<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa]]></title><description><![CDATA[<p dir="auto">Good Evening, and Sorry for the repeating topic.<br />
I am trying to control Pi-Hole on my Pi with Alexa Echo device. I have installed Triggercmd ( subscribed to it, to use commands more often.)on Windows 10  laptop . Can I enter a command (pihole_on_off.sh)that allows me to run the script on my Pi without installing triggercmd on Pi.<br />
Sorry again I am quite new in scripting.<br />
Thanks.<br />
<img src="/forum/assets/uploads/files/1650144675987-3375bc8a-325d-4f36-abaf-5c28e5d5dbfa-image.png" alt="3375bc8a-325d-4f36-abaf-5c28e5d5dbfa-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://www.triggercmd.com/forum/topic/2108/controlling-pi-hole-on-the-raspberry-pi-remotely-through-alexa</link><generator>RSS for Node</generator><lastBuildDate>Wed, 11 Mar 2026 01:34:15 GMT</lastBuildDate><atom:link href="https://www.triggercmd.com/forum/topic/2108.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 16 Apr 2022 21:33:15 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa on Sun, 29 May 2022 12:44:01 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://www.triggercmd.com/forum/uid/1">@russ</a> I added the password to pi-hole and generated the token from web API. New URL that appeared with that token has been added to the TriggerCMD. However, this still doesn't resolve the problem, I am receiving the same message with empty token. Can anyone help with the issue? Where to dig further? Thanks</p>
]]></description><link>https://www.triggercmd.com/forum/post/5908</link><guid isPermaLink="true">https://www.triggercmd.com/forum/post/5908</guid><dc:creator><![CDATA[Georgi_Sharkov]]></dc:creator><pubDate>Sun, 29 May 2022 12:44:01 GMT</pubDate></item><item><title><![CDATA[Reply to Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa on Fri, 27 May 2022 18:21:13 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://www.triggercmd.com/forum/uid/1">@russ</a> Thank you for the advice. I tried this command:<br />
<a href="http://192.168.8.102/admin/api.php?disable=300&amp;auth=" rel="nofollow ugc">http://192.168.8.102/admin/api.php?disable=300&amp;auth=</a><br />
(auth parameter doesn't have any hashed value as I don't have a password setup for Pihole)<br />
<img src="/forum/assets/uploads/files/1653675562143-16172f57-f3dd-4d8c-b96e-a125fd1357d8-image.png" alt="16172f57-f3dd-4d8c-b96e-a125fd1357d8-image.png" class=" img-fluid img-markdown" /><br />
It works just fine if I type it manually in the browser. When I add it to the CMD GUI window command, when I run it with the start command, it shows me the message:<br />
Empty token! Check if cookies are enabled on your system.<br />
All cookies are enabled in the browser. What could be the issue?<br />
Maybe this will help you- when I run the command, it appears in the browser without the last bit <img src="/forum/assets/uploads/files/1653675439002-335e47c7-655a-4fc3-84d4-421b473c7e44-image.png" alt="335e47c7-655a-4fc3-84d4-421b473c7e44-image.png" class=" img-fluid img-markdown" /><br />
I don't know, maybe I am doing something wrong as I am quite new in this field.</p>
]]></description><link>https://www.triggercmd.com/forum/post/5907</link><guid isPermaLink="true">https://www.triggercmd.com/forum/post/5907</guid><dc:creator><![CDATA[Georgi_Sharkov]]></dc:creator><pubDate>Fri, 27 May 2022 18:21:13 GMT</pubDate></item><item><title><![CDATA[Reply to Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa on Sat, 21 May 2022 21:00:10 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://www.triggercmd.com/forum/uid/14858">@georgi_sharkov</a>, you could use Chrome, press F12, find the request under the network tab, then copy the "Copy all as cURL (cmd)" option.</p>
