DNS Drift: What It Is and Why It Breaks Client Sites Without Warning
DNS drift — unauthorized or unexpected DNS record changes — is one of the most common causes of client site outages. Learn how to detect and monitor it across your agency portfolio.
Updated 27 April 2026
See exactly where your client domains stand.
Run a free audit on up to 10 domains — SSL expiry, domain expiry, and DNS health in one report. No signup needed.
What DNS drift is
DNS drift is what happens when DNS records for a domain change — intentionally or not — without all parties being aware. It is called "drift" because the change is often gradual or indirect: a client updates a record through their registrar portal without telling you, a hosting platform migrates servers and updates an A record automatically, or a third-party tool the client installed modifies a CNAME entry as part of its setup.
The result is a mismatch between the DNS configuration you expect and the configuration that is actually resolving. That mismatch may not break anything immediately — but it creates a fragile state where subsequent changes, SSL renewals, or infrastructure migrations fail in ways that are difficult to diagnose.
DNS drift is not edge-case behaviour. In any agency managing more than 20–30 client websites, with clients who have partial or full access to their own DNS settings, unexpected DNS changes are a routine occurrence. The question is not whether they will happen — it is whether you will know about them before they cause an outage.
How DNS drift causes outages
A record changes that move traffic to the wrong server
The most direct form of drift: a client updates their A record to point to a new IP address — perhaps they read that moving to a different host would be faster, or a third-party "SEO tool" offered to "optimise" their DNS. Traffic now goes to a server you are not managing, which may not have the site files, SSL certificate, or correct configuration.
From the client's perspective: the site suddenly returns errors. From your perspective: everything on your infrastructure is fine, because the site is no longer on your infrastructure.
CNAME changes that break SSL validation
ACME-based SSL certificates using DNS-01 validation require specific CNAME records to be present and resolving correctly at renewal time. If a client removes or modifies those CNAME records — perhaps because they appeared unfamiliar — the next auto-renewal attempt fails silently. The certificate continues to work until it expires. Then the site shows a browser warning.
This failure mode is particularly insidious because there is a delay of up to 47 days (under the new certificate validity schedule) between when the drift occurs and when the outage happens. By that time, the original change may not be obvious from audit logs or browser history.
MX record changes that break email
Email delivery is one of the first casualties of DNS drift. An MX record pointing to the wrong mail server, or removed entirely, causes email to bounce — or worse, to be silently dropped. Clients often do not notice for days because many emails that fail to deliver do not produce immediately visible bounce messages.
For clients who use their domain for business email, MX drift is a serious incident. It is also frequently caused by something the client did themselves — updating what they thought was an unrelated record — and they may not connect the mail failure to the DNS change.
Check your client DNS health alongside SSL and domain expiry.
CertPilot's free audit covers up to 10 domains — DNS health, SSL expiry, and domain registration in one report. No signup required.
For a full operating model around record inventory, ownership, and change visibility, use DNS monitoring for agencies.
Common sources of DNS drift at agencies
Client-initiated changes
Clients who have access to their registrar or DNS provider make changes. This is legitimate — it is their domain. The problem is that they often make those changes without informing you, and without understanding the downstream effects.
Common client-initiated drift:
- Adding a TXT record for a Google Search Console verification that accidentally overwrites an existing TXT record used for SPF or DKIM
- Pointing a subdomain to a new service via CNAME without realising the subdomain was already in use
- Disabling a redirect they thought was broken, which was actually serving a purpose
Registrar and hosting platform automatic updates
Some registrars update DNS records automatically when you change account settings. Switching from one nameserver configuration to another, enabling or disabling domain parking, or renaming a hosting plan can trigger automatic DNS modifications.
Managed hosting platforms are another source. Cloudways, Kinsta, WP Engine, and similar platforms sometimes update IP addresses when they perform infrastructure migrations. They typically notify customers, but the notifications go to the account owner — which may be the client, not you.
Third-party tool installations
Marketing tools, live chat platforms, e-commerce plugins, and analytics services often ask clients to add DNS records as part of their setup. A client installing a new marketing automation tool may add a CNAME that conflicts with existing configuration, or may remove a record it tells them to replace without understanding what the old record was for.
What to monitor and how
Baseline your DNS records
Before you can detect drift, you need a baseline: the complete set of DNS records for each client domain at a known-good state. This means:
- A records (and AAAA if IPv6 is in use)
- CNAME records (all subdomains)
- MX records and their priority values
- TXT records (SPF, DKIM, DMARC, domain verification tokens)
- NS records (which nameservers are authoritative)
- Any SRV records for services like Microsoft 365 or Google Workspace
Store the baseline with a timestamp so you have a reference point for comparison.
