| options/nixos/services.mpdscribble.verbose | Log level for the mpdscribble daemon.
|
| options/home-manager/services.mpdscribble.verbose | Log level for the mpdscribble daemon.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockNodeName | This optional key specifies the node to connect(2) or bind(2) to.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.RootDirectory | This optional key is used to specify a directory to chroot(2) to before running the job.
|
| options/nixos/services.pcscd.ignoreReaderNames | List of reader name patterns for the PCSC daemon to ignore
|
| options/nixos/services.slurm.rest.environment | Environment variables to set for the slurmrestd daemon, see slurmrestd(8).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SessionCreate | This key specifies that the job should be spawned into a new security
audit session rather than the default session for the context is belongs
to
|
| options/nixos/services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| options/nixos/services.netbird.clients.<name>.autoStart | Start the service with the system
|
| options/nixos/services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| options/nixos/services.avahi.denyInterfaces | List of network interfaces that should be ignored by the
avahi-daemon
|
| options/darwin/launchd.daemons.<name>.serviceConfig.EnableGlobbing | This flag causes launchd to use the glob(3) mechanism to update the program arguments before invocation.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StandardErrorPath | This optional key specifies what file should be used for data being sent to stderr when using stdio(3).
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockType | This optional key tells launchctl what type of socket to create
|
| options/nixos/services.prometheus.exporters.rasdaemon.listenAddress | Address to listen on.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LimitLoadToSessionType | This configuration file only applies to sessions of the type specified
|
| options/darwin/services.emacs.additionalPath | This option specifies additional PATH that the emacs daemon would have
|
| options/nixos/services.shairport-sync.arguments | Arguments to pass to the daemon
|
| options/nixos/services.spamassassin.debug | Whether to run the SpamAssassin daemon in debug mode
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathName | This optional key implies SockFamily is set to "Unix"
|
| options/nixos/services.prometheus.exporters.rasdaemon.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.avahi.allowInterfaces | List of network interfaces that should be used by the avahi-daemon
|
| options/nixos/services.quassel.interfaces | The interfaces the Quassel daemon will be listening to
|
| options/nixos/services.postfix.masterConfig.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockFamily | This optional key can be used to specifically request that "IPv4" or "IPv6" socket(s) be created.
|
| options/nixos/services.saunafs.metalogger.enable | Whether to enable Saunafs metalogger daemon.
|
| options/nixos/services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| options/nixos/services.spamassassin.enable | Whether to enable the SpamAssassin daemon.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPathMode | This optional key specifies the mode of the socket
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.CPU | The maximum amount of cpu time (in seconds) to be used by each process.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits | Resource limits to be imposed on the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits | Resource limits to be imposed on the job
|
| options/nixos/services.collabora-online.settings | Configuration for Collabora Online WebSocket Daemon, see
https://sdk.collaboraonline.com/docs/installation/Configuration.html, or
https://github.com/CollaboraOnline/online/blob/master/coolwsd.xml.in for the default
configuration.
|
| options/nixos/services.gnome.gnome-online-accounts.enable | Whether to enable GNOME Online Accounts daemon, a service that provides
a single sign-on framework for the GNOME desktop.
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| options/nixos/services.triggerhappy.enable | Whether to enable the triggerhappy hotkey daemon.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Core | The largest size (in bytes) core file that may be created.
|
| options/nixos/security.auditd.plugins.<name>.format | Binary passes the data exactly as the audit event dispatcher gets it from
the audit daemon
|
| options/nixos/services.tor.torsocks.onionAddrRange | Tor hidden sites do not have real IP addresses
|
| options/nixos/services.endlessh-go.prometheus.port | Specifies on which port the endlessh-go daemon listens for Prometheus
queries.
|
| options/nixos/services.guix.substituters.urls | A list of substitute servers' URLs for the Guix daemon to download
substitutes from.
|
| options/darwin/services.ipfs.enableGarbageCollection | Passes --enable-gc flag to ipfs daemon.
|
| options/nixos/services.gocd-agent.environment | Additional environment variables to be passed to the Go
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.Bonjour | This optional key can be used to request that the service be registered with the
mDNSResponder(8)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.AbandonProcessGroup | When a job dies, launchd kills any remaining processes with the same process group ID as the job
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.FileSize | The largest size (in bytes) file that may be created.
|
| options/nixos/services.moosefs.metalogger.enable | Whether to enable MooseFS metalogger daemon that maintains a backup copy of the master's metadata.
|
| options/home-manager/services.psd.browsers | A list of browsers to sync
|
| options/darwin/launchd.daemons.<name>.serviceConfig.WorkingDirectory | This optional key is used to specify a directory to chdir(2) to before running the job.
|
| options/nixos/services.watchdogd.settings.safe-exit | With safeExit enabled, the daemon will ask the driver to disable the WDT before exiting
|
| options/nixos/services.fastnetmon-advanced.enable | Whether to enable the fastnetmon-advanced DDoS Protection daemon.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockServiceName | This optional key specifies the service on the node to connect(2) or bind(2) to.
