log-api.newrelic.com

Please follow the below template, it will help us to help you!

Running the following Pi-Hole environment & Unbound. Everything is working great over the last several weeks and then as of 04Feb2026, in the Query Log, “log-api.newrelic.com“ is being blocked, but it has already become #2 on the “Top Blocked Domains“. Did a search and found “
Search Assist

Log-api.newrelic.com is the endpoint used by New Relic for sending log data from applications to their monitoring and analytics platform. This allows users to track and analyze logs in real-time for better performance insights.“. Additional search trying to find what software / systems use this, comes up with the following (excerpt):

Cloud Services

  • AWS, Azure, and Google Cloud: These platforms often have integrations that allow logs from cloud services to be sent to New Relic for analysis.
CPU: 3.5% on 4 cores running 313 processes (3.2% used by FTL)
RAM: 53.0% of 416.1 MB is used (19.1% used by FTL)
Swap: 42.6% of 416.0 MB is used
Kernel: Linux PI-HOLE-99 6.12.62+rpt-rpi-v8 #1 SMP PREEMPT Debian 1:6.12.62-1+rpt1 (2025-12-18) aarch64
Uptime: a month (running since Tuesday, January 6th 2026, 20:47:13)
FTL: PID 159192, last restart was on Wednesday, February 4th 2026, 06:10:05

QUESTION(s): I have not seen this before in any Pi-Hole threads, etc. In addition, no additional software and/or “Cloud Services” items have been added to any devices on the network? Not worried that it is being blocked, but the number of entries in the Query Log is concerning…..any feedback / advise would be greatly appreciated.

Ehh…

Click on it and you will see which Client is sending the DNS Query the whole time ?!

My guess is some app on your phone that is using it after it’s latest update sadly…

Thank you for the response.

However, I have Raspberry Pi / pi-hole on is own VLAN network and all entries in the Query Log only provide Host address / Gateway IP (i.e: XX.XX.XX.1).

But thank you very much for the response.

Thank you for the great response. I am using Ubiquiti **USG 3P (**USG 3P 4.4.57) for my main router / security gateway (the ISP gateway is in Pass thru / Bridge mode) and am only using DNS (pointing to Pi-Hole) as my primary DNS server (also pointing the another Pi-Hole as my secondary DNS - which is defined as a secondary Pi-Hole sync’d with Nebula). However, under the Network settings for the DNS VLAN where both the Pi-Hole’s reside, I am using Unifi’s DHCP as the DHCP server for that VLAN starting with XX.XX.XX.6 (which is the static IP address of the 1st Pi-Hole instance.
My Network is micro-segmented, isolating my IoT devices, Guest, DNS, & Default, with FW rules between them, etc….

I am not that well versed on how to “Use Pi-hole as your network DHCP server“ in conjunction with keeping existing VLANS in place (….Mongo only know where Choo Choo Go…)….do you have step by step instructions and/or and link explaining to to implement Pi-Hole as the DHCP server and keeping my network segmented (I am not Bullwinkle aka Mr. Know-It-All and LOVE learning new things all the time.

Thank you very much in advance.

Regards,

NotTheMama

ok I found this but I am not that advanced and need to find some specific examples maybe….

To keep your UniFi network micro-segmented while using Pi-hole for DHCP, configure each VLAN to use Pi-hole as the DNS server and ensure that DHCP is managed by UniFi. This setup allows you to maintain isolation between different segments while still benefiting from Pi-hole's ad-blocking capabilities.

mzonline.com discourse.pi-hole.net

Micro-Segmentation with UniFi and Pi-hole

Micro-segmentation enhances network security by isolating different segments, such as IoT devices, from the main network. Using Pi-hole for DHCP can help manage DNS requests effectively across these segments.

Setting Up VLANs

  1. Create VLANs: In your UniFi controller, set up separate VLANs for different device types (e.g., IoT, guest, corporate).

  2. Assign VLAN IDs: Each VLAN should have a unique ID. For example:

    • IoT VLAN: ID 80

    • Guest VLAN: ID 90

    • Corporate VLAN: ID 100

Configuring Pi-hole as DHCP Server

  1. Enable DHCP on Pi-hole: In the Pi-hole settings, enable the DHCP server feature.

  2. Set DHCP Ranges: Define IP address ranges for each VLAN. Ensure that the ranges do not overlap.

  3. Point DNS to Pi-hole: In the UniFi controller, set the DNS server for each VLAN to the Pi-hole's IP address.

Firewall Rules

  1. Create Firewall Rules: Implement rules to restrict traffic between VLANs. For example, allow only specific traffic from the IoT VLAN to the corporate VLAN if necessary.

