{"id":1764,"date":"2025-11-13T15:18:28","date_gmt":"2025-11-13T12:18:28","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/bir-domain-bir-kahve-ve-kokte-cname-dilegi\/"},"modified":"2025-11-13T15:18:28","modified_gmt":"2025-11-13T12:18:28","slug":"bir-domain-bir-kahve-ve-kokte-cname-dilegi","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/bir-domain-bir-kahve-ve-kokte-cname-dilegi\/","title":{"rendered":"Bir Domain, Bir Kahve ve K\u00f6kte CNAME Dile\u011fi"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><p>{<br \/>\n  &#8220;title&#8221;: &#8220;Apex Alan Ad\u0131nda CNAME Olur mu? K\u00f6kte Y\u00f6nlendirme S\u0131rr\u0131: ALIAS\/ANAME ve Cloudflare Flattening&#8221;,<br \/>\n  &#8220;content&#8221;: &#8220;n<\/p>\n<p>Hi\u00e7 \u015f\u00f6yle oldu mu? Alan ad\u0131n\u0131 yeni bir SaaSu2019a ba\u011flayacaks\u0131n, d\u00f6k\u00fcmanda kocaman u201cCNAME ekleu201d yaz\u0131yor, ama senin kafandaki plan apex u2013 yani k\u00f6k domain. u201cwwwu201d istemiyorsun, tertemiz <strong>ornek.com<\/strong> \u00e7al\u0131\u015fs\u0131n, hem de tek kayd\u0131yla. DNS paneline giriyorsun, CNAME yazmaya kalk\u0131yorsun ve pat: izin yok. \u0130\u015fte o g\u00fcn, ben de ofiste ayn\u0131 duvara toslad\u0131m. Kahveyi bir kenara b\u0131rak\u0131p u201cPeki \u015fimdi ne olacak?u201d diye d\u00fc\u015f\u00fcnd\u00fcm. Asl\u0131nda mesele kural d\u0131\u015f\u0131 bir \u015fey yapmak de\u011fil; DNSu2019in y\u0131llard\u0131r s\u00fcren kural\u0131n\u0131, modern d\u00fcnyan\u0131n ihtiya\u00e7lar\u0131yla bar\u0131\u015ft\u0131rmak.<\/p>\n<p>n<\/p>\n<p>Bu yaz\u0131da, u201cApex alan ad\u0131nda CNAME olur mu?u201d sorusunu tam kalbinden konu\u015fal\u0131m. Cevab\u0131n k\u0131sa k\u0131sm\u0131 u201chy\u0131ru201d; ama hik\u00e2ye burada bitmiyor. \u00c7\u00fcnk\u00fc devreye <strong>ALIAS\/ANAME<\/strong> gibi sentetik kay\u0131tlar ve <strong>Cloudflare CNAME Flattening<\/strong> gibi pratik \u00e7\u00f6z\u00fcmler giriyor. Mesela \u015f\u00f6yle d\u00fc\u015f\u00fcn\u00fcn: Sizin taraf\u0131n\u0131zda A\/AAAA giri\u015fi var gibi dursun ama perde arkas\u0131nda CNAME hedefi takip edilsin; IP de\u011fi\u015fse bile siz sabit kal\u0131n. Gelin bunu ger\u00e7ek d\u00fcnyadan \u00f6rneklerle, basit ama i\u015flevsel bir dille birlikte \u00e7\u00f6zelim.<\/p>\n<p>nn<\/p>\n<div id=\"toc_container\" class=\"toc_transparent no_bullets\"><p class=\"toc_title\">\u0130&ccedil;indekiler<\/p><ul class=\"toc_list\"><li><a href=\"#CNAME_Neden_Apexu2019te_Olmaz_Kuralin_Ozunu_Bir_Cumlede\"><span class=\"toc_number toc_depth_1\">1<\/span> CNAME Neden Apexu2019te Olmaz? Kural\u0131n \u00d6z\u00fcn\u00fc Bir C\u00fcmlede<\/a><ul><li><a href=\"#DNSu2019in_temel_sikligi_ve_kati_kurali\"><span class=\"toc_number toc_depth_2\">1.1<\/span> DNSu2019in temel \u015f\u0131kl\u0131\u011f\u0131 ve kat\u0131 kural\u0131<\/a><\/li><li><a href=\"#Gercek_hayatta_bu_neden_can_yakiyor\"><span class=\"toc_number toc_depth_2\">1.2<\/span> Ger\u00e7ek hayatta bu neden can yak\u0131yor?<\/a><\/li><\/ul><\/li><li><a href=\"#ALIAS_ve_ANAME_CNAME_Konforunu_Kural_Bozmadan_Vermek\"><span class=\"toc_number toc_depth_1\">2<\/span> ALIAS ve ANAME: CNAME Konforunu Kural Bozmadan Vermek<\/a><ul><li><a href=\"#Sentetik_kayit_fikri_neden_akillica\"><span class=\"toc_number toc_depth_2\">2.1<\/span> Sentetik kay\u0131t fikri neden ak\u0131ll\u0131ca?<\/a><\/li><li><a href=\"#Kimler_sagliyor_nasil_dusunmeli\"><span class=\"toc_number toc_depth_2\">2.2<\/span> Kimler sa\u011fl\u0131yor, nas\u0131l d\u00fc\u015f\u00fcnmeli?<\/a><\/li><\/ul><\/li><li><a href=\"#Cloudflare_CNAME_Flattening_Kokte_CNAME_Hissi_AAAAA_Gercegi\"><span class=\"toc_number toc_depth_1\">3<\/span> Cloudflare CNAME Flattening: K\u00f6kte CNAME Hissi, A\/AAAA Ger\u00e7e\u011fi<\/a><ul><li><a href=\"#Flattening_tam_olarak_ne_yapiyor\"><span class=\"toc_number toc_depth_2\">3.1<\/span> Flattening tam olarak ne yap\u0131yor?