| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs | List of Kubernetes service discovery configurations.
|
| options/nixos/services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| options/nixos/services.nats.group | Group under which NATS runs.
|
| options/nixos/services.radicle.node.extraArgs | Extra arguments for radicle-node
|
| options/nixos/services.redis.servers.<name>.requirePassFile | File with password for the database.
|
| options/nixos/services.redsocks.redsocks.*.port | Port on which redsocks should listen.
|
| options/nixos/services.pretalx.plugins | Pretalx plugins to install into the Python environment.
|
| options/nixos/services.slskd.settings.web.https.disabled | Disable the built-in HTTPS server
|
| options/nixos/services.tt-rss.email.digestSubject | Subject line for email digests.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| options/nixos/services.openbao.settings | Settings of OpenBao
|
| options/nixos/services.nifi.maxJavaHeapSize | Set the initial heap size for the JVM in MB.
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.openafsClient.afsdb | Resolve cells via AFSDB DNS records.
|
| options/nixos/services.slskd.nginx.reuseport | Create an individual listening socket
|
| options/nixos/services.prometheus.scrapeConfigs.*.dns_sd_configs | List of DNS service discovery configurations.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.moodle.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| options/nixos/services.openafsClient.globalCellServDBFile | Global CellServDB file to be deployed
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.exporters.nats.port | Port to listen on.
|
| options/nixos/services.rsync.jobs.<name>.settings | Settings that should be passed to rsync via long options
|
| options/nixos/services.prometheus.exporters.dnsmasq.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnsmasq.openFirewall is true.
|
| options/nixos/services.nvme-rs.settings.check_interval_secs | Check interval in seconds
|
| options/nixos/services.maddy.openFirewall | Open the configured incoming and outgoing mail server ports.
|
| options/nixos/services.limesurvey.httpd.virtualHost.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| options/nixos/services.prometheus.exporters.process.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.shelly.enable | Whether to enable the prometheus shelly exporter.
|
| options/nixos/services.prometheus.exporters.frr.enable | Whether to enable the prometheus frr exporter.
|
| options/nixos/services.nsd.rootServer | Whether this server will be a root server (a DNS root server, you
usually don't want that).
|
| options/nixos/services.prometheus.exporters.nginx.listenAddress | Address to listen on.
|
| options/nixos/services.prometheus.exporters.unpoller.log.debug | Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs.
|
| options/nixos/services.maubot.settings.homeservers | Known homeservers
|
| options/nixos/services.prosody.modules.motd | Send a message to users when they log in
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.snapserver.settings.tcp-streaming.bind_to_address | Address to listen on for snapclient connections.
|
| options/nixos/services.prometheus.exporters.opnsense.opnsenseServerProtocol | Opnsense metrics scraper protocol to use
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.snapper.snapshotRootOnBoot | Whether to snapshot root on boot
|
| options/nixos/services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.teamviewer.enable | Whether to enable TeamViewer daemon & system package.
|
| options/nixos/services.movim.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| options/nixos/services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.prio | CPU scheduler priority.
|
| options/nixos/services.trilium-server.environmentFile | File to load as the environment file
|
| options/nixos/services.prometheus.exporters.sql.extraFlags | Extra commandline options to pass to the sql exporter.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/services.shiori.webRoot | The root of the Shiori web application
|
| options/nixos/services.sshguard.whitelist | Whitelist a list of addresses, hostnames, or address blocks.
|
| options/nixos/services.prometheus.exporters.modemmanager.refreshRate | How frequently ModemManager will refresh the extended signal quality
information for each modem
|
| options/nixos/services.teeworlds.server.maxClients | The maximum amount of clients that can be connected to the server at the same time.
|
| options/nixos/services.scion.scion-router.enable | Whether to enable the scion-router service.
|
| options/nixos/services.thanos.compact.startAt | When this option is set to a systemd.time
specification the Thanos compactor will run at the specified period
|
| options/nixos/services.omnom.settings.smtp.host | SMTP server hostname.
|
| options/nixos/services.matomo.nginx.default | Makes this vhost the default.
|
| options/nixos/services.pixelfed.nginx.locations.<name>.index | Adds index directive.
|
| options/nixos/services.thermald.ignoreCpuidCheck | Whether to ignore the cpuid check to allow running on unsupported platforms
|
| options/nixos/services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| options/nixos/services.oauth2-proxy.github.org | Restrict logins to members of this organisation.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins | Authentication plugin to attach to this listener
|
| options/nixos/services.neo4j.directories.data | Path of the data directory
|
| options/nixos/services.peertube.listenWeb | The public-facing port that PeerTube will be accessible at (likely 80 or 443 if running behind a reverse proxy)
|
| options/nixos/services.teeworlds.server.maxClientsPerIP | The maximum amount of clients with the same IP address that can be connected to the server at the same time.
|
| options/nixos/services.redmine.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.prometheus.alertmanagerGotify.defaultPriority | The default priority for messages sent to gotify.
|
| options/nixos/services.shorewall.package | The shorewall package to use.
|
| options/nixos/services.sftpgo.settings.webdavd.bindings.*.port | The port for serving WebDAV requests
|
| options/nixos/services.peertube.redis.createLocally | Configure local Redis server for PeerTube.
|
| options/nixos/services.meilisearch.enable | Whether to enable Meilisearch - a RESTful search API.
|
| options/nixos/services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| options/nixos/services.prometheus.exporters.klipper.package | The prometheus-klipper-exporter package to use.
|
| options/nixos/services.multipath.devices.*.rr_weight | If set to priorities the multipath configurator will assign path weights
as "path prio * rr_min_io".
|
| options/nixos/services.nginx.appendConfig | Configuration lines appended to the generated Nginx
configuration file
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.pixelfed.nginx.locations | Declarative location config
|
| options/nixos/services.tor.settings.MaxClientCircuitsPending | See torrc manual.
|
| options/nixos/services.onedrive.package | The onedrive package to use.
|
| options/nixos/services.smartdns.settings | A set that will be generated into configuration file, see the SmartDNS README for details of configuration parameters
|
| options/nixos/services.sharkey.setupRedis | Whether to automatically set up a local Redis cache and configure Sharkey to use it.
|
| options/nixos/services.mediawiki.skins | Attribute set of paths whose content is copied to the skins
subdirectory of the MediaWiki installation in addition to the default skins.
|
| options/nixos/services.prometheus.exporters.mysqld.extraFlags | Extra commandline options to pass to the mysqld exporter.
|
| options/nixos/services.netatalk.enable | Whether to enable the Netatalk AFP fileserver.
|
| options/nixos/services.nextdns.arguments | Additional arguments to be passed to nextdns run.
|
| options/nixos/services.prometheus.pushgateway.persistMetrics | Whether to persist metrics to a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.stargazer.routes | Routes that Stargazer should server
|
| options/nixos/services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.neo4j.workerCount | Number of Neo4j worker threads, where the default of
0 indicates a worker count equal to the number of
available processors.
|
| options/nixos/services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| options/nixos/services.prometheus.exporters.dmarc.group | Group under which the dmarc exporter shall be run.
|
| options/nixos/services.prometheus.remoteRead | Parameters of the endpoints to query from
|
| options/nixos/services.omnom.settings.smtp.send_timeout | Send timeout duration in seconds.
|
| options/nixos/services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| options/nixos/services.umurmur.openFirewall | Open ports in the firewall for the uMurmur Mumble server.
|