| options/nixos/services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| options/nixos/services.prometheus.exporters.surfboard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.surfboard.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pgbouncer.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pgbouncer.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.smokeping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smokeping.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.borgmatic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.borgmatic.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.nextcloud.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nextcloud.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.tailscale.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tailscale.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| options/nixos/services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.prometheus.exporters.graphite.mappingSettings | Mapping configuration for the exporter, see
https://github.com/prometheus/graphite_exporter#yaml-config for
available options.
|
| options/nixos/services.prometheus.exporters.storagebox.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.scaphandre.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.junos-czerwonk.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.py-air-control.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.py-air-control.openFirewall
is true
|
| options/nixos/services.grafana_reporter.templateDir | Optional template directory to use custom tex templates
|
| options/nixos/programs.kdeconnect.enable | Whether to enable kdeconnect
|
| options/nixos/services.prometheus.exporters.node.disabledCollectors | Collectors to disable which are enabled by default.
|
| options/nixos/services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| options/nixos/services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| options/nixos/boot.initrd.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| options/nixos/services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| options/nixos/services.prometheus.exporters.mailman3.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mailman3.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| options/nixos/services.prometheus.exporters.graphite.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.graphite.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.postgres.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postgres.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.smartctl.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smartctl.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.opnsense.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.opnsense.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.influxdb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.influxdb.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.unpoller.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unpoller.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.nginxlog.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginxlog.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.collectd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.collectd.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.mikrotik.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mikrotik.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.fritzbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fritzbox.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.blackbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.blackbox.openFirewall
is true
|
| options/nixos/boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| options/home-manager/programs.ssh.matchBlocks.<name>.dynamicForwards | Specify dynamic port forwardings
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/darwin/services.prometheus.exporters.node.disabledCollectors | Collectors to disable from the list of collectors that are enabled by default.
|
| options/nixos/services.prometheus.exporters.chrony.enabledCollectors | Collectors to enable
|
| options/nixos/services.adguardhome.openFirewall | Open ports in the firewall for the AdGuard Home web interface
|
| options/nixos/networking.rxe.interfaces | Enable RDMA on the listed interfaces
|
| options/nixos/services.icecream.scheduler.openFirewall | Whether to automatically open the daemon port in the firewall.
|
| options/nixos/services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| options/nixos/services.silverbullet.openFirewall | Open port in the firewall.
|
| options/nixos/services.changedetection-io.webDriverSupport | Enable support for fetching web pages using WebDriver and Chromium
|
| options/nixos/services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| options/nixos/containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| options/nixos/services.prometheus.exporters.modemmanager.enable | Whether to enable the prometheus modemmanager exporter.
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| options/nixos/services.flaresolverr.openFirewall | Open the port in the firewall for FlareSolverr.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.prometheus.exporters.imap-mailstat.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.imap-mailstat.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.scaphandre.telemetryPath | Path under which to expose metrics.
|
| options/nixos/containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| options/nixos/services.filebeat.settings.output.elasticsearch.hosts | The list of Elasticsearch nodes to connect to
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.enable | Whether to enable collectd binary protocol receiver.
|
| options/nixos/services.kubernetes.apiserver.securePort | Kubernetes apiserver secure port.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/nixos/services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pve.collectors.resources | Collect PVE resources info
|
| options/nixos/services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| options/nixos/services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/services.prometheus.exporters.unpoller.controllers | List of Unifi controllers to poll
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.url | URL of the Unifi controller.
|
| options/nixos/services.prometheus.exporters.nextcloud.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nextcloud.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.borgmatic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.borgmatic.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.surfboard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.surfboard.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.wireguard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.wireguard.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rasdaemon.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.smokeping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smokeping.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.tailscale.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tailscale.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.pgbouncer.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pgbouncer.openFirewall
is true
|
| options/nixos/services.cassandra.rpcAddress | The address or interface to bind the native transport server to
|
| options/nixos/services.limesurvey.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.limesurvey.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| options/nixos/services.prometheus.exporters.artifactory.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.modemmanager.extraFlags | Extra commandline options to pass to the modemmanager exporter.
|
| options/nixos/services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| options/nixos/services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.junos-czerwonk.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| options/nixos/programs.coolercontrol.nvidiaSupport | Enable support for Nvidia GPUs.
|
| options/nixos/services.prometheus.exporters.wireguard.interfaces | Specifies the interface(s) passed to the wg show dump parameter
|
| options/nixos/containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.prometheus.exporters.sql.configuration | Exporter configuration as nix attribute set
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.prometheus.exporters.opnsense.opnsenseServerAddress | Opnsense IP address of the opnsense appliance
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|