<\/a><\/li><li><a href=\"#Turuncu_bulut_gri_bulut_ve_gercekte_donen_IP\"><span class=\"toc_number toc_depth_2\">3.2<\/span> Turuncu bulut, gri bulut ve ger\u00e7ekte d\u00f6nen IP<\/a><\/li><li><a href=\"#TTL_ne_oluyor_gecikme_var_mi\"><span class=\"toc_number toc_depth_2\">3.3<\/span> TTL ne oluyor, gecikme var m\u0131?<\/a><\/li><\/ul><\/li><li><a href=\"#Gercek_Dunya_Senaryolari_u201cMesela_Soyle_Dusununu201d_Bolumu\"><span class=\"toc_number toc_depth_1\">4<\/span> Ger\u00e7ek D\u00fcnya Senaryolar\u0131: u201cMesela \u015e\u00f6yle D\u00fc\u015f\u00fcn\u00fcnu201d B\u00f6l\u00fcm\u00fc<\/a><ul><li><a href=\"#SaaS_u201cCNAME_isteru201d_ama_siz_u201cwwwu201d_istemezsiniz\"><span class=\"toc_number toc_depth_2\">4.1<\/span> SaaS u201cCNAME isteru201d ama siz u201cwwwu201d istemezsiniz<\/a><\/li><li><a href=\"#Coklu_bolge_degisken_IP_ve_u201cSik_degisen_hedefu201d_senaryosu\"><span class=\"toc_number toc_depth_2\">4.2<\/span> \u00c7oklu b\u00f6lge, de\u011fi\u015fken IP ve u201cS\u0131k de\u011fi\u015fen hedefu201d senaryosu<\/a><\/li><li><a href=\"#SSLTLS_ve_sertifika_tarafi\"><span class=\"toc_number toc_depth_2\">4.3<\/span> SSL\/TLS ve sertifika taraf\u0131<\/a><\/li><li><a href=\"#HSTS_yonlendirme_ve_SEO_tarafi\"><span class=\"toc_number toc_depth_2\">4.4<\/span> HSTS, y\u00f6nlendirme ve SEO taraf\u0131<\/a><\/li><li><a href=\"#E-posta_SPFDMARC_ve_apex_uzerindeki_diger_kayitlar\"><span class=\"toc_number toc_depth_2\">4.5<\/span> E-posta, SPF\/DMARC ve apex \u00fczerindeki di\u011fer kay\u0131tlar<\/a><\/li><\/ul><\/li><li><a href=\"#Ince_Ayar_DNSSEC_Sert_Cevreler_ACME_ve_Yayilim\"><span class=\"toc_number toc_depth_1\">5<\/span> \u0130nce Ayar: DNSSEC, Sert \u00c7evreler, ACME ve Yay\u0131l\u0131m<\/a><ul><li><a href=\"#DNSSEC_ile_aralari_nasil\"><span class=\"toc_number toc_depth_2\">5.1<\/span> DNSSEC ile aralar\u0131 nas\u0131l?<\/a><\/li><li><a href=\"#ACME_dogrulama_ve_otomatik_sertifika_yenileme\"><span class=\"toc_number toc_depth_2\">5.2<\/span> ACME do\u011frulama ve otomatik sertifika yenileme<\/a><\/li><li><a href=\"#TTL_ve_u201cGercekten_ne_zaman_yayiliru201d_sorusu\"><span class=\"toc_number toc_depth_2\">5.3<\/span> TTL ve u201cGer\u00e7ekten ne zaman yay\u0131l\u0131r?u201d sorusu<\/a><\/li><li><a href=\"#Guvenlik_duvarlari_giden_trafik_ve_u201cHedef_hostnameu201d\"><span class=\"toc_number toc_depth_2\">5.4<\/span> G\u00fcvenlik duvarlar\u0131, giden trafik ve u201cHedef hostnameu201d<\/a><\/li><li><a href=\"#Takip_etmek_olcmek_ve_aksami_huzurlu_kapamak\"><span class=\"toc_number toc_depth_2\">5.5<\/span> Takip etmek, \u00f6l\u00e7mek ve ak\u015fam\u0131 huzurlu kapamak<\/a><\/li><\/ul><\/li><li><a href=\"#Kapanis_Kokte_CNAME_Degil_CNAMEu2019in_Hissi\"><span class=\"toc_number toc_depth_1\">6<\/span> Kapan\u0131\u015f: K\u00f6kte CNAME De\u011fil, CNAMEu2019in Hissi<\/a><\/li><\/ul><\/div>\n<h2 id=\"section-2\"><span id=\"CNAME_Neden_Apexu2019te_Olmaz_Kuralin_Ozunu_Bir_Cumlede\">CNAME Neden Apexu2019te Olmaz? Kural\u0131n \u00d6z\u00fcn\u00fc Bir C\u00fcmlede<\/span><\/h2>\n<p>n<\/p>\n<h3><span id=\"DNSu2019in_temel_sikligi_ve_kati_kurali\">DNSu2019in temel \u015f\u0131kl\u0131\u011f\u0131 ve kat\u0131 kural\u0131<\/span><\/h3>\n<p>n<\/p>\n<p>DNSu2019in en sevdi\u011fim yan\u0131, basit kurallar\u0131n \u00fczerine \u00f6r\u00fcl\u00fc kocaman bir d\u00fcnya olmas\u0131. O basit kural \u015fudur: Bir isim CNAME ise, onunla birlikte ba\u015fka kay\u0131t olamaz. K\u00f6kte, yani apexu201te ise NS ve SOA zaten olmak zorunda. E hal b\u00f6yleyken apexu2019e CNAME koydu\u011funuz an, u201cCNAME tek ba\u015f\u0131na olmal\u0131u201d kural\u0131 ile u201cApexu2019te NS\/SOA zorunluduru201d kural\u0131 \u00e7ak\u0131\u015f\u0131yor. Sonu\u00e7 belli: Apexu2019te CNAME yasak.