social.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
social.lol is a lighthearted social hangout for the omg.lol community.

Administered by:

Server stats:

848
active users

#Route53

0 posts0 participants0 posts today
Paco Hope #resist<p>I realized that I was spending 50¢ every month for 7 Route53 hosted zones at AWS, when I really don't need to do that for some of them. I'm using <code>name.com</code> as my registrar, and they'll do basic <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> service for free as a part of that.</p><p>I didn't want to spend an hour clicking and copy/pasting DNS records, so like any good geek I spent about 6 hours writing a script to do it for me. 😃 </p><p>It's a bit of a specialized need. If you're not hosted in <a href="https://infosec.exchange/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> and not looking to go to <code>name.com</code>, this is not useful to you at all, except as a curiosity of how badly I write python.</p><p>But if (a) you're cheap like me, and (b) you've made the same choices as me, this script will save you some time.</p><p><a href="https://git.paco.to/pacohope/route53-namecom-dns" rel="nofollow noopener noreferrer" target="_blank">route53-namecom-dns</a> </p><p><a href="https://infosec.exchange/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a></p>
Paco Hope #resist<p>The punchline on my <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> reconfiguration is that nothing went wrong because I didn’t actually make any changes that took effect. I do a weird config to have reliable DNS: <br>I have a hidden master that uses dnsmadeeasy as the public servers. They answer authoritatively but they’re getting records from my <a href="https://infosec.exchange/tags/powerdns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powerdns</span></a> server.</p><p>Well, one problem I have is using CDNs at the apex zone. I use <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/cloudfront" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudfront</span></a> as my <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CDN</span></a>. This is fine when you use <a href="https://infosec.exchange/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> as your DNS. They can put alias records in at the apex. But it doesn’t work with dnsmadeeasy secondary zones. The way I run them. </p><p>Name dot com is my registrar. They can do alias records. So I think they also do DNS for free. I’m going to migrate my Route53 zones to the free DNS instead of paying $0.50 per zone per month. All this effort will save me about $6.50/month. <br><a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a></p>
Adam ♿<p>A question to <a href="https://aus.social/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://aus.social/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> <a href="https://aus.social/tags/CloudWatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudWatch</span></a> experts:</p><p>I have a <a href="https://aus.social/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> public zone sending logs to a <a href="https://aus.social/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> group - why isn't case in the incoming queries preserved?</p><p>(if someone queries AAA.test.voltagex.org the log will show aaa.test.voltagex.org)</p>
Brian LeRoux 💚<p>pleasantly surprised how easy domain transferring is between <a href="https://indieweb.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://indieweb.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> accounts</p>
Jan ☕🎼🎹☁️🏋️‍♂️<p><a href="https://fedi.kcore.org/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> just introduced <a href="https://fedi.kcore.org/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> <a href="https://fedi.kcore.org/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> profiles. Gimme gimme! </p><p><a href="https://aws.amazon.com/about-aws/whats-new/2024/04/amazon-route-53-profiles/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">aws.amazon.com/about-aws/whats</span><span class="invisible">-new/2024/04/amazon-route-53-profiles/</span></a></p>
Steve Castano<p><span class="h-card" translate="no"><a href="https://mastodon.social/@lucas3d" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>lucas3d</span></a></span> for sure keep an eye on it… it’s specifically my wildcard certs that don’t renew properly. My single sites renew with no problem as soon as they are within the 30 day renewal period, but my <a href="https://mastodon.stevex.online/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.stevex.online/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> and <a href="https://mastodon.stevex.online/tags/PowerDNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerDNS</span></a> ones with the DNS challenge tend to fail repeatedly. Just to cover yourself, a good uptime monitor with cert expiration is what catches mine… I use Uptime Kuma for that: <a href="https://github.com/louislam/uptime-kuma" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/louislam/uptime-kum</span><span class="invisible">a</span></a> (great to run under docker)</p>
CFN Updates<p>New AWS::Route53::RecordSet GeoProximityLocation</p><p>Use the AWS::Route53::RecordSet GeoProximityLocation property to specify a geoproximity resource recordset.<br><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53-recordset-geoproximitylocation.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.aws.amazon.com/AWSCloudFo</span><span class="invisible">rmation/latest/UserGuide/aws-properties-route53-recordset-geoproximitylocation.html</span></a> <a href="https://awscommunity.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> <a href="https://awscommunity.social/tags/cloudformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudformation</span></a></p>
Jon "The Nice Guy" Spriggs<p>Using <a href="https://toot.io/tags/NetworkFirewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkFirewall</span></a> and <a href="https://toot.io/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> <a href="https://toot.io/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://toot.io/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> to protect a private subnet’s egress traffic in <a href="https://toot.io/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://jon.sprig.gs/blog/post/2760" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jon.sprig.gs/blog/post/2760</span><span class="invisible"></span></a></p>
