\ No newline at end of file
diff --git a/categories/dns/index.xml b/categories/dns/index.xml
index a6eae73e8c..418e5d5737 100644
--- a/categories/dns/index.xml
+++ b/categories/dns/index.xml
@@ -1,14 +1,21 @@
Docs – DNS/categories/dns/Recent content in DNS on DocsHugo -- gohugo.ioUser-Guide: DNS Server/user-guide/tools/transparent-endpoint-injection/dns-server/Mon, 01 Jan 0001 00:00:00 +0000/user-guide/tools/transparent-endpoint-injection/dns-server/
-<p>LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
-<p>When the system starts up, the log output contains the IP address of the local DNS server. Typically, this address by default is either <code>0.0.0.0</code> (see example below) or <code>127.0.0.1</code> if LocalStack cannot bind to <code>0.0.0.0</code> due to a conflicting service.</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>Starting DNS servers (tcp/udp port 53 on 0.0.0.0)...
-</span></span></code></pre></div><h2 id="configuration">Configuration</h2>
-<p>The DNS server can be configured to match your usecase using the <code>DNS_ADDRESS</code> environment variable.</p>
-<p>To bind the server to <code>127.0.0.1</code>, you can set:</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span>127.0.0.1
-</span></span></code></pre></div><p>You can disable the DNS server (which will prevent LocalStack from binding port 53) using:</p>
+<p>All versions of LocalStack include a DNS server that resolves the domain name <code>localhost.localstack.cloud</code> to the LocalStack container.
+This enables seamless connectivity from your container to LocalStack, or from created compute resources like Lambda, ECS or EC2 to LocalStack.
+In addition, LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
+<p>When the system starts up, the log output contains the IP address of the local DNS server.
+If port 53 can be bound on the host, the LocalStack CLI will publish port 53 from the container to the host on IP address <code>127.0.0.1</code>.
+Otherwise it will not publish port 53 to the host.
+Regardless of whether the port can be bound or not, the DNS server is bound to address <code>0.0.0.0</code> of the LocalStack container so other containers within the same docker network can use the DNS server.
+See the <a href="/references/network-troubleshooting/endpoint-url/#from-your-container">Network Troubleshooting guide</a> for more details.</p>
+<h2 id="configuration">Configuration</h2>
+<p>If you experience problems when running LocalStack and the DNS server is the issue, you can disable the DNS server using:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#0000cf;font-weight:bold">0</span>
-</span></span></code></pre></div><p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
+</span></span></code></pre></div>
+<div class="alert alert-warning" role="alert">
+<h4 class="alert-heading">Warning</h4>
+We do not recommend this configuration since this disables resolving <code>localhost.localstack.cloud</code> to the LocalStack container.
+</div>
+<p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_LOCAL_NAME_PATTERNS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#4e9a06">'.*(ecr|lambda).*.amazonaws.com'</span>
</span></span></code></pre></div><p>Using this configuration, the LocalStack DNS server only redirects ECR and Lambda domains to LocalStack, and the rest will be resolved via <code>$DNS_SERVER</code>. This can be used for hybrid setups, where certain API calls (e.g., ECR, Lambda) target LocalStack, whereas other services will target real AWS.</p>
<div class="alert alert-warning" role="alert">
@@ -125,6 +132,10 @@ LocalStack will not store or share any forwarded DNS requests, except maybe in t
<p>If you rely on your local network’s DNS, your router/DNS server might block requests due to the DNS Rebind Protection.
This feature is enabled by default in pfSense, OPNSense, OpenWRT, AVM FritzBox, and potentially also other devices.
Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (like OpenWRT).</p>
+<div class="alert alert-primary" role="alert">
+<h4 class="alert-heading">Note</h4>
+If you are using the LocalStack DNS server, DNS rebind protection should not cause any issues.