<\/p>\n<p>n<\/p>\n<p>Bu yasa\u011f\u0131n kitap c\u00fcmlesini g\u00f6rmek isterseniz, <a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc1034\" rel=\"nofollow noopener\" target=\"_blank\">RFC 1034&#8217;teki kural<\/a> yeterince a\u00e7\u0131k anlat\u0131r. Elbette g\u00fcnl\u00fck hayatta kimse u201cBen RFC okuyay\u0131m da ak\u015famlar\u0131 rahat uyuyay\u0131mu201d diye dola\u015fm\u0131yor. Ama cebinizde \u015fu kadar kals\u0131n: u201cK\u00f6k alan ad\u0131 CNAME olamaz, \u00e7\u00fcnk\u00fc apex di\u011fer zorunlu kay\u0131tlarla birlikte ya\u015famak zorunda.u201d<\/p>\n<p>n<\/p>\n<h3><span id=\"Gercek_hayatta_bu_neden_can_yakiyor\">Ger\u00e7ek hayatta bu neden can yak\u0131yor?<\/span><\/h3>\n<p>n<\/p>\n<p>SaaS kullanan herkes bilir; \u00e7o\u011fu platform u201cBize CNAME ile gelu201d der. \u00c7\u00fcnk\u00fc IP de\u011fi\u015febilir, y\u00fck dengeleme devreye girer, global trafik y\u00f6nlendirme yap\u0131l\u0131r. Bu g\u00fczel ama, sizin k\u00f6k alan ad\u0131n\u0131zda bu esnekli\u011fi CNAME ile veremezsiniz. Genellikle ilk akla gelen \u00e7\u00f6z\u00fcm, u201cwwwu2019yi CNAME yapay\u0131m, k\u00f6k\u00fc wwwu2019ye 301 ile y\u00f6nlendireyimu201d olur. Bu kabul gibi g\u00f6r\u00fcnse de her proje u201cwwwu201d kullanmak istemez. Kimisi markas\u0131 gere\u011fi \u00e7\u0131plak alan ad\u0131n\u0131 sever, kimisi da\u011f\u0131n\u0131k subdomain yap\u0131s\u0131ndan ka\u00e7mak ister.<\/p>\n<p>n<\/p>\n<p>Benim i\u00e7in en kritik nokta, de\u011fi\u015fimin h\u0131zland\u0131\u011f\u0131 g\u00fcnlerde b\u00f6yle k\u0131s\u0131tlar\u0131n insan\u0131 yava\u015flatmas\u0131. Bir gecede \u00fcst servis sa\u011flay\u0131c\u0131 IP de\u011fi\u015ftirir, siz u201cA kay\u0131tlar\u0131n\u0131u201d g\u00fcncelleyene kadar trafik h\u0131rpalan\u0131r. \u0130stedi\u011fimiz \u015fey, k\u00f6kte CNAME rahatl\u0131\u011f\u0131 ama kurallar\u0131 bozmadan.<\/p>\n<p>nn<\/p>\n<h2 id=\"section-3\"><span id=\"ALIAS_ve_ANAME_CNAME_Konforunu_Kural_Bozmadan_Vermek\">ALIAS ve ANAME: CNAME Konforunu Kural Bozmadan Vermek<\/span><\/h2>\n<p>n<\/p>\n<h3><span id=\"Sentetik_kayit_fikri_neden_akillica\">Sentetik kay\u0131t fikri neden ak\u0131ll\u0131ca?<\/span><\/h3>\n<p>n<\/p>\n<p>ALIAS ve ANAME, farkl\u0131 sa\u011flay\u0131c\u0131lar\u0131n benzer bak\u0131\u015f a\u00e7\u0131lar\u0131. Temelde yapt\u0131klar\u0131 \u015fu: Siz panelde u201cCNAME gibiu201d bir hedef g\u00f6steriyorsunuz; yetkili DNS, o hedefin A\/AAAA IPu2019lerini kendi taraf\u0131nda \u00e7\u00f6z\u00fcyor ve isteyen herkese normal A\/AAAA gibi sunuyor. B\u00f6ylece d\u0131\u015far\u0131dan bak\u0131nca apexu2019inizde CNAME yok, kural bozulmuyor. Ama siz u201cCNAME esnekli\u011finiu201d al\u0131yorsunuz. IP de\u011fi\u015fse bile, yetkili DNS tekrar \u00e7\u00f6z\u00fcyor ve g\u00fcncel IPu2019leri d\u00f6nd\u00fcr\u00fcyor.<\/p>\n<p>n<\/p>\n<p>Bu yakla\u015f\u0131m bana, u201cYolda lasti\u011fi de\u011fi\u015ftirmeku201d gibi geliyor. Arabay\u0131 durdurmadan, ak\u0131\u015f\u0131 bozmadan sorun \u00e7\u00f6z\u00fcl\u00fcyor. Dezavantaj\u0131 yok mu? Elbette sa\u011flay\u0131c\u0131, sizin i\u00e7in ek bir \u00e7\u00f6z\u00fcmleme (resolve) yap\u0131yor; bu da perde arkas\u0131nda biraz daha i\u015f, biraz daha bekleme penceresi demek. Ama modern DNS altyap\u0131lar\u0131 bunu gayet sa\u011fl\u0131kl\u0131 y\u00f6netiyor.<\/p>\n<p>n<\/p>\n<h3><span id=\"Kimler_sagliyor_nasil_dusunmeli\">Kimler sa\u011fl\u0131yor, nas\u0131l d\u00fc\u015f\u00fcnmeli?<\/span><\/h3>\n<p>n<\/p>\n<p>Bir\u00e7ok DNS sa\u011flay\u0131c\u0131 bu t\u00fcr sentetik kay\u0131tlar\u0131 destekliyor. Konseptin arkas\u0131ndaki mant\u0131k benzer; ayr\u0131nt\u0131lar de\u011fi\u015febilir. Amazon taraf\u0131nda bu yakla\u015f\u0131m\u0131 anlamak i\u00e7in <a href=\"https:\/\/docs.aws.amazon.com\/Route53\/latest\/DeveloperGuide\/hosted-zones-alias.html\" rel=\"nofollow noopener\" target=\"_blank\">AWS Route 53&#8217;\u00fcn ALIAS kayd\u0131 anlat\u0131m\u0131<\/a> iyi bir rehberdir. Y\u0131llar i\u00e7inde g\u00f6rd\u00fcm ki i\u015fin p\u00fcf noktas\u0131, sadece u201cbunu destekliyor mu?u201d demek de\u011fil; u201cNas\u0131l cache ediyor, TTLu2019i nas\u0131l y\u00f6netiyor, hedefteki de\u011fi\u015fikli\u011fi ne kadar h\u0131zl\u0131 yakal\u0131yor?u201d gibi pratik sorular\u0131 da sormak.