checks on ALIAS records, the comparison logic reverses. The check passes when the two lookups return &lt;strong&gt;different&lt;/strong&gt; results, indicating the two records point to different locations. This behavior helps detect scenarios like:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;CDN or load balancer configurations change without coordination&lt;/li&gt;
  &lt;li&gt;DNS failover or traffic management policies activate unintentionally&lt;/li&gt;
  &lt;li&gt;ALIAS records break due to misconfigured target records&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;setting-up-inverted-checks&quot;&gt;Setting Up Inverted Checks&lt;/h2&gt;

&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/create-inverted-wildcard-dns-record.png&quot; width=&quot;587&quot; height=&quot;441&quot; alt=&quot;DNS Check form showing the Invert check toggle enabled with the Exclusive option automatically disabled, demonstrating mutual exclusivity&quot; style=&quot;max-width: 100%; height: auto; border: 1px solid #ddd; margin: 20px 0;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Creating an inverted check requires a paid DNS Check account (Professional or Enterprise). The feature is available when adding or editing a DNS record.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps to create an inverted check:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;Navigate to your DNS record group and click &quot;Add DNS record&quot; or edit an existing record&lt;/li&gt;
  &lt;li&gt;Fill in the DNS record name, type, and value fields as usual&lt;/li&gt;
  &lt;li&gt;Enable the &quot;Invert check&quot; toggle&lt;/li&gt;
  &lt;li&gt;Save the record&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;DNS Check immediately begins monitoring with the inverted logic. The record appears in your DNS record group with an &lt;span class=&quot;label label-info&quot; data-toggle=&quot;tooltip&quot; title=&quot;Inverted check: passes when record is absent or value doesn&apos;t match&quot; style=&quot;margin-left: 5px;&quot;&gt;INVERTED&lt;/span&gt; badge for easy identification.&lt;/p&gt;

&lt;h2 id=&quot;important-restrictions&quot;&gt;Important Restrictions&lt;/h2&gt;

&lt;p&gt;Inverted checks work independently from other DNS Check features, but a few intentional restrictions prevent confusing or overly complex monitoring configurations:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cannot combine with Exclusive mode:&lt;/strong&gt; The &quot;Exclusive&quot; option and &quot;Invert check&quot; option are mutually exclusive. You cannot enable both on the same DNS record. When you enable one option, DNS Check automatically disables the other in the user interface. This restriction prevents ambiguous monitoring logic that would be difficult to reason about and troubleshoot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not available for load balancer records:&lt;/strong&gt; DNS records configured as &lt;a href=&quot;/load-balancer-record-monitor&quot;&gt;load balancers&lt;/a&gt; (with multiple expected values) cannot use inverted checks. Load balancer monitoring already implements specialized logic for handling sets of IP addresses or hostnames. Adding inverted logic would overcomplicate the feature without clear use cases. If you need to monitor load balancer absence, create a non-load-balancer wildcard check with invert enabled instead.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Requires paid account:&lt;/strong&gt; Inverted checks are available on paid accounts (&lt;a href=&quot;/pricing&quot;&gt;Professional and Enterprise plans&lt;/a&gt;).&lt;/p&gt;

&lt;h2 id=&quot;zone-file-export-handling&quot;&gt;Zone File Export Handling&lt;/h2&gt;

&lt;p&gt;When you export your monitored DNS records to zone file format using the &quot;Export to zone file&quot; button, DNS Check includes inverted records as comments rather than standard zone file entries. This design decision reflects the nature of inverted monitoring: zone files define what DNS records &lt;strong&gt;should exist&lt;/strong&gt; in your zone, while inverted checks monitor what &lt;strong&gt;should not exist&lt;/strong&gt; or what should be absent.&lt;/p&gt;

&lt;p&gt;Inverted records appear in the exported zone file with a clear comment prefix:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;; INVERTED CHECK: staging.example.com. A * (passes when absent)
; INVERTED CHECK: example.com. A 192.0.2.50 (passes when value doesn&apos;t match)
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;This format provides documentation of your inverted monitoring configuration without affecting the zone file&apos;s functionality. You can import the zone file into your DNS server or use it as configuration documentation, and the commented inverted checks serve as useful notes about monitoring expectations.&lt;/p&gt;

&lt;h2 id=&quot;using-inverted-checks-at-scale&quot;&gt;Using Inverted Checks at Scale&lt;/h2&gt;

&lt;p&gt;Inverted checks integrate seamlessly with DNS Check&apos;s existing notification and monitoring features. State changes for inverted records trigger the same &lt;a href=&quot;/notifications&quot;&gt;notification channels&lt;/a&gt; as traditional checks: email, webhooks, Slack, PagerDuty, Opsgenie, and other configured integrations.&lt;/p&gt;

&lt;p&gt;When an inverted check fails (meaning an unwanted record was detected or a monitored record was created), DNS Check&apos;s error messages clearly communicate what was found. The notification includes the inverted record&apos;s configuration and the actual DNS query results.&lt;/p&gt;

&lt;p&gt;The state change history for inverted records tracks transitions just like normal records, providing a complete audit trail of when monitored records appeared, disappeared, or changed values. This historical data helps with troubleshooting recurring issues and understanding DNS configuration changes over time.&lt;/p&gt;

&lt;h2 id=&quot;get-started-with-inverted-checks&quot;&gt;Get Started with Inverted Checks&lt;/h2&gt;

&lt;p&gt;Inverted checks address DNS monitoring scenarios that traditional monitoring can&apos;t handle, from detecting rogue record creation to detecting internal IP addresses appearing in public DNS. The inverted logic provides visibility into DNS record creation and unwanted value detection without requiring complex workarounds or external scripting.&lt;/p&gt;

&lt;p&gt;Ready to start using inverted checks? &lt;a href=&quot;/signup&quot;&gt;Sign up for a DNS Check account&lt;/a&gt; and &lt;a href=&quot;/pricing&quot;&gt;upgrade&lt;/a&gt; to a Professional (starting at $8/month) or Enterprise plan to enable inverted checks. Existing paid customers can start using inverted checks immediately by either editing an existing DNS record or creating a new one and turning on the &quot;Invert check&quot; option.&lt;/p&gt;

