Pihole is not working propperly after installing opendns

I'm running pihole and doh from cloudflare on my pi and installed openvpn yesterday and for some reasons the pihole stopped working (requests from my devices are not delivered to the pi hole and do not show up in the querly logs). I played a lot and now in the query log there are the requests of my devices, but with status unknown and replay N/A, so tried to fix this and now for some reasons pi hole shows:

DNS Service is not running, FTL not running.

sudo systemctl status pihole-FTL:

pihole-FTL.service - LSB: pihole-FTL daemon
   Loaded: loaded (/etc/init.d/pihole-FTL; generated; vendor preset: enabled)
   Active: active (exited) since Fri 2019-08-16 17:48:52 CEST; 18min ago
     Docs: man:systemd-sysv-generator(8)
  Process: 388 ExecStart=/etc/init.d/pihole-FTL start (code=exited, status=0/SUC
    Tasks: 0 (limit: 4915)
   CGroup: /system.slice/pihole-FTL.service

Aug 16 17:48:37 raspberrypi systemd[1]: Starting LSB: pihole-FTL daemon...
Aug 16 17:48:37 raspberrypi pihole-FTL[388]: Not running
Aug 16 17:48:50 raspberrypi su[973]: Successful su for pihole by root
Aug 16 17:48:50 raspberrypi su[973]: + ??? root:pihole
Aug 16 17:48:50 raspberrypi su[973]: pam_unix(su:session): session opened for us
Aug 16 17:48:52 raspberrypi pihole-FTL[388]: dnsmasq: illegal repeated keyword a
Aug 16 17:48:52 raspberrypi systemd[1]: Started LSB: pihole-FTL daemon.
netstat -tupln | grep :53

udp        0      0 0.0.0.0:5353            0.0.0.0:*                           401/avahi-daemon: r 
udp6       0      0 :::5353                 :::*                                401/avahi-daemon: r 

there was pihole-FTL listening on Port 53 now its gone.

/etc/dnsmasq.d/01-pihole-conf:

addn-hosts=/etc/pihole/gravity.list
addn-hosts=/etc/pihole/black.list
addn-hosts=/etc/pihole/local.list


localise-queries


no-resolv



cache-size=10000

log-queries
log-facility=/var/log/pihole.log

local-ttl=2

log-async

# If a DHCP client claims that its name is "wpad", ignore that.
# This fixes a security hole. see CERT Vulnerability VU#598349
dhcp-name-match=set:wpad-ignore,wpad
dhcp-ignore-names=tag:wpad-ignore
server=1.1.1.1
server=1.0.0.1
local-service

/etc/resolve.conf:

# Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8)
#     DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE OVERWRITTEN
nameserver 127.0.0.1
search 192.168.177.1

Pls help to fix that

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.