Skip to content


Folders and files

Last commit message
Last commit date

Latest commit



4 Commits

Amazon Route53 Hosted Zone record replication (Public to Private)

This repository shows an example of DNS record replication from an Amazon Route 53 public hosted zone to a private hosted zone - both with the same domain name. What do we want to solve with this solution? Let's say that you want resources in your VPC to have public resolution as your external users (with a public hosted zone), except you want also specific private resolution using a private hosted zone.

As stated in the AWS Documentation, if there's a matching domain name between a public and a private hosted zone, the VPC Resolver does not forward requests from the private to the public one if a record is not found. This means you need to sync changes between hosted zones, except those records that don't require update.


This example builds the following resources:

  • Amazon EventBridge rule that takes the changes done in the Amazon Route 53 (and tracked in AWS CloudTrail) and targets an AWS Lambda function.
  • AWS Lambda function, that processes the record changes in the Public Hosted Zone and applies them in the Private Hosted Zone.
  • Private Hosted Zone, with the same name as the Public Hosted Zone you provide.
  • An Amazon VPC, with Amazon EC2 instances and AWS System Manager VPC endpoints to test the DNS resolution between the Public and Private Hosted Zones.
  • AWS IAM roles for the Lambda function and EC2 instance.

How can I deploy the solution?

You have code to deploy this architecture with in AWS CloudFormation or Terraform. Check the README in each folder to deploy the solution, taking into account the following pre-requisities:

  • An AWS Account with an IAM user that has appropriate permissions.
  • An Amazon Route 53 Public Hosted Zone, as the IaC examples will ask for its zone ID and name.
  • If you want to use the Terraform example, Terraform should be installed.

How does it work?

All the actions done in Route 53 are recorded by CloudTrail in us-east-1, and that's why the Serverless resources are located in that AWS Region. The EventBride rule has an event pattern, so it is only triggered when there are Route 53 actions (API calls via CloudTrail) to the Hosted Zone we indicate, and the specific event is ChangeResourceRecordSets (creating, deleting or updating records).

    "source": ["aws.route53"],
    "detail-type": ["AWS API Call via CloudTrail"],
    "detail": {
        "eventSource": [""],
        "eventName": ["ChangeResourceRecordSets"],
        "requestParameters": {
            "hostedZoneId": ["${HOSTED_ZONE_ID}"]

Once the event is triggered, it invokes a Lambda function that performs three actions:

  • Checks the different changes applied to the Hosted Zone, and filters those ones that are records tagged as don't update.
  • For the changes that need an action, it needs to transform the keys of the declaration and capitalize the first letter of all of them - to comply with the format of boto3 (the Lambda is written in Python).
  • It does a ChangeResourceRecordSets against the Private Hosted Zone.

The VPC resources, EC2 instance, and SSM VPC endpoints are created for testing purposes, and you can select in which AWS Region they are located - that way you can practice how this solution works in multi-Region environments.

What about multi-Account? In the case you want to update a Hosted Zone in another AWS account, you can do two things:



See CONTRIBUTING for more information.


This library is licensed under the MIT-0 License. See the LICENSE file.


No description, website, or topics provided.



Code of conduct

Security policy





No releases published


No packages published