&lt;p&gt;For detailed documentation on the &quot;Invert check&quot; feature, including usage with ALIAS records and examples for each DNS record type, visit our &lt;a href=&quot;/monitor-dns-records#invert-check&quot;&gt;Monitor DNS Records&lt;/a&gt; page.&lt;/p&gt;
</description>
        <pubDate>Mon, 03 Nov 2025 11:53:00 -0500</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2025/11/03/detect-dns-record-creation-planned-or-rogue.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2025/11/03/detect-dns-record-creation-planned-or-rogue.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Amazon Isn&apos;t Eating Its Own DNS Dog Food</title>
        <description>&lt;p&gt;&lt;em&gt;Updated October 24, 2025: Added TL;DR per reader feedback for clarity.&lt;/em&gt;&lt;/p&gt;

&lt;h2 id=&quot;tldr&quot;&gt;TL;DR&lt;/h2&gt;

&lt;p&gt;The evidence shows that:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;amazon.com&lt;/strong&gt; uses name servers (amzndns.*) hosted by &lt;strong&gt;Vercara, LLC&lt;/strong&gt;
(UltraDNS)&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;aws.com&lt;/strong&gt; and &lt;strong&gt;aws.amazon.com&lt;/strong&gt; use name servers (awsdns.*) hosted by
&lt;strong&gt;Amazon.com, Inc.&lt;/strong&gt; (Route 53)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On October 19-20, 2025, Amazon Web Services (AWS) experienced a &lt;a href=&quot;https://www.theregister.com/2025/10/20/amazon_aws_outage/&quot;&gt;significant outage&lt;/a&gt; (&lt;a href=&quot;https://health.aws.amazon.com/health/status&quot;&gt;AWS status&lt;/a&gt;) affecting its US-EAST-1 region in northern Virginia. The root cause was DNS resolution failures for DynamoDB&apos;s API endpoints, which cascaded across AWS&apos;s interconnected services, disrupting major platforms including Snapchat, McDonald&apos;s, Disney+, Roblox, Coinbase, Reddit, and Amazon&apos;s own services.&lt;/p&gt;

&lt;p&gt;While investigating the outage, I discovered that Amazon doesn&apos;t use its own AWS Route 53 service for amazon.com&apos;s DNS.&lt;/p&gt;

&lt;h2 id=&quot;eating-your-own-dog-food&quot;&gt;Eating Your Own Dog Food&lt;/h2&gt;

&lt;p&gt;&quot;Eating your own dog food&quot; (or &quot;dogfooding&quot;) is a practice where a company uses its own products or services internally. The phrase originated in the 1980s in the technology industry, and it serves several important purposes:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;strong&gt;Quality assurance&lt;/strong&gt;: Internal usage exposes bugs and usability issues before customers encounter them&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Credibility&lt;/strong&gt;: Demonstrating confidence in your own products builds customer trust&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Employee understanding&lt;/strong&gt;: Teams gain firsthand experience with what they&apos;re building and selling&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Many major technology companies have embraced dogfooding as a core principle. &lt;a href=&quot;https://www.atlassian.com/blog/atlassian-engineering/improving-coding-agent-experience&quot;&gt;Atlassian uses Jira for all internal development&lt;/a&gt;, recently detailing how they dogfood new features like their Rovo Dev coding agent across all internal Jira sites. &lt;a href=&quot;https://slack.engineering/deploys-at-slack/&quot;&gt;Slack deploys every new feature&lt;/a&gt; to an internal &quot;Dogfood&quot; tier first, where all Slack employees use it before external customers see it, helping catch problems early.&lt;/p&gt;

&lt;p&gt;These companies understand that if their products aren&apos;t good enough for their own use, they shouldn&apos;t be selling them to customers. A company that uses its own products creates a positive feedback loop, making the products even better.&lt;/p&gt;

&lt;p&gt;DNS Check follows this same principle. We monitor our own critical DNS records using our service, including dnscheck.co&apos;s authoritative name servers, MX records, and TXT records. When we add new features or make infrastructure changes, we experience the same monitoring alerts, notification workflows, and diagnostic tools that our customers use. This internal usage helps us identify potential improvements and ensures we&apos;re building features that genuinely matter for DNS monitoring.&lt;/p&gt;

&lt;!--more--&gt;

&lt;h2 id=&quot;amazons-dns-infrastructure-choice&quot;&gt;Amazon&apos;s DNS Infrastructure Choice&lt;/h2&gt;

&lt;p&gt;Given the importance of dogfooding, it&apos;s notable that Amazon doesn&apos;t use Route 53 for its flagship domain. Route 53 is AWS&apos;s managed DNS service, marketed for its scalability, reliability, and global infrastructure. Yet amazon.com relies on third-party DNS infrastructure from Vercara (formerly Neustar&apos;s UltraDNS).&lt;/p&gt;

&lt;p&gt;The decision predates the launch of Route 53 in December 2010. &lt;a href=&quot;https://www.theregister.com/2009/12/24/ddos_attack_ultradns_december_09/&quot;&gt;Amazon was already using UltraDNS for amazon.com in 2009&lt;/a&gt;, when a DDoS attack on UltraDNS briefly took down amazon.com. Migrating a domain as critical as amazon.com to a new DNS provider carries significant risk, even when that provider is your own service. However, this choice means Amazon doesn&apos;t directly experience Route 53&apos;s operational characteristics for its most critical domain.&lt;/p&gt;

&lt;p&gt;The October 19-20 outage adds an interesting dimension to this situation. AWS experienced a significant disruption due to DNS failures affecting its internal infrastructure, but its most public-facing domain operates on a different DNS provider&apos;s infrastructure. Had Amazon been using Route 53 for amazon.com, it would have had more firsthand operational experience with Route 53&apos;s behavior in similar public-facing scenarios.&lt;/p&gt;

&lt;h2 id=&quot;steps-to-reproduce&quot;&gt;Steps to Reproduce&lt;/h2&gt;

&lt;p&gt;To verify that Amazon uses third-party DNS infrastructure instead of its own
Route 53 service, you can follow these steps using standard command-line tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note for Windows users&lt;/strong&gt;: The examples below use &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dig&lt;/code&gt; and &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;whois&lt;/code&gt; (common on
Linux/macOS). On Windows, you can use &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;nslookup&lt;/code&gt; instead of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dig&lt;/code&gt; (nslookup
examples are provided alongside dig). Windows does not include &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;whois&lt;/code&gt; by
default. You can use an online tool like &lt;a href=&quot;https://who.is/&quot;&gt;who.is&lt;/a&gt; or
&lt;a href=&quot;https://www.whois.com/whois/&quot;&gt;whois.com&lt;/a&gt; for IP address lookups.&lt;/p&gt;

&lt;h3 id=&quot;1-check-amazoncoms-authoritative-name-servers&quot;&gt;1. Check amazon.com&apos;s authoritative name servers&lt;/h3&gt;

&lt;p&gt;First, query the authoritative name servers for amazon.com:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig amazon.com NS +short
ns2.amzndns.org.
ns1.amzndns.net.
ns2.amzndns.com.
ns2.amzndns.co.uk.
ns1.amzndns.co.uk.
ns1.amzndns.com.
ns1.amzndns.org.
ns2.amzndns.net.
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows using nslookup:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup -type=NS amazon.com
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Notice the naming pattern: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;*.amzndns.*&lt;/code&gt; - these are not Route 53 name servers.&lt;/p&gt;

&lt;h3 id=&quot;2-compare-with-route-53-name-server-patterns&quot;&gt;2. Compare with Route 53 name server patterns&lt;/h3&gt;

&lt;p&gt;For comparison, check the name servers for aws.com, which uses Route 53:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig aws.com NS +short
ns-2028.awsdns-61.co.uk.
ns-1500.awsdns-59.org.
ns-164.awsdns-20.com.
ns-917.awsdns-50.net.
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup -type=NS aws.com
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Route 53 name servers follow the pattern &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;ns-[number].awsdns-[number].[tld]&lt;/code&gt;
where the TLD is typically .com, .net, .org, or .co.uk. This is the standard
naming convention for all Route 53 public hosted zones.&lt;/p&gt;

&lt;p&gt;Note that aws.amazon.com uses a mix of name servers, including some Route 53
servers alongside AWS-internal infrastructure:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig aws.amazon.com NS +short
tp.8e49140c2-frontier.amazon.com.
dr49lng3n1n2s.cloudfront.net.
ns-1860.awsdns-40.co.uk.
ns-106.awsdns-13.com.
ns-905.awsdns-49.net.
ns-1402.awsdns-47.org.
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup -type=NS aws.amazon.com
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The presence of &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;awsdns.*&lt;/code&gt; name servers confirms that &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;aws.amazon.com&lt;/code&gt; uses Route 53.&lt;/p&gt;

&lt;h3 id=&quot;3-identify-who-owns-the-amzndns-name-servers&quot;&gt;3. Identify who owns the amzndns name servers&lt;/h3&gt;

&lt;p&gt;Look up the IP address of one of amazon.com&apos;s name servers:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig ns1.amzndns.com A +short
156.154.64.10
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup ns1.amzndns.com
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Check the ownership of this IP address using whois:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;whois 156.154.64.10 | &lt;span class=&quot;nb&quot;&gt;grep&lt;/span&gt; &lt;span class=&quot;nt&quot;&gt;-E&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;^(NetRange|OrgName|Organization):&quot;&lt;/span&gt;
NetRange:       156.154.60.0 - 156.154.80.255
OrgName:        Vercara, LLC
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;The IP addresses for all amzndns name servers fall within the 156.154.60.0 -
156.154.80.255 range owned by Vercara, LLC (formerly Neustar). Vercara operates
the UltraDNS managed DNS service.&lt;/p&gt;

&lt;p&gt;Note: The grep patterns shown are compatible with ARIN (American Registry for Internet
Numbers) output format. WHOIS output may vary slightly between different
regional registries, but the ownership information will be present.&lt;/p&gt;

&lt;p&gt;You can verify additional name servers follow the same pattern:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig ns2.amzndns.net A +short
156.154.69.10

&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig ns1.amzndns.org A +short
156.154.66.10

&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;whois 156.154.69.10 | &lt;span class=&quot;nb&quot;&gt;grep&lt;/span&gt; &lt;span class=&quot;nt&quot;&gt;-E&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;^(NetRange|OrgName):&quot;&lt;/span&gt;
NetRange:       156.154.60.0 - 156.154.80.255
OrgName:        Vercara, LLC
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup ns2.amzndns.net
&amp;gt; nslookup ns1.amzndns.org
&lt;/code&gt;&lt;/pre&gt;

&lt;h3 id=&quot;4-confirm-route-53-name-server-ownership&quot;&gt;4. Confirm Route 53 name server ownership&lt;/h3&gt;

&lt;p&gt;For comparison, verify that Amazon owns the Route 53 name servers:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig ns-106.awsdns-13.com A +short
205.251.192.106

&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;whois 205.251.192.106 | &lt;span class=&quot;nb&quot;&gt;grep&lt;/span&gt; &lt;span class=&quot;nt&quot;&gt;-E&lt;/span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;^(NetRange|OrgName):&quot;&lt;/span&gt;
NetRange:       205.251.192.0 - 205.251.255.255
OrgName:        Amazon.com, Inc.
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup ns-106.awsdns-13.com
&lt;/code&gt;&lt;/pre&gt;

&lt;h3 id=&quot;5-verify-name-server-software-identification&quot;&gt;5. Verify name server software identification&lt;/h3&gt;

&lt;p&gt;As a final confirmation, you can query the name servers directly to identify
their DNS software using a CHAOS class query:&lt;/p&gt;

&lt;div class=&quot;language-bash highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;nv&quot;&gt;$ &lt;/span&gt;dig +short CHAOS TXT version.bind @156.154.64.10
&lt;span class=&quot;s2&quot;&gt;&quot;UltraDNS Nameserver&quot;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Or on Windows:&lt;/p&gt;

&lt;pre&gt;&lt;code class=&quot;language-cmd&quot;&gt;&amp;gt; nslookup -class=CHAOS -type=TXT version.bind 156.154.64.10
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The UltraDNS name server explicitly identifies itself as &quot;UltraDNS Nameserver&quot;.
Route 53 name servers typically don&apos;t respond to these CHAOS queries (they time
out), which is a security practice to avoid revealing implementation details.&lt;/p&gt;

&lt;h2 id=&quot;why-this-matters&quot;&gt;Why This Matters&lt;/h2&gt;

&lt;p&gt;Amazon&apos;s choice to use UltraDNS instead of Route 53 for amazon.com doesn&apos;t necessarily indicate a problem with Route 53. Large enterprises often maintain DNS infrastructure decisions made years before newer solutions existed, and the risk of migrating critical domains can outweigh potential benefits. UltraDNS is a well-regarded DNS provider with a strong track record.&lt;/p&gt;

