š Piāhole DNS¶
Piāhole is a lightweight DNS solution that provides networkāwide ad blocking and centralized DNS management. It is particularly useful in homelab environments where visibility, filtering, and integration with existing directory services are important.
āļø Installation¶
Installation is straightforward and documented in the Piāhole Basic Install Guide.
Manual Installation¶
wget -O basic-install.sh https://install.pi-hole.net
sudo bash basic-install.sh
- Recommended to install on a minimal VM or container for efficiency.
- Ensure the VM has a static IP address to avoid DNS resolution issues.
š¢ Integration with Active Directory¶
When Piāhole is used as the primary DNS server in an environment with Windows Active Directory (AD), it must be configured to forward ADāspecific queries to the domain controller. This is achieved using Conditional Forwarding.
Steps¶
- Open the Piāhole Admin UI.
- Navigate to Settings ā DNS.
- Scroll to Conditional Forwarding and enable the checkbox.
- Configure the following:
-
Local network field:
192.168.2.0/24 -
IP address of DHCP server:
192.168.2.253 -
Local domain name:
refol.us
-
Local network field:
ā This ensures Piāhole forwards AD domain queries (e.g.,
_ldap._tcp.refol.us) to the domain controller at192.168.2.251, while continuing to filter external queries.
š„ļø Admin Web Interface¶
The Piāhole admin dashboard provides query logs, statistics, and configuration options.
Access it via:
http://pi.hole/adminhttp://192.168.2.253/admin
š Consider enabling HTTPS or restricting access to trusted subnets for security.
š” Usage with TPāLink Omada¶
To integrate Piāhole with TPāLink Omada for centralized DNS management:
- Log in to the Omada Cloud Controller.
- Navigate to Settings ā Wired Networks ā LAN.
- Edit the Default network.
- Set DNS Server to Manual.
- Enter the following DNS servers:
192.168.2.253192.168.2.2518.8.8.8
š This ensures all LAN clients use Piāhole for DNS resolution, with redundancy across multiple Piāhole instances.
š ļø Troubleshooting Piāhole + AD Integration¶
Even with Conditional Forwarding enabled, issues can arise. Here are common pitfalls and resolutions:
1. Domain Join Failures¶
- Symptom: Windows clients cannot join the AD domain.
- Cause: Piāhole is not forwarding SRV records correctly.
-
Fix: Verify Conditional Forwarding is set to the AD DNS (
192.168.2.251).nslookup _ldap._tcp.refol.us 192.168.2.253
2. Kerberos Authentication Errors¶
- Symptom: Logon failures or GPOs not applying.
- Cause: Time skew or blocked SRV records.
- Fix: Ensure NTP is configured on the domain controller and Piāhole forwards AD queries.
3. DNS Loops¶
- Symptom: Queries fail or time out.
- Cause: Piāhole forwards to AD, but AD forwards back to Piāhole.
- Fix: Configure AD DNS forwarders to point upstream (e.g., Cloudflare, Google), not back to Piāhole.
4. Missing Client Hostnames in Piāhole Logs¶
- Symptom: Piāhole shows only IPs, not hostnames.
- Cause: Conditional Forwarding not configured with the DHCP server IP.
-
Fix: Ensure the DHCP server IP (
192.168.2.252) is entered in Piāholeās Conditional Forwarding settings.
5. Piāhole Blocking AD Queries¶
- Symptom: AD services intermittently fail.
-
Fix: Whitelist AD domain (
refol.us) and controller hostname in Piāhole.
š References¶