<p dir="auto"><img src="/forum/assets/uploads/files/1653166721618-a4e9240c-0cb7-41bf-92d6-ac43abf74272-image.png" alt="a4e9240c-0cb7-41bf-92d6-ac43abf74272-image.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">That will give you the curl command, but if there's authentication in the request, it will likely expire after some time.</p>
]]></description><link>https://www.triggercmd.com/forum/post/5884</link><guid isPermaLink="true">https://www.triggercmd.com/forum/post/5884</guid><dc:creator><![CDATA[Russ]]></dc:creator><pubDate>Sat, 21 May 2022 21:00:10 GMT</pubDate></item><item><title><![CDATA[Reply to Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa on Sat, 21 May 2022 19:15:13 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://www.triggercmd.com/forum/uid/1">@russ</a> Thank you for the reply and apologies for the late reply from my side. Is it possible to run a curl command in the triggercmd that will be able to deactivate or activate the PiHole?PiHole is installed on the Pi4 and it is accessible through a browser with an internal IP address  like 192.168.8.102 from my PC. What will be the command to insert in the triggercmd command line in this case?</p>
]]></description><link>https://www.triggercmd.com/forum/post/5882</link><guid isPermaLink="true">https://www.triggercmd.com/forum/post/5882</guid><dc:creator><![CDATA[Georgi_Sharkov]]></dc:creator><pubDate>Sat, 21 May 2022 19:15:13 GMT</pubDate></item><item><title><![CDATA[Reply to Controlling  Pi-Hole on the Raspberry Pi remotely through Alexa on Mon, 18 Apr 2022 21:21:23 GMT]]></title><description><![CDATA[<p dir="auto"><a class="mention plugin-mentions-user plugin-mentions-a" href="https://www.triggercmd.com/forum/uid/14858">@georgi_sharkov</a>, yes, you can use ssh to run commands on your Raspberry Pi from your Windows 10 PC without installing a triggercmd agent on the Raspberry Pi.</p>
<p dir="auto">Install the OpenSSH client in Windows 10 by opening an elevated command prompt (right-click cmd and run as administrator) and running this command:</p>
<pre><code>dism /Online /Add-Capability /CapabilityName:OpenSSH.Client
</code></pre>
<p dir="auto">Then to generate a public/private key pair, run this from a normal cmd prompt, run this and press enter a few times.</p>
<pre><code>ssh-keygen
</code></pre>
<p dir="auto">You'll end up with a .ssh folder with an id_rsa file and an id_rsa.pub file.  The id_rsa is your private key, so keep that private.  The id_rsa.pub file contains text you need to copy into the authorized_keys file on your Raspberry Pi so you can ssh into the Pi without a password.</p>
<p dir="auto">Log into your Raspberry Pi as the pi user, or which ever user you use:</p>
<pre><code>ssh pi@garagepi
</code></pre>
<p dir="auto">At this point you'll still need to enter your password.</p>
<p dir="auto">Once logged in, edit your pi user's ~/.ssh/authorized_keys file, and append the contents of the id_rsa.pub file to the end of that authorized_keys file.  If it's empty that's fine.  Just paste the contents in and save it.</p>
<p dir="auto">Now logout, and run this command again:</p>
<pre><code>ssh pi@raspberrypi
</code></pre>
<p dir="auto">If it logs in without a password, you're golden.  Now you can run remote commands on the Raspberry Pi like this:</p>
<pre><code>ssh pi@raspberrypi ls
</code></pre>
<p dir="auto">In that case I ran the <strong>ls</strong> command on the Pi from my Windows box, but you could run any command including a script that enables or disables Pi Hole.  For example your <strong>Command</strong> and <strong>Off Command</strong> could be these:</p>
<pre><code>ssh pi@raspberrypi ~/pi_hole_on.sh
ssh pi@raspberrypi ~/pi_hole_off.sh
</code></pre>
]]></description><link>https://www.triggercmd.com/forum/post/5720</link><guid isPermaLink="true">https://www.triggercmd.com/forum/post/5720</guid><dc:creator><![CDATA[Russ]]></dc:creator><pubDate>Mon, 18 Apr 2022 21:21:23 GMT</pubDate></item></channel></rss>