Quick Tip!
New! Cloudways Autonomous - Kubernetes Powered Fully Managed WordPress Hosting with built-in autoscaling.
Cloudways has partnered with Elastic Email to help you maximize email deliverability for your applications. This guide will walk you through activating the Elastic Email add-on, verifying your domain(s), testing your SMTP configuration, and downloading logs.
Important
Binding Elastic email to your server & Verifying your domain is mandatory. Without proper domain verification, emails sent via Elastic Email will not work. Make sure you follow all steps, including adding and verifying the required DNS records.
Table of Contents
Prerequisites
You must have at least one active server on Cloudways. If you don’t have one yet, launch a new server before proceeding.
Decide which domain(s) you will use to send emails. You’ll need to verify each domain by adding the required DNS records in your Domain Registrar or DNS hosting service.
Note: You can follow this article for step-by-step instructions on how to activate Elastic Email add-on. Alternatively, you can also review this video tutorial:
Activate the Elastic Email Add-on
Log In to your Cloudways Platform using your email address and password.
From the top menu bar, click Grid > Add-ons.
In the Add-ons list, locate Elastic Email and click on it.
4. Select a Package based on your monthly email volume requirements.
5. Click Subscribe to activate the plan.
Tip: If you’re new to Elastic Email, it’s usually best to start with a lower email package and then upgrade as your needs grow.
Bind Elastic Email to Your Server
Once you subscribe to an Elastic Email package, you need to connect it (“bind” it) to the Cloudways server(s) from which you’ll be sending emails.
From the top menu bar, go to Servers.
Click the desired server where you want to configure Elastic Email SMTP.
Under Server Management, click SMTP.
Select Elastic Email in the dropdown.
Click Enable.
Note:
You can bind one Elastic Email package to multiple servers.
Once enabled at the server level, you do not need to enable it separately for each application on that server.
How to Verify Your Domain
Domain verification proves you own the domain and authorizes Elastic Email to send emails on your behalf. All relevant DNS records must be added and propagated before verification can succeed.
You will need to add or update the following DNS records at your Domain Registrar or DNS hosting provider. The exact steps for adding DNS records vary depending on your provider, but the required record types and values are the same.
Tip
Domain Registrar is a company from where you purchased your domain, while the DNS records can be hosted at the same domain registrar or any third-party service.
1. SPF
SPF stands for “Sender Policy Framework”. SPF is an email authentication method. SPF helps servers authenticate that messages appearing to come from a specific domain are sent from servers authorized by the domain owner. It helps protect your domain from phishing and spoofing, and it also ensures that your messages are delivered correctly.
You will need the following information while pointing SPF record.
Type | TXT |
Name/Host/Alias | @ |
Value/Answer/Destination | v=spf1 a mx include:_spf.elasticemail.com ~all |
TTL | Automatic or the lowest allowed |
If you have subdomain(s), then you need to replace @ with the subdomain, e.g., support in the Name/Host/Alias field.
Type | TXT |
Name/Host/Alias | subdomain |
Value/Answer/Destination | v=spf1 a mx include:_spf.elasticemail.com ~all |
TTL | Automatic or the lowest allowed |
Tip
Some DNS registrars may not accept “@” as Host; thus, you can leave the Host field blank. If that does not work, you can enter your domain name in the Host field.
Please note that there can only be one SPF record per domain, so if there is an existing record, add “include:_spf.elasticemail.com” at the end of that record. For instance, if your domain already has the SPF record for Rackspace mail add-on as “v=spf1 a mx include:emailsrvr.com ~all”, then it should look like “v=spf1 a mx include:emailsrvr.com include:_spf.elasticemail.com ~all” after updating. Similarly, if you have an SPF record for Gsuite, the record should look like “v=spf1 a mx include:_spf.google.com include:_spf.elasticemail.com ~all”.
2. DKIM
DKIM stands for “DomainKeys Identified Mail”. It is also an email authentication method that adds a digital signature to every message. In addition, DKIM allows receiving servers to confirm that the domain’s owners have authorized mail coming from a domain and that these messages aren’t altered during transit.
You will need the following information while pointing DKIM record.