Monitor daily for changes
DNS records can change at any time — a registrar update propagates in minutes, not days (contrary to the old "DNS takes 24–48 hours to propagate" claim, which describes worst-case TTL behaviour, not typical change speeds). Daily monitoring against your baseline gives you a one-day maximum detection window.
For critical client domains — those where SSL auto-renewal depends on specific DNS records, or where email delivery is business-critical — intraday monitoring reduces the detection window further.
Key records to watch by priority
| Record type | Drift risk | Why it matters | |---|---|---| | A (apex) | High | Moves traffic to wrong server | | A (www) | High | Same — often separate record | | CNAME (_acme-challenge.*) | High | Breaks SSL auto-renewal | | MX | High | Breaks email delivery | | TXT (SPF) | Medium | Breaks email authentication | | NS | Medium | If changed, all other records are affected | | CNAME (subdomains) | Medium | Moves subdomain traffic unexpectedly | | TXT (DKIM, DMARC) | Lower | Email authentication degrades gradually |
Communicating DNS changes to clients
The best way to prevent client-initiated DNS drift is a clear agreement at project start: DNS changes that affect the hosting, SSL, or email configuration should go through you before being made in the registrar panel.
A brief "DNS change request" process — even just an email — creates accountability and gives you a chance to review the change before it is applied. Document this in your retainer agreement or onboarding checklist.
For clients who need more independence, consider moving their DNS to Cloudflare (free tier), which provides an audit log of every record change with timestamps and user attribution. This does not prevent drift, but it makes investigating it much faster.
DNS drift and its connection to SSL failures
DNS drift is one of the primary causes of silent SSL renewal failures. If you are investigating why an SSL certificate that should be auto-renewing has expired, DNS is usually the first place to check:
- Is the
_acme-challengeCNAME still present and pointing to the correct value? - Has the A record changed, and does the new IP have the correct web server configuration to respond to HTTP-01 validation?
- Are the NS records still pointing to the expected nameservers?
See the SSL expiry tracking guide for the full SSL monitoring workflow, and the 47-day SSL certificates guide for how the shortening certificate lifetimes affect your exposure window.
Including DNS health in client reports
DNS health is a useful addition to monthly client reporting — it demonstrates that your oversight extends beyond the visible application layer to the infrastructure underneath. A report noting "all DNS records stable — no changes detected this month" is a concrete deliverable. A report flagging an unexpected CNAME change for client review starts a useful conversation.
See the client website health report template for a reporting format that incorporates DNS health alongside SSL and domain expiry.
How CertPilot monitors DNS drift
CertPilot baselines DNS records for every domain in your account and runs daily checks to detect changes:
- Daily DNS record comparison against the stored baseline
- Alerts on any record change with the old and new values shown
- A, AAAA, CNAME, MX, TXT, NS monitoring across all subdomains you add
- SSL and domain expiry on the same dashboard so you catch compounding failures
- Client grouping for portfolio-level views
- PDF reports including DNS status for client deliverables
Start a 14-day free trial — no credit card required — or check up to 10 domains for free right now.
External references
- Cloudflare DNS audit log documentation — how to use Cloudflare's change history
- DNSSEC overview (ICANN) — cryptographic protection against DNS record tampering
- SPF record syntax (RFC 7208) — reference for TXT record format used in email authentication
Related resources
- How to monitor DNS changes across client websites
- MX record monitoring for agencies
- Free SSL, DNS, and domain tools
- How CertPilot checks domains
Frequently Asked Questions
What is DNS drift?
DNS drift is the gap between the DNS records an agency expects and the records that actually resolve. It can happen after client edits, registrar changes, hosting migrations, or third-party tool setup.
DNS drift is not always bad, but unexplained drift can break websites, email, and SSL renewal workflows.
What DNS records should agencies monitor for drift?
Start with A, AAAA, CNAME, MX, NS, TXT, and CAA records. These record types cover website routing, email delivery, nameserver authority, validation records, and certificate issuance rules.
That gives agencies enough visibility to review operational risk without turning DNS monitoring into a broad security scanner.
Why do MX or NS changes matter?
MX records control client email routing, so a mistaken change can interrupt business email. NS records control which DNS provider is authoritative, so a change can affect every other record.
Both are important in website care plans because clients may experience email or website issues before anyone connects the problem to DNS.
Can DNS monitoring prevent SSL renewal failures?
DNS monitoring cannot guarantee renewal success, but it can reveal changes that commonly block renewal, such as missing validation records, changed nameservers, or restrictive CAA records.
That gives the agency more time to review the renewal path before the certificate enters a short warning window.
Monitor every client domain from one dashboard.
CertPilot checks SSL expiry, DNS records, and domain registration daily — then sends one alert when action is needed. 14-day free trial, no card required.