| services.dae.config | WARNING: This option will expose store your config unencrypted world-readable in the nix store
|
| services.znc.configFile | Configuration file for ZNC
|
| services.v2ray.config | The configuration object
|
| services.k3s.configPath | File path containing the k3s YAML config
|
| systemd.network.config | Definition of global systemd network config.
|
| services.rke2.configPath | File path containing the rke2 YAML config
|
| services.frr.config | FRR configuration statements.
|
| services.rss-bridge.config | Attribute set of arbitrary config options
|
| services.nginx.config | Verbatim nginx.conf configuration
|
| nixpkgs.config | Global configuration for Nixpkgs
|
| programs.miriway.config | Miriway's config
|
| services.conman.config | The configuration object
|
| services.cgminer.config | Additional config
|
| services.fluentd.config | Fluentd config.
|
| services.sssd.config | Contents of sssd.conf.
|
| services.davis.config | |
| services.drbd.config | Contents of the drbd.conf configuration file.
|
| programs.git.config | Configuration to write to /etc/gitconfig
|
| services.unit.config | Unit configuration in JSON format
|
| services.monit.config | monitrc content
|
| boot.uki.configFile | The configuration file passed to ukify(1) to create the UKI
|
| services.ferm.config | Verbatim ferm.conf configuration.
|
| services.bird.config | BIRD Internet Routing Daemon configuration file.
http://bird.network.cz/
|
| services.go-neb.config | Your config.yaml as a Nix attribute set
|
| services.riemann.config | Contents of the Riemann configuration file
|
| services.exim.config | Verbatim Exim configuration
|
| services.radvd.config | The contents of the radvd configuration file.
|
| services.gvpe.configText | GVPE config contents
|
| services.dae.configFile | The path of dae config file, end with .dae.
|
| services.realm.config | The realm configuration, see https://github.com/zhboner/realm#overview for documentation.
|
| hardware.fw-fanctrl.config | Additional config entries for the fw-fanctrl service (documentation: https://github.com/TamtamHero/fw-fanctrl/blob/main/doc/configuration.md)
|
| services.gvpe.configFile | GVPE config file, if already present
|
| services.nscd.config | Configuration to use for Name Service Cache Daemon
|
| xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| services.jibri.config | Jibri configuration
|
| services.logcheck.config | Config options that you would like in logcheck.conf.
|
| services.minio.configDir | The config directory, for the access keys and other settings.
|
| services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| services.iptsd.config | Configuration for IPTSD
|
| services.dante.config | Contents of Dante's configuration file
|
| services.jicofo.config | Contents of the jicofo.conf configuration file.
|
| services.ngircd.config | The ngircd configuration (see ngircd.conf(5)).
|
| programs.xonsh.config | Extra text added to the end of /etc/xonsh/xonshrc,
the system-wide control file for xonsh.
|
| hardware.alsa.config | The content of the system-wide ALSA configuration (/etc/asound.conf)
|
| services.cross-seed.configDir | Cross-seed config directory
|
| services.ocis.configDir | Path to directory containing oCIS config file
|
| services.jigasi.config | Contents of the sip-communicator.properties configuration file for jigasi.
|
| services.jack.loopback.config | ALSA config for loopback device.
|
| services.bind.configFile | Overridable config file to use for named
|
| services.soju.configFile | Path to config file
|
| services.cloud-init.config | raw cloud-init configuration
|
| services.fireqos.config | The FireQOS configuration.
|
| services.v2ray.configFile | The absolute path to the configuration file
|
| services.target.config | Content of /etc/target/saveconfig.json
This file is normally read and written by targetcli
|
| boot.initrd.systemd.network.config | Definition of global systemd network config.
|
| hardware.pcmcia.config | Path to the configuration file which maps the memory, IRQs
and ports used by the PCMCIA hardware.
|
| services.flexget.config | The YAML configuration for FlexGet.
|
| services.varnish.config | Verbatim default.vcl configuration.
|
| services.karma.configFile | A YAML config file which can be used to configure karma instead of the nix-generated file.