Type | TXT |
Name/Host/Alias | api._domainkey |
Value/Answer/Destination | k=rsa;t=s;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbmGbQMzYeMvxwtNQoXN0waGYaciuKx8mtMh5czguT4EZlJXuCt6V+l56mmt3t68FEX5JJ0q4ijG71BGoFRkl87uJi7LrQt1ZZmZCvrEII0YO4mp8sDLXC8g1aUAoi8TJgxq2MJqCaMyj5kAm3Fdy2tzftPCV/lbdiJqmBnWKjtwIDAQAB |
TTL | Automatic or the lowest allowed |
If you have subdomain(s), then you need to add your subdomain, e.g., support at the end of api._domainkey in the Name/Host/Alias field, so it will look like api._domainkey.support.
Type | TXT |
Name/Host/Alias | api._domainkey.subdomain |
Value/Answer/Destination | k=rsa;t=s;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbmGbQMzYeMvxwtNQoXN0waGYaciuKx8mtMh5czguT4EZlJXuCt6V+l56mmt3t68FEX5JJ0q4ijG71BGoFRkl87uJi7LrQt1ZZmZCvrEII0YO4mp8sDLXC8g1aUAoi8TJgxq2MJqCaMyj5kAm3Fdy2tzftPCV/lbdiJqmBnWKjtwIDAQAB |
TTL | Automatic or the lowest allowed |
Tip
Some DNS registrar may not accept “api._domainkey” as Host; thus, you can enter “api._domainkey.mydomain.com”, replacing my domain with your actual domain.
3. Tracking
Elastic Email “tracks” opens, clicks, unsubscribes, etc. You need to rewrite links and use web pages. Configuring a “tracking domain” brands these rewritten links and pages with your own domain.
You will need the following information while pointing tracking record.
Type | CNAME |
Name/Host/Alias | tracking |
Value/Answer/Destination | api.elasticemail.com |
TTL | Automatic or the lowest allowed |
If you have subdomain(s), then you need to add your subdomain, e.g., support at the end of tracking in the Name/Host/Alias field, so it will look like tracking.support.
Type | CNAME |
Name/Host/Alias | tracking.subdomain |
Value/Answer/Destination | api.elasticemail.com |
TTL | Automatic or the lowest allowed |
Tip
If your DNS registrar automatically adds your domain name after the tracking value, e.g., “api.elasticemail.com.mydomain.com”. To avoid this from happening, add a period “.” at the end of your tracking record value, e.g., “api.elasticemail.com.”.
If you are using Cloudflare to manage your DNS records, please note that you must disable the orange proxy icon while pointing the tracking record.
4. MX
MX record stands for “Mail Exchange Records”. It specifies a mail server responsible for accepting emails addressed to your domain. In other words, MX records tell which mail servers accept incoming emails for your domain and where emails should be routed if addressed to your domain. Therefore, you need to have the correct MX records to receive emails.
Most users have mailboxes (e.g., “[email protected]”) configured to receive emails; therefore, if you have a mailbox from any third-party service, e.g., Rackspace, Gsuite, etc., you have MX records already configured with it; thus, you don’t need to point any additional records, and you can move to the next and final DNS record. If you don’t have a Mailbox, you can use an inexpensive Rackspace Email Add-on on Cloudways Platform.
5. DMARC
DMARC stands for “DMARC is short for Domain-based Message Authentication, Reporting, and Conformance”. It is also an email authentication protocol that ensures the proper authentication of emails. SPF and DKIM are prerequisites of DMARC and must be implemented before setting up a DMARC policy.
A DMARC policy allows a sender to indicate that their emails are signed by SPF and DKIM and tells a receiver what to do if neither authentication methods pass, such as junk or bounce the email. Please note that the DMARC policy on your domain will affect all of your emails sent from that domain, not only the emails sent using Elastic Email; therefore, please ensure you are using the SPF and DKIM for all your email delivery.
Tip
If you are looking to set a custom DMARC policy, we strongly recommend using Elastic Email’s DMARC Generator – it will help you create DMARC records suited for your domain.
There are three different ways to point DMARC records based on your requirement.
Option 1 — Setup your DMARC policy with a simple, most common DMARC record. In this option, you will not receive any reports.
Type | TXT |
Name/Host/Alias | _dmarc |
Value/Answer/Destination | v=DMARC1; p=none; |
TTL | Automatic or the lowest allowed |
Option 2 — In this option, you will receive reports. The DMARC Reports will come to the email you specify in ruf= and rua= parameters.
