Amazon Route 53 Explained

Amazon Route 53 is AWS’s managed DNS service that helps direct user traffic to the right application endpoint. In real-world cloud architectures, it often acts as the first decision point for internet traffic, helping route users to an Application Load Balancer, CloudFront distribution, public IP, or even a disaster recovery endpoint.

If you are building highly available applications in AWS, understanding Route 53 is not optional. It directly affects reachability, traffic flow, failover behaviour, latency optimisation, and user experience.

AWS DNS Routing Policies Health Checks Failover Terraform Interview Prep

What is Amazon Route 53?

Amazon Route 53 is a highly available and scalable DNS web service from AWS. It is used to manage domain names, resolve DNS queries, perform health checks, and route traffic intelligently to application endpoints.

In simple terms, when a user types a domain name such as app.example.com into a browser, Route 53 helps answer the question: Where should this request go?

Think of Route 53 as the traffic controller sitting in front of your application. It does not process the application request itself, but it decides which endpoint the user should be sent to.

What does the name Route 53 mean?

The “53” comes from the TCP/UDP port number used by DNS. Route 53 is therefore named after the standard DNS service port.

Watch: AWS Route 53 Explained (Hands-on)

Prefer video learning? This tutorial explains Route 53 concepts, DNS flow, routing policies, and real-world use cases.

Why Route 53 matters in cloud networking

In cloud environments, many services sit behind load balancers, content delivery networks, or dynamic endpoints. Hardcoding IP addresses is not practical, scalable, or resilient. DNS becomes the abstraction layer that makes modern application delivery possible.

High availability

Route 53 can work with health checks and failover policies so traffic is sent only to healthy endpoints.

Performance optimisation

Latency-based routing can direct users to the region that provides the fastest response time.

Traffic control

Weighted routing can split traffic between old and new versions during gradual rollouts or testing.

Disaster recovery

Failover routing can automatically move users to a backup environment when the primary becomes unavailable.

Route 53 is not only for public websites. It is also heavily used for internal private DNS inside VPC-based application environments.

How Amazon Route 53 works

At a high level, Route 53 participates in DNS resolution. When a user requests your domain, Route 53 returns the correct DNS answer based on your hosted zone configuration and routing policy.

User enters https://app.example.com
                  |
                  v
          Browser asks DNS resolver
                  |
                  v
          Resolver queries Route 53 hosted zone
                  |
                  v
          Route 53 checks record + routing policy + health status
                  |
                  v
          Returns endpoint:
            - ALB DNS name
            - CloudFront distribution
            - Public IP
            - Another domain name
                  |
                  v
          User request goes to selected application endpoint

Step-by-step DNS flow

  1. The user enters a domain name in the browser.
  2. The browser or operating system sends a DNS lookup request to a resolver.
  3. The resolver finds the authoritative DNS information for your domain.
  4. Route 53 returns the configured DNS record response.
  5. The browser connects to the returned endpoint and the application request starts.
Route 53 returns DNS answers. It does not serve your application itself. Your application is typically hosted behind services such as CloudFront, ALB, NLB, EC2, EKS ingress, or another endpoint.

Core Route 53 components

1. Hosted zones

A hosted zone is a container for DNS records for a specific domain.

  • Public hosted zone: Used for internet-facing domains such as example.com.
  • Private hosted zone: Used for internal DNS within one or more VPCs.

2. DNS records

These are the actual entries that map domain names to endpoints.

Record Type Purpose Typical Use
A Maps a name to an IPv4 address Public IP or internal IP mapping
AAAA Maps a name to an IPv6 address IPv6-enabled environments
CNAME Maps one hostname to another hostname Subdomain redirection
Alias AWS-native mapping to AWS resources ALB, CloudFront, S3 website endpoints
MX Mail routing record Email services
TXT Text-based metadata or verification SPF, DKIM, domain verification

3. Alias records

Alias records are especially important in AWS. They let you map a domain directly to AWS-managed resources such as an Application Load Balancer or CloudFront distribution.

Unlike CNAME records, alias records can also be used at the zone apex, for example example.com.

4. Health checks

Route 53 health checks monitor the health of endpoints. They are commonly used with failover policies so that DNS answers change when the primary application becomes unhealthy.

Route 53 routing policies explained

One of the biggest strengths of Route 53 is that it can return different DNS answers depending on the routing policy you choose.

Routing Policy What it does Best use case
Simple Returns a single record response Single application endpoint
Weighted Splits traffic across multiple records by percentage Canary release or phased migration
Latency Sends users to the lowest-latency region Global applications
Failover Routes to standby if primary is unhealthy Disaster recovery
Geolocation Routes based on user location Regional content or compliance rules
Geoproximity Routes based on geographic bias Fine-grained regional traffic steering
Multi-value answer Returns multiple healthy records Basic DNS-level load distribution

Weighted routing example

Imagine you are deploying a new version of an application. Instead of sending 100% of traffic to the new release, you can start with 10% and keep 90% on the old version. If things look stable, you can gradually increase the percentage.

