Just did a quick Google… There are some resources and tutorials online of people doing exactly that. Take a look!
Only thing you might need to change is the configuration for which port the pi-hole web server (UI) will be running on. Because octoprint already uses Port 80 by default, you might have to assign another port for the pi-hole service. (I believe it also defaults to 80. That would crash because it can’t bind to the same port). That should be a pretty simple config change though.
I had it setup using docker at the time. Both pihole and octoprint as individual containers…
But I assume you should be able to just install and run the package locally on the octopi distro.
Out of the box, pihole has a few block lists already set up. Those are pretty good already.
To add more, you can find some good block list collections online. No need to add them all. Pick a good handful, depending on the category of stuff you want to block. Here are some helpful links:
https://github.com/lightswitch05/hosts
… Once you got a few block lists set up, you’ll probably want to whitelist some things specifically, that are otherwise caught up in the filter. This is a super helpful resource for that:
https://discourse.pi-hole.net/t/commonly-whitelisted-domains/212
Sure! If you’ve got that pi on all the time. I previously did that and it worked well. My current setup is multiple pi’s though, cause the octo pi is switched off with the printer now…
Also using this on the go through VPN
Pi Hole with a few good block lists…
Posteo.de - 100% renewable energy. Full industry standard encryption. No tracking, no adds. Annual transparency report. Supporting social and environmental efforts. Great treatment of their employees.
Python! Although I’ve been recently working on a bigger frontend project in TypeScript and I’ve grown to like it… Wouldn’t use them for all the same purposes though. Right tool for the job and so on…
Wait, I am confused…
Block the user… It’s the easiest way to get rid of it