Type | TXT |
Name/Host/Alias | _dmarc |
Value/Answer/Destination | v=DMARC1; p=none; ruf=mailto:[email protected]; rua=mailto:[email protected] |
TTL | Automatic or the lowest allowed |
When you no longer receive negative reports, change your DMARC policy from “p=none” to “p=quarantine”, which will not necessarily bounce email, but indicate to the recipient server they should consider quarantining it (junk or spam folder).
Option 3 — You will also receive reports with this option. When you are satisfied that you are validating all the emails from your domain(s) with SPF and DKIM, change the policy to reject, which will bounce the emails that do not pass SPF and DKIM validation.
Type | TXT |
Name/Host/Alias | _dmarc |
Value/Answer/Destination | v=DMARC1; p=reject; ruf=mailto:[email protected]; rua=mailto:[email protected] |
TTL | Automatic or the lowest allowed |
If you have subdomain(s), then you need to add your subdomain, e.g., support at the end of _dmarc in the Name/Host/Alias field, so it will look like _dmarc.support.
Type | TXT |
Name/Host/Alias | _dmarc.subdomain |
Value/Answer/Destination | v=DMARC1; p=none; |
TTL | Automatic or the lowest allowed |
Confirm Domain Verification on Cloudways
After configuring all the DNS records, it’s time to verify your domain on the Cloudways Platform using the following steps:
Return to the Add-ons section (where you activated Elastic Email).
Click Verify next to Elastic Email.
In the popup, enter your domain name and click Verify Domain.
Once verified, the record statuses will turn green.
If verification fails, wait for DNS propagation (which can take up to 24 hours) and then try again.
Note:
You can view all your verified domains or ones with missing records by clicking View Verified Domains.
Test Your SMTP Configuration
After you’ve activated the Elastic Email add-on, binded your server, and verified your domain, you can send a test email directly through Cloudways to ensure everything is set up correctly.
Go to Servers > [Your Server] > SMTP (where you enabled Elastic Email).
Click Send Test Email.
Enter the Sender address and Receiver address.
The Sender address should be a verified email/domain (i.e., one that has the verified Elastic Email DNS records in place).
Click Send Test Email.
If everything is correct, you should receive the test email in your inbox.
Tip:
If the email lands in spam, ensure you have correctly configured all SPF, DKIM, and Tracking records.
Download Elastic Email Logs
Elastic Email tracks each email’s journey (opened, clicked, unsubscribed, etc.). You can download these logs directly from the Cloudways Platform for insights into your email performance.
Go to Add-ons (same place you activated Elastic Email).
Click Logs under Elastic Email to download a .csv file containing the past 7 days of email activity.
Common statuses in the log include:
ReadyToSend: The email is in the delivery queue and waiting for its turn to be delivered.
WaitingToRetry: An email will be put into this status if a delivery attempt receives a “greylisting” response from the recipient server or a temporary connection issue.
Sent: If the email status is “Sent”, then the first-in-line recipient server has successfully accepted the email from Elastic Email. No additional information is yet known about the email.
Opened: Elastic Email embeds a 1×1 invisible image pixel in the BodyHTML of your emails. When a recipient opens an email, the image is downloaded. The downloading of the image informs Elastic Email of this activity. When this happens, the email is considered “Opened”. Only emails containing BodyHTML can be tracked for opens.
Clicked: If Click Tracking is enabled on your account, Elastic Email will rewrite the links in your emails. For example, when a recipient clicks a link, the user is briefly directed through Elastic Email and then onto the original target URL. When this happens, the email status will change to “Clicked”.
Unsubscribed: This status means that the recipient used this particular email to unsubscribe from your account.
Complaint: This status means that the recipient has either marked the email as spam in the email client or marked “I did not ask to receive this email” while unsubscribing.
Bounced: If an email has a Bounced Status, then it means that Elastic Email attempted to deliver the email but was unable to. There are very many reasons why this might occur.
Suppressed: If an email status is “Suppressed” it means that Elastic Email did not or was not able to make a delivery attempt. The most common reason for this is when an email is sent to a contact with a suppressed status.
Need More Help?
We hope this article has clarified the entire process of setting up the Elastic Email add-on, from activation and domain verification to testing and logs. If you have any further questions or issues:
Search the Cloudways Support Center for more help.
Reach out via Live Chat: Click Need a Hand? > Send us a Message on the Cloudways Platform.
Or create a support ticket.
Happy emailing with Cloudways and Elastic Email!
Use Cloudways' managed hosting servers to easily configure and use lightening-fast email delivery service for sending all important emails