Amazon Route 53 Explained
Amazon Route 53 is AWS’s managed DNS service that helps direct user traffic to the right application endpoint. In real-world cloud architectures, it often acts as the first decision point for internet traffic, helping route users to an Application Load Balancer, CloudFront distribution, public IP, or even a disaster recovery endpoint.
If you are building highly available applications in AWS, understanding Route 53 is not optional. It directly affects reachability, traffic flow, failover behaviour, latency optimisation, and user experience.
What is Amazon Route 53?
Amazon Route 53 is a highly available and scalable DNS web service from AWS. It is used to manage domain names, resolve DNS queries, perform health checks, and route traffic intelligently to application endpoints.
In simple terms, when a user types a domain name such as app.example.com into a browser,
Route 53 helps answer the question: Where should this request go?
What does the name Route 53 mean?
The “53” comes from the TCP/UDP port number used by DNS. Route 53 is therefore named after the standard DNS service port.
Watch: AWS Route 53 Explained (Hands-on)
Prefer video learning? This tutorial explains Route 53 concepts, DNS flow, routing policies, and real-world use cases.
Why Route 53 matters in cloud networking
In cloud environments, many services sit behind load balancers, content delivery networks, or dynamic endpoints. Hardcoding IP addresses is not practical, scalable, or resilient. DNS becomes the abstraction layer that makes modern application delivery possible.
High availability
Route 53 can work with health checks and failover policies so traffic is sent only to healthy endpoints.
Performance optimisation
Latency-based routing can direct users to the region that provides the fastest response time.
Traffic control
Weighted routing can split traffic between old and new versions during gradual rollouts or testing.
Disaster recovery
Failover routing can automatically move users to a backup environment when the primary becomes unavailable.
How Amazon Route 53 works
At a high level, Route 53 participates in DNS resolution. When a user requests your domain, Route 53 returns the correct DNS answer based on your hosted zone configuration and routing policy.
User enters https://app.example.com
|
v
Browser asks DNS resolver
|
v
Resolver queries Route 53 hosted zone
|
v
Route 53 checks record + routing policy + health status
|
v
Returns endpoint:
- ALB DNS name
- CloudFront distribution
- Public IP
- Another domain name
|
v
User request goes to selected application endpointStep-by-step DNS flow
- The user enters a domain name in the browser.
- The browser or operating system sends a DNS lookup request to a resolver.
- The resolver finds the authoritative DNS information for your domain.
- Route 53 returns the configured DNS record response.
- The browser connects to the returned endpoint and the application request starts.
Core Route 53 components
1. Hosted zones
A hosted zone is a container for DNS records for a specific domain.
- Public hosted zone: Used for internet-facing domains such as
example.com. - Private hosted zone: Used for internal DNS within one or more VPCs.
2. DNS records
These are the actual entries that map domain names to endpoints.
| Record Type | Purpose | Typical Use |
|---|---|---|
| A | Maps a name to an IPv4 address | Public IP or internal IP mapping |
| AAAA | Maps a name to an IPv6 address | IPv6-enabled environments |
| CNAME | Maps one hostname to another hostname | Subdomain redirection |
| Alias | AWS-native mapping to AWS resources | ALB, CloudFront, S3 website endpoints |
| MX | Mail routing record | Email services |
| TXT | Text-based metadata or verification | SPF, DKIM, domain verification |
3. Alias records
Alias records are especially important in AWS. They let you map a domain directly to AWS-managed resources such as an Application Load Balancer or CloudFront distribution.
Unlike CNAME records, alias records can also be used at the zone apex, for example example.com.
4. Health checks
Route 53 health checks monitor the health of endpoints. They are commonly used with failover policies so that DNS answers change when the primary application becomes unhealthy.
Route 53 routing policies explained
One of the biggest strengths of Route 53 is that it can return different DNS answers depending on the routing policy you choose.
| Routing Policy | What it does | Best use case |
|---|---|---|
| Simple | Returns a single record response | Single application endpoint |
| Weighted | Splits traffic across multiple records by percentage | Canary release or phased migration |
| Latency | Sends users to the lowest-latency region | Global applications |
| Failover | Routes to standby if primary is unhealthy | Disaster recovery |
| Geolocation | Routes based on user location | Regional content or compliance rules |
| Geoproximity | Routes based on geographic bias | Fine-grained regional traffic steering |
| Multi-value answer | Returns multiple healthy records | Basic DNS-level load distribution |
Weighted routing example
Imagine you are deploying a new version of an application. Instead of sending 100% of traffic to the new release, you can start with 10% and keep 90% on the old version. If things look stable, you can gradually increase the percentage.
