Regex entered into /etc/pihole/regex.list should be blocked accordingly.
Actual Behaviour:
Upon adding a wildcard block via terminal, i.e. pihole --wild example.com, this happens:
[i] Adding ((^)|(.))example.com$ to regex list...
[i] Using cached Event Horizon list...
[i] 855514 unique domains trapped in the Event Horizon
[i] Number of blacklisted domains: 0
[i] Number of regex filters: 0
[✓] Restarting DNS service
[✓] DNS service is running
[✓] Pi-hole blocking is Enabled
I've used these instructions to update from master branch though
echo "FTLDNS" | sudo tee /etc/pihole/ftlbranch
pihole checkout core FTLDNS
pihole checkout web FTLDNS
Hence I suspect I'm on the beta FTLDNS branch rather than Release 4.0.
Let's move you over to the Release 4.0 branch, which has had a lot of development recently. This includes all of the beta FTLDNS plus quite a bit more.
echo release/v4.0 | sudo tee /etc/pihole/ftlbranch
pihole checkout core release/v4.0
pihole checkout web release/v4.0
Still no luck, this is the output after executing pihole --wild example.com
[i] Adding ((^)|(\.))example\.com$ to regex list...
[i] Using cached Event Horizon list...
[i] 855756 unique domains trapped in the Event Horizon
[i] Number of blacklisted domains: 0
[i] Number of regex filters: 0
[✓] Restarting DNS service
[✓] DNS service is running
[✓] Pi-hole blocking is Enabled
After executing 'sudo service pihole-FTL restart', here are the results of dig example.com
Have you tried entering these command to the blacklist in the admin web interface, or was this only done through the pihole command line? If you haven't tried, please try to enter the "example" regex in the web api and report results.