&lt;p&gt;However, the lack of dogfooding does mean Amazon misses opportunities that come from using its own service for its most critical domain:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Operational experience&lt;/strong&gt;: Running amazon.com on Route 53 would give Amazon direct insight into Route 53&apos;s behavior under the same traffic patterns and reliability requirements it demands for its primary domain. This real-world testing would complement its existing internal usage and customer feedback.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Incident response&lt;/strong&gt;: During DNS-related outages like the October 19-20 incident, having its primary domain on the same DNS infrastructure would provide additional operational data and motivation to resolve issues quickly. Teams would experience the same pain points as customers.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Customer confidence&lt;/strong&gt;: When AWS sells Route 53 to enterprises for their mission-critical domains, those customers might reasonably wonder why Amazon doesn&apos;t use it for amazon.com. Dogfooding sends a strong signal about a product&apos;s readiness for production use.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Feature validation&lt;/strong&gt;: New Route 53 features and performance improvements would be validated against one of the world&apos;s highest-traffic domains, ensuring they work at scale before customers deploy them.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The October 19-20 outage highlighted how DNS failures create cascading problems across dependent services. While that outage affected AWS&apos;s internal DNS infrastructure rather than Route 53, it demonstrates why DNS reliability matters for Amazon&apos;s business. Using Route 53 for amazon.com would align its most visible domain with the DNS service it recommends to customers.&lt;/p&gt;

&lt;h2 id=&quot;the-importance-of-dns-monitoring&quot;&gt;The Importance of DNS Monitoring&lt;/h2&gt;

&lt;p&gt;Whether you&apos;re using Route 53, UltraDNS, or any other DNS provider, proactive monitoring remains essential. The AWS outage demonstrated how DNS issues can rapidly cascade, impacting services that rely on DNS resolution. Without monitoring, DNS problems often go undetected until users report failures.&lt;/p&gt;

&lt;p&gt;DNS Check provides continuous monitoring for your DNS records, alerting you immediately when issues occur. Our service monitors authoritative name servers from multiple global locations, ensuring that they respond correctly and return the expected values. When DNS problems arise, let DNS Check notify you before your customers do.&lt;/p&gt;

&lt;p&gt;We eat our own dog food by monitoring our own DNS infrastructure with DNS Check. This means we rely on the same monitoring, alerting, and diagnostic tools that we provide to customers. When we improve DNS Check, we directly benefit from those improvements ourselves.&lt;/p&gt;

&lt;p&gt;Ready to add DNS monitoring to your infrastructure? &lt;a href=&quot;/signup&quot;&gt;Sign up for a free DNS Check account&lt;/a&gt; and start monitoring your critical DNS records today. Whether you&apos;re running on AWS, managing your own infrastructure, or using any other provider, DNS Check helps you catch DNS issues before they cascade into larger problems.&lt;/p&gt;

</description>
        <pubDate>Tue, 21 Oct 2025 09:50:00 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2025/10/21/aws-dog-food.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2025/10/21/aws-dog-food.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Lessons from the October 2025 AWS DNS Outage</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/aws-dns-cascading-failure.svg&quot; width=&quot;900&quot; height=&quot;266&quot; alt=&quot;The Domino Effect: AWS DNS Outage - DNS resolution failure triggering a cascade of falling dominos representing AWS services (DynamoDB, Lambda, ECS, API Gateway) leading to your business&quot; style=&quot;max-width: 100%; height: auto; border: none;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Early on October 20, 2025, Amazon Web Services (AWS) experienced a &lt;a href=&quot;https://www.theregister.com/2025/10/20/amazon_aws_outage/&quot;&gt;significant outage&lt;/a&gt; affecting its US-EAST-1 region in northern Virginia. The root cause was DNS resolution failures for DynamoDB&apos;s API endpoints, which cascaded across AWS&apos;s interconnected services. The incident disrupted major platforms including Signal, Snapchat, Fortnite, Reddit, Coinbase, Ring, Amazon&apos;s own Alexa and Prime Video services, and banking applications for institutions like Bank of Scotland, Halifax, and Lloyds.&lt;/p&gt;

&lt;p&gt;This outage demonstrates a fundamental truth about modern cloud infrastructure: DNS failures create disproportionate impact. When DNS resolution fails, even perfectly healthy servers become unreachable, effectively taking services offline.&lt;/p&gt;

&lt;h2 id=&quot;timeline-and-technical-details&quot;&gt;Timeline and Technical Details&lt;/h2&gt;

&lt;p&gt;AWS first reported elevated error rates across multiple services at approximately &lt;a href=&quot;https://health.aws.amazon.com/health/status&quot;&gt;3:11 AM ET&lt;/a&gt;. The company identified the root cause as DNS resolution issues affecting DynamoDB API endpoints in the US-EAST-1 region. DynamoDB serves as a foundational service for many AWS offerings, so DNS failures preventing applications from resolving DynamoDB endpoints created cascading failures across &lt;a href=&quot;https://www.thestack.technology/aws-us-east-1-glitches-out-across-k8-identity-frontend/&quot;&gt;more than 70 AWS services&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;By 6:35 AM ET, AWS reported that the DNS issue had been &quot;fully mitigated&quot; and service operations were returning to normal. However, some services experienced lingering effects as backlogs cleared and systems recovered. The total disruption lasted approximately 3-4 hours for most affected services.&lt;/p&gt;

&lt;p&gt;The incident highlights how DNS is a critical dependency of distributed systems. When DNS resolution fails, services can&apos;t locate the API endpoints they depend on. This creates the same observable failure as if those endpoints were completely offline, even though the underlying infrastructure might be functioning normally.&lt;/p&gt;

&lt;!--more--&gt;

&lt;h2 id=&quot;why-dns-failures-have-outsized-impact&quot;&gt;Why DNS Failures Have Outsized Impact&lt;/h2&gt;

&lt;p&gt;DNS resolution is typically one of the first steps in any network communication. When an application needs to communicate with a service like DynamoDB, it must first resolve the service&apos;s hostname to an IP address. If this resolution fails or returns incorrect information, the entire communication chain breaks down.&lt;/p&gt;

