API Documentation

DNS

How can I configure a monitor to check a very specific URL?

If you just use one of our built-in monitors, like the Default HTTP, it will simply attempt to load the web page with the IP address of the attached device and look for an HTTP 200 response code. Often, this is a perfectly quick and accurate monitor, but this doesn’t always work. For example, I […]

Can server UP/DOWN alerts be sent as an SMS or Text Message to my phone?

Yes, if you want to receive alert messages to your phone as an SMS or Text Message, you need to do two things. First, you need to create an alert list. Secondly, you need to edit your user profile and add a mobile number. To access your user profile, click the ACCOUNT link in the […]

Certification Authority Authorization – CAA Records

Q: Does Total Uptime support these new record types? A: YES! …and no. We support a TYPE257 record today. So by converting your CAA record to RFC 3597 syntax, you can implement “CAA” records right now. So the bottom line is YES! Background on CAA In February 2017 the CA/Browser Forum voted to mandate Certification […]

CNAME and MX for the same host name

Q: Why is it not possible to have a CNAME and MX record for the same host name? For example, test.example.com cannot be both a CNAME and an MX record at the same time. A: Unfortunately, what you’re running into is a limitation of the DNS specification. According to RFC 1034 “If a CNAME RR […]

How to create an SPF record

What is SPF? Sender Policy Framework (SPF) is a protocol designed to help combat forged email. It allows the owner of a domain to specify which hosts are authorized to send email from that domain. Full details can be found in RFC 7208.   How does SPF work? Domain owners publish SPF records in the […]

DNSSEC Implementation Guide

We recently added an easy-to-use implementation of DNSSEC in our UI.  The currently deployed version in our UI makes it nearly impossible to misconfigure.  Every time you make a change, it is queued for review by one of our NOC engineers to ensure that the requested actions will not impact any existing chain of trust. […]