|
| options/home-manager/services.mpdscribble.passwordFile | File containing the password for the mpd daemon.
|
| options/nixos/services.usbguard.insertedDevicePolicy | How to treat USB devices that are already connected after the daemon
starts
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockPassive | This optional key specifies whether listen(2) or connect(2) should be called on the created file
descriptor
|
| options/darwin/launchd.daemons.<name>.serviceConfig.StartInterval | This optional key causes the job to be started every N seconds
|
| options/nixos/services.gocd-server.environment | Additional environment variables to be passed to the gocd-server process
|
| options/nixos/services.prometheus.exporters.rasdaemon.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rasdaemon.openFirewall
is true
|
| options/nixos/hardware.nvidia.dynamicBoost.enable | Whether to enable dynamic Boost balances power between the CPU and the GPU for improved
performance on supported laptops using the nvidia-powerd daemon
|
| options/nixos/services.knot-resolver.settings.workers | The number of running kresd (Knot Resolver daemon) workers
|
| options/nixos/services.tailscale.derper.verifyClients | Whether to verify clients against a locally running tailscale daemon if they are allowed to connect to this node or not.
|
| options/nixos/services.neo4j.directories.home | Path of the Neo4j home directory
|
| options/nixos/services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Data | The maximum size (in bytes) of the data segment for a process; this defines how far a program may
extend its break with the sbrk(2) system call.
|
| options/nixos/services.saunafs.chunkserver.enable | Whether to enable Saunafs chunkserver daemon.
|
| options/nixos/services.matrix-appservice-irc.needBindingCap | Whether the daemon needs to bind to ports below 1024 (e.g. for the ident service)
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SockProtocol | This optional key specifies the protocol to be passed to socket(2)
|
| options/nixos/services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| options/darwin/launchd.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/nixos/services.hddfancontrol.enable | Whether to enable hddfancontrol daemon.
|
| options/nixos/services.torrentstream.enable | Whether to enable TorrentStream daemon.
|
| options/nixos/services.cgit.<name>.gitHttpBackend.enable | Whether to bypass cgit and use git-http-backend for HTTP clones
|
| options/darwin/launchd.daemons.<name>.serviceConfig.MachServices | This optional key is used to specify Mach services to be registered with the Mach bootstrap sub-system
|
| options/nixos/services.moosefs.chunkserver.enable | Whether to enable MooseFS chunkserver daemon that stores file data.
|
| options/nixos/services.nullidentdmod.enable | Whether to enable the nullidentdmod identd daemon.
|
| options/nixos/services.traefik.dynamic.files | Dynamic configuration files to write
|
| options/nixos/services.postfix.settings.master.<name>.command | A program name specifying a Postfix service/daemon process
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.Stack | The maximum size (in bytes) of the stack segment for a process; this defines how far a program's
stack segment may be extended
|
| options/nixos/services.xserver.displayManager.gdm.settings | Options passed to the gdm daemon
|
| options/nixos/services.neo4j.directories.data | Path of the data directory
|
| options/nixos/services.icecream.scheduler.openFirewall | Whether to automatically open the daemon port in the firewall.
|
| options/nixos/services.pantheon.parental-controls.enable | Whether to enable Pantheon parental controls daemon.
|
| options/nixos/security.auditd.settings.admin_space_left | This is a numeric value in mebibytes (MiB) that tells the audit daemon when to perform a configurable action because the system is running
low on disk space
|
| options/nixos/services.usbguard.presentDevicePolicy | How to treat USB devices that are already connected when the daemon
starts
|
| options/darwin/launchd.daemons.<name>.serviceConfig.SoftResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.HardResourceLimits.MemoryLock | The maximum size (in bytes) which a process may lock into memory using the mlock(2) function.
|
| options/nixos/services.cron.systemCronJobs | A list of Cron jobs to be appended to the system-wide
crontab
|
| options/darwin/launchd.daemons.<name>.serviceConfig.ProgramArguments | This key maps to the second argument of execvp(3)
|
| options/nixos/services.hardware.deepcool-digital-linux.enable | Whether to enable DeepCool Digital monitoring daemon.
|
| options/nixos/services.prometheus.exporters.rasdaemon.enabledCollectors | List of error types to collect from the event database.
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.LaunchEvents | Specifies higher-level event types to be used as launch-on-demand event
sources
|
| options/nixos/services.localtimed.enable | Enable localtimed, a simple daemon for keeping the
system timezone up-to-date based on the current location
|
| options/darwin/launchd.user.agents.<name>.serviceConfig.LowPriorityIO | This optional key specifies whether the kernel should consider this daemon to be low priority when
doing file system I/O.
|
| options/darwin/launchd.daemons.<name>.serviceConfig.Sockets.<name>.SecureSocketWithKey | This optional key is a variant of SockPathName
|