Resolver endpoint security groups use connection tracking to gather information about traffic to and from the endpoints. Each endpoint interface has a maximum number of connections that can be tracked, and a high volume of DNS queries can exceed the connections and cause throttling and query loss. Connection tracking is AWS's default behavior for monitoring the state of traffic flowing through security groups (SGs). Using connection tracking in SGs will reduce the throughput of traffic, however, you can implement untracked connections to reduce overhead and improve performance. For more information see Untracked connections.
If the connection tracking is enforced either by using restrictive security group rules or queries are routed through Network Load Balancer (see Automatically tracked connections), the overall maximum queries per second per IP address for an endpoint can be as low as 1500.
Ingress and egress Security Group rule recommendations for the inbound Resolver endpoint
Ingress rules | ||
---|---|---|
Protocol type | Port number | Source IP |
TCP | 53 | 0.0.0.0/0 |
UDP | 53 | 0.0.0.0/0 |
Egress rules | ||
Protocol type | Port number | Destination IP |
TCP | All | 0.0.0.0/0 |
UDP | All | 0.0.0.0/0 |
Ingress and egress security group rule recommendations for the outbound Resolver endpoint
Ingress rules | ||
---|---|---|
Protocol type | Port number | Source IP |
TCP | All | 0.0.0.0/0 |
UDP | All | 0.0.0.0/0 |
Egress rules | ||
Protocol type | Port number | Destination IP |
TCP | All | 0.0.0.0/0 |
UDP | All | 0.0.0.0/0 |
Inbound Resolver endpoints
For clients using an inbound resolver endpoint, the capacity of the elastic network interface will be impacted if you have over 40,000 unique IP address and port combinations generating the DNS traffic.