<\/p>\n<p>n<\/p>\n<p>E\u011fer ekosisteminizde altyap\u0131y\u0131 otomatik y\u00f6netiyorsan\u0131z, bu noktada otomasyon kilit role b\u00fcr\u00fcn\u00fcyor. Birka\u00e7 sat\u0131r YAML ya da HCL ile DNS ya\u015fam d\u00f6ng\u00fcs\u00fcn\u00fc kontrol etmek, gece 03:00 alarm\u0131 yerine sabah kahvesiyle d\u00fczeltme yapabilmek demek. Bu arada, DNS ve sunucu kurulumlar\u0131n\u0131 birlikte ele ald\u0131\u011f\u0131m <a href=\"https:\/\/www.dchost.com\/blog\/terraform-ile-vps-ve-dns-otomasyonu-cloudflare-proxmox-openstack-ve-sifir-kesinti-dagitim-nasil-bir-araya-gelir\/\">Terraform ile VPS ve DNS otomasyonu<\/a> yaz\u0131s\u0131nda bu i\u015fin sahadaki kar\u015f\u0131l\u0131\u011f\u0131n\u0131 da \u00f6rnekledim.<\/p>\n<p>nn<\/p>\n<h2 id=\"section-4\"><span id=\"Cloudflare_CNAME_Flattening_Kokte_CNAME_Hissi_AAAAA_Gercegi\">Cloudflare CNAME Flattening: K\u00f6kte CNAME Hissi, A\/AAAA Ger\u00e7e\u011fi<\/span><\/h2>\n<p>n<\/p>\n<h3><span id=\"Flattening_tam_olarak_ne_yapiyor\">Flattening tam olarak ne yap\u0131yor?<\/span><\/h3>\n<p>n<\/p>\n<p>Cloudflareu2019\u0131n u201cCNAME Flatteningu201d dedi\u011fi \u015fey, yetkili DNS sunucusunda CNAME hedefini \u00e7\u00f6z\u00fcp, sonu\u00e7taki A\/AAAA kay\u0131tlar\u0131n\u0131 son kullan\u0131c\u0131ya vermek. D\u0131\u015far\u0131daki d\u00fcnya, apexu2019te normal A\/AAAA g\u00f6r\u00fcr; ama kaynak, panelde g\u00f6sterdi\u011finiz hedef hosttur. B\u00f6ylece k\u00f6ke CNAME koymadan CNAME konforunu ya\u015fars\u0131n\u0131z. Mant\u0131k basit, etkisi b\u00fcy\u00fck.<\/p>\n<p>n<\/p>\n<p>Detaylar\u0131n\u0131 merak edenler, <a href=\"https:\/\/developers.cloudflare.com\/dns\/manage-dns-records\/reference\/cname-flattening\/\" rel=\"nofollow noopener\" target=\"_blank\">Cloudflare CNAME Flattening dok\u00fcmantasyonu<\/a> \u00fczerinden resmi a\u00e7\u0131klamay\u0131 da inceleyebilir. Orada anlat\u0131lan \u015feyin sahadaki hissi \u015fu: u201cHedef host de\u011fi\u015fti mi, Cloudflare onu yakalay\u0131p yeni IPu2019leri yayar; sen apexu2019te kay\u0131t ta\u015f\u0131makla u\u011fra\u015fma.u201d<\/p>\n<p>n<\/p>\n<h3><span id=\"Turuncu_bulut_gri_bulut_ve_gercekte_donen_IP\">Turuncu bulut, gri bulut ve ger\u00e7ekte d\u00f6nen IP<\/span><\/h3>\n<p>n<\/p>\n<p>Cloudflareu2019da iki mod var: Proxy a\u00e7\u0131kken turuncu bulut, kapal\u0131yken gri bulut. Proxy a\u00e7\u0131ksa son kullan\u0131c\u0131 asl\u0131nda Cloudflareu2019\u0131n anycast IPu2019lerine gider; arka tarafta hedefinize istek forward edilir. Proxy kapal\u0131ysa, flattening hedefi \u00e7\u00f6z\u00fcp ger\u00e7ek A\/AAAA d\u00f6ner. Yani u201cFlatteningu201d, hem proxylu hem proxiesiz senaryoda i\u015f g\u00f6r\u00fcr ama d\u00f6nen IP setinin niteli\u011fi proxy durumuna g\u00f6re de\u011fi\u015fir.<\/p>\n<p>n<\/p>\n<p>Bu ayr\u0131m \u00f6nemli \u00e7\u00fcnk\u00fc performans, g\u00fcvenlik ve kay\u0131tlar\u0131n u201cgizlili\u011fiu201d a\u00e7\u0131s\u0131ndan farkl\u0131 dinamikler var. Proxylu mod, orijini saklay\u0131p kenar g\u00fcvenlik sa\u011flar; proxiesiz mod, \u015feffaf ve yal\u0131n \u00e7al\u0131\u015f\u0131r. Hangi yolu se\u00e7erseniz se\u00e7in, apex u201cCNAME gibi davran\u0131ru201d ama DNS d\u00fcnyas\u0131yla kavga etmez.<\/p>\n<p>n<\/p>\n<h3><span id=\"TTL_ne_oluyor_gecikme_var_mi\">TTL ne oluyor, gecikme var m\u0131?<\/span><\/h3>\n<p>n<\/p>\n<p>Flattening, hedef kayd\u0131n TTLu2019ini bir \u00f6l\u00e7\u00fcde dikkate al\u0131r, ama bu ili\u015fki bire bir de\u011fildir. Cloudflare ve benzeri sa\u011flay\u0131c\u0131lar, hedefi belirli aral\u0131klarla \u00e7\u00f6zer; sonu\u00e7lar\u0131n\u0131 da kendi \u00f6nbelleklerinde y\u00f6netir. Pratikte g\u00f6rd\u00fc\u011f\u00fcm \u015fu: Uygun bir TTL se\u00e7imi ve sa\u011fl\u0131kl\u0131 bir hedef altyap\u0131 ile gecikme endi\u015fe edilecek seviyede olmaz. Yine de de\u011fi\u015fiklik anlar\u0131nda birka\u00e7 dakikal\u0131k u201cge\u00e7i\u015f penceresiu201d do\u011fal bir durum.