|
| services.mighttpd2.config | Verbatim config file to use
(see https://kazu-yamamoto.github.io/mighttpd2/config.html)
|
| services.netdata.config | netdata.conf configuration as nix attributes. cannot be combined with configText.
|
| services.jitsi-meet.config | Client-side web application settings that override the defaults in config.js
|
| services.snmpd.configFile | Path to the snmpd.conf file
|
| services.postfix.config | The main.cf configuration file as key value set.
|
| services.haproxy.config | Contents of the HAProxy configuration file,
haproxy.conf.
|
| services.coredns.config | Verbatim Corefile to use
|
| services.klipper.configDir | Path to Klipper config file.
|
| services.smokeping.config | Full smokeping config supplied by the user
|
| services.spiped.config | Configuration for a secure pipe daemon
|
| services.xserver.config | The contents of the configuration file of the X server
(xorg.conf)
|
| services.tor.tsocks.config | Extra configuration
|
| services.artalk.configFile | Artalk config file path
|
| containers.<name>.config | A specification of the desired configuration of this
container, as a NixOS module.
|
| services.conman.configFile | The absolute path to the configuration file
|
| services.webdav.configFile | Path to config file
|
| services.davmail.config | Davmail configuration
|
| services.solanum.config | Solanum IRC daemon configuration file.
check https://github.com/solanum-ircd/solanum/blob/main/doc/reference.conf for all options.
|
| services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| services.rshim.config | Structural setting for the rshim configuration file
(/etc/rshim.conf)
|
| programs.gtklock.config | Configuration for gtklock
|
| services.netdata.configText | Verbatim netdata.conf, cannot be combined with config.
|
| services.wivrn.config.enable | Whether to enable configuration for WiVRn.
|
| services.klipper.configFile | Path to default Klipper config.
|
| services.nitter.config.proxy | URL to a HTTP/HTTPS proxy.
|
| services.pppd.peers.<name>.config | pppd configuration for this peer, see the pppd(8) man page.
|
| systemd.network.config.dhcpV4Config | Each attribute in this set specifies an option in the
[DHCPv4] section of the networkd config
|
| systemd.network.config.dhcpV6Config | Each attribute in this set specifies an option in the
[DHCPv6] section of the networkd config
|
| services.ocserv.config | Configuration content to start an OCServ server
|
| services.minetest-server.config | Settings to add to the minetest config file
|
| services.rabbitmq.config | Verbatim advanced configuration file contents using the Erlang syntax
|
| services.speechd.config | System wide configuration file for Speech Dispatcher
|
| services.opentsdb.config | The contents of OpenTSDB's configuration file
|
| services.doh-server.configFile | The config file for the doh-server
|
| services.maubot.configMutable | Whether maubot should write updated config into extraConfigFile. This will make your Nix module settings have no effect besides the initial config, as extraConfigFile takes precedence over NixOS settings!
|
| services.riemann-dash.config | Contents added to the end of the riemann-dash configuration file.
|
| services.crab-hole.configFile | The config file of crab-hole
|
| services.nitter.config.proxyAuth | Credentials for proxy.
|
| services.deluge.config | Deluge core configuration for the core.conf file
|
| services.druid.broker.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Broker
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.druid.router.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Router
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.sabnzbd.configFile | Path to config file (deprecated, use settings instead and set this value to null)
|
| services.riemann.configFile | A Riemann config file
|
| services.miniflux.config | Configuration for Miniflux, refer to
https://miniflux.app/docs/configuration.html
for documentation on the supported values.
|
| services.spotifyd.config | (Deprecated) Configuration for Spotifyd
|
| services.sniproxy.config | sniproxy.conf configuration excluding the daemon username and pid file.
|
| services.minetest-server.configPath | Path to the config to use
|
| services.tautulli.configFile | The location of Tautulli's config file.
|
| services.dovecot2.configFile | Config file used for the whole dovecot configuration.
|
| services.nitter.config.enableRSS | Whether to enable RSS feeds.