Latency routing example

Suppose your application is deployed in Mumbai and Frankfurt. A user from India should ideally be routed to Mumbai, while a user from Europe should ideally be routed to Frankfurt. Latency-based routing helps Route 53 return the best endpoint.

Failover routing example

In a disaster recovery setup, the primary application may be running in one region and the standby application in another. If Route 53 health checks detect that the primary endpoint is unhealthy, DNS answers can automatically shift users to the backup environment.

Primary record ---> app-primary.example.com ---> ALB in Region A | | health check fails v Secondary record ---> app-dr.example.com ---> ALB in Region B

Real-world Route 53 architecture example

Here is a common production-style traffic flow for an internet-facing application hosted on AWS:

User | v Route 53 | v CloudFront | v Application Load Balancer | v EKS / EC2 application nodes | v Backend services / databases

In this architecture:

  • Route 53 resolves the domain name.
  • CloudFront improves global content delivery and edge caching.
  • The ALB distributes traffic to healthy application targets.
  • Your compute platform may be EKS, ECS, or EC2.
This is why Route 53 is often one of the first networking services you configure in AWS. If DNS is wrong, everything above it may be healthy but still unreachable to users.

Terraform example for Route 53

Below is a simple example that creates a hosted zone and an alias record pointing to an Application Load Balancer.

resource "aws_route53_zone" "main" {
  name = "example.com"
}

resource "aws_route53_record" "app" {
  zone_id = aws_route53_zone.main.zone_id
  name    = "app.example.com"
  type    = "A"

  alias {
    name                   = aws_lb.app.dns_name
    zone_id                = aws_lb.app.zone_id
    evaluate_target_health = true
  }
}

What this Terraform does

  • Creates a hosted zone for example.com.
  • Creates a DNS record for app.example.com.
  • Uses an alias record instead of a CNAME to point to an AWS load balancer.
  • Enables target health evaluation for smarter DNS responses.
In AWS environments, alias records are usually the better choice for AWS-managed endpoints such as ALB and CloudFront.

Common Route 53 mistakes

Using CNAME instead of Alias for AWS resources

This is one of the most common mistakes. Alias records are more appropriate for AWS-native resources and also support the root domain.

Forgetting TTL impact

DNS caching means changes do not always become effective immediately. A high TTL can slow down migrations and troubleshooting.

No health checks for failover design

If failover is required, health checks must be designed properly. Without them, DNS may keep returning a broken primary endpoint.

Private hosted zone confusion

Private hosted zones only resolve inside associated VPCs. They are not visible on the public internet.

Wrong record in the wrong hosted zone

A record created in the wrong hosted zone can lead to confusing behaviour, especially in organisations with multiple domains and subdomains.

A healthy application can still appear “down” to users if DNS points to the wrong endpoint or if stale cached records are still in use.

Route 53 troubleshooting guide

Problem: Domain not resolving

Check whether the domain is using the correct Route 53 name servers and whether the record exists in the expected hosted zone.

Problem: Traffic still going to old endpoint

Check TTL values and local DNS cache. DNS updates may take time to propagate depending on caching behaviour.

Problem: Failover did not happen

Verify that the health check is attached correctly and the failover records are configured as primary and secondary.

Problem: Internal domain works only inside VPC

This may be expected if you are using a private hosted zone. Public clients cannot resolve private hosted zone records.

Practical troubleshooting checklist

  • Confirm whether the issue is DNS, load balancer, TLS, or application-related.
  • Validate the hosted zone and record name carefully.
  • Check whether the response is coming from public or private DNS.
  • Review record TTL and recent changes.
  • Confirm alias target values if pointing to ALB or CloudFront.
  • Verify health check status if failover routing is involved.

Route 53 interview questions

1. What is the difference between Alias and CNAME in Route 53?

Alias records are AWS-specific and can point to AWS services such as ALB and CloudFront. They also work at the root domain level. CNAME records map one hostname to another hostname but cannot be used at the zone apex.

2. When would you use latency-based routing?

Use latency-based routing when your application is deployed in multiple AWS regions and you want users to reach the region with the lowest latency.

3. What is a private hosted zone?

A private hosted zone is used for internal DNS resolution inside associated VPCs and is not publicly resolvable from the internet.

4. How does Route 53 failover routing work?

It uses primary and secondary records along with health checks. If the primary endpoint fails health checks, Route 53 returns the secondary endpoint.

5. Is Route 53 a load balancer?

No. Route 53 is a DNS service. It answers DNS queries and directs users to endpoints, but it does not process application traffic like an ALB or NLB.

Frequently asked questions

What is Amazon Route 53 used for?

Route 53 is used for DNS management, domain registration, health checks, and traffic routing to AWS and non-AWS endpoints.

Can Route 53 point to a load balancer?

Yes. This is one of the most common use cases. Route 53 alias records are commonly used to point domains to Application Load Balancers and Network Load Balancers.

Does Route 53 support disaster recovery?

Yes. Using health checks and failover routing, Route 53 can redirect traffic from a failed primary endpoint to a secondary recovery endpoint.