| options/nixos/services.vmagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config | Configures the queue used to write to remote storage.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.host.address | The address to forward to.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.remoteForwards.*.bind.address | The address to bind to.
|
| options/nixos/services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| options/nixos/services.prometheus.remoteRead.*.proxy_url | Optional Proxy URL.
|
| options/nixos/services.nullmailer.remotesFile | Path to the remotes control file
|
| options/nixos/services.prometheus.remoteWrite.*.proxy_url | Optional Proxy URL.
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.role_arn | The AWS role ARN.
|
| options/nixos/nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| packages/nixpkgs/coder | Provision remote development environments via Terraform |
| options/nixos/services.prometheus.remoteWrite.*.sigv4.access_key | The Access Key ID.
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.secret_key | The Secret Access Key.
|
| options/nixos/services.journald.remote.settings.Remote.ServerCertificateFile | A path to a SSL certificate file in PEM format
|
| options/nixos/services.prometheus.remoteRead.*.read_recent | Whether reads should be made for queries for time ranges that
the local storage should have complete data for.
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.capacity | Number of samples to buffer per shard before we block reading of more
samples from the WAL
|
| options/home-manager/services.muchsync.remotes | Muchsync remotes to synchronise with.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| packages/nixpkgs/flirc | Use any Remote with your Media Center |
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.prometheus.remoteWrite.*.metadata_config.send | Whether metric metadata is sent to remote storage or not.
|
| options/nixos/services.prometheus.remoteWrite.*.metadata_config | Configures the sending of series metadata to remote storage
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.journald.remote.settings.Remote.TrustedCertificateFile | A path to a SSL CA certificate file in PEM format, or all
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.password | HTTP password
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/darwin/networking.hostName | The hostname of your system, as visible from the command line and used by local and remote
networks when connecting through SSH and Remote Login
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/nix.sshServe.enable | Whether to enable serving the Nix store as a remote store via SSH.
|
| options/nixos/services.prometheus.remoteRead.*.required_matchers | An optional list of equality matchers which have to be
present in a selector to query the remote read endpoint.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token_file | Sets the Authorization header on every remote read request with the bearer token
read from the configured file
|
| packages/nixpkgs/xpipe | Cross-platform shell connection hub and remote file manager |
| options/nixos/services.prometheus.remoteWrite.*.bearer_token_file | Sets the Authorization header on every remote write request with the bearer token
read from the configured file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/services.rustdesk-server.enable | Whether to enable RustDesk, a remote access and remote control software, allowing maintenance of computers and other devices.
|
| packages/nixpkgs/usbfluxd | Redirects the standard usbmuxd socket to allow connections to local and remote usbmuxd instances so remote devices appear connected locally |
| packages/nixpkgs/apt-dater | Terminal-based remote package update manager |
| options/nixos/services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| packages/nixpkgs/todesk | Remote Desktop Application |
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.logLevel | Set the log-level
|
| options/nixos/hardware.sane.netConf | Network hosts that should be probed for remote scanners.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation | Certificate revocation policy for CRL or OCSP revocation.
- A
strict revocation policy fails if no revocation information is
available, i.e. the certificate is not known to be unrevoked.
ifuri fails only if a CRL/OCSP URI is available, but certificate
revocation checking fails, i.e. there should be revocation information
available, but it could not be obtained.
- The default revocation policy
relaxed fails only if a certificate is
revoked, i.e. it is explicitly known that it is bad
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.enable | Whether to enable this mount.
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.autoMount | Whether to enable automatic mounting.
|
| packages/nixpkgs/rmtfs | Qualcomm Remote Filesystem Service |
| options/nixos/services.prometheus.remoteWrite.*.queue_config.max_shards | Maximum number of shards, i.e. amount of concurrency.
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.min_shards | Minimum number of shards, i.e. amount of concurrency.
|
| options/nixos/services.prometheus.remoteWrite.*.metadata_config.send_interval | How frequently metric metadata is sent to remote storage.
|
| packages/nixpkgs/jetbrains.gateway | Remote development for JetBrains products |
| options/nixos/services.prometheus.remoteRead.*.basic_auth.password_file | HTTP password file
|
| options/home-manager/programs.rclone.remotes.<name>.mounts.<name>.mountPoint | A local file path specifying the location of the mount point.
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.max_backoff | Maximum retry delay.
|
| packages/nixpkgs/remctl | Remote execution tool |
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.remoteWrite.*.queue_config.min_backoff | Initial retry delay
|
| packages/nixpkgs/ios-webkit-debug-proxy | DevTools proxy (Chrome Remote Debugging Protocol) for iOS devices (Safari Remote Web Inspector) |
| options/home-manager/services.muchsync.remotes.<name>.local.importNew | Whether to begin the synchronisation by running
notmuch new locally.
|
| options/home-manager/programs.rclone.remotes.<name>.secrets | Sensitive configuration values such as passwords, API keys, and tokens
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| options/home-manager/programs.zed-editor.installRemoteServer | Whether to symlink the Zed's remote server binary to the expected
location
|
| options/nixos/services.xrdp.enable | Whether to enable xrdp, the Remote Desktop Protocol server.
|
| options/home-manager/services.muchsync.remotes.<name>.sshCommand | Specifies a command line to pass to /bin/sh
to execute a command on another machine
|
| options/nixos/services.prometheus.remoteWrite.*.write_relabel_configs | List of remote write relabel configurations.
|
| packages/nixpkgs/garnet | Remote cache-store from Microsoft Research |
| options/nixos/services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/home-manager/programs.rclone.remotes.<name>.config | Regular configuration options as described in rclone's documentation
https://rclone.org/docs/
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| options/nixos/services.murmur.dbus | Enable D-Bus remote control
|
| options/home-manager/accounts.email.accounts.<name>.lieer.settings.ignore_remote_labels | Set Gmail labels to ignore when syncing from remote labels to
local tags (before translations).
|
| packages/nixpkgs/xpra | Persistent remote applications for X |
| options/nixos/services.cfssl.tlsRemoteCa | CAs to trust for remote TLS requests.
|
| options/home-manager/services.muchsync.remotes.<name>.frequency | How often to run muchsync
|