<\/p>\n<p>n<\/p>\n<p>Cloudflare \u00fczerinde ba\u015fka detaylar da var; \u00f6rne\u011fin WebSocket ya da gRPC gibi uzun soluklu ba\u011flant\u0131lar kuruyorsan\u0131z, kenar ve kaynak aras\u0131ndaki davran\u0131\u015f\u0131 iyi tan\u0131mak gerekir. Bu konuda pratik notlar\u0131 derledi\u011fim <a href=\"https:\/\/www.dchost.com\/blog\/cloudflare-ile-websocket-ve-grpc-yayini-nasil-hep-canli-kalir-nginx-timeout-keep%E2%80%91alive-ve-kesintisiz-dagitimin-sirlari\/\">Cloudflare ile WebSocket ve gRPC yay\u0131n\u0131<\/a> yaz\u0131s\u0131n\u0131 da bir kenara not edin; k\u00f6kte flattening yapsan\u0131z bile uygulama katman\u0131 trafi\u011fi, uzatmal\u0131 ba\u011flant\u0131lar ve time-out ayarlar\u0131yla \u015fekillenir.<\/p>\n<p>nn<\/p>\n<h2 id=\"section-5\"><span id=\"Gercek_Dunya_Senaryolari_u201cMesela_Soyle_Dusununu201d_Bolumu\">Ger\u00e7ek D\u00fcnya Senaryolar\u0131: u201cMesela \u015e\u00f6yle D\u00fc\u015f\u00fcn\u00fcnu201d B\u00f6l\u00fcm\u00fc<\/span><\/h2>\n<p>n<\/p>\n<h3><span id=\"SaaS_u201cCNAME_isteru201d_ama_siz_u201cwwwu201d_istemezsiniz\">SaaS u201cCNAME isteru201d ama siz u201cwwwu201d istemezsiniz<\/span><\/h3>\n<p>n<\/p>\n<p>Bir e-ticaret altyap\u0131s\u0131na ge\u00e7iyorsunuz, d\u00f6k\u00fcman u201cCNAME verinu201d diyor. Siz ise sadece ornek.com ile ya\u015famak istiyorsunuz. Burada \u00fc\u00e7 yol var gibi durur: Klasik u201cwwwu2019ye CNAME, k\u00f6kten wwwu2019ye HTTP 301u201d, ya da u201cALIAS\/ANAMEu201d, ya da u201cCloudflare Flatteningu201d. E\u011fer marka kimli\u011finiz u201cwwwu201du2019s\u00fcz bir adresi dayat\u0131yorsa, apexu2019te sentetik \u00e7\u00f6z\u00fcmle gitmek gayet temiz bir yol. SaaS taraf\u0131 IP de\u011fi\u015ftirirse, sizin apex kayd\u0131n\u0131z g\u00fcncel IPu2019leri zaten almaya devam eder.<\/p>\n<p>n<\/p>\n<p>u201cwwwu201d kullanmakta sak\u0131nca yok; hatta baz\u0131lar\u0131 CDN taraf\u0131ndaki kurallar\u0131 daha rahat y\u00f6netir. Ama apex sevdas\u0131 a\u011f\u0131r bas\u0131yorsa, flattening tam olarak bu \u00f6zg\u00fcrl\u00fc\u011f\u00fc veriyor. \u0130lk kez kurarken bir u201c301 mi flattening mi?u201d tart\u0131\u015fmas\u0131 ya\u015fan\u0131r; burada asl\u0131nda teknik do\u011fruluktan \u00e7ok marka tercihi, SEO al\u0131\u015fkanl\u0131klar\u0131 ve y\u00f6nlendirme politikan\u0131z belirleyici olur.<\/p>\n<p>n<\/p>\n<h3><span id=\"Coklu_bolge_degisken_IP_ve_u201cSik_degisen_hedefu201d_senaryosu\">\u00c7oklu b\u00f6lge, de\u011fi\u015fken IP ve u201cS\u0131k de\u011fi\u015fen hedefu201d senaryosu<\/span><\/h3>\n<p>n<\/p>\n<p>Bir \u00fcretim ortam\u0131nda arka tarafta IPu2019ler de\u011fi\u015febilir; \u00f6zellikle \u00e7ok b\u00f6lgeli ya da otomatik \u00f6l\u00e7eklenen ortamlarda. CNAME rahatl\u0131\u011f\u0131n\u0131 apexu2019te istiyorsan\u0131z, ALIAS\/ANAME veya flattening hedefteki de\u011fi\u015fimleri yakalar. u201cBu gece IP de\u011fi\u015fti, A kay\u0131tlar\u0131n\u0131 unuttuku201d kabusu ya\u015famazs\u0131n\u0131z. \u00dcstelik t\u00fcm bunlar, kullan\u0131c\u0131ya u201cA\/AAAAu201d olarak g\u00f6r\u00fcn\u00fcr; yani kural ihlal etmeden konfor kazan\u0131rs\u0131n\u0131z.<\/p>\n<p>n<\/p>\n<h3><span id=\"SSLTLS_ve_sertifika_tarafi\">SSL\/TLS ve sertifika taraf\u0131<\/span><\/h3>\n<p>n<\/p>\n<p>K\u00f6k y\u00f6nlendirmeyi \u00e7\u00f6zmek tek ba\u015f\u0131na yetmez; u\u00e7taki sertifikalar da do\u011fru olmal\u0131. Hem ornek.com hem de www.ornek.com i\u00e7in sertifika kapsam\u0131n\u0131z\u0131 netle\u015ftirin. Taray\u0131c\u0131 uyumlulu\u011fu ve performans dengesini konu\u015ftu\u011fum <a href=\"https:\/\/www.dchost.com\/blog\/nginx-apachede-ecdsa-rsa-ikili-ssl-uyumluluk-mu-hiz-mi-ikisini-birden-nasil-alirsin\/\">ECDSA + RSA ikili SSL ile uyumluluk ve h\u0131z<\/a> yaz\u0131s\u0131, u201ck\u00f6kte mi wwwu2019de mi?u201d gibi sorular\u0131n \u00f6tesinde, sertifika se\u00e7iminde de d\u00fc\u015f\u00fcnmenize yard\u0131mc\u0131 olur. Unutmay\u0131n, DNS kay\u0131tlar\u0131n\u0131 ak\u0131ll\u0131ca kurgulamak kadar, sertifikay\u0131 do\u011fru kesmek de kesinti riskini azalt\u0131r.