How to manage GoDaddy Domains in AWS Route53

Here is a quick guide to manage domain, whose registrar is Go Daddy in AWS using Route 53:

  1. Create a Hosted Zone in AWS Route 53
  • Log into your AWS Console
  • Navigate to Route 53 service
  • Click on “Hosted zones” in the left sidebar
  • Click “Create hosted zone”
  • Enter your domain name: example.org
  • Choose “Public hosted zone”
  • Click “Create hosted zone”
  1. Get the Name Servers from AWS
  • After creating the hosted zone, you’ll see a list of 4 name servers assigned to your domain
  • These will look something like:
    ns-1234.awsdns-12.org ns-567.awsdns-34.com ns-890.awsdns-56.net ns-1234.awsdns-78.co.uk
  • Keep this page open as you’ll need these name servers in the next step
  1. Update Name Servers in GoDaddy
  • Log into your GoDaddy account
  • SAVE ALL THE INFO FROM GODADDY – from DNS, NameServer, and other tabs as required.
  • Go to your Domain Settings for example.org
  • Look for “Nameservers” or “DNS” section
  • Choose “I’ll use my own nameservers” or “Custom nameservers”
  • Enter the 4 name servers you got from AWS Route 53
  • Save the changes
  1. Wait for DNS Propagation
  • DNS changes can take 24-48 hours to fully propagate
  • You can check the status using:
    • AWS Route 53 console (look for “Status” column)
    • Online DNS propagation checkers
    • dig or nslookup commands
  1. Verify DNS Transfer
  • In AWS Route 53, you can verify the transfer by:
    • Looking for “NS” records that match the name servers you set up
    • Using the “Test Record” feature in Route 53
    • Also check on https://www.whatsmydns.net/
  1. Set Up Required DNS Records
  • In AWS Route 53, create the following records:
    • A record for example.org pointing to your EC2 instance’s public IP
    • MX records for email routing
    • SPF, DKIM, and DMARC records for email authentication
    • Any other required records for your services
  1. Best Practices
  • Keep a backup of your DNS records
  • Document all changes.
  • Set up DNS monitoring in AWS Route 53
  • Consider setting up DNS failover if needed
  • Use AWS Route 53’s health checks for your services
  1. Cost Considerations
  • AWS Route 53 charges:
    • $0.50 per hosted zone per month
    • $0.40 per million queries for the first billion queries
    • Additional costs for health checks and routing policies
  1. Security Considerations
  • Enable AWS CloudTrail to log all Route 53 API calls
  • Use IAM roles and policies to restrict access to Route 53
  • Consider enabling DNSSEC for additional security
  1. Monitoring and Maintenance
    • Set up CloudWatch alarms for DNS health
    • Regularly review DNS records
    • Keep track of DNS changes in your history.txt
    • Monitor DNS propagation times

Would you like me to provide more detailed information about any of these steps or help you with setting up specific DNS records for your email server?

Finding All IP Addresses in Your AWS VPC with a Simple Bash Script

MORE Cursor magic!

When managing AWS infrastructure, it’s often crucial to have a clear overview of all IP addresses and endpoints within your Virtual Private Cloud (VPC). With literally just one simple prompt, Cursor created a helpful bash script that provides a comprehensive view of all network-related resources in a VPC.

Continue reading “Finding All IP Addresses in Your AWS VPC with a Simple Bash Script”

AWS WordPress Deployment with CloudFront using Terraform

I couldn’t find an existing repo with a simple way to deploy a WordPress site on AWS with CloudFront CDN integration, so I created this Terraform script to do it: main-salman/aws-wordpress-cloudfront-terraform: A WordPress deployment on AWS fronted by CloudFront CDN deployed using Terraform.

This is great to test out CloudFront CDN integration with WordPress on AWS. Bunch of other scripts I found required owning a domain name and other inputs. This is just a simple script to get you started. Just simply run “terraform init” and “terraform apply” and you’re good to go!

Before running the script, the only three things you need to provide are:

  1. AWS Access Key
  2. AWS Secret Key
  3. Key Pair Name

All the other variables are optional and you can change them to your liking.

Continue reading “AWS WordPress Deployment with CloudFront using Terraform”

Make a Web Application from scratch with CURSOR – no development experience needed!

My awesome friend Dipto Biswas introduced me to the world of AI development – and I am totally hooked!

Anyone can make web applications, and so much more, using AI, with no programming / development experience required! And you can actually make stuff that’s useful – not just basic “hello world” type beginer tutorials.

In this video, I make an app that can summarize a list of all AWS resources in a particular AWS account. You can make whatever you want using the same process. Make a 3D Pong game. Make an app that can remove background from images. Make an app that shows what the stars look like on a particular night based on latitude and longitude. Or whatever else your imagination thinks of! Here are the tools and accounts you need:

Cursor – The AI Code Editor

Vercel

GitHub

Install WSL | Microsoft Learn

Install Ubuntu on WSL2 – Ubuntu WSL documentation

How To Install Node.js on Ubuntu 20.04 | DigitalOcean (I referred to this part as NPM in the video)

Go nuts!

Crossplane and ArgoCD on your own local machine on a KinD cluster – from scratch

A bunch of Crossplane/ArgoCD tutorials exist already – so why create another one? This one starts FROM SCRATCH, and takes you through all the way to creating resources on AWS.

Crossplane is not necessarily easy to get started with. But, once you get it going, it’s not much harder to use than Terraform, but with a whole lot more benefits.

If you’re new to Crossplane, these videos offer an excellent introduction. Now, are you ready to dive into the world of Crossplane?

Continue reading “Crossplane and ArgoCD on your own local machine on a KinD cluster – from scratch”

Automatically tag EC2 instances with OS

I was surprised that a blog post doesn’t already exist (or at least I didn’t find one), so, this post covers how to automatically add a tag to EC2 instances upon creation with OS of the instance. After the below components are deployed, EC2 instances should automatically have either a os:linux or os:windows tag.

  1. First, create a Lambda function with the following code. I called my function autoTagEC2OS. Use Python 3.12:

Continue reading “Automatically tag EC2 instances with OS”

Blog at WordPress.com.

Up ↑