|
| services.akkoma.config | Configuration for Akkoma
|
| services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| services.frr.configFile | Configuration file to use for FRR
|
| services.tika.configFile | The Apache Tika configuration (XML) file to use.
|
| services.spiped.config.<name>.target | Address to which spiped should connect.
|
| security.sudo.configFile | This string contains the contents of the
sudoers file.
|
| services.ax25.axlisten.config | Options that will be passed to the axlisten daemon.
|
| services.ndppd.configFile | Path to configuration file.
|
| services.rspamd.postfix.config | Addon to postfix configuration
|
| services.pomerium.configFile | Path to Pomerium config YAML
|
| systemd.network.config.networkConfig | Each attribute in this set specifies an option in the
[Network] section of the networkd config
|
| security.sudo-rs.configFile | This string contains the contents of the
sudoers file.
|
| services.openldap.configDir | Use this config directory instead of generating one from the
settings option
|
| services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| services.cntlm.configText | Verbatim contents of cntlm.conf.
|
| services.loki.configFile | Specify a configuration file that Loki should use
|
| services.rabbitmq.configItems | Configuration options in RabbitMQ's new config file format,
which is a simple key-value format that can not express nested
data structures
|
| services.drupal.sites.<name>.configSyncDir | The location of the Drupal config sync directory.
|
| services.mimir.configFile | Specify a configuration file that Mimir should use.
|
| services.charybdis.config | Charybdis IRC daemon configuration file.
|
| services.promtail.configFile | Config file path for Promtail
|
| services.saslauthd.config | Configuration to use for Cyrus SASL authentication daemon.
|
| services.tempo.configFile | Specify a path to a configuration file that Tempo should use.
|
| services.kanata.keyboards.<name>.configFile | The config file
|
| services.node-red.configFile | Path to the JavaScript configuration file
|
| services.lighttpd.configText | Overridable config file contents to use for lighttpd
|
| programs.fish.vendor.config.enable | Whether fish should source configuration snippets provided by other packages.
|
| services.radicale.config | Radicale configuration, this will set the service
configuration file
|
| services.inspircd.config | Verbatim inspircd.conf file
|
| services.netdata.configDir | Complete netdata config directory except netdata.conf
|
| services.sickbeard.configFile | Path to config file.
|
| services.webdav-server-rs.configFile | Path to config file
|
| services.kanata.keyboards.<name>.config | Configuration other than defcfg
|
| services.nitter.config.enableDebug | Whether to enable request logs and debug endpoints.
|
| services.nitter.config.base64Media | Use base64 encoding for proxied media URLs.
|
| services.ergochat.configFile | Path to configuration file
|
| services.rss-bridge.config.FileCache.path | Directory where to store cache files (if cache.type = "file").
|
| services.riemann.configFiles | Extra files containing Riemann configuration
|
| services.cfssl.configFile | Path to configuration file
|
| services.mihomo.configFile | Configuration file to use.
|
| services.pulseaudio.daemon.config | Config of the pulse daemon
|
| services.scion.scion-ip-gateway.config | scion-ip-gateway daemon configuration
|
| programs.less.configFile | Path to lesskey configuration file.
configFile takes precedence over commands,
clearDefaultCommands, lineEditingKeys, and
envVariables.
|
| services.gatus.configFile | Path to the Gatus configuration file
|
| services.httpd.configFile | Override the configuration file used by Apache
|
| services.home-assistant.configDir | The config directory, where your configuration.yaml is located.
|
| services.druid.overlord.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Overlord
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.squid.configText | Verbatim contents of squid.conf
|
| services.syncthing.configDir | The path where the settings and keys will exist.
|
| services.graphite.carbon.config | Content of carbon configuration file.
