DNS changes to make at GoDaddy (queued, fires when login lands)
The moment Jim shares the GoDaddy login, run these in order. Total time at the registrar: about 15 minutes. No client involvement needed.
Round 1 — immediate (run within 30 min of getting access)
1. Audit before changing anything
dig +short A bensontheatre.org
dig +short MX bensontheatre.org
dig +short TXT bensontheatre.org
dig +short NS bensontheatre.org
Save the output as a snapshot in case we need to revert. Drop into BLOCKERS.md cleared section with timestamp.
2. Add SPF record
Add as TXT record at root (@):
v=spf1 include:_spf.google.com ~all
Why: every email from bensontheatre.org is currently unauthenticated. SPF tells receiving mail servers that Google Workspace is the legitimate sender. Without it, newsletters and form notifications spam-filter.
If we add SendGrid for transactional email, update later to:
v=spf1 include:_spf.google.com include:sendgrid.net ~all
3. Drop the stale Microsoft 365 verification token
Remove the TXT record MS=ms29607555. Leftover from a Microsoft 365 setup that never went anywhere; the live system is Google Workspace.
4. Add Google domain verification token (if rolling fresh GA4 / GSC)
Per Phase 1 of analytics setup: when we add the new GA4 + Google Search Console, Google will hand us a TXT verification record. Add that here.
Format usually: google-site-verification=<token>
Round 2 — Workspace recovery (24-48 hr after Round 1)
5. DKIM record
Once Workspace super admin is recovered (separate flow):
- In admin.google.com, generate the DKIM key under Apps → Google Workspace → Gmail → Authenticate email
- Publish the public key as TXT at: google._domainkey.bensontheatre.org
After publishing, return to admin.google.com and click "Start authentication." Google verifies and turns on DKIM signing.
6. Tighten DMARC
Current DMARC is v=DMARC1; p=none; (monitor only). After SPF + DKIM are observing for a few days with no legitimate email being marked spam, tighten:
v=DMARC1; p=quarantine; rua=mailto:dmarc@bensontheatre.org
Then later (~30 days observed clean):
v=DMARC1; p=reject; rua=mailto:dmarc@bensontheatre.org
Round 3 — DNS cutover at launch (the big one)
Run 24-48 hours before flipping DNS:
7. Drop A record TTL
Lower the TTL on the existing A record from default (usually 1 hour) to 300 seconds. This means once we flip the IP, the change propagates within 5 minutes instead of an hour.
8. Confirm SSL is provisioned at the new host
Don't flip DNS until the new host has issued SSL for bensontheatre.org. Check with Flywheel or Kinsta dashboard before swap.
9. Swap A record IP
Change the A record from 151.101.66.159 (Fastly / Shape Society's Flywheel) to the new host's IP.
10. Monitor
Watch DNS propagation:
dig +short A bensontheatre.org
# repeat every 5 min for the first hour
Verify the site loads from the new host. Verify SSL is valid. Verify email is still receiving (test send to admin@bensontheatre.org).
11. After 24-48 hours stable
Bump TTL back up to 3600 (1 hour) or 86400 (24 hours).
What does NOT change
These records stay exactly as they are during cutover:
- MX records (Google Workspace) — leave alone, email keeps working
- Nameservers (ns69/ns70.domaincontrol.com) — we stay on GoDaddy DNS, just change the values
- DMARC and DKIM — already running by the time we cut over
If something goes wrong
Every change above is reversible. Keep the Round 1 dig output as a snapshot. Worst case, paste old values back into GoDaddy DNS panel.
Flywheel and Kinsta both keep snapshots — if the new host has an issue, we can revert the A record while we troubleshoot. The old Shape Society install is still running on the old IP unless someone shuts it down, so reverting just resumes service from there.