<\/p>\n<p>n<\/p>\n<h3><span id=\"HSTS_yonlendirme_ve_SEO_tarafi\">HSTS, y\u00f6nlendirme ve SEO taraf\u0131<\/span><\/h3>\n<p>n<\/p>\n<p>HSTS kullan\u0131yorsan\u0131z, u201ctime-to-first-secureu201d etkisini d\u00fc\u015f\u00fcn\u00fcn. K\u00f6kten wwwu2019ye y\u00f6nlendiriyorsan\u0131z 301 kal\u0131c\u0131 olsun, kanonik adresinizi tekle\u015ftirin. Flattening tercih ediyorsan\u0131z ve tek host \u00fczerinden ilerleyecekseniz, kanonik etiketleri ve site haritalar\u0131n\u0131 d\u00fczenli tutun. Teknik olarak hangisini se\u00e7ti\u011finiz de\u011fil, tutarl\u0131l\u0131kla y\u00fcr\u00fctmeniz arama motorlar\u0131nda daha p\u00fcr\u00fczs\u00fcz bir sonu\u00e7 verir.<\/p>\n<p>n<\/p>\n<h3><span id=\"E-posta_SPFDMARC_ve_apex_uzerindeki_diger_kayitlar\">E-posta, SPF\/DMARC ve apex \u00fczerindeki di\u011fer kay\u0131tlar<\/span><\/h3>\n<p>n<\/p>\n<p>G\u00fczel taraf \u015fu: Flattening ve ALIAS gibi y\u00f6ntemlerde d\u0131\u015far\u0131ya A\/AAAA d\u00f6nd\u00fc\u011f\u00fc i\u00e7in apexu2019te MX, TXT, SPF ve DMARC kay\u0131tlar\u0131n\u0131z\u0131 normal \u015fekilde tutabilirsiniz. u201cCNAME olursa di\u011fer kay\u0131tlar ya\u015fayamazu201d kural\u0131na tak\u0131lmazs\u0131n\u0131z, \u00e7\u00fcnk\u00fc asl\u0131nda CNAME sunmuyoruz. Bu arada, e-postada do\u011frulama ve s\u0131n\u0131rlar\u0131 geni\u015fleten teknikleri seviyorsan\u0131z, ben u201cDNS limitleriyle medeni \u015fekilde ba\u015f etmeu201d dendi\u011finde <a href=\"https:\/\/www.dchost.com\/blog\/spf-flattening-ile-10-lookup-duvarini-nasil-asarsin-ci-cd-ve-workers-ile-yasayan-spf\/\">SPF Flattening ile 10 lookup duvar\u0131n\u0131 a\u015fma<\/a> yakla\u015f\u0131m\u0131n\u0131 \u00e7ok pratik buluyorum; fikir olarak benze\u015firler, biri e-posta taraf\u0131nda, di\u011feri apex y\u00f6nlendirmesinde nefes ald\u0131r\u0131r.<\/p>\n<p>nn<\/p>\n<h2 id=\"section-6\"><span id=\"Ince_Ayar_DNSSEC_Sert_Cevreler_ACME_ve_Yayilim\">\u0130nce Ayar: DNSSEC, Sert \u00c7evreler, ACME ve Yay\u0131l\u0131m<\/span><\/h2>\n<p>n<\/p>\n<h3><span id=\"DNSSEC_ile_aralari_nasil\">DNSSEC ile aralar\u0131 nas\u0131l?<\/span><\/h3>\n<p>n<\/p>\n<p>DNSSEC kapal\u0131 bir kutu de\u011fil ama beklenti ayarlamak \u015fart. Flattening yapt\u0131\u011f\u0131n\u0131zda, d\u00f6nen kay\u0131t A\/AAAA oldu\u011fundan, imzalar da sizin alan ad\u0131n\u0131z\u0131n zinciriyle gelir. Hedef hostnameu2019in kendi DNSSEC zincirini u201cdirektu201d ta\u015f\u0131m\u0131\u015f olmazs\u0131n\u0131z; \u00e7\u00fcnk\u00fc siz zaten yetkili sunucuda \u00e7\u00f6z\u00fcmleyip u201cyeni bir cevapu201d \u00fcretiyorsunuz. Y\u0131llard\u0131r bu d\u00fczenle sorunsuz \u00e7al\u0131\u015fan \u00e7ok yap\u0131 g\u00f6rd\u00fcm; kritik olan, DNS sa\u011flay\u0131c\u0131n\u0131z\u0131n DNSSEC uygulamas\u0131n\u0131n sa\u011flam olmas\u0131.<\/p>\n<p>n<\/p>\n<h3><span id=\"ACME_dogrulama_ve_otomatik_sertifika_yenileme\">ACME do\u011frulama ve otomatik sertifika yenileme<\/span><\/h3>\n<p>n<\/p>\n<p>Letu2019s Encrypt gibi ACME ak\u0131\u015flar\u0131nda HTTP-01 veya DNS-01 do\u011frulamas\u0131 yapars\u0131n\u0131z. K\u00f6kte flattening varsa, proxy a\u00e7\u0131ksa baz\u0131 do\u011frulama endpointu2019lerinin u201cg\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fcu201d etkilenebilir. Burada iki k\u00fc\u00e7\u00fck kural i\u015fimi \u00e7ok kolayla\u015ft\u0131r\u0131yor: Do\u011frulama s\u0131ras\u0131nda proxyu2019yi gerekirse k\u0131sa s\u00fcreli kapatmak ve m\u00fcmk\u00fcnse DNS-01 ile TXT do\u011frulamas\u0131 tercih etmek. B\u00f6ylece apex mi, www mi, hangi yol daha rahat, hepsini bir \u00e7\u0131rp\u0131da ge\u00e7ersiniz.