Ultimate Pi-hole configuration guide, SSL certificates, automatic updates, automatic sync, more!

preview_player
Показать описание
Pi-hole is an awesome solution to run in your home network to keep your Internet free of ads, malicous traffic, and tracking data. Would you like to learn how to setup a Pi-hole instance in your home lab based on Docker? We take an in-depth look at setting up Pi-hole with Docker in the home lab, how to set up using the Docker run command line, Docker-compose, and then also Docker-compose with Traefik and Pi-hole.

My blog:

_____________________________________________________

Social Media:

LinkedIn:

Github:

Introduction to Pihole, with Docker, SSL certificates, and synchronization - 0:00
Pihole, DNS, and network level ad blocking improving Internet browsing at home - 0:59
What is Pihole? - 1:16
Intercepting DNS requests in your home network - 1:34
Overview of installing Pihole with Docker - 2:14
Using the Docker command line to install Pihole - 2:30
Going through the Docker run command to install Pi-hole - 2:45
Spinning up the Pihole container - 3:54
Issuing Docker ps to see the running Pihole container - 4:13
Browsing out to the web interface of our Pihole container - 4:35
Using Docker Compose to move to HTTPS and SSL certificates - 5:00
Stepping through the Docker Compose file - 5:38
Looking at the Pihole container configuration in Docker Compose - 6:31
Setting the names of the Pihole host in Docker Compose - 7:30
Running the Docker Compose file with Docker up -d - 8:11
Docker-compose ps to view state - 8:35
Browsing out to the Pihole container on the DNS name configured over HTTPS SSL - 8:50
Configuring proper SSL certificates on your Pi-hole container - 9:32
Using Traefik to pull proper SSL certificates - 9:52
Looking at Docker Compose to add Letsencrypt certificates and Cloudflare to pull proper SSL certificates - 10:06
Configuring TLS domains and wildcard certificates from Letsencrypt - 11:15
Entering your Cloudflare email address and API token - 11:47
Talking public DNS - 12:35
Adding a Watchtower container to automatically update your Pi-hole container - 12:47
Running docker-compose up -d - No certificate errors - 13:14
Running multiple Pihole instances for high availability - 13:38
Overview of Gravity sync from VMStan - 13:58
Configuring Gravity Sync - 14:33
Running Gravity sync - 15:00
Wrapping up thoughts on Pi-hole ultimate configuration guide - 16:03

pfSense pfBlockerNG vs Pihole Pros and Cons:

Pihole Local DNS Records synchronized from Active Directory:

How to install Pihole on Hyper-V with Debian:
Рекомендации по теме
Комментарии
Автор

I liked your teaching, because I'm Brazilian and new to English and your calm speaking helps me understand. Thank you very much

didoleu
Автор

GravitySync is really one part of a High Availability (HA) setup for PiHole.
The second part for a HA setup is to install keepalived on each PiHole and you have to create a configuration file where you specify a virtual IP address that is established between the two devices and you then use this virtual IP address as the DNS address in your DHCP scopes or manually entered on statically any configured devices instead of one or the other or both PiHole IPs.

When the primary PiHole is down for any reason, the secondary becomes the master and instantly picks up to continue serving as the network's DNS server and, because GravitySync is also synchronizing from the primary on a frequent basis, your adlists and other blocking config are already up to date.
When the primary comes back online, it resumes as the master and retakes control.

darrenoleary
Автор

Great video. Could you please write a small documentation with the scripts to all of the steps in the video? That would be very helpful to those of us that may make a typo and cause an error that we can't find. Thank you.

bobbydedman
Автор

Could you write down the script in video for us to follow? It is too hard to follow your steps in screen! thanks.

arioncheng
Автор

I'm not sure whether the SSL dropdown contains the same url, but when you're blurring the url make sure to also blur the dropdown when you click the certificate. Depending on whether you wanted to hide the domain or the uri. (You're showing the domain in the video)

alphaegen
Автор

This was a really good watch ! Awesome job.

JasonsLabVideos
Автор

Excellent video, best tutorial I have found on this.

mlxjiyf
Автор

I have recently started watching your videos and I find your content very unique. I'm amazed how your try to solve very specific and real world problems Ops/Admins face. Thank you for the amazing content.
I just have one suggestion. The audio is not very good. It would awesome if the audio quality is improved a bit. Better mics, acoustic panels would improve the audio quality manifold.
Thank you once again!

rohedam
Автор

I'll check this out now. Does this pihole container include unbound? Thanks for sharing. I love your content and format

rauldeandrade
Автор

Hello. I have been watching your videos for a while.

It could be more helpfull if you provide us a link with the code for the docker compose.

IronTrela
Автор

Thanks for the tutorial, where can we find the tutorial's documentation? The complete docker compose script. Thanks once again

azeemyusuf
Автор

Awesome video. Still trying to wrap my head around Traefik 😅

blevenzon
Автор

You mentioned your local DNS resolver but didn’t say what it was. Just curious what you’re using to resolve local DNS records on your network.

ThomasTomchak
Автор

can you add mobile devices/tv's into pi-hole to block ads on those devices

taranagnew
Автор

Out of interest, can you have two services request wildcard certificates on the same domain? I already have a similar configuration setup using AMCE on my firewall. I use that to give my firewall a certificate, and other services via haproxy. If I then set traefik up with a wildcard will that confuse everything?

CodeMonkeX
Автор

Thank you very much! This is an excellent explanation. Can you also include unbound in the mix, and do it in a Proxmox VM or LXC? That will be awesome!
Thanks again

nippurtech
Автор

Hi sir i hope you will answer me, opening porte 53 in cloud instance will invite unknown people to use my pihole dns as recursive dns so how i can secure my pihole without vpn allowing traffic just for specific mac addresses, i used iptables but it didn't work

ripaire
Автор

Is a copy of the docker compose file available somewhere?

JamesMyatt
Автор

When I try to login to pihole. I can oly logo to RaspAP. Can I run both?

Aesahaetr
Автор

Hi Brandon, can you share the scripts? I can't seem to locate them on your site.Thanks !

BrandonTan