  2. Test Connectivity: Ensure devices in different VLANs can only communicate as intended. Use tools like ping or traceroute to verify.

Managing DNS Requests

  • Custom DNS Records: For better management, consider adding custom DNS records in Pi-hole for devices in each VLAN. This helps in identifying devices easily.

  • Monitor Traffic: Use the Pi-hole dashboard to monitor DNS queries and ensure that requests are being filtered correctly.

By following these steps, you can effectively micro-segment your UniFi network while utilizing Pi-hole for DHCP and DNS management.

mzonline.com discourse.pi-hole.net

Explore More

What are the steps to configure VLANs with Pi-hole and UniFi?

To configure VLANs with Pi-hole and UniFi, set up your UniFi controller to manage DHCP for each VLAN, using the Pi-hole's IP address as the DNS server. Then, ensure that Pi-hole is configured to handle DNS requests from all VLANs, and consider enabling Conditional Forwarding for hostname resolution.

Like the part about:

Firewall Rules

  1. Create Firewall Rules: Implement rules to restrict traffic between VLANs. For example, allow only specific traffic from the IoT VLAN to the corporate VLAN if necessary.

I already have FW rules established between the VLANS in Unifi…..maybe I am over thinking this….or maybe if I don’t have some specific examples to compare against…..I just don’t start experimenting on the home network without understanding the specifics….since “THE BOSS” will have my….well lets keep this rated PG only….. :wink: LOL

In addition, making an assumption, in Pi-Hole, I should set the same DNCP ranges for each VLAN currently setup in the UniFi security gateway (router). Also, assuming then Pi-Hole to manage the DCHP ranges now and the FW rules already established in the Unifi router / gateway will still manage the traffic / restrictions between the VLANS….sorry to be so verbose, but the SAPPORO is ice cold :wink: ….

next detail questions regarding:

Configuring Pi-hole as DHCP Server

  1. Enable DHCP on Pi-hole: In the Pi-hole settings, enable the DHCP server feature.

  2. Set DHCP Ranges: Define IP address ranges for each VLAN. Ensure that the ranges do not overlap.

how do I enter each VLANS DHCP range based on the above screenshot….will it let me add multiple VLANS? Any advise / feedback would be greatly appreciate…..thank you in advance…

I am to assume that I do each VLAN DHCP ranges one at a time….adding the first VLAN DNCP range…. “APPLY”, then repeat the above for each VLAN and associates DHCP range(s)….I think I will wait to morning when “The Boss” is still asleep :wink:

Dude…

Time to replace that thing !!!

It has been declared EOL firmware updates wise for a couple of years now !!
New versions of the UniFi Controller also don’t support it anymore !!

I replaced mine with OPNsense running on a TopTon Mini PC and never looked back :wink:

Why would you do all this when there is absolutely no need to do so ?!

You probably had the Pi-Hole IP Address entered in the WAN configuration part of your UniFi Controller and should move it to the LAN configuration part of the VLANs you are using.

If you want Pi-Hole to be active in all your VLANs as DNS Server you can just create VLAN Interfaces in Debian via NetworkManager or SystemD and FTLDNS will automatically bind to them by default.

Another option is to have a seperate “Servers VLAN” and setup the right Firewall Rules from all your VLANs to access Pi-Hole as the DNS Server only.

That’s pretty much it… :wink:

I don’t want to do all of this. I am no expert and they were meant to show what I found online (as possible suggestions to you guys….the SME(s)).

I just recent came across DNS Sinkhole concept by watch this person:

https://www.youtube.com/watch?v=RoKi4-MCLRw“

and following his worksheet:

RPi + Pi-hole + Unbound (optional) Worksheet — Dad, the Engineer

that is why I configured DNS (via the WAN1 setting) to point directly to the pi-hole DNS IP addresses (which is on its .

But the more I research, I found this:

There is no need to do that !!

That option is meant for DHCP Relay and is something you will probably never need :wink:

Those two things have nothing to do with each other !!

How is your networking configured right now in your Raspberry Pi OS a.k.a. RaspBian which is based on Debian ?

There are some examples shown here : https://www.baeldung.com/linux/vlans-create
It’s not the whole story but it will give you an idea about what needs to be done :wink:

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.