CFN Updates<p>New AWS::Route53::RecordSetGroup GeoProximityLocation</p><p>Use the AWS::Route53::RecordSetGroup GeoProximityLocation property to specify croperty to specify a geoproximity resource recordset.<br><a href="https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-route53-recordsetgroup-geoproximitylocation.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.aws.amazon.com/AWSCloudFo</span><span class="invisible">rmation/latest/UserGuide/aws-properties-route53-recordsetgroup-geoproximitylocation.html</span></a> <a href="https://awscommunity.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> <a href="https://awscommunity.social/tags/cloudformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudformation</span></a></p>
CFN Updates<p>New AWS::Route53::RecordSet GeoProximityLocation</p><p>Use the AWS::Route53::RecordSet GeoProximityLocation property to specify a geoproximity resource recordset.<br><a href="https://docs.aws.amazon.com/aws-properties-route53-recordset-geoproximitylocation.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.aws.amazon.com/aws-proper</span><span class="invisible">ties-route53-recordset-geoproximitylocation.html</span></a> <a href="https://awscommunity.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> <a href="https://awscommunity.social/tags/cloudformation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudformation</span></a></p>
Trusty<p>🚨 Introducing a single pane of glass for domains, DNS, and more! 🚨</p><p>Take control of all your domains, DNS, and SSL certificates across registrars and providers from a single pane of glass.</p><p>With DNSimple's NEW Domain Control Plane, you can<br>• Add, edit, or remove DNS records.<br>• Register, transfer, or renew domain names.<br>• Request and deploy SSL certificates.<br>• And much much more.<br>Visit 👉<a href="https://blog.dnsimple.com/2023/12/introducing-domain-control-plane/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=DCP" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.dnsimple.com/2023/12/intr</span><span class="invisible">oducing-domain-control-plane/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=DCP</span></a></p><p><a href="https://dnsimple.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://dnsimple.social/tags/sslcertificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sslcertificate</span></a> <a href="https://dnsimple.social/tags/domains" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domains</span></a> <a href="https://dnsimple.social/tags/domainregistration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domainregistration</span></a> <a href="https://dnsimple.social/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://dnsimple.social/tags/coredns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coredns</span></a> <a href="https://dnsimple.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://dnsimple.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a></p>
Trusty<p>Managing multiple AWS accounts? Experiencing DNS or domain sprawl? 😓 Get a clean, simple overview of all your domains and DNS in one place 😉. Manage your Route53 zones in DNSimple with our Domain Control Plane 👉 <a href="https://blog.dnsimple.com/2023/06/manage-aws-routes-in-dnsimple/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.dnsimple.com/2023/06/mana</span><span class="invisible">ge-aws-routes-in-dnsimple/</span></a> <a href="https://dnsimple.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://dnsimple.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> <a href="https://dnsimple.social/tags/domains" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>domains</span></a> <a href="https://dnsimple.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a></p>
John Manoogian III<p>I know folks sing the praises of <a href="https://trunk.lol/tags/porkbun" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>porkbun</span></a> as a <a href="https://trunk.lol/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> service provider, but the <a href="https://trunk.lol/tags/UI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UI</span></a> could really use some love. It would be SO EASY to at least exceed the UI quality of AWS <a href="https://trunk.lol/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a>’s dns console, and yet porkbun honestly BARELY meets that low bar. As a customer I would love to see what a dns web ui could look like with a little polish and attention to detail and update to modern ui standards.</p>
Major Hayden 🤠<p>Just to follow up, I moved my domain to AWS Route53 and left it there for a week. The response times got *worse* at Route53!</p><p>Guess it&#39;s time to go back to Porkbun! 🤯</p><p><a href="https://social.lol/tags/aws" class="mention hashtag" rel="tag">#<span>aws</span></a> <a href="https://social.lol/tags/dns" class="mention hashtag" rel="tag">#<span>dns</span></a> <a href="https://social.lol/tags/route53" class="mention hashtag" rel="tag">#<span>route53</span></a> <a href="https://social.lol/tags/porkbun" class="mention hashtag" rel="tag">#<span>porkbun</span></a> 🐷</p>
Trusty<p>You don’t need complex UI just to manage your DNS zones 😓. Get a clean, simple overview of all your digital assets in one place 🤩. Manage your Route53 zones within DNSimple, read more 👉 <a href="https://blog.dnsimple.com/2023/06/manage-aws-routes-in-dnsimple/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=route53" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.dnsimple.com/2023/06/mana</span><span class="invisible">ge-aws-routes-in-dnsimple/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=route53</span></a> <a href="https://dnsimple.social/tags/aws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aws</span></a> <a href="https://dnsimple.social/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://dnsimple.social/tags/awsdevops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>awsdevops</span></a> <a href="https://dnsimple.social/tags/uideveloper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uideveloper</span></a> <a href="https://dnsimple.social/tags/route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>route53</span></a> <a href="https://dnsimple.social/tags/dev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dev</span></a></p>
Stefan Midjich ꙮ҄<p>A Dynamic <a href="https://mastodon.se/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.se/tags/Ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ansible</span></a> role for <a href="https://mastodon.se/tags/AWS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWS</span></a> <a href="https://mastodon.se/tags/Route53" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Route53</span></a> in case anyone is interested. It's part of my <a href="https://mastodon.se/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> setup.</p><p><a href="https://mastodon.se/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> </p><p><a href="https://gitlab.com/stemid-ansible/homelab/-/tree/main/roles/route53-dyndns" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.com/stemid-ansible/home</span><span class="invisible">lab/-/tree/main/roles/route53-dyndns</span></a></p>