At least one of your adlists (https://www.holistische-gesundheit.net/
) does not seem to be an adlist at all, and as such it would always prompt Pi-hole's failure message to download it, even if you can access that site from a browser.
You may want to remove that site from your adlists.
Your debug log shows that you are using 34 adlists referring to raw.githubusercontent.com
- those wouldn't be nearly enough to prompt a rate limit.
How do you suspect that domain triggering Pi-hole's rate limit?
I'm only aware of Pi-hole's rate limit warning to state the offending client. Stating a domain may not be of much use, as the request that triggers the rate limit could be for an arbitrary domain, not necessarily one that has been excessively requested.
Let's see which domains and clients got refused during the last 24 hours, and how many queries Pi-hole has processed in total:
pihole-FTL sqlite3 "/etc/pihole/pihole-FTL.db" "SELECT domain, count(domain), client FROM queries WHERE timestamp > strftime('%s','now','-1 day') AND reply_type=8 GROUP BY domain ORDER BY 2 DESC LIMIT 10;"
pihole-FTL sqlite3 "/etc/pihole/pihole-FTL.db" "SELECT count(*) FROM queries WHERE timestamp > strftime('%s','now','-1 day');"
It's also notable that the rate limit warning refers to your Pi-hole host machine's IPs, not its localhost addresses as would be common for gravity updates when your host uses 127.0.0.1 for DNS:
*** [ DIAGNOSING ]: contents of /var/log/pihole
-rw-r--r-- 1 pihole pihole 75K Feb 24 13:47 /var/log/pihole/FTL.log
-----head of FTL.log------
[2024-02-24 00:00:34.350 1928322M] Rate-limiting fd00::d990:ac87:441f:a285 for at least 36 seconds
[2024-02-24 00:00:34.400 1928322M] Rate-limiting 192.168.178.157 for at least 36 seconds
This would suggest that some other software made those DNS requests, or that they were routed differently.
Your debug log indeed shows you are running some additional software on the machine hosting your Pi-hole (I've picked the few processes that are most likely to have been manually added):
*** [ DIAGNOSING ]: Ports in use
udp:0.0.0.0:631 is in use by cups-browsed
udp:0.0.0.0:41641 is in use by tailscaled
tcp:0.0.0.0:8888 is in use by rpimonitord
Furthermore, you debug log shows your Pi-hole machine to use 100.100.100.100 for DNS:
*** [ DIAGNOSING ]: contents of /etc
-rw-r--r-- 1 root root 236 Feb 24 13:20 /etc/resolv.conf
nameserver 100.100.100.100
search tail3845f.ts.net fritz.box
That's the nameserver that all processes (apart from Pi-hole's DNS server) on your machine are using, including Pi-hole's update scripts.
That's a CGNAT range IP, neither public nor private, i.e. it is usually only accessible via a specific ISP, typically on mobile data plans.
Are you using such an ISP, or is that IP perhaps related to Tailscale's VPN service?
In any case, with the machine using that DNS server, I am actually surprised that you would observe DNS requests for raw.githubusercontent.com
from gravity updates registering in Pi-hole at all: Those requests should all have gone to the nameservers from your resolv.conf, i.e. to your 100.100.100.100.
And on a side note:
Pi-hole defaults to 1000 requests per minute per client, and that should be sufficient if your clients are talking to Pi-hole directly (which your debug log shows them to do).