DNS Delegation for DNScale Regions
How to update nameserver delegation at your registrar for DNScale zones, including the nameserver sets for each region (EU, GLOBAL, EU_GLOBAL).
What you'll learn
- Understand how nameserver delegation works and why correct delegation is critical
- Choose the right DNScale region (EU, GLOBAL, EU_GLOBAL) for your use case
- Update nameserver delegation at your registrar with step-by-step instructions
- Verify delegation is correct using dig and troubleshoot common delegation issues
When you create a zone in DNScale, you must point your domain's delegation at the registrar to the nameservers for the selected region. This process, called nameserver delegation, tells the global DNS infrastructure which authoritative servers are responsible for answering queries about your domain.
How DNS Delegation Works
Delegation is the mechanism that makes the DNS hierarchy function. When a recursive resolver needs to find the A record for example.com, it follows a delegation chain:
- The root servers direct the resolver to the
.comTLD servers - The TLD servers look up the NS records registered for
example.comand direct the resolver to those nameservers - The authoritative nameservers (e.g., DNScale) answer with the requested record
The NS records at the TLD level come from your registrar. When you update nameservers at your registrar, you are updating this delegation ā telling the entire internet where to find authoritative answers for your domain.
# Trace the full delegation chain for a domain
dig +trace example.com
# See just the NS delegation at the TLD level
dig NS example.com +short
ns1.dnscale.eu.
ns2.dnscale.eu.Tip: The delegation at your registrar and the NS records in your zone should match. If they disagree, resolvers may get inconsistent answers. DNScale automatically sets the correct NS records in your zone when you create it.
Nameserver Sets by Region
DNScale operates nameservers across multiple regions. Each nameserver is deployed on an anycast network, meaning queries are automatically routed to the nearest available point of presence.
EU Region
Best for domains primarily serving European audiences. Nameservers are located across multiple European points of presence.
ns1.dnscale.euns2.dnscale.eu
GLOBAL Region
Best for domains serving a worldwide audience. Nameservers are located across points of presence in Europe, North America, and Asia.
ns1.dnscale.comns2.dnscale.com
EU_GLOBAL Region
Best for domains that need comprehensive global coverage with strong European presence. Uses nameservers from both regions for maximum geographic diversity and redundancy.
ns1.dnscale.euns1.dnscale.comns2.dnscale.euns2.dnscale.com
Tip: Use exactly the names above. Remove old nameservers when switching regions to avoid "mixed delegation" and inconsistent responses.
Choosing the Right Region
Your choice of region affects DNS resolution latency for your users. Consider where your audience is located:
| Use Case | Recommended Region | Why |
|---|---|---|
| EU-focused business | EU | Lowest latency for European users |
| North American audience | GLOBAL | Optimized for North American resolution |
| Worldwide audience | EU_GLOBAL | Coverage across both regions |
| GDPR-sensitive data | EU | Data remains within European infrastructure |
| Multi-region application | EU_GLOBAL | Redundancy across regions |
| CDN or global SaaS | EU_GLOBAL | Best overall coverage |
For a detailed explanation of how DNScale distributes queries geographically, see Global DNS Resolution Balancing.
How Anycast Improves Delegation
Each DNScale nameserver hostname (e.g., ns1.dnscale.eu) resolves to an anycast IP address that is announced from multiple physical locations. When a resolver queries ns1.dnscale.eu, the query is routed by BGP to the nearest DNScale point of presence. This means:
- Lower latency ā queries are answered by the geographically closest server
- Automatic failover ā if one location goes down, queries are automatically routed to the next nearest location
- DDoS resilience ā attack traffic is distributed across all locations rather than hitting a single server
- No single point of failure ā even with only two nameserver hostnames, the underlying infrastructure is distributed
You can verify the anycast behavior by checking which server responds to your queries:
# Check the A and AAAA records for DNScale nameservers
dig A ns1.dnscale.eu +short
dig AAAA ns1.dnscale.eu +short
dig A ns1.dnscale.com +short
dig AAAA ns1.dnscale.com +shortRegistrar Update Steps (General)
Use the correct set of nameservers for your zone's region, then replace all existing NS records at the registrar level:
- Sign in to your domain registrar and open the domain's DNS or Nameservers section
- Choose Custom nameservers (or similar)
- Delete all existing nameserver entries
- Add the DNScale nameservers for your zone's region (see above)
- Save/apply. If prompted to confirm glue/hostnames, accept the provided hostnames
- Wait for propagation (typically minutes to a few hours); you can verify with
dig NS example.com
Tip: Always replace all nameservers in a single change. A partial swap where some nameservers point to the old host and some to DNScale will cause intermittent resolution failures.