&lt;p&gt;In AWS&apos;s case, internal DNS resolution problems meant that services couldn&apos;t locate DynamoDB endpoints. Because many AWS services use DynamoDB for state management, session storage, and data persistence, this single DNS issue propagated across a large portion of AWS&apos;s infrastructure.&lt;/p&gt;

&lt;p&gt;This cascading effect demonstrates why DNS monitoring deserves special attention in your infrastructure reliability strategy. Unlike many other failure modes that might affect individual services or components, DNS failures can simultaneously impact everything that depends on the affected domain.&lt;/p&gt;

&lt;h2 id=&quot;the-case-for-dns-monitoring&quot;&gt;The Case for DNS Monitoring&lt;/h2&gt;

&lt;p&gt;While AWS&apos;s internal DNS infrastructure isn&apos;t directly accessible to external monitoring, organizations running on AWS can monitor their own DNS configurations to catch issues before they affect users. DNS Check provides monitoring for several scenarios that could prevent or mitigate outage impacts:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Name server availability monitoring&lt;/strong&gt;: Track whether your authoritative name servers are responding to queries. If a name server becomes unreachable, DNS Check detects this immediately and sends alerts, giving you time to investigate before users are affected.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Resolution correctness&lt;/strong&gt;: Verify that DNS queries return the expected values. Incorrect DNS responses can route traffic to the wrong endpoints or create partial outages that are difficult to diagnose.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Geographic consistency&lt;/strong&gt;: DNS Check queries from multiple global locations, helping you detect geolocation-based routing issues or inconsistent responses from different name servers.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For organizations depending on cloud infrastructure, DNS monitoring provides an early warning system. While you can&apos;t control AWS&apos;s internal DNS infrastructure, you can monitor your own DNS records and receive immediate notification when issues occur. This visibility helps you respond quickly, whether that means communicating with customers, activating failover systems, or contacting your service provider.&lt;/p&gt;

&lt;h2 id=&quot;building-dns-resilience&quot;&gt;Building DNS Resilience&lt;/h2&gt;

&lt;p&gt;The AWS outage reinforces several architectural principles for DNS resilience:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Use multiple authoritative name servers&lt;/strong&gt;: Most domains configure multiple authoritative name servers, providing redundancy if one name server fails.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Monitor DNS responses continuously&lt;/strong&gt;: Automated monitoring detects DNS issues faster than manual checks or user reports. DNS Check monitors your records at regular intervals and alerts you immediately when problems occur, helping you maintain awareness of your DNS infrastructure&apos;s health.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Understand your DNS dependencies&lt;/strong&gt;: Map out which systems depend on DNS resolution for critical services. This understanding helps you assess the potential impact of DNS failures and prioritize monitoring for your most important records.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Implement appropriate timeout and retry logic&lt;/strong&gt;: Applications should handle DNS resolution failures gracefully. Configure reasonable timeout values and implement retry logic that accounts for temporary DNS issues without creating excessive load on DNS infrastructure.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Consider multi-region and multi-cloud strategies&lt;/strong&gt;: While complex to implement, distributing your infrastructure across multiple regions or cloud providers can reduce the impact of regional outages. This typically requires careful DNS configuration to route traffic appropriately and failover mechanisms to handle regional failures.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id=&quot;looking-forward&quot;&gt;Looking Forward&lt;/h2&gt;

&lt;p&gt;Large-scale outages like this AWS incident serve as valuable reminders that no infrastructure is immune to failures. DNS&apos;s role as a foundational Internet protocol means that DNS issues often create widespread impact. By implementing proactive DNS monitoring, organizations gain visibility into this critical infrastructure layer and can respond quickly when problems occur.&lt;/p&gt;

&lt;p&gt;DNS Check monitors your DNS records and sends notifications when problems are detected, helping you maintain reliable DNS infrastructure. Whether you&apos;re running a small application or managing DNS for a large organization, monitoring provides the visibility needed to catch issues early and respond effectively.&lt;/p&gt;

&lt;p&gt;Ready to add DNS monitoring to your infrastructure? &lt;a href=&quot;/signup&quot;&gt;Sign up for a free DNS Check account&lt;/a&gt; and start monitoring your critical DNS records today.&lt;/p&gt;

</description>
        <pubDate>Mon, 20 Oct 2025 12:02:00 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2025/10/20/october-2025-aws-dns-outage.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2025/10/20/october-2025-aws-dns-outage.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Performance and Reliability Enhancements</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/dns-message-exchange-large-txt-record.svg&quot; width=&quot;800&quot; height=&quot;680&quot; alt=&quot;DNS message exchange diagram showing UDP to TCP fallback for large DNS TXT records, with 8-step protocol flow and RFC 6891 EDNS&quot; style=&quot;max-width: 100%; height: auto;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Over the past few months, we&apos;ve heard from DNS Check customers encountering increasingly complex DNS configurations. Modern domains often accumulate dozens of TXT records for email authentication, domain verification, and security tokens, creating responses that exceed traditional UDP limits and trigger complex fallback mechanisms. These scenarios were generating confusing error messages and, in some cases, false alerts when DNS servers didn&apos;t handle large responses correctly.&lt;/p&gt;

&lt;p&gt;We&apos;re excited to announce significant performance and reliability enhancements that directly address these challenges. These improvements make DNS troubleshooting clearer, reduce false alerts, and ensure accurate monitoring of your critical DNS records, regardless of how complex your DNS configuration becomes.&lt;/p&gt;

&lt;h2 id=&quot;enhanced-dns-error-diagnostics&quot;&gt;Enhanced DNS Error Diagnostics&lt;/h2&gt;

&lt;!--more--&gt;

&lt;p&gt;When DNS queries fail, the difference between a server error, a network timeout, and a connection refusal can determine whether you&apos;re looking at a name server misconfiguration or a network connectivity issue. Previously, DNS Check grouped all DNS server communication errors under a single &quot;ServFail&quot; category, forcing you to investigate further to understand the root cause.&lt;/p&gt;

&lt;p&gt;DNS Check now distinguishes between three distinct types of communication failures:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;General ServFail errors&lt;/strong&gt;: Issues with the name server itself, such as internal server errors or misconfigurations. You&apos;ll see these when the name server receives your query but can&apos;t process it due to zone file errors or server-side issues.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Query timeouts&lt;/strong&gt;: When DNS Check&apos;s connection to your chosen name server times out. This typically indicates network connectivity problems or an overloaded name server that can&apos;t respond within the timeout window.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Connection refused&lt;/strong&gt;: When the name server actively refuses the connection request. This often means the name server isn&apos;t accepting queries from DNS Check&apos;s monitoring locations or isn&apos;t running on the expected port.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This enhanced error categorization immediately points you toward the right troubleshooting approach. Instead of generic ServFail messages requiring additional investigation, you get specific diagnostic information that saves time and reduces confusion during DNS incidents.&lt;/p&gt;

&lt;h2 id=&quot;improved-support-for-large-txt-records&quot;&gt;Improved Support for Large TXT Records&lt;/h2&gt;

&lt;p&gt;Here&apos;s a real-world example that illustrates why large TXT record support matters. When you query a domain with extensive verification and email authentication records, you might see something like this:&lt;/p&gt;

&lt;div class=&quot;language-plaintext highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;$ dig txt example.com
;; Truncated, retrying in TCP mode.