+</div>
<p>You can check if your DNS setup works correctly by resolving a subdomain of <code>localhost.localstack.cloud</code>:
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;display:grid;"><code class="language-text" data-lang="text"><span style="display:flex;"><span><span class="command-prefix">$ </span>dig test.localhost.localstack.cloud
</span></span><span style="display:flex;"><span>
@@ -148,7 +159,7 @@ Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (lik
</span></span><span style="display:flex;"><span>;; WHEN: Fr Jän 14 11:23:12 CET 2022
</span></span><span style="display:flex;"><span>;; MSG SIZE rcvd: 90</span></span></code></pre></div>
</p>
-<p>If the the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
+<p>If the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
If not, please check the configuration of your router / DNS if the Rebind Protection is active or <a href="/user-guide/tools/transparent-endpoint-injection/dns-server/#system-dns-configuration">enable the LocalStack DNS on your system</a>.</p>
<h2 id="customizing-internal-endpoint-resolution">Customizing internal endpoint resolution</h2>
<p>The DNS name <code>localhost.localstack.cloud</code> (and any subdomains like <code>mybucket.s3.localhost.localstack.cloud</code>) is used internally in LocalStack to route requests, e.g., between a Lambda container and the LocalStack APIs.</p>
diff --git a/categories/localstack-pro/index.html b/categories/localstack-pro/index.html
index a852526abe..9860ac8d9d 100644
--- a/categories/localstack-pro/index.html
+++ b/categories/localstack-pro/index.html
@@ -1,7 +1,7 @@
LocalStack Pro | Docs
\ No newline at end of file
diff --git a/categories/localstack-pro/index.xml b/categories/localstack-pro/index.xml
index c2179bb5e8..2579badbb5 100644
--- a/categories/localstack-pro/index.xml
+++ b/categories/localstack-pro/index.xml
@@ -2474,16 +2474,23 @@ id="tabs-07-01" role="tabpanel" aria-labelled-by="tabs-07-01-tab">
<li><a href="https://github.com/localstack/localstack-pro-samples/tree/master/lambda-mounting-and-debugging">Lambda Code Mounting and Debugging (Python)</a></li>
<li><a href="https://github.com/localstack/localstack-pro-samples/tree/master/sample-archive/spring-cloud-function-microservice">Spring Cloud Function on LocalStack (Kotlin JVM)</a></li>
</ul>User-Guide: DNS Server/user-guide/tools/transparent-endpoint-injection/dns-server/Mon, 01 Jan 0001 00:00:00 +0000/user-guide/tools/transparent-endpoint-injection/dns-server/
-<p>LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
-<p>When the system starts up, the log output contains the IP address of the local DNS server. Typically, this address by default is either <code>0.0.0.0</code> (see example below) or <code>127.0.0.1</code> if LocalStack cannot bind to <code>0.0.0.0</code> due to a conflicting service.</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>Starting DNS servers (tcp/udp port 53 on 0.0.0.0)...
-</span></span></code></pre></div><h2 id="configuration">Configuration</h2>
-<p>The DNS server can be configured to match your usecase using the <code>DNS_ADDRESS</code> environment variable.</p>
-<p>To bind the server to <code>127.0.0.1</code>, you can set:</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span>127.0.0.1
-</span></span></code></pre></div><p>You can disable the DNS server (which will prevent LocalStack from binding port 53) using:</p>
+<p>All versions of LocalStack include a DNS server that resolves the domain name <code>localhost.localstack.cloud</code> to the LocalStack container.
+This enables seamless connectivity from your container to LocalStack, or from created compute resources like Lambda, ECS or EC2 to LocalStack.
+In addition, LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
+<p>When the system starts up, the log output contains the IP address of the local DNS server.
+If port 53 can be bound on the host, the LocalStack CLI will publish port 53 from the container to the host on IP address <code>127.0.0.1</code>.
+Otherwise it will not publish port 53 to the host.
+Regardless of whether the port can be bound or not, the DNS server is bound to address <code>0.0.0.0</code> of the LocalStack container so other containers within the same docker network can use the DNS server.