<\/p>\n<p>n<\/p>\n<h3><span id=\"TTL_ve_u201cGercekten_ne_zaman_yayiliru201d_sorusu\">TTL ve u201cGer\u00e7ekten ne zaman yay\u0131l\u0131r?u201d sorusu<\/span><\/h3>\n<p>n<\/p>\n<p>DNS bir s\u00f6z. u201c\u015eu kadar s\u00fcre bu cevaba g\u00fcvenu201d der. Flattening ve ALIAS, hedefin TTLu2019ine bakarak ve kendi i\u00e7 ritmiyle \u00e7\u00f6z\u00fcme yeni IPu2019leri ta\u015f\u0131r. Bu y\u00fczden de\u011fi\u015fiklik yapt\u0131\u011f\u0131n\u0131z an ile herkesin yeni IPu2019yi g\u00f6rd\u00fc\u011f\u00fc an aras\u0131nda k\u00fc\u00e7\u00fck bir pencere kal\u0131r. Bu pencereyi daraltmak i\u00e7in kritik ge\u00e7i\u015flerde TTLu2019leri \u00f6nce d\u00fc\u015f\u00fcrmek, kesimden sonra tekrar y\u00fckseltmek h\u00e2l\u00e2 alt\u0131n kural.<\/p>\n<p>n<\/p>\n<h3><span id=\"Guvenlik_duvarlari_giden_trafik_ve_u201cHedef_hostnameu201d\">G\u00fcvenlik duvarlar\u0131, giden trafik ve u201cHedef hostnameu201d<\/span><\/h3>\n<p>n<\/p>\n<p>Arka planda hedef hostnameu2019e giden trafi\u011fi kabul etmeyen k\u0131s\u0131tlar varsa, u201cflattening yapt\u0131k, i\u015f bittiu201d demeyin. \u00d6zellikle proxylu senaryolarda ger\u00e7ek istemci IPu2019sini g\u00f6rmek istiyorsan\u0131z, ba\u011flant\u0131 ba\u015fl\u0131klar\u0131n\u0131 do\u011fru yorumlayan uygulama katman\u0131 ve ilgili firewall kurallar\u0131 \u015fart. u201cNeden geceleri kopuyor?u201d diye d\u00fc\u015f\u00fcnd\u00fcren gizli bir kural bazen tek sat\u0131rl\u0131k bir ayard\u0131r.<\/p>\n<p>n<\/p>\n<h3><span id=\"Takip_etmek_olcmek_ve_aksami_huzurlu_kapamak\">Takip etmek, \u00f6l\u00e7mek ve ak\u015fam\u0131 huzurlu kapamak<\/span><\/h3>\n<p>n<\/p>\n<p>Kritik bir ge\u00e7i\u015fte ben asla sadece u201cDNS kayd\u0131n\u0131 de\u011fi\u015ftirdiku201d diyerek i\u015f b\u0131rakm\u0131yorum. Sa\u011flay\u0131c\u0131n\u0131n health check imkanlar\u0131n\u0131, kendi izleme panellerinizi, hatta bir iki ba\u011f\u0131ms\u0131z b\u00f6lgeden yap\u0131lan curl denemelerini rutine ekleyin. Cloudflare gibi kenar platformlar\u0131nda uzun s\u00fcreli ba\u011flant\u0131lar kuruyorsan\u0131z, yaz\u0131n\u0131n ba\u015f\u0131nda and\u0131\u011f\u0131m WebSocket\/gRPC notlar\u0131n\u0131 tekrar g\u00f6zden ge\u00e7irin. Her \u015fey yolundaysa zaten sessizlik en g\u00fczel i\u015faret olur.<\/p>\n<p>nn<\/p>\n<h2 id=\"section-7\"><span id=\"Kapanis_Kokte_CNAME_Degil_CNAMEu2019in_Hissi\">Kapan\u0131\u015f: K\u00f6kte CNAME De\u011fil, CNAMEu2019in Hissi<\/span><\/h2>\n<p>n<\/p>\n<p>Toparlayal\u0131m. u201cApex alan ad\u0131nda CNAME olur mu?u201d sorusunun k\u0131sa cevab\u0131 hay\u0131r. Ama g\u00fcn\u00fcm\u00fcz\u00fcn pratik \u00e7\u00f6z\u00fcmleri, bu u201chy\u0131ru201d\u0131 g\u00fcnl\u00fck hayatta bir \u015f\u00f6lene \u00e7eviriyor. <strong>ALIAS\/ANAME<\/strong> ve <strong>Cloudflare CNAME Flattening<\/strong>, k\u00f6kte CNAMEu2019in verdi\u011fi esnekli\u011fi kural bozmadan ya\u015fat\u0131yor. Hedef hostname de\u011fi\u015fti\u011finde, siz panelde dola\u015fmadan g\u00fcncel IPu2019lere kavu\u015fuyorsunuz. MX, TXT, SPF, DMARC gibi apex kay\u0131tlar\u0131n\u0131z da huzur i\u00e7inde yerinde kal\u0131yor.<\/p>\n<p>n<\/p>\n<p>Ne yapal\u0131m peki? \u015e\u00f6yle k\u00fc\u00e7\u00fck bir ak\u0131\u015f akl\u0131mda hep \u00e7al\u0131\u015f\u0131r: Marka tercihlerinizi d\u00fc\u015f\u00fcn\u00fcn, u201cwwwu201d mi yoksa \u00e7\u0131plak alan m\u0131? CDN\/proxy ihtiyac\u0131n\u0131z\u0131 tart\u0131n; uzun soluklu ba\u011flant\u0131lar\u0131n\u0131z ve g\u00fcvenlik ayarlar\u0131n\u0131z net mi? Sonra, DNS sa\u011flay\u0131c\u0131n\u0131z\u0131n sundu\u011fu se\u00e7eneklere bak\u0131n; flattening\/ALIAS hangi detaylarla geliyor? Ge\u00e7i\u015fi planlarken TTLu2019i bir t\u0131k d\u00fc\u015f\u00fcr\u00fcn, do\u011frulamalar\u0131 yap\u0131n, izlemeyi a\u00e7\u0131n. E\u011fer i\u015fin uygulama taraf\u0131nda TLS d\u00fcnyas\u0131yla da ilgileniyorsan\u0131z, <a href=\"https:\/\/www.dchost.com\/blog\/nginx-apachede-ecdsa-rsa-ikili-ssl-uyumluluk-mu-hiz-mi-ikisini-birden-nasil-alirsin\/\">ikili