Bobcares

Cloudflare AWS Amplify | Integration

by | Feb 9, 2024

Learn how to integrate Cloudflare & AWS Amplify. Our AWS Support team is here to help you with your questions and concerns.

Cloudflare AWS Amplify | Integration

Many of our customers find that setting up a custom subdomain on Cloudflare for their AWS Amplify project is a breeze. However, they might run into some roadblocks along the way. Lucky for them, our experts are on standby to help out in a jiffy.

Cloudflare AWS Amplify | Integration

Today, we are going to take a look at pointing a Cloudflare subdomain to an AWS project and handle issues along the way:

  1. We begin by heading to the Domain Management tab in our AWS Amplify project.
  2. Then, we have to input the root domain for our subdomain and select “configure domain.”
  3. Next, select “exclude root” under “Subdomains” if we are only adding a subdomain. This makes sure that the primary A Record does not conflict with other sites hosted elsewhere.
  4. After that, customize the subdomain and save the settings.
  5. Now it is time for SSL Configuration. We can get information and snippets for Cloudflare from AWS. So, we have to copy the CNAME details from the provided snippets.
  6. Then, head to Cloudflare’s DNS tab and click “Add Record.”
  7. Under “Type,” select CNAME. Add the name from AWS ( it is the first domain listed in the AWS text box) and paste the corresponding Target.
  8. Then, make sure the Proxy Status is set to “DNS only” to avoid conflicts with AWS SSL.
  9. Now, save the settings.
  10. At this point, we have to add the subdomain CNAME in Cloudflare. So head to AWS Amplify.
  11. Then, under “Custom domain,” click “Actions” and select “View DNS records.”
  12. Now it will display the CNAME records we need to add to Cloudflare.
  13. Additionally, we have to make sure the Proxy Status is set to “DNS only.”

Waiting for Verification

After the above steps, we have to give it some time for DNS changes to propagate. Depending on TTL settings, our custom subdomain on AWS will be verified within 15 minutes. However, it may take longer. We can double-check CNAME settings if needed.

Furthermore, do not use the Proxied option for the AWS Amplify Domain, as it’s already a secure connection.

Additionally, verify domain ownership by adding the specified DNS record before adding the subdomain entry in our DNS.

We can verify the DNS entry as seen here:

  1. Get the DNS record name from AWS.
  2. Add this entry to our DNS, ensuring it’s set to “DNS only.”

If issues arise during setup, our experts suggest experimenting with different CAA entries for AWS Amplify domain ownership verification.

Alternatively, we can try adding wildcard entries for all suggested CAA certificates.

At the end of the day, connecting Cloudflare subdomains to AWS Amplify projects boost the efficiency of web development.

[Need assistance with a different issue? Our team is available 24/7.]

Conclusion

In brief, our Support Experts demonstrated how to integrate Cloudflare & AWS Amplify.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF