Posted On: Jul 8, 2024
If you are using Amazon Route 53 as your public, authoritative DNS, you will now have the capability to easily log DNS queries received by Amazon Route 53 through integration with CloudWatch logs in the Amazon Web Services China (Beijing) region, operated by Sinnet, and Amazon Web Services China (Ningxia) region, operated by NWCD. This capability makes it easier to debug issues, conduct security audits, and run business analytics. With near real-time log delivery, customers can react quickly to events, and the power of CloudWatch logs makes it easy to search, export, or archive your query logs.
Public DNS query logs can be a useful tool to troubleshoot issues with your application. They can also be an essential part of security audits by enabling you to understand what domain names your end users are querying for, which can also be a useful business metric. Once you have enabled DNS query logs for Route 53, the Cloudwatch log records can be exported to S3 or streamed to Kinesis Firehose and Amazon OpenSearch.
To learn more about Amazon Route 53 DNS guery logs, please see the Amazon Route 53 documentation.