; &amp;lt;&amp;lt;&amp;gt;&amp;gt; DiG 9.10.6 &amp;lt;&amp;lt;&amp;gt;&amp;gt; txt example.com
;; -&amp;gt;&amp;gt;HEADER&amp;lt;&amp;lt;- opcode: QUERY, status: NOERROR, id: 12832
;; flags: qr rd ra; QUERY: 1, ANSWER: 23, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;example.com.			IN	TXT

;; ANSWER SECTION:
example.com.		300	IN	TXT	&quot;MS=ms70274184&quot;
example.com.		300	IN	TXT	&quot;google-site-verification=C7thfNeXVahkVhniiqTI1iSVnElKR_kBBtnEHkeGDlo&quot;
example.com.		300	IN	TXT	&quot;apple-domain-verification=DNnWJoArJobFJKhJ&quot;
example.com.		300	IN	TXT	&quot;facebook-domain-verification=h9mm6zopj6p2po54woa16m5bskm6oo&quot;
example.com.		300	IN	TXT	&quot;stripe-verification=5096d01ff2cf194285dd51cae18f24fa9c26dc928cebac3636d462b4c6925623&quot;
[... 18 more verification records ...]
example.com.		300	IN	TXT	&quot;v=spf1 ip4:199.15.212.0/22 include:_spf.google.com include:spf1.mcsv.net include:spf.mandrillapp.com -all&quot;

;; Query time: 10 msec
;; SERVER: 192.168.0.1#53(192.168.0.1)
;; MSG SIZE  rcvd: 1954
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Notice two critical details: the &quot;Truncated, retrying in TCP mode&quot; message and the final response size of 1954 bytes. This response exceeds the &lt;a href=&quot;https://www.dnsflagday.net/2020/&quot;&gt;DNS Flag Day recommended UDP buffer size of 1232 bytes&lt;/a&gt;, forcing the query to fall back from UDP to TCP - exactly the scenario illustrated in the diagram above.&lt;/p&gt;

&lt;p&gt;DNS Check now handles these large TXT record scenarios more reliably through several key improvements:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Enhanced EDNS handling&lt;/strong&gt;: We&apos;ve improved compatibility with name servers that have incomplete implementations of &lt;a href=&quot;https://tools.ietf.org/rfc/rfc6891.txt&quot;&gt;RFC 6891 Extension Mechanisms for DNS (EDNS)&lt;/a&gt;. Some DNS providers implement EDNS incompletely, causing issues when responses approach or exceed the advertised buffer size. DNS Check now adapts to these implementation quirks automatically.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Improved TCP connection management&lt;/strong&gt;: When UDP responses are truncated (as shown in the dig output above), DNS Check establishes a TCP connection to retrieve the complete response. We&apos;ve enhanced our TCP connection handling to prevent premature disconnects that some name servers exhibit, ensuring reliable retrieval of large responses.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;DNS Flag Day compliance&lt;/strong&gt;: DNS Check now uses 1232-byte UDP buffers by default, following &lt;a href=&quot;https://www.dnsflagday.net/2020/&quot;&gt;DNS Flag Day recommendations&lt;/a&gt;. This prevents IP fragmentation issues that can cause packet loss and monitoring failures.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This enhancement is particularly valuable for monitoring email authentication records like SPF records with multiple include statements, large DKIM public keys, and domains with extensive third-party service integrations that require domain verification records.&lt;/p&gt;

&lt;h2 id=&quot;optimized-query-reliability&quot;&gt;Optimized Query Reliability&lt;/h2&gt;

&lt;p&gt;Reliability improvements often happen behind the scenes, but their impact on your monitoring experience is significant. We&apos;ve fine-tuned timeout values and retry logic to strike a better balance between rapid issue detection and false positive prevention.&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Smarter timeout management&lt;/strong&gt;: Different types of DNS queries require different timeout strategies. Large TXT record queries over TCP naturally take longer than simple A record lookups over UDP. DNS Check now adjusts timeout values based on query type and transport protocol, reducing false timeouts for legitimate slow responses while maintaining rapid detection of actual failures.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Connection pooling enhancements&lt;/strong&gt;: For users monitoring hundreds or thousands of DNS records, efficient connection management makes a substantial difference in query performance. We&apos;ve optimized connection pooling to reuse TCP connections when appropriate, reducing the overhead of establishing new connections for each large record query.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Intelligent retry strategies&lt;/strong&gt;: When a query fails, the retry approach depends on the failure type. Network timeouts warrant different retry timing than server errors. DNS Check now implements failure-specific retry logic that improves success rates while avoiding unnecessary load on DNS servers.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These optimizations are particularly beneficial if you&apos;re monitoring large numbers of DNS records or require frequent check intervals, but all users benefit from more reliable monitoring and fewer false alerts.&lt;/p&gt;

&lt;h2 id=&quot;streamlined-integrations&quot;&gt;Streamlined Integrations&lt;/h2&gt;

&lt;p&gt;Reliable notifications depend on reliable integration partners. We&apos;ve updated our integration offerings to focus on actively maintained, dependable notification channels:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Removed discontinued services&lt;/strong&gt;: Following Flowdock&apos;s service discontinuation, we&apos;ve removed this integration to prevent configuration confusion. If you were using Flowdock notifications, you&apos;ll need to migrate to an alternative integration.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Enhanced Basecamp support&lt;/strong&gt;: The Basecamp integration now supports both Basecamp 3 and Basecamp 4. Existing Basecamp integrations continue working without modification.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;All remaining integrations received strengthened error handling and more robust delivery mechanisms. These improvements reduce the likelihood of missed notifications during DNS incidents, when reliable alerting matters most.&lt;/p&gt;

