This document discusses the author's 12 years of experience defending DNS infrastructure and observing various cyber attacks. It describes how the author migrated to more secure DNS configurations, deployed logging and analytics to gain insights into attacks, and incorporated additional defenses like NIDS and RPZ. It also discusses using NetFlow and Zeek to analyze network traffic patterns and investigate DNS queries in more depth. The overall experience highlighted the value of a multi-layered approach to DNS security through continuous monitoring, analytics, and active defenses.