| options/nixos/services.prometheus.exporters.mongodb.group | Group under which the mongodb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.dnsmasq.group | Group under which the dnsmasq exporter shall be run.
|
| options/nixos/services.prometheus.exporters.ecoflow.group | Group under which the ecoflow exporter shall be run.
|
| options/nixos/services.prometheus.exporters.apcupsd.group | Group under which the apcupsd exporter shall be run.
|
| options/nixos/services.prometheus.exporters.process.group | Group under which the process exporter shall be run.
|
| options/nixos/services.prometheus.exporters.systemd.group | Group under which the systemd exporter shall be run.
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.radicle.httpd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| options/darwin/services.github-runners | Multiple GitHub Runners
|
| options/nixos/services.moodle.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nagios.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.port | Port to listen on.
|
| options/nixos/services.prometheus.exporters.node-cert.user | User owning the certs.
|
| options/nixos/services.prometheus.exporters.py-air-control.group | Group under which the py-air-control exporter shall be run.
|
| options/nixos/services.anuko-time-tracker.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.mikrotik.group | Group under which the mikrotik exporter shall be run.
|
| options/nixos/services.prometheus.exporters.opnsense.group | Group under which the opnsense exporter shall be run.
|
| options/nixos/services.prometheus.exporters.postgres.group | Group under which the postgres exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nginxlog.group | Group under which the nginxlog exporter shall be run.
|
| options/nixos/services.prometheus.exporters.unpoller.group | Group under which the unpoller exporter shall be run.
|
| options/nixos/services.prometheus.exporters.graphite.group | Group under which the graphite exporter shall be run.
|
| options/nixos/services.prometheus.exporters.fritzbox.group | Group under which the fritzbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smartctl.group | Group under which the smartctl exporter shall be run.
|
| options/nixos/services.prometheus.exporters.blackbox.group | Group under which the blackbox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.influxdb.group | Group under which the influxdb exporter shall be run.
|
| options/nixos/services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| options/nixos/services.prometheus.exporters.collectd.group | Group under which the collectd exporter shall be run.
|
| options/nixos/services.certmgr.enable | Whether to enable certmgr.
|
| options/nixos/services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| options/nixos/services.certmgr.validMin | The interval before a certificate expires to start attempting to renew it.
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.bookstack.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| options/nixos/services.grafana.settings.smtp.cert_file | File path to a cert file.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.group | Group under which the imap-mailstat exporter shall be run.
|
| options/nixos/services.certmgr.specs | Certificate specs as described by:
https://github.com/cloudflare/certmgr#certificate-specs
These will be added to the Nix store, so they will be world readable.
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/services.bcg.mqtt.certfile | Certificate file for MQTT server access.
|
| options/nixos/services.changedetection-io.group | Group account under which changedetection-io runs.
|
| options/nixos/services.prometheus.exporters.borgmatic.group | Group under which the borgmatic exporter shall be run.
|
| options/nixos/services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| options/nixos/services.prometheus.exporters.rasdaemon.group | Group under which the rasdaemon exporter shall be run.
|
| options/nixos/services.prometheus.exporters.nextcloud.group | Group under which the nextcloud exporter shall be run.
|
| options/nixos/services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| options/nixos/services.prometheus.exporters.tailscale.group | Group under which the tailscale exporter shall be run.
|
| options/nixos/services.prometheus.exporters.pgbouncer.group | Group under which the pgbouncer exporter shall be run.
|
| options/nixos/services.prometheus.exporters.wireguard.group | Group under which the wireguard exporter shall be run.
|
| options/nixos/services.jirafeau.nginxConfig.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kubernetes.kubeconfig.certFile | Default kubeconfig client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.exporters.junos-czerwonk.group | Group under which the junos-czerwonk exporter shall be run.
|
| options/nixos/services.certspotter.emailRecipients | A list of email addresses to send certificate updates to.
|
| options/nixos/services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.package | The certmgr package to use.
|
| options/nixos/networking.supplicant.<name>.userControlled.group | Members of this group can control wpa_supplicant.
|
| options/nixos/services.kubernetes.proxy.kubeconfig.certFile | Kubernetes proxy client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.exporters.buildkite-agent.group | Group under which the buildkite-agent exporter shall be run.
|
| options/nixos/services.prometheus.exporters.storagebox.group | Group under which the storagebox exporter shall be run.
|
| options/nixos/services.prometheus.exporters.scaphandre.group | Group under which the scaphandre exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.hologram-server.groupClassAttr | The objectclass attribute to search for groups when enableLdapRoles is true
|
| options/nixos/services.prometheus.exporters.node-cert.excludePaths | List of paths to exclute from searching for SSL certificates.
|
| options/home-manager/launchd.agents.<name>.config.GroupName | This optional key specifies the group to run the job as
|
| options/nixos/services.resilio.sharedFolders | Shared folder list
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.prometheus.exporters.node-cert.listenAddress | Address to listen on.
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.metricsPort | The port for the Prometheus HTTP endpoint.
|
| options/nixos/services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| options/nixos/services.prometheus.exporters.node-cert.excludeGlobs | List files matching a pattern to include
|
| options/nixos/services.prometheus.exporters.node-cert.includeGlobs | List files matching a pattern to include
|
| options/nixos/services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| options/nixos/services.kubernetes.kubelet.kubeconfig.certFile | Kubelet client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.mediawiki.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.limesurvey.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| options/nixos/services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.github-runners.<name>.user | User under which to run the service
|