| options/nixos/services.mastodon.sidekiqPort | TCP port used by the mastodon-sidekiq service.
|
| options/nixos/services.uptermd.openFirewall | Whether to open the firewall for the port in services.uptermd.port.
|
| options/nixos/services.zitadel.openFirewall | Whether to open the port specified in listenPort in the firewall.
|
| options/nixos/services.xonotic.openFirewall | Open the firewall for TCP and UDP on the specified port.
|
| options/nixos/services.zammad.websocketPort | Websocket service port.
|
| options/nixos/services.netdata.enableAnalyticsReporting | Enable reporting of anonymous usage statistics to Netdata Inc. via either
Google Analytics (in versions prior to 1.29.4), or Netdata Inc.'s
self-hosted PostHog (in versions 1.29.4 and later)
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/nixos/services.prometheus.exporters.rtl_433.ids.*.location | Location to match.
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.prometheus.exporters.apcupsd.apcupsdNetwork | Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
|
| options/darwin/system.defaults.iCal."TimeZone support enabled" | Turn on time zone support
|
| options/nixos/services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| options/nixos/services.freeciv.openFirewall | Whether to enable opening the firewall for the port listening for clients.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.extraFlags | Extra commandline options to pass to the buildkite-agent exporter.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| options/nixos/services.restic.server.listenAddress | Listen on a specific IP address and port or unix socket.
|
| options/nixos/services.prometheus.exporters.nvidia-gpu.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nvidia-gpu.openFirewall
is true
|
| options/darwin/services.privoxy.listenAddress | The address and TCP port on which privoxy will listen.
|
| options/nixos/services.prometheus.exporters.scaphandre.extraFlags | Extra commandline options to pass to the scaphandre exporter.
|
| options/nixos/services.prometheus.exporters.storagebox.extraFlags | Extra commandline options to pass to the storagebox exporter.
|
| options/nixos/services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| options/nixos/services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.listenAddress | Address to listen on.
|
| options/nixos/services.xserver.exportConfiguration | Whether to symlink the X server configuration under
/etc/X11/xorg.conf.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| options/nixos/services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| options/nixos/services.prometheus.exporters.restic.refreshInterval | Refresh interval for the metrics in seconds
|
| options/nixos/services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| options/nixos/services.etesync-dav.openFirewall | Whether to open the firewall for the specified port.
|
| options/nixos/services.prometheus.exporters.rtl_433.listenAddress | Address to listen on.
|
| options/nixos/hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.oldestUnseenDate | Enable metric with timestamp of oldest unseen mail
|
| options/nixos/services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| options/nixos/services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| options/nixos/services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| options/nixos/networking.nat.forwardPorts.*.sourcePort | Source port of the external interface; to specify a port range, use a string with a colon (e.g. "60000:61000")
|
| options/nixos/services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| options/nixos/services.tor.torsocks.fasterServer | IP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP
|
| options/nixos/services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.package | The prometheus-storagebox-exporter package to use.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.esphome.enableUnixSocket | Listen on a unix socket /run/esphome/esphome.sock instead of the TCP port.
|
| options/nixos/services.borgmatic.settings.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| options/nixos/services.immich-kiosk.openFirewall | Whether to open the firewall for the immich-kiosk port.
|
| options/nixos/services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| options/nixos/services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| options/nixos/services.prometheus.exporters.fritzbox.gatewayAddress | The hostname or IP of the FRITZ!Box.
|
| options/nixos/services.prometheus.exporters.smokeping.pingInterval | Interval between pings.
|
| options/nixos/services.netbird.server.signal.metricsPort | Internal port of the metrics server.
|
| options/nixos/services.prometheus.exporters.postfix.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postfix.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.libvirt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.libvirt.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.klipper.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.klipper.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.unbound.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unbound.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.bitcoin.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bitcoin.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.mongodb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mongodb.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.apcupsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.apcupsd.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.ecoflow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ecoflow.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.process.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.process.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.sabnzbd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sabnzbd.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.dnsmasq.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnsmasq.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.dovecot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dovecot.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.systemd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.systemd.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.varnish.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.varnish.openFirewall
is true
|
| options/nixos/services.jirafeau.nginxConfig.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.dnsdist.dnscrypt.listenPort | Listen port of the endpoint
|
| options/nixos/services.anki-sync-server.openFirewall | Whether to open the firewall for the specified port.
|
| options/nixos/services.orangefs.server.servers | URLs for storage server including port
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| options/darwin/launchd.agents.<name>.serviceConfig.StartCalendarInterval | This optional key causes the job to be started every calendar interval as specified
|
| options/nixos/services.prometheus.exporters.tailscale.listenAddress | Address to listen on.
|