jfb
February 27, 2019, 7:07pm
10
This guide I wrote and posted on Reddit. I had originally written it for a friend who started with zero Linux knowledge and wanted to set up a Pi-Hole from scratch. The guide gets you to a running Pi-Hole, and doesn't discuss how to do configuration and other details in Pi-Hole.
https://www.reddit.com/r/pihole/comments/9y9e9w/simple_guide_to_setting_up_a_pi_zero_w_and/
We have several FAQ's on this forum for configuring clients to use Pi-Hole:
Three methods
Generally, there are three different methods that will enable devices on your network to be protected by Pi-hole.
1. Define Pi-hole's IP address as the only DNS entry in the router
Rationale
Only is italicized here for a reason: Pi-hole needs to be the only DNS server because it intercepts queries and decides whether or not they should be blocked. If you have other DNS servers configured, you may be sent to the correct domain, bypassing Pi-hole completely.
Because of this, we re…
Reduced Ad Blocking Capability
The main reason you should Pi-hole as your only DNS server is that you will see increased performance in the blocking of ads.
If you have two DNS servers (Pi-hole and something else), your network clients may not always query Pi-hole for name resolution. If a query happens to be answered from a non-Pi-hole DNS server, your block lists will not apply (since that DNS server doesn't know about them).
All Queries Need To Go Through Pi-hole First
Since other DNS serv…
Please generate a debug log, upload it when prompted and post the token here. We can take a look at your Pi-Hole setup for any errors.
pihole -d
from the Linux terminal
or do it through the Web interface:
Login into your Pi-hole's command line
Enter sudo pihole -d
Provide us with the debug token that is generated after the debug script completes
Alternative: Securely sending us additional information
Preferred Method
If there is additional information you want to provide us, you can upload any kind of text to our server. You will still get a debug token so your information will remain anonymous.
To do this, you can pipe some shell output into netcat, which will upload it to our secure server . …