dns-management

Manage DNS records, routing policies, and failover configurations for high availability and disaster recovery.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "dns-management" with this command: npx skills add aj-geddes/useful-ai-prompts/aj-geddes-useful-ai-prompts-dns-management

DNS Management

Table of Contents

Overview

Implement DNS management strategies for traffic routing, failover, geo-routing, and high availability using Route53, Azure DNS, or CloudFlare.

When to Use

  • Domain management and routing
  • Failover and disaster recovery
  • Geographic load balancing
  • Multi-region deployments
  • DNS-based traffic management
  • CDN integration
  • Health check routing
  • Zero-downtime migrations

Quick Start

Minimal working example:

# route53-setup.yaml
apiVersion: v1
kind: ConfigMap
metadata:
  name: route53-config
  namespace: operations
data:
  setup-dns.sh: |
    #!/bin/bash
    set -euo pipefail

    DOMAIN="myapp.com"
    HOSTED_ZONE_ID="Z1234567890ABC"
    PRIMARY_ENDPOINT="myapp-primary.example.com"
    SECONDARY_ENDPOINT="myapp-secondary.example.com"

    echo "Setting up Route53 DNS for $DOMAIN"

    # Create health check for primary
    PRIMARY_HEALTH=$(aws route53 create-health-check \
      --health-check-config '{
        "Type": "HTTPS",
        "ResourcePath": "/health",
        "FullyQualifiedDomainName": "'${PRIMARY_ENDPOINT}'",
        "Port": 443,
// ... (see reference guides for full implementation)

Reference Guides

Detailed implementations in the references/ directory:

GuideContents
AWS Route53 ConfigurationAWS Route53 Configuration
DNS Failover ScriptDNS Failover Script
CloudFlare DNS ConfigurationCloudFlare DNS Configuration
DNS Monitoring and ValidationDNS Monitoring and Validation

Best Practices

✅ DO

  • Use health checks with failover
  • Set appropriate TTL values
  • Implement geolocation routing
  • Use weighted routing for canary
  • Monitor DNS resolution
  • Document DNS changes
  • Test failover procedures
  • Use DNS DNSSEC

❌ DON'T

  • Use TTL of 0
  • Point to single endpoint
  • Forget health checks
  • Mix DNS and application failover
  • Change DNS during incidents
  • Ignore DNS propagation time
  • Use generic names
  • Skip DNS monitoring

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

nodejs-express-server

No summary provided by upstream source.

Repository SourceNeeds Review
General

markdown-documentation

No summary provided by upstream source.

Repository SourceNeeds Review
General

rest-api-design

No summary provided by upstream source.

Repository SourceNeeds Review
General

architecture-diagrams

No summary provided by upstream source.

Repository SourceNeeds Review