+See the <a href="/references/network-troubleshooting/endpoint-url/#from-your-container">Network Troubleshooting guide</a> for more details.</p>
+<h2 id="configuration">Configuration</h2>
+<p>If you experience problems when running LocalStack and the DNS server is the issue, you can disable the DNS server using:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#0000cf;font-weight:bold">0</span>
-</span></span></code></pre></div><p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
+</span></span></code></pre></div>
+<div class="alert alert-warning" role="alert">
+<h4 class="alert-heading">Warning</h4>
+We do not recommend this configuration since this disables resolving <code>localhost.localstack.cloud</code> to the LocalStack container.
+</div>
+<p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_LOCAL_NAME_PATTERNS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#4e9a06">'.*(ecr|lambda).*.amazonaws.com'</span>
</span></span></code></pre></div><p>Using this configuration, the LocalStack DNS server only redirects ECR and Lambda domains to LocalStack, and the rest will be resolved via <code>$DNS_SERVER</code>. This can be used for hybrid setups, where certain API calls (e.g., ECR, Lambda) target LocalStack, whereas other services will target real AWS.</p>
<div class="alert alert-warning" role="alert">
@@ -2600,6 +2607,10 @@ LocalStack will not store or share any forwarded DNS requests, except maybe in t
<p>If you rely on your local network’s DNS, your router/DNS server might block requests due to the DNS Rebind Protection.
This feature is enabled by default in pfSense, OPNSense, OpenWRT, AVM FritzBox, and potentially also other devices.
Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (like OpenWRT).</p>
+<div class="alert alert-primary" role="alert">
+<h4 class="alert-heading">Note</h4>
+If you are using the LocalStack DNS server, DNS rebind protection should not cause any issues.
+</div>
<p>You can check if your DNS setup works correctly by resolving a subdomain of <code>localhost.localstack.cloud</code>:
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;display:grid;"><code class="language-text" data-lang="text"><span style="display:flex;"><span><span class="command-prefix">$ </span>dig test.localhost.localstack.cloud
</span></span><span style="display:flex;"><span>
@@ -2623,7 +2634,7 @@ Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (lik
</span></span><span style="display:flex;"><span>;; WHEN: Fr Jän 14 11:23:12 CET 2022
</span></span><span style="display:flex;"><span>;; MSG SIZE rcvd: 90</span></span></code></pre></div>
</p>
-<p>If the the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
+<p>If the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
If not, please check the configuration of your router / DNS if the Rebind Protection is active or <a href="/user-guide/tools/transparent-endpoint-injection/dns-server/#system-dns-configuration">enable the LocalStack DNS on your system</a>.</p>
<h2 id="customizing-internal-endpoint-resolution">Customizing internal endpoint resolution</h2>
<p>The DNS name <code>localhost.localstack.cloud</code> (and any subdomains like <code>mybucket.s3.localhost.localstack.cloud</code>) is used internally in LocalStack to route requests, e.g., between a Lambda container and the LocalStack APIs.</p>
diff --git a/categories/tools/index.html b/categories/tools/index.html
index a22c8876b2..e1d1ad8243 100644
--- a/categories/tools/index.html
+++ b/categories/tools/index.html
@@ -1,7 +1,7 @@
Tools | Docs
\ No newline at end of file
diff --git a/categories/tools/index.xml b/categories/tools/index.xml
index 78affee410..b0d8d1cc2e 100644
--- a/categories/tools/index.xml
+++ b/categories/tools/index.xml
@@ -205,16 +205,23 @@ Similar to the <code>save</code> command, the usage of the Cloud Pod&r
</span></span><span style="display:flex;"><span> -n, --name TEXT Name of the Cloud Pod <span style="color:#ce5c00;font-weight:bold">[</span>required<span style="color:#ce5c00;font-weight:bold">]</span>
</span></span><span style="display:flex;"><span> --help Show this message and exit.
</span></span></code></pre></div>User-Guide: DNS Server/user-guide/tools/transparent-endpoint-injection/dns-server/Mon, 01 Jan 0001 00:00:00 +0000/user-guide/tools/transparent-endpoint-injection/dns-server/
-<p>LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
-<p>When the system starts up, the log output contains the IP address of the local DNS server. Typically, this address by default is either <code>0.0.0.0</code> (see example below) or <code>127.0.0.1</code> if LocalStack cannot bind to <code>0.0.0.0</code> due to a conflicting service.</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-text" data-lang="text"><span style="display:flex;"><span>Starting DNS servers (tcp/udp port 53 on 0.0.0.0)...
