Sorry guys, another Disk shortage issue. Getting slammed by this query:
newtab.0.1.168.192.in-addr.arpa from 192.1.1
Running Pi-hole on a RPI 3 w/Dietpi as OS..installed pi using dietpi software
Had issues w/my RPI and bought some new sd cards, 32g..sandisk.
Use teleport to restore...ever since, nothing but issues. On top of the disk shortage, cpu at 100% which im sure is a by product of the
root@DietPi:~# tail /var/log/pihole.log
May 3 15:29:36 dnsmasq[22694]: forwarded newtab to 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: query[HTTPS] newtab from 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: forwarded newtab to 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: query[HTTPS] newtab from 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: forwarded newtab to 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: query[HTTPS] newtab from 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: forwarded newtab to 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: query[A] newtab.0.1.168.192.in-addr.arpa from 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: forwarded newtab.0.1.168.192.in-addr.arpa to 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: query[HTTPS] newtab from 192.168.1.1
May 3 15:29:36 dnsmasq[22694]: forwarded newtab to 192.168.1.1
So this seems like it might be somekind of loop. Is the wan side of the router using pihole as its upstream resolver? Maybe something with conditional forwarding?
No, the wan interface does not show the .217 as the dns. The lan interface does....I also disabled conditional forwarding and restarted FTL....working good but eventually it will fail like above Should the WAN side have the pihole dns server listed?
Do you have any apple devices. This query type [HTTPS] seems to be used primarily by apple devices. I'm not really familiar with so the "newtab" portion is throwing me.
If the query is the same every time you have the issue it might be worth powering each device down one at a time to see if you can atleast isolate the client. I would also suggest a debug log / token for the devs to check the configuration.
root@DietPi:~# grep arpa /var/log/pihole.log | tail -n25
May 3 17:26:50 dnsmasq[40902]: query[PTR] 1.36.14.76.in-addr.arpa from 192.168.1.1
May 3 17:26:50 dnsmasq[40902]: query[PTR] 220.36.14.76.in-addr.arpa from 192.168.1.1
May 3 17:44:26 dnsmasq[40902]: query[SVCB] _dns.resolver.arpa from 192.168.1.170
May 3 17:44:26 dnsmasq[40902]: cached _dns.resolver.arpa is NXDOMAIN
May 3 17:51:06 dnsmasq[40902]: query[PTR] 1.36.14.76.in-addr.arpa from 192.168.1.1
May 3 17:51:06 dnsmasq[40902]: query[PTR] 220.36.14.76.in-addr.arpa from 192.168.1.1
May 3 18:03:07 dnsmasq[45990]: query[PTR] 100.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 100.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:03:07 dnsmasq[45990]: query[PTR] 108.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 108.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:03:07 dnsmasq[45990]: query[PTR] 168.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 168.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:03:07 dnsmasq[45990]: query[PTR] 159.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 159.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:03:07 dnsmasq[45990]: query[PTR] 217.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: config 217.1.168.192.in-addr.arpa is <PTR>
May 3 18:03:07 dnsmasq[45990]: query[PTR] 170.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 170.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:03:07 dnsmasq[45990]: query[PTR] 1.1.168.192.in-addr.arpa from 127.0.0.1
May 3 18:03:07 dnsmasq[45990]: forwarded 1.1.168.192.in-addr.arpa to 127.0.0.1#5335
May 3 18:14:16 dnsmasq[45990]: query[SVCB] _dns.resolver.arpa from 192.168.1.170
May 3 18:14:16 dnsmasq[45990]: forwarded _dns.resolver.arpa to 127.0.0.1#5335
May 3 18:14:16 dnsmasq[4
``5990]: reply _dns.resolver.arpa is NXDOMAIN
You have configured a DNS loop:
Your router (presumably) at 192.168.1.1 is using Pi-hole for DNS, and at the same time, your Pi-hole is using 192.168.1.1 as upstream DNS server.
Your debug log is empty, so I can't tell whether you've enabled Pi-hole's Conditional Forwarding or you've configured one of Pi-hole's upstream DNS servers to forward to your router.
To break the loop, you'd need to point either your router or Pi-hole to a different upstream.
Thxs for the reply...I am using unbound. Pihole upstream DNS is pointing to 127.0.0.1. I did have CF set and is currently disabled. My router is 192.168.1.1 and the LAN interface DNS is pointing to 192.168.1.217 (in 2 different places) which is the Pihole.Using router for DHCP. Resolv.conf points to 127
I am not sure what to change unless theres a misconfiguration somewhere but I rarely make any router changes and Ive been running pihole on this router for a few years now... thxs again
Well the IP to the server/web are fine...so ill just leave as is.Thanks for the link,
Pihole is running like a champ....and I havent done anything yet.