Registrar-Specific Notes
Cloudflare Registrar
In the "Domain Registration" tab, switch to "Custom nameservers," remove the two Cloudflare defaults, add the DNScale nameservers, and save. Cloudflare will show a confirmation banner while propagating.
GoDaddy
Under Domain > Manage DNS > Nameservers > Change > Enter my own nameservers, replace all existing entries with the DNScale set, and save. Approve any confirmation dialogs.
Namecheap
Domain List > Manage > Nameservers > Custom DNS. Remove old entries, add DNScale nameservers, and click the checkmark to save.
Gandi
Domain > Nameservers > "Change" > Custom. Replace existing nameservers with the DNScale set and validate.
Google Domains (if applicable)
DNS > Custom name servers. Remove defaults, add DNScale nameservers, and click Save.
Route 53 Domains
In the Registered Domains console, edit the NS records and replace with DNScale nameservers (Route 53 allows four entries).
Pre-Migration Checklist
Before updating nameservers, ensure your DNScale zone is fully configured. This prevents downtime during the propagation period when resolvers start querying DNScale:
- Create the zone in DNScale with the correct region
- Add all records ā verify every A, AAAA, CNAME, MX, TXT record exists. Use zone import to migrate records from your previous provider
- Verify email records ā confirm SPF, DKIM, and DMARC records are present to avoid email delivery issues
- Check CAA records ā if you use CAA, ensure they are configured in the new zone so TLS certificate issuance continues to work
- Lower TTL at the old provider ā reduce TTL on all records to 300 seconds at least 24 hours before the switch
- Test the new zone by querying DNScale nameservers directly (see Verification below)
Verification
After updating nameservers at your registrar, verify the delegation is correct:
# NS records should return only DNScale nameservers for the chosen region
dig NS yourdomain.com
;; ANSWER SECTION:
yourdomain.com. 86400 IN NS ns1.dnscale.eu.
yourdomain.com. 86400 IN NS ns2.dnscale.eu.
# SOA record should show a DNScale nameserver in the MNAME field
dig SOA yourdomain.com @ns1.dnscale.eu
;; ANSWER SECTION:
yourdomain.com. 3600 IN SOA ns1.dnscale.eu. ...
# Verify A record is served correctly
dig A yourdomain.com @ns1.dnscale.eu +short
192.0.2.1
# Compare with a public resolver
dig A yourdomain.com @8.8.8.8 +short
192.0.2.1
# Check propagation across multiple resolvers
for ns in 8.8.8.8 1.1.1.1 9.9.9.9 208.67.222.222; do
echo "$ns: $(dig +short NS yourdomain.com @$ns)"
doneTroubleshooting Delegation Issues
Nameservers Not Updating
TLD-level NS record changes can take up to 48 hours to propagate. The TTL on TLD NS records is typically 24-48 hours, so resolvers that recently cached the old delegation will continue using the old nameservers until their cache expires.
# Check what the TLD servers say (bypass resolver cache)
dig NS yourdomain.com +traceLame Delegation
A lame delegation occurs when the nameservers listed at the registrar do not actually serve the zone. This results in SERVFAIL responses. Ensure the zone exists in DNScale and that the nameserver hostnames match exactly.
Mixed Delegation
If some NS records point to DNScale and others point to a different provider, resolvers may get different answers depending on which nameserver they query. This causes intermittent failures. Always replace all nameservers in a single change.
DNSSEC Issues After Migration
If DNSSEC was enabled at your previous DNS host, the DS records at the registrar may still reference the old DNSSEC keys. This causes validation failures. Either remove the DS records at the registrar before switching, or coordinate the DNSSEC migration.
Zone Not Resolving After Delegation
If your domain stops resolving after changing nameservers:
- Verify the zone exists in DNScale and contains the expected records
- Query DNScale nameservers directly:
dig A yourdomain.com @ns1.dnscale.eu - If the direct query works but public resolvers fail, propagation is still in progress
- If the direct query fails, check that the zone is active and records are configured correctly
- Flush your local DNS cache to see the latest delegation
Managing Delegation with Infrastructure as Code
If you manage your DNS through automation, you can configure delegation alongside your records:
- Terraform ā the DNScale Terraform provider manages zones and records programmatically
- DNSControl ā supports DNScale as a provider for declaring DNS configuration as code
Both tools let you define your zone, records, and region in version-controlled configuration files, ensuring your DNS setup is reproducible and auditable.
Conclusion
Correct nameserver delegation is the foundation of working DNS. Without it, no resolver can find your zone or its records. By choosing the right DNScale region, following the delegation process carefully, and verifying with dig, you ensure your domain is reliably served from DNScale's anycast infrastructure. Avoid partial swaps ā always replace all nameservers in one change to prevent resolution splits.
Ready to manage your DNS with confidence?
DNScale provides anycast DNS hosting with a global network, real-time analytics, and an easy-to-use API.
Start free