| options/nixos/services.prometheus.exporters.bind.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.php-fpm.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.ebpf.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.mqtt.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.bird.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.snmp.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.ipmi.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.flow.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.mail.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.nats.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.knot.openFirewall | Open port in firewall for incoming connections.
|
| options/home-manager/programs.neomutt.unmailboxes | Set unmailboxes * at the start of account configurations
|
| options/home-manager/wayland.windowManager.sway.config.workspaceLayout | The mode in which new containers on workspace level will
start.
|
| options/home-manager/xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| options/nixos/xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| options/home-manager/targets.genericLinux.nixGL.offloadWrapper | The package wrapper function available for use as
(config.lib.nixGL.wrapOffload <package>)
|
| options/home-manager/targets.genericLinux.nixGL.defaultWrapper | The package wrapper function available for use as (config.lib.nixGL.wrap <package>)
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.host_info | Enable extended host info for this device. Warning: This will heavily increase scrape time.
|
| options/nixos/services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| options/nixos/services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| options/nixos/<imports = [ pkgs.php.services.default ]>.php-fpm.package | PHP package to use for php-fpm
|
| options/nixos/services.nifi.proxyPort | Allow requests from a specific port.
|
| options/nixos/services.rqbit.httpPort | The listen port for the HTTP API.
|
| options/nixos/services.youtrack.environmentalParameters.listen-port | The port YouTrack will listen on.
|
| options/nixos/services.postfix.transport | Entries for the transport map, cf. man-page transport(5).
|
| options/home-manager/programs.zellij.attachExistingSession | Whether to attach to the default session after being autostarted if a Zellij session already exists
|
| options/nixos/services.consul.webUi | Enables the web interface on the consul http port.
|
| options/nixos/services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| options/nixos/services.uptime-kuma.appriseSupport | Whether to enable apprise support for notifications.
|
| options/home-manager/programs.smug.projects.<name>.windows.*.selected | Whether this window should be selected by default at session start.
|
| options/nixos/services.shairport-sync.enable | Enable the shairport-sync daemon
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| options/nixos/programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| options/nixos/services.deconz.wsPort | TCP port for the WebSocket.
|
| options/nixos/services.thinkfan.smartSupport | Whether to build thinkfan with S
|
| options/nixos/services.ncps.server.addr | The address and port the server listens on.
|
| options/nixos/services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| options/nixos/services.prometheus.exporters.v2ray.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.nginx.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.dmarc.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.kafka.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.fritz.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.jitsi.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.idrac.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.redis.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.caddy.httpPort | The default port to listen on for HTTP traffic.
|
| options/nixos/services.radicle.httpd.nginx.reuseport | Create an individual listening socket
|
| options/home-manager/programs.quickshell.systemd.target | The systemd target that will automatically start quickshell
|
| options/nixos/services.moosefs.cgiserver.settings.PORT | Port for CGI server to listen on.
|
| options/home-manager/services.espanso.waylandSupport | Whether to enable wayland support on linux
|
| options/nixos/services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| options/nixos/services.taler.merchant.settings.merchant.PORT | Port on which the HTTP server listens.
|
| options/nixos/services.taler.exchange.settings.exchange.PORT | Port on which the HTTP server listens.
|
| options/nixos/services.shairport-sync.package | The shairport-sync package to use.
|
| options/nixos/services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| options/nixos/services.livekit.ingress.settings.redis.address | Address or hostname and port for redis connection
|
| options/nixos/services.pixiecore.statusPort | HTTP port for status information (can be the same as --port)
|
| options/nixos/services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| options/nixos/services.oauth2-proxy.httpAddress | HTTPS listening address
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| options/nixos/services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| options/nixos/services.firefly-iii-data-importer.user | User account under which firefly-iii-data-importer runs.
|
| options/nixos/swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| options/nixos/services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| options/nixos/systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| options/nixos/boot.zfs.forceImportRoot | Forcibly import the ZFS root pool(s) during early boot
|
| options/nixos/services.libeufin.bank.settings.libeufin-bank.PORT | The port on which libeufin-bank should listen.
|
| options/nixos/services.mediatomb.ps3Support | Whether to enable ps3 specific tweaks
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/virtualisation.bios | An alternate BIOS (such as qboot) with which to start the VM
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.enable | Whether to enable the prometheus exportarr-sonarr exporter.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.enable | Whether to enable the prometheus exportarr-radarr exporter.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.enable | Whether to enable the prometheus exportarr-lidarr exporter.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.enable | Whether to enable the prometheus exportarr-bazarr exporter.
|
| options/nixos/services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| options/nixos/hardware.facter.report | Hardware report data generated by nixos-facter
|
| options/nixos/services.prometheus.exporters.fastly.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.dnssec.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.mysqld.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.restic.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.tibber.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.deluge.openFirewall | Open port in firewall for incoming connections.
|