Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
virtualisation:pihole_lxc_container [2025/04/28 17:41] – [Table] dodenhoeftvirtualisation:pihole_lxc_container [2025/04/29 07:18] (current) – [Setup LXC Pi-hole virtualization] dodenhoeft
Line 12: Line 12:
 Pi-hole can be used to block unwanted content on network level before it even reaches your browser. This is accomplished by using pi-hole as the primary DNS in your network. Every device that uses the router for internet access will benefit from this. By default the adlist will update automatically every sunday. Some of the key features of pi-hole are: Pi-hole can be used to block unwanted content on network level before it even reaches your browser. This is accomplished by using pi-hole as the primary DNS in your network. Every device that uses the router for internet access will benefit from this. By default the adlist will update automatically every sunday. Some of the key features of pi-hole are:
  
-  *  +  * Protection from adds and trackers 
-  * Protection from adds and trackers +  * Displaying statistical data about clients on the dashboard 
-  * Displaying statistical data about clients on the dashboard +  * Use as DHCP server for your network 
-  * Use as DHCP server for your network +  * Whitelist/Blacklist feature (supports filtering via regex) 
-  * Whitelist/Blacklist feature (supports filtering via regex) +  * Management of clients and groups of clients 
-  * Management of clients and groups of clients +  * Adding custom adlists and mangement of those
-  * Adding custom adlists and mangement of those+
  
 For a complete documentation of the full feature set you can visit https://docs.pi-hole.net/. For a complete documentation of the full feature set you can visit https://docs.pi-hole.net/.
Line 32: Line 31:
 The configuration has been accomplished and verifed with the following software versions: The configuration has been accomplished and verifed with the following software versions:
  
-| Software version  | 4.9.0.102  +|Software version| 4.9.0.102| 
-| Alpine version    | 3.15.0     +|Alpine version| 3.15.0| 
-| Kernel version    | 5.15.147   |+|Kernel version| 5.15.147|
  
 We will not take any responsiblity or support whether this configuration will work with different versions. We will not take any responsiblity or support whether this configuration will work with different versions.