
Route 53 Resolver: AD Integration & Multi-VPC DNS (Part 2)
Part 2 explores Active Directory integration and managing DNS in a multi-VPC environment
Anjali Vijayakumar
Amazon Employee
Published May 24, 2025
In Part 1, we covered how Route 53 Resolver simplifies DNS in hybrid cloud setups with managed endpoints and forwarding rules. Now, let’s dive into two key scenarios—integrating Active Directory (AD) and managing DNS across multiple VPCs. I will save Route 53 Profiles, a new feature released last year, and a scenario for managing VPC Interface Endpoints for Part 3.
Active Directory (AD) integration is a common use case where DNS plays a critical role in ensuring seamless name resolution both on-premises and within AWS VPCs. AWS offers managed Microsoft AD and Simple AD, but some customers also run self-managed AD or use third-party DNS solutions like Infoblox.
The core challenge is that AD often manages IP allocation and DNS for hostnames and reverse DNS lookups, and this needs to work consistently across on-premises and cloud environments.
Before Route 53 Resolver, a typical setup for AD in AWS resembled the forwarding instances model:
- Deploy AD DNS servers either on-premises or in a VPC.
- Configure DHCP in the VPC to point EC2 instances at these AD DNS servers, sending all DNS queries (public and private) their way.

This setup works but has notable downsides:
- Cross Availability Zone Traffic: Queries often cross AZ boundaries, increasing latency and reducing fault tolerance.
- Scaling Bottlenecks: AD DNS servers become hotspots, especially since Windows and Linux clients typically query the first DNS server in their configuration, leading to uneven load.
- Fault Tolerance Loss: If the primary AD DNS server or its AZ fails, DNS resolution is severely impacted.
With Route 53 Resolver, it’s a lot smoother: Route 53 Resolver offers a better way to integrate Active Directory DNS into your hybrid cloud setup. The key components include:
- Inbound Endpoints: Allow on-premises networks to forward DNS queries to Route 53 Resolver.
- Forwarding Rules: Create a forwarding rule for your Active Directory domain (e.g.,
mydomain.com
). Route only AD-specific queries (e.g., formydomain.com
) to your AD DNS servers (on-premises or in AWS) via outbound endpoints, while the VPC Route 53 resolver handles everything else, like public queries (e.g.,s3.amazonaws.com
).
Benefits with this approach:
- Keep instances using the Route 53 resolver, benefiting from its zonal caching and fault isolation.
- Significantly reduce cross-AZ traffic for non-AD DNS queries, improving performance.
Consider a domain
mydomain.com
managed by AD. With Route 53 Resolver:
- Instances use the VPC resolver (Route 53 Resolver) for DNS.
- A forwarding rule sends queries for
mydomain.com
to the AD DNS servers via an outbound endpoint. - Public DNS queries (like for
s3.amazonaws.com
) go directly to public DNS (via the Route 53 Resolver), not burdening AD DNS servers.
This hybrid approach balances performance and functionality while maintaining compatibility with AD requirements.

In more complex setups, you might have both a managed AD in a VPC and a trusted AD on-premises.
Rather than forwarding queries through multiple hops (e.g., from Route 53 Resolver to managed AD to on-premises AD), it is better to forward queries directly to the most relevant directory server. This reduces latency and potential points of failure.
Many organizations operate multiple VPCs, often across multiple AWS accounts, to segregate environments, teams, or projects. Managing DNS coherently across these VPCs is crucial for smooth connectivity.
Route 53 Resolver makes this easier with a hub-and-spoke model:
Centralized Endpoints: Set up inbound and outbound endpoints in a hub VPC and share private hosted zones and forwarding rules with spoke VPCs using Route 53 Profiles (more detail in Part 3)
Why It Works: Each VPC gets the same DNS view, with local caching to minimize inter-VPC forwarding and boost performance.
This approach keeps DNS resilient, scalable, and low-maintenance.
A: Nope, a single hub VPC with inbound and outbound endpoints can serve multiple VPCs. Share private hosted zones with the hub VPC, and forwarding rules with spoke VPCs using Route 53 Profiles (covered in Part 3).
A: You can use Route 53 Profiles to associate private hosted zones and forwarding rules with VPCs in a different account. Yes, you guessed it, we will look at this in Part 3.
A: When using inbound endpoints, if you need to resolve public EC2 names to internal IPs in any of the VPCs, connectivity between VPCs using VPC peering or Transit Gateway is needed. When using outbound endpoints, no connectivity between VPCs is needed —forwarding rules handle DNS resolution automatically.
A: The most specific matching rule wins, similar to routing tables. Forward rules always take precedence over system rules for the same domain name (we covered Forward and System rules in Part 1).
A: Add multiple ENIs per endpoint (each handling up to 10,000 queries per second) across different AZs, and monitor CloudWatch metrics to scale proactively.
Route 53 Resolver makes DNS management in hybrid clouds easy, especially for Active Directory integration and multi-VPC setups. Its inbound and outbound endpoints, paired with forwarding rules, let you build a performant, reliable DNS infrastructure without the old-school hassles. By centralizing endpoints in a hub VPC and following best practices like minimal forwarding and proactive monitoring, you can keep performance high and headaches low! Stay tuned for Part 3, where we’ll explore Route 53 Profiles and DNS management for VPC Interface Endpoints.
Any opinions in this post are those of the individual author and may not reflect the opinions of AWS.