| options/nixos/services.gitea.settings.server.HTTP_PORT | Listen port
|
| options/nixos/services.librechat.openFirewall | Whether to open the port in the firewall.
|
| options/nixos/services.bookstack.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.gancio.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.i2pd.proto.socksProxy.outproxyPort | Upstream outproxy bind port.
|
| options/nixos/services.teamspeak3.queryHttpPort | TCP port opened for ServerQuery connections using the HTTP protocol.
|
| options/nixos/services.matomo.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/nixos/services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| options/nixos/services.monica.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| options/darwin/services.prometheus.exporters.node.disabledCollectors | Collectors to disable from the list of collectors that are enabled by default.
|
| options/nixos/services.prometheus.exporters.chrony.enabledCollectors | Collectors to enable
|
| options/nixos/containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| options/nixos/services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| packages/nixpkgs/cvise | Super-parallel Python port of C-Reduce |
| options/nixos/services.hatsu.settings.HATSU_LISTEN_PORT | Port where hatsu should listen for incoming requests.
|
| options/nixos/services.immich-public-proxy.openFirewall | Whether to open the IPP port in the firewall
|
| options/nixos/services.navidrome.settings.Port | Port to run Navidrome on.
|
| options/nixos/services.tinyproxy.settings.Port | Specify which port to listen to.
|
| options/nixos/services.navidrome.openFirewall | Whether to open the TCP port in the firewall
|
| options/nixos/services.tailscale.openFirewall | Whether to open the firewall for the specified port.
|
| options/nixos/services.patroni.postgresqlPort | The port on which PostgreSQL listens.
|
| options/nixos/services.zeronet.fileserverPort | Zeronet fileserver port.
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/nixos/services.prometheus.exporters.modemmanager.enable | Whether to enable the prometheus modemmanager exporter.
|
| options/nixos/services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| options/nixos/services.prometheus.exporters.script.settings.scripts.*.timeout | Optional timeout for the script in seconds.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.imap-mailstat.openFirewall
is true
|
| options/nixos/services.amule.settings.eMule.UDPPort | UDP port for eD2k traffic (searches, source exchange) and all Kad network communication
|
| options/nixos/services.overseerr.openFirewall | Open a port in the firewall for the Overseerr web interface.
|
| options/nixos/services.orangefs.server.servers | URLs for storage server including port
|
| options/nixos/services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.enable | Whether to enable collectd binary protocol receiver.
|
| options/nixos/services.prometheus.exporters.scaphandre.telemetryPath | Path under which to expose metrics.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| options/nixos/services.pangolin.openFirewall | Whether to enable opening TCP ports 80 and 443, and UDP port 51820 in the firewall for the Pangolin service(s).
|
| options/nixos/services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| options/nixos/services.prometheus.exporters.pve.collectors.resources | Collect PVE resources info
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| options/nixos/services.prometheus.exporters.unpoller.controllers | List of Unifi controllers to poll
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.changedetection-io.webDriverSupport | Enable support for fetching web pages using WebDriver and Chromium
|
| options/nixos/services.prometheus.exporters.nextcloud.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nextcloud.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.borgmatic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.borgmatic.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.surfboard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.surfboard.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.wireguard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.wireguard.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rasdaemon.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.smokeping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smokeping.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.tailscale.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tailscale.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.pgbouncer.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pgbouncer.openFirewall
is true
|
| options/nixos/services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| options/nixos/services.peroxide.settings.UserPortImap | The port on which to listen for IMAP connections.
|
| options/nixos/services.peroxide.settings.UserPortSmtp | The port on which to listen for SMTP connections.
|
| options/nixos/services.bookstack.settings.DB_PORT | The port your database is listening at.
|
| options/nixos/services.blendfarm.serverConfig.Port | Default port blendfarm server listens on.
|
| options/nixos/services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| options/nixos/services.onlyoffice.examplePort | Port the OnlyOffice example server should listen on.
|
| options/nixos/services.n8n.environment.N8N_PORT | The HTTP port n8n runs on.
|
| options/nixos/services.pgbouncer.openFirewall | Whether to automatically open the specified TCP port in the firewall.
|
| options/nixos/services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| options/nixos/services.local-content-share.openFirewall | Whether to automatically open the specified port in the firewall
|
| options/nixos/services.tor.torsocks.fasterServer | IP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.url | URL of the Unifi controller.
|
| packages/nixpkgs/gdmap | Tool to visualize disk space (GTK 3 port of Original) |
| options/nixos/services.prometheus.exporters.junos-czerwonk.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.junos-czerwonk.openFirewall
is true
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| options/nixos/services.prometheus.exporters.modemmanager.extraFlags | Extra commandline options to pass to the modemmanager exporter.
|
| options/nixos/services.prometheus.exporters.artifactory.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| options/nixos/services.prometheus.exporters.wireguard.interfaces | Specifies the interface(s) passed to the wg show dump parameter
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| options/nixos/services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| options/nixos/programs.localsend.openFirewall | Whether to enable opening the firewall port 53317 for receiving files.
|
| options/nixos/services.hologram-server.listenAddress | Address and port to listen on
|
| options/nixos/services.dockerRegistry.openFirewall | Opens the port used by the firewall.
|
| options/nixos/services.jirafeau.nginxConfig.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| options/nixos/services.prometheus.exporters.sql.configuration | Exporter configuration as nix attribute set
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| options/nixos/services.prometheus.exporters.opnsense.opnsenseServerAddress | Opnsense IP address of the opnsense appliance
|
| options/nixos/services.prometheus.exporters.ecoflow.scrapingInterval | Scrapping interval in seconds
|
| options/nixos/services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| options/nixos/services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| options/nixos/services.prometheus.exporters.artifactory.artiAccessToken | Access token for authentication against JFrog Artifactory API
|
| options/nixos/services.firezone.relay.openFirewall | Opens up the main STUN port and the TURN allocation range.
|
| options/nixos/services.home-assistant.openFirewall | Whether to open the firewall for the specified port.
|
| options/nixos/services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.localForwards | Specify local port forwardings
|
| options/nixos/services.prometheus.exporters.unpoller.log.prometheusErrors | Whether to enable emitting errors to prometheus.
|
| options/nixos/services.prometheus.exporters.snmp.configuration | Snmp exporter configuration as nix attribute set
|
| options/nixos/services.prometheus.exporters.sql.configuration.jobs | An attrset of metrics scraping jobs to run.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| options/nixos/services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| options/nixos/services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| options/nixos/services.meilisearch.listenPort | The port that Meilisearch will listen on.
|
| options/nixos/services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| options/nixos/services.tmate-ssh-server.advertisedPort | External port advertised to clients
|
| options/nixos/services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|