&lt;h2 id=&quot;api-performance-improvements&quot;&gt;API Performance Improvements&lt;/h2&gt;

&lt;p&gt;The &lt;a href=&quot;/api&quot;&gt;DNS Check API&lt;/a&gt; has received significant architectural improvements that benefit both our web application and API users. We&apos;ve streamlined the internal codebase, removing legacy dependencies while maintaining full backward compatibility.&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Faster response times&lt;/strong&gt;: Database query optimizations and improved caching reduce API response latency, particularly for accounts monitoring large numbers of DNS records.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Enhanced reliability&lt;/strong&gt;: Better error handling and connection management improve API availability.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Future-ready architecture&lt;/strong&gt;: These changes establish a foundation for upcoming API enhancements, including expanded query capabilities and additional DNS record types.&lt;/p&gt;
  &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you&apos;re building applications on DNS Check&apos;s API, you&apos;ll experience more consistent performance. The improved architecture also supports our roadmap for additional API features.&lt;/p&gt;

&lt;h2 id=&quot;looking-forward&quot;&gt;Looking Forward&lt;/h2&gt;

&lt;p&gt;These enhancements reflect our commitment to evolving DNS Check alongside the changing DNS landscape. As organizations adopt more cloud services, improve email security, and integrate additional third-party tools, DNS configurations grow increasingly complex. DNS Check&apos;s improvements ensure reliable monitoring regardless of this complexity.&lt;/p&gt;

&lt;p&gt;The enhanced error diagnostics provide clearer troubleshooting guidance when issues occur. The improved large TXT record support handles modern DNS configurations that previous generations of DNS monitoring tools struggle with. The optimized query reliability reduces false alerts that can desensitize teams to real DNS problems.&lt;/p&gt;

&lt;p&gt;Whether you&apos;re monitoring a handful of critical records for a small business or managing DNS infrastructure for a large enterprise, these improvements ensure you receive accurate, actionable alerts when DNS issues arise and clear information to resolve them efficiently.&lt;/p&gt;

&lt;p&gt;Ready to experience these improvements? &lt;a href=&quot;/signup&quot;&gt;Sign up for a free DNS Check account&lt;/a&gt; and start monitoring your DNS records today. Existing customers immediately benefit from these enhancements: no configuration changes required.&lt;/p&gt;
</description>
        <pubDate>Sat, 13 Sep 2025 12:15:00 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2025/09/13/performance-and-reliability-enhancements.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2025/09/13/performance-and-reliability-enhancements.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Two New DNS Record Monitoring Features</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/dns-record-flapping-between-passing-and-failing.png&quot; width=&quot;512&quot; height=&quot;512&quot; alt=&quot;DNS Record Flapping Between Passing and Failing States&quot; style=&quot;border-style:none; padding-right: 10px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;We&apos;re excited to announce two significant enhancements to DNS Check: &lt;strong&gt;DNS Record Flapping Detection&lt;/strong&gt; and &lt;strong&gt;Extended Notification History&lt;/strong&gt;. These features streamline the troubleshooting process for recurring DNS resolution errors and reduce repetitive notifications.&lt;/p&gt;

&lt;h2 id=&quot;dns-record-flapping-detection&quot;&gt;DNS Record Flapping Detection&lt;/h2&gt;

&lt;p&gt;DNS record flapping occurs when a record rapidly alternates between passing and failing states. With our new feature, DNS Check identifies records that change state six or more times within two hours as flapping. This proactive detection serves two primary purposes:&lt;/p&gt;

&lt;!--more--&gt;

&lt;ol&gt;
  &lt;li&gt;&lt;strong&gt;Notification of Flapping Issues&lt;/strong&gt;: DNS Check will alert you when flapping is detected, enabling you to investigate and address potential problems rapidly.&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Aggregated Notifications&lt;/strong&gt;: DNS Check consolidates flapping alerts into a single email per hour for users with immediate email notifications enabled. This approach prevents an overwhelming number of emails during periods of instability. There are a few caveats to this behavior. See our &lt;a href=&quot;/faq#dns-record-flapping&quot;&gt;FAQ entry&lt;/a&gt; for details.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Common causes of DNS record flapping include:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Inconsistent Responses from Authoritative Name Servers&lt;/strong&gt;: Different name servers may return varying results for the same query, often due to misconfigurations.&lt;/p&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Geolocation-based Routing&lt;/strong&gt;: DNS Check queries from multiple global locations, which can trigger discrepancies in DNS responses from CDNs and load balancers. To address this:
    &lt;ul&gt;
      &lt;li&gt;If monitoring a CDN or load balancer record, configure it as a load balancer record and specify all potential IPs or hostnames that your CDN or load balancer could return. DNS Check will consider the record passing if any subset of the expected results are returned.&lt;/li&gt;
      &lt;li&gt;Alternatively, set a specific name server for DNS Check to query to ensure consistent results from a deterministic IP address.&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Connectivity Issues&lt;/strong&gt;: These can cause a record to alternate between passing and failing with &lt;a href=&quot;/blog/dns-monitoring/2016/03/11/dns-servfail-errors.html&quot;&gt;ServFail errors&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By detecting and alerting you to flapping records, DNS Check empowers you to maintain the stability and reliability of your DNS configurations.&lt;/p&gt;

&lt;h2 id=&quot;extended-notification-history&quot;&gt;Extended Notification History&lt;/h2&gt;

&lt;p&gt;Understanding the history of your DNS records is crucial for effective troubleshooting and analysis. We’ve expanded our notification history retention for Enterprise accounts to 365 days, allowing for a full year of state change tracking. Professional accounts retain 90 days of history, while Basic accounts maintain a 7-day history. This extended access enables you to observe long-term patterns, investigate past incidents, and maintain comprehensive records for auditing purposes.&lt;/p&gt;

&lt;p&gt;These enhancements reflect our commitment to providing robust and user-friendly DNS monitoring. We aim to empower you with the tools to maintain an optimal DNS configuration by offering detailed insights into DNS record behavior and extending historical data access.&lt;/p&gt;