-</span></span></code></pre></div><h2 id="configuration">Configuration</h2>
-<p>The DNS server can be configured to match your usecase using the <code>DNS_ADDRESS</code> environment variable.</p>
-<p>To bind the server to <code>127.0.0.1</code>, you can set:</p>
-<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span>127.0.0.1
-</span></span></code></pre></div><p>You can disable the DNS server (which will prevent LocalStack from binding port 53) using:</p>
+<p>All versions of LocalStack include a DNS server that resolves the domain name <code>localhost.localstack.cloud</code> to the LocalStack container.
+This enables seamless connectivity from your container to LocalStack, or from created compute resources like Lambda, ECS or EC2 to LocalStack.
+In addition, LocalStack Pro supports transparent execution mode, which means that your application code automatically accesses the LocalStack APIs as opposed to the real APIs on AWS.</p>
+<p>When the system starts up, the log output contains the IP address of the local DNS server.
+If port 53 can be bound on the host, the LocalStack CLI will publish port 53 from the container to the host on IP address <code>127.0.0.1</code>.
+Otherwise it will not publish port 53 to the host.
+Regardless of whether the port can be bound or not, the DNS server is bound to address <code>0.0.0.0</code> of the LocalStack container so other containers within the same docker network can use the DNS server.
+See the <a href="/references/network-troubleshooting/endpoint-url/#from-your-container">Network Troubleshooting guide</a> for more details.</p>
+<h2 id="configuration">Configuration</h2>
+<p>If you experience problems when running LocalStack and the DNS server is the issue, you can disable the DNS server using:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_ADDRESS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#0000cf;font-weight:bold">0</span>
-</span></span></code></pre></div><p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
+</span></span></code></pre></div>
+<div class="alert alert-warning" role="alert">
+<h4 class="alert-heading">Warning</h4>
+We do not recommend this configuration since this disables resolving <code>localhost.localstack.cloud</code> to the LocalStack container.
+</div>
+<p>You can also specify which exact URLs should be redirected to LocalStack by defining a hostname regex like:</p>
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"><code class="language-bash" data-lang="bash"><span style="display:flex;"><span><span style="color:#000">DNS_LOCAL_NAME_PATTERNS</span><span style="color:#ce5c00;font-weight:bold">=</span><span style="color:#4e9a06">'.*(ecr|lambda).*.amazonaws.com'</span>
</span></span></code></pre></div><p>Using this configuration, the LocalStack DNS server only redirects ECR and Lambda domains to LocalStack, and the rest will be resolved via <code>$DNS_SERVER</code>. This can be used for hybrid setups, where certain API calls (e.g., ECR, Lambda) target LocalStack, whereas other services will target real AWS.</p>
<div class="alert alert-warning" role="alert">
@@ -331,6 +338,10 @@ LocalStack will not store or share any forwarded DNS requests, except maybe in t
<p>If you rely on your local network’s DNS, your router/DNS server might block requests due to the DNS Rebind Protection.
This feature is enabled by default in pfSense, OPNSense, OpenWRT, AVM FritzBox, and potentially also other devices.
Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (like OpenWRT).</p>
+<div class="alert alert-primary" role="alert">
+<h4 class="alert-heading">Note</h4>
+If you are using the LocalStack DNS server, DNS rebind protection should not cause any issues.
+</div>
<p>You can check if your DNS setup works correctly by resolving a subdomain of <code>localhost.localstack.cloud</code>:
<div class="highlight"><pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;display:grid;"><code class="language-text" data-lang="text"><span style="display:flex;"><span><span class="command-prefix">$ </span>dig test.localhost.localstack.cloud
</span></span><span style="display:flex;"><span>
@@ -354,7 +365,7 @@ Some of the vendors might allow upstream responses in the 127.0.0.0/8 range (lik
</span></span><span style="display:flex;"><span>;; WHEN: Fr Jän 14 11:23:12 CET 2022
</span></span><span style="display:flex;"><span>;; MSG SIZE rcvd: 90</span></span></code></pre></div>
</p>
-<p>If the the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
+<p>If the DNS resolves the subdomain to your localhost (127.0.0.1), your setup is working.