Latency routing example
Suppose your application is deployed in Mumbai and Frankfurt. A user from India should ideally be routed to Mumbai, while a user from Europe should ideally be routed to Frankfurt. Latency-based routing helps Route 53 return the best endpoint.
Failover routing example
In a disaster recovery setup, the primary application may be running in one region and the standby application in another. If Route 53 health checks detect that the primary endpoint is unhealthy, DNS answers can automatically shift users to the backup environment.
Primary record ---> app-primary.example.com ---> ALB in Region A
|
| health check fails
v
Secondary record ---> app-dr.example.com ---> ALB in Region B
Real-world Route 53 architecture example
Here is a common production-style traffic flow for an internet-facing application hosted on AWS:
User
|
v
Route 53
|
v
CloudFront
|
v
Application Load Balancer
|
v
EKS / EC2 application nodes
|
v
Backend services / databases
In this architecture:
- Route 53 resolves the domain name.
- CloudFront improves global content delivery and edge caching.
- The ALB distributes traffic to healthy application targets.
- Your compute platform may be EKS, ECS, or EC2.
Terraform example for Route 53
Below is a simple example that creates a hosted zone and an alias record pointing to an Application Load Balancer.
resource "aws_route53_zone" "main" {
name = "example.com"
}
resource "aws_route53_record" "app" {
zone_id = aws_route53_zone.main.zone_id
name = "app.example.com"
type = "A"
alias {
name = aws_lb.app.dns_name
zone_id = aws_lb.app.zone_id
evaluate_target_health = true
}
}
What this Terraform does
- Creates a hosted zone for
example.com. - Creates a DNS record for
app.example.com. - Uses an alias record instead of a CNAME to point to an AWS load balancer.
- Enables target health evaluation for smarter DNS responses.
Common Route 53 mistakes
Using CNAME instead of Alias for AWS resources
This is one of the most common mistakes. Alias records are more appropriate for AWS-native resources and also support the root domain.
Forgetting TTL impact
DNS caching means changes do not always become effective immediately. A high TTL can slow down migrations and troubleshooting.
No health checks for failover design
If failover is required, health checks must be designed properly. Without them, DNS may keep returning a broken primary endpoint.
Private hosted zone confusion
Private hosted zones only resolve inside associated VPCs. They are not visible on the public internet.
Wrong record in the wrong hosted zone
A record created in the wrong hosted zone can lead to confusing behaviour, especially in organisations with multiple domains and subdomains.
Route 53 troubleshooting guide
Problem: Domain not resolving
Check whether the domain is using the correct Route 53 name servers and whether the record exists in the expected hosted zone.
Problem: Traffic still going to old endpoint
Check TTL values and local DNS cache. DNS updates may take time to propagate depending on caching behaviour.
Problem: Failover did not happen
Verify that the health check is attached correctly and the failover records are configured as primary and secondary.
Problem: Internal domain works only inside VPC
This may be expected if you are using a private hosted zone. Public clients cannot resolve private hosted zone records.
Practical troubleshooting checklist
- Confirm whether the issue is DNS, load balancer, TLS, or application-related.
- Validate the hosted zone and record name carefully.
- Check whether the response is coming from public or private DNS.
- Review record TTL and recent changes.
- Confirm alias target values if pointing to ALB or CloudFront.
- Verify health check status if failover routing is involved.
Route 53 interview questions
Alias records are AWS-specific and can point to AWS services such as ALB and CloudFront. They also work at the root domain level. CNAME records map one hostname to another hostname but cannot be used at the zone apex.
Use latency-based routing when your application is deployed in multiple AWS regions and you want users to reach the region with the lowest latency.
A private hosted zone is used for internal DNS resolution inside associated VPCs and is not publicly resolvable from the internet.
It uses primary and secondary records along with health checks. If the primary endpoint fails health checks, Route 53 returns the secondary endpoint.
No. Route 53 is a DNS service. It answers DNS queries and directs users to endpoints, but it does not process application traffic like an ALB or NLB.
Frequently asked questions
Route 53 is used for DNS management, domain registration, health checks, and traffic routing to AWS and non-AWS endpoints.
Yes. This is one of the most common use cases. Route 53 alias records are commonly used to point domains to Application Load Balancers and Network Load Balancers.
Yes. Using health checks and failover routing, Route 53 can redirect traffic from a failed primary endpoint to a secondary recovery endpoint.