&lt;p&gt;For more information on these features and how they can benefit your organization, visit our &lt;a href=&quot;/features&quot;&gt;Features&lt;/a&gt; page.&lt;/p&gt;
</description>
        <pubDate>Sat, 29 Mar 2025 11:42:15 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2025/03/29/dns-record-flapping-detection-and-extended-notification-history.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2025/03/29/dns-record-flapping-detection-and-extended-notification-history.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>Capacity Expansion</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://cdn.dnscheck.co/images/dns-monitoring-server.jpg&quot; width=&quot;640&quot; height=&quot;480&quot; alt=&quot;DNS Monitoring Server&quot; style=&quot;border-style:none; padding-right: 10px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;We will migrate DNS Check’s infrastructure to more powerful hardware on Saturday, July 24. The maintenance window will begin at 12 am UTC and end at 1 am UTC.&lt;/p&gt;

&lt;p&gt;We anticipate that this migration will cause 10-15 minutes of downtime for our website and API endpoints. Monitoring of some DNS records will also be delayed by up to 15 minutes.&lt;/p&gt;

&lt;p&gt;The upgrade will make DNS Check&apos;s website snappier and increase the number of DNS records we can monitor. We&apos;ve grown steadily since our last major hardware upgrade in 2018. We still have spare capacity from the 2018 upgrade but are upgrading now to ensure that we stay well ahead of the growth curve.&lt;/p&gt;

&lt;!--more--&gt;

&lt;p&gt;If you&apos;re using &lt;a href=&quot;/api&quot;&gt;our API&lt;/a&gt; for DNS record monitoring, then we recommend scheduling a maintenance window within your monitoring system that runs from 12 to 1 am UTC on Saturday, July 24.&lt;/p&gt;

&lt;p&gt;Feel free to &lt;a href=&quot;/contact&quot;&gt;contact us&lt;/a&gt; if you have any questions.&lt;/p&gt;

</description>
        <pubDate>Sun, 18 Jul 2021 05:48:14 -0400</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2021/07/18/capacity-expansion.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2021/07/18/capacity-expansion.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
      <item>
        <title>DNS Monitoring Improvements</title>
        <description>&lt;p&gt;Happy New Year! We want to kick off 2021 by announcing some improvements to DNS Check.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Extended the Notification History&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When troubleshooting an intermittent problem or flapping record, it&apos;s useful to see what failures occurred in the past and look for patterns. DNS Check maintains a log of the notifications sent for each monitored DNS record to support that type of troubleshooting. Each record&apos;s log can be viewed by clicking its &lt;span class=&quot;glyphicon glyphicon-calendar&quot; aria-hidden=&quot;true&quot;&gt;&lt;/span&gt; History button.&lt;/p&gt;

&lt;!--more--&gt;

&lt;p&gt;Here&apos;s an example report:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;DNS Record Notification History&quot; class=&quot;screenshot&quot; src=&quot;https://cdn.dnscheck.co/images/dns-record-notification-history.png&quot; width=&quot;913&quot; height=&quot;638&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The log used to be maintained for 30 days for paid accounts, but we recently increased the retention period to 90 days.&lt;/p&gt;

&lt;p&gt;Free accounts can also view this log, but only for the past 7 days.&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;/troubleshoot-dns-records&quot;&gt;Troubleshoot DNS Records&lt;/a&gt; page has more details on this feature.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Added Support for Monitoring More DNS Records&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We added four new &lt;a href=&quot;/pricing&quot;&gt;subscription options&lt;/a&gt; to the checkout page to monitor up to 3,000 DNS records. Previously, the largest available package on that page had a 1,0000 DNS record limit.&lt;/p&gt;

&lt;p&gt;We&apos;re also able to create custom packages for monitoring more than 3,000 DNS records. &lt;a href=&quot;/contact&quot;&gt;Get in touch&lt;/a&gt; with us if you&apos;d like a custom quote.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Made the Zone File Importer More Robust&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;DNS Check offers the option of importing entire zone files for monitoring. This system worked for properly formed zone files, but some DNS hosting providers produce malformed zone files that can cause issues, like making individual records unreadable. Another common problem is omitting the zone file&apos;s &lt;strong&gt;$ORIGIN&lt;/strong&gt;, making relative references like &lt;strong&gt;@&lt;/strong&gt; meaningless.&lt;/p&gt;

&lt;p&gt;We&apos;ve enhanced the zone file importer&apos;s &quot;Autocorrect syntax errors&quot; option to fix more types of zone file issues. The enhancement was significant enough to warrant turning the option on by default. It was off by default before.&lt;/p&gt;

&lt;p&gt;The &lt;a href=&quot;/dns-record-groups&quot;&gt;Monitor DNS Records&lt;/a&gt; page shows how to access the zone file importer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Made the Check Frequency Configurable&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We added the ability to customize how often DNS records are checked. Each &lt;a href=&quot;/dns-record-groups&quot;&gt;DNS record group&lt;/a&gt; now has &quot;Check frequency&quot; settings that can be set to any of the following:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Every 5 minutes (the default)&lt;/li&gt;
  &lt;li&gt;Every hour&lt;/li&gt;
  &lt;li&gt;Paused&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Previously, all DNS records were checked every 5 minutes, and there wasn&apos;t any way to pause checks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Added a Status Page&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Finally, we&apos;ve created a status page at &lt;a href=&quot;https://status.dnscheck.co/&quot;&gt;status.dnscheck.co&lt;/a&gt;. Moving forward, we&apos;ll post notices about upcoming maintenance there. If any services experience downtime, we&apos;ll also document them on the status page. Feel free to subscribe for status updates.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;Status Page showing all services operational and 100% uptime&quot; class=&quot;screenshot&quot; src=&quot;https://cdn.dnscheck.co/images/status-page-all-services-operational.png&quot; width=&quot;579&quot; height=&quot;748&quot; /&gt;&lt;/p&gt;

&lt;p&gt;That&apos;s it for now. More improvements are coming in 2021, and we&apos;re looking forward to sharing them with you.&lt;/p&gt;
</description>
        <pubDate>Sat, 02 Jan 2021 05:24:00 -0500</pubDate>
        <link>https://www.dnscheck.co/blog/dns-monitoring/2021/01/02/dns-monitoring-improvements.html</link>
        <guid isPermaLink="true">https://www.dnscheck.co/blog/dns-monitoring/2021/01/02/dns-monitoring-improvements.html</guid>
        
        
        <category>dns-monitoring</category>
        
      </item>
    
  </channel>
</rss>