If not, please check the configuration of your router / DNS if the Rebind Protection is active or <a href="/user-guide/tools/transparent-endpoint-injection/dns-server/#system-dns-configuration">enable the LocalStack DNS on your system</a>.</p>
<h2 id="customizing-internal-endpoint-resolution">Customizing internal endpoint resolution</h2>
<p>The DNS name <code>localhost.localstack.cloud</code> (and any subdomains like <code>mybucket.s3.localhost.localstack.cloud</code>) is used internally in LocalStack to route requests, e.g., between a Lambda container and the LocalStack APIs.</p>
diff --git a/getting-started/faq/index.html b/getting-started/faq/index.html
index 7582cb0015..1fed9836d8 100644
--- a/getting-started/faq/index.html
+++ b/getting-started/faq/index.html
@@ -1,7 +1,7 @@
Frequently Asked Questions | Docs
My application cannot reach LocalStack over the network
\ No newline at end of file
diff --git a/references/network-troubleshooting/created-resources/index.html b/references/network-troubleshooting/created-resources/index.html
index 8b8172f956..5110e6c3cc 100644
--- a/references/network-troubleshooting/created-resources/index.html
+++ b/references/network-troubleshooting/created-resources/index.html
@@ -279,7 +279,10 @@
If you have created a resource using LocalStack, such as an OpenSearch cluster or RDS database, you may need to access it from your application. Typically, these resources are accessible through a URL or a hostname provided by LocalStack. While the environment variable HOSTNAME_EXTERNAL can often control the returned hostname, this approach may only work for some cases. This guide will explore different scenarios and provide detailed instructions on accessing resources created by LocalStack under different scenarios.
Note
An additional environment variable is available: LOCALSTACK_HOSTNAME. It is primarily used for communication within LocalStack and should not be used. We are currently working on streamlining the configuration under different scenarios.
From your host
For example, suppose you have created an OpenSearch cluster using LocalStack and want to access it from the same computer. In such a case, you can set the HOSTNAME_EXTERNAL environment variable to specify the desired hostname that will be returned. Check out the service-specific documentation for more details.
The Lambda service in LocalStack also supports the HOSTNAME_FROM_LAMBDA environment variable, which can be handy if LocalStack is reachable through a specific hostname. Suppose you’re running LocalStack in a user-defined network using Docker, where the LocalStack container can be accessed from other containers in the network using its service name. In that case, you can set the HOSTNAME_FROM_LAMBDA environment variable to this value to help resolve any issues with lambda functions accessing resources created by LocalStack.
If you have created a resource using LocalStack, such as an OpenSearch cluster or RDS database, you may need to access it from your application. Typically, these resources are accessible through a URL or a hostname provided by LocalStack. While the environment variable HOSTNAME_EXTERNAL can often control the returned hostname, this approach may only work for some cases. This guide will explore different scenarios and provide detailed instructions on accessing resources created by LocalStack under different scenarios.
Note
An additional environment variable is available: LOCALSTACK_HOSTNAME. It is primarily used for communication within LocalStack and should not be used. We are currently working on streamlining the configuration under different scenarios.
From your host
For example, suppose you have created an OpenSearch cluster using LocalStack and want to access it from the same computer. In such a case, you can set the HOSTNAME_EXTERNAL environment variable to specify the desired hostname that will be returned. Check out the service-specific documentation for more details.
For LocalStack versions before 2.3.0
+The Lambda service in LocalStack also supports the HOSTNAME_FROM_LAMBDA environment variable, which can be handy if LocalStack is reachable through a specific hostname.
+Suppose you're running LocalStack in a user-defined network using Docker, where the LocalStack container can be accessed from other containers in the network using its service name.
+In that case, you can set the HOSTNAME_FROM_LAMBDA environment variable to this value to help resolve any issues with lambda functions accessing resources created by LocalStack.