|
| services.supybot.configFile | Path to initial supybot config file
|
| hardware.rasdaemon.config | rasdaemon configuration, currently only used for CE PFA
for details, read rasdaemon.outPath/etc/sysconfig/rasdaemon's comments
|
| services.snipe-it.config | Snipe-IT configuration options to set in the
.env file
|
| systemd.network.config.routeTables | Defines route table names as an attrset of name to number
|
| services.mysql.configFile | Override the configuration file used by MySQL
|
| services.rtorrent.configText | The content of rtorrent.rc
|
| services.nominatim.ui.config | Nominatim UI configuration placed to theme/config.theme.js file
|
| services.spiped.config.<name>.encrypt | Take unencrypted connections from the
source socket and send encrypted
connections to the target socket.
|
| services.spiped.config.<name>.decrypt | Take encrypted connections from the
source socket and send unencrypted
connections to the target socket.
|
| services.hqplayerd.config | HQplayer daemon configuration, written to /etc/hqplayer/hqplayerd.xml
|
| services.libreswan.configSetup | Options to go in the 'config setup' section of the Libreswan IPsec configuration
|
| services.jellyseerr.configDir | Config data directory
|
| services.mattermost.configDir | Mattermost config directory.
|
| services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| services.alloy.configPath | Alloy configuration file/directory path
|
| services.iptsd.config.Stylus.Disable | Disables the stylus
|
| services.limesurvey.config | LimeSurvey configuration
|
| services.druid.middleManager.config | (key=value) Configuration to be written to runtime.properties of the druid Druid middleManager
https://druid.apache.org/docs/latest/configuration/index.html
|
| system.tools.nixos-generate-config.enable | Whether to enable nixos-generate-config script.
|
| services.umurmur.configFile | Configuration file, default is generated from config.service.umurmur.settings
|
| services.caddy.configFile | Override the configuration file used by Caddy
|
| services.headphones.configFile | Path to config file.
|
| services.atalkd.configFile | Optional path to a custom atalkd.conf file
|
| services.nextcloud.config.dbtype | Database type.
|
| services.nextcloud.config.dbname | Database name.
|
| services.nextcloud.config.dbuser | Database user.
|
| services.angrr.configFile | Path to the angrr configuration file in TOML format
|
| services.dnsmasq.configFile | Path to the configuration file of dnsmasq.
|
| services.ntopng.configText | Overridable configuration file contents to use for ntopng
|
| services.bitlbee.configDir | Specify an alternative directory to store all the per-user configuration
files.
|
| services.shibboleth-sp.configFile | Path to shibboleth config file
|
| services.corerad.configFile | Path to CoreRAD TOML configuration file.
|
| services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| hardware.fancontrol.config | Required fancontrol configuration file content
|
| services.inadyn.configFile | Configuration file for inadyn
|
| services.fedimintd.<name>.nginx.config | Overrides to the nginx vhost section for api
|
| programs.system-config-printer.enable | Whether to enable system-config-printer, a Graphical user interface for CUPS administration.
|
| services.dockerRegistry.configFile | Path to CNCF distribution config file
|
| services.monica.config | monica configuration options to set in the
.env file
|
| services.system-config-printer.enable | Whether to enable system-config-printer, a service for CUPS administration used by printing interfaces.
|
| services.powerdns-admin.config | Configuration python file
|
| services.dnscrypt-proxy.configFile | Path to TOML config file
|
| services.miniflux.config.CREATE_ADMIN | Create an admin user from environment variables.
|
| services.kmonad.keyboards.<name>.config | Keyboard configuration.
|
| services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| xdg.portal.configPackages | List of packages that provide XDG desktop portal configuration, usually in
the form of share/xdg-desktop-portal/$desktop-portals.conf
|
| services.miniflux.config.WATCHDOG | Enable or disable Systemd watchdog.
|
| services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| services.spiped.config.<name>.keyfile | Name of a file containing the spiped key
|
| services.miniflux.config.LISTEN_ADDR | Address to listen on
|
| services.nitter.config.tokenCount | Minimum amount of usable tokens
|
| services.wivrn.config.json | Configuration for WiVRn
|
| services.fedimintd.<name>.nginx.config.root | The path of the web root directory.
|
| services.nextcloud.config.dbpassFile | The full path to a file that contains the database password.
|
| systemd.network.config.addRouteTablesToIPRoute2 | If true and routeTables are set, then