Updated Frequent Questions (markdown)

Michael Stanclift 2022-04-15 22:52:51 -05:00
parent 2c657c5937
commit ded0523a0e

@ -8,6 +8,7 @@ Redundancy.
- The most attractive way for people to leverage Pi-hole is on a Raspberry Pi, which are not exactly "enterprise grade" systems, and usually have cheap SD cards that can burn out due to due to frequent write activity. - The most attractive way for people to leverage Pi-hole is on a Raspberry Pi, which are not exactly "enterprise grade" systems, and usually have cheap SD cards that can burn out due to due to frequent write activity.
- If you have your Pi-hole setup as the only DNS target, some devices will get annoyed and commonly will utilize hard coded backup servers, from public DNS resolvers which do not have any of the privacy protections afforded by Pi-hole. - If you have your Pi-hole setup as the only DNS target, some devices will get annoyed and commonly will utilize hard coded backup servers, from public DNS resolvers which do not have any of the privacy protections afforded by Pi-hole.
- In some cases people intentionally set those public resolvers as a backup entry in DHCP, thinking it'll only be used if Pi-hole isn't available, **which is not the case.** - In some cases people intentionally set those public resolvers as a backup entry in DHCP, thinking it'll only be used if Pi-hole isn't available, **which is not the case.**
- Home automation, smart TVs/speakers and other IOT devices are the most common offenders here. (In my own environment approximately 10% of queries happen against the second DNS resolver, but it frequently has a much higher blocking rate over the primary.)
### Do you merge the statistics and logs from each Pi-hole? ### Do you merge the statistics and logs from each Pi-hole?