| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.caddy.settings | Structured configuration for Caddy to generate a Caddy JSON configuration file
|
| options/nixos/services.opencloud.settings | Additional YAML configuration for OpenCloud services
|
| options/home-manager/programs.streamlink.plugins | Streamlink plugins
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region | The AWS Region
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| options/nixos/services.komodo-periphery.extraSettings | Extra settings to add to the generated TOML config.
|
| options/nixos/services.athens.index.postgres.password | Password for the Postgres database
|
| options/nixos/services.athens.singleFlight.redis.password | Password for the redis server
|
| options/nixos/nixpkgs.localSystem | Systems with a recently generated hardware-configuration.nix
do not need to specify this option, unless cross-compiling, in which case
you should set only nixpkgs.buildPlatform
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.url | URL from which the targets are fetched.
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.project | The GCP Project.
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.max_backoff | Maximum retry delay.
|
| options/nixos/services.paperless.settings | Extra paperless config options
|
| options/nixos/services.send.environment | All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,
some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables
Values under services.send.environment will override the predefined values in the Send service.
- Time/duration should be in seconds
- Filesize values should be in bytes
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations | Declarative location config
|
| options/nixos/services.prometheus.scrapeConfigs.*.static_configs.*.targets | The targets specified by the target group.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.asterisk.useTheseDefaultConfFiles | Sets these config files to the default content
|
| options/nixos/services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| options/nixos/services.bcg.environmentFiles | File to load as environment file
|
| options/nixos/services.dashy.enable | Whether to enable Dashy, a highly customizable, easy to use, privacy-respecting dashboard app
|
| options/nixos/services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| options/home-manager/wayland.windowManager.sway.package | Sway package to use
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.min_backoff | Initial retry delay
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters | Filters can be used optionally to filter the instance list by other criteria.
|
| options/nixos/services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| options/nixos/services.jupyterhub.kernels | Declarative kernel config
Kernels can be declared in any language that supports and has
the required dependencies to communicate with a jupyter server
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| packages/nixpkgs/perl538Packages.ConfigTiny | Read/Write .ini style files with as little code as possible |
| packages/nixpkgs/perl540Packages.ConfigTiny | Read/Write .ini style files with as little code as possible |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| packages/nixpkgs/ggh | Recall your SSH sessions (also search your SSH config file) |
| packages/nixpkgs/perl540Packages.ConfigMVPReaderINI | MVP config reader for .ini files |
| packages/nixpkgs/perl538Packages.ConfigMVPReaderINI | MVP config reader for .ini files |
| options/nixos/services.cross-seed.useGenConfigDefaults | Whether to use the option defaults from the configuration generated by
cross-seed gen-config
|
| options/nixos/services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| options/nixos/services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter | Filter can be used optionally to filter the instance list by other
criteria Syntax of this filter string is described here in the filter
query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/home-manager/services.hypridle.importantPrefixes | List of prefix of attributes to source at the top of the config.
|
| options/home-manager/programs.hyprlock.importantPrefixes | List of prefix of attributes to source at the top of the config.
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.locations | Declarative location config
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint | Custom endpoint to be used.
|
| options/nixos/services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| packages/nixpkgs/perl540Packages.ConfigGeneral | Generic Config Module |
| packages/nixpkgs/perl538Packages.ConfigGeneral | Generic Config Module |
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/programs.nix-required-mounts.allowedPatterns | The hook config, describing which paths to mount for which system features
|
| options/nixos/services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs | List of Azure service discovery configurations.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs | List of Uyuni Serverset service discovery configurations.
|
| options/nixos/services.prometheus.scrapeConfigs.*.nerve_sd_configs | List of AirBnB's Nerve service discovery configurations.
|
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| options/nixos/services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| options/nixos/services.rathole.credentialsFile | Path to a TOML file to be merged with the settings
|
| options/nixos/services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| options/nixos/services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.file_sd_configs.*.files | Patterns for files from which target groups are extracted
|
| packages/nixpkgs/perl540Packages.ConfigGrammar | Grammar-based, user-friendly config parser |
| packages/nixpkgs/perl538Packages.ConfigGrammar | Grammar-based, user-friendly config parser |
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server | Address of the Kuma Control Plane's MADS xDS server.
|
| options/nixos/services.hadoop.hbase.regionServer.restartIfChanged | Restart regionServer con config change.
|
| options/nixos/services.glusterfs.killMode | The systemd KillMode to use for glusterd.
glusterd spawns other daemons like gsyncd
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values | Value of the filter.
|
| packages/nixpkgs/fast-ssh | TUI tool to use the SSH config for connections |
| options/nixos/services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| options/nixos/services.nextcloud-spreed-signaling.stateDir | Directory used for state & config files.
|
| options/nixos/services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| options/nixos/services.kanidm.provision.autoRemove | Determines whether deleting an entity in this provisioning config should automatically
cause them to be removed from kanidm, too
|
| options/nixos/services.prometheus.scrapeConfigs.*.relabel_configs.*.action | Action to perform based on regex matching
|
| options/nixos/services.librespeed.settings | LibreSpeed configuration written as Nix expression
|
| options/nixos/services.k3s.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl
|
| options/nixos/services.spacecookie.settings | Settings for spacecookie
|
| options/nixos/services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.rke2.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/rke2/agent/etc/containerd/config.toml.tmpl
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.livekit.ingress.settings.rtc_config.port_range_end | End of UDP port range for WebRTC
|
| options/nixos/services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| options/nixos/services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| options/nixos/services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| options/nixos/services.quickwit.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.temporal.restartIfChanged | Automatically restart the service on config change
|
| options/nixos/services.saunafs.metalogger.settings | Contents of metalogger config file (see sfsmetalogger.cfg(5)).
|
| options/nixos/services.spark.worker.restartIfChanged | Automatically restart worker service on config change
|
| options/nixos/services.spark.master.restartIfChanged | Automatically restart master service on config change
|