SSL ile uyumluluk ve h\u0131z dengesini<\/a> konu\u015ftu\u011fumuz notlar akl\u0131n\u0131zda bulunsun. \u0130lham veriyorsa, u201cDNS ile altyap\u0131y\u0131 birlikte ta\u015f\u0131maku201d fikrini de <a href=\"https:\/\/www.dchost.com\/blog\/terraform-ile-vps-ve-dns-otomasyonu-cloudflare-proxmox-openstack-ve-sifir-kesinti-dagitim-nasil-bir-araya-gelir\/\">Terraform otomasyon ak\u0131\u015f\u0131<\/a> ile somutla\u015ft\u0131r\u0131n. Umar\u0131m bu yaz\u0131, apexu2019te CNAME arayanlar\u0131n g\u00f6nl\u00fcne su serpmi\u015ftir. Sorular\u0131n\u0131z olursa, her zaman beklerim; bir sonraki yaz\u0131da g\u00f6r\u00fc\u015fmek \u00fczere.<\/p>\n<p>&#8220;,<br \/>\n  &#8220;focus_keyword&#8221;: &#8220;Apex alan ad\u0131nda CNAME&#8221;,<br \/>\n  &#8220;meta_description&#8221;: &#8220;Apex alan ad\u0131nda CNAME olur mu? ALIAS\/ANAME ve Cloudflare CNAME Flattening ile k\u00f6k DNS y\u00f6nlendirmeyi, TTL ve e-posta kay\u0131tlar\u0131yla birlikte net ve pratik anlat\u0131m.&#8221;,<br \/>\n  &#8220;faqs&#8221;: [<br \/>\n    {<br \/>\n      &#8220;question&#8221;: &#8220;Apex alan ad\u0131nda CNAME ger\u00e7ekten yasak m\u0131?&#8221;,<br \/>\n      &#8220;answer&#8221;: &#8220;Evet. K\u00f6kte NS ve SOA zorunludur ve CNAME tek ba\u015f\u0131na ya\u015famak ister. Bu y\u00fczden apex\u2019te CNAME kullanamazs\u0131n. Pratikte \u00e7\u00f6z\u00fcm, ALIAS\/ANAME ya da Cloudflare CNAME Flattening gibi y\u00f6ntemlerdir; d\u0131\u015far\u0131ya A\/AAAA d\u00f6nd\u00fckleri i\u00e7in kural\u0131 bozmazlar.&#8221;<br \/>\n    },<br \/>\n    {<br \/>\n      &#8220;question&#8221;: &#8220;Flattening veya ALIAS kullan\u0131rsam e-posta kay\u0131tlar\u0131m etkilenir mi?&#8221;,<br \/>\n      &#8220;answer&#8221;: &#8220;Hay\u0131r. D\u0131\u015far\u0131ya A\/AAAA d\u00f6nd\u00fc\u011f\u00fc i\u00e7in apex\u2019te MX, TXT, SPF ve DMARC kay\u0131tlar\u0131n\u0131 normal \u015fekilde tutabilirsin. Zaten as\u0131l dert, CNAME\u2019in yan\u0131nda ba\u015fka kay\u0131tlar\u0131n olamamas\u0131yd\u0131; flattening\/ALIAS bunu a\u015far.&#8221;<br \/>\n    },<br \/>\n    {<br \/>\n      &#8220;question&#8221;: &#8220;K\u00f6k alan\u0131 www\u2019ye y\u00f6nlendirmek mi, yoksa flattening kullanmak m\u0131 daha iyi?&#8221;,<br \/>\n      &#8220;answer&#8221;: &#8220;Bu daha \u00e7ok tercih meselesi. Marka dili, SEO al\u0131\u015fkanl\u0131klar\u0131 ve altyap\u0131 mimarisi belirleyici olur. www\u2019ye 301 verip CNAME\u2019i www\u2019de tutmak gayet temizdir; ama \u00e7\u0131plak domaine \u00e2\u015f\u0131ksan flattening\/ALIAS ile k\u00f6kte esnekli\u011fi al\u0131rs\u0131n. Her iki yakla\u015f\u0131mda da tutarl\u0131l\u0131k ve do\u011fru TLS\/izleme ayarlar\u0131 i\u015fin anahtar\u0131d\u0131r.&#8221;<br \/>\n    }<br \/>\n  ]<br \/>\n}<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>{ &#8220;title&#8221;: &#8220;Apex Alan Ad\u0131nda CNAME Olur mu? K\u00f6kte Y\u00f6nlendirme S\u0131rr\u0131: ALIAS\/ANAME ve Cloudflare Flattening&#8221;, &#8220;content&#8221;: &#8220;n Hi\u00e7 \u015f\u00f6yle oldu mu? Alan ad\u0131n\u0131 yeni bir SaaSu2019a ba\u011flayacaks\u0131n, d\u00f6k\u00fcmanda kocaman u201cCNAME ekleu201d yaz\u0131yor, ama senin kafandaki plan apex u2013 yani k\u00f6k domain. u201cwwwu201d istemiyorsun, tertemiz ornek.com \u00e7al\u0131\u015fs\u0131n, hem de tek kayd\u0131yla. DNS paneline giriyorsun, CNAME yazmaya [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1765,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/1764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=1764"}],"version-history":[{"count":0,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/1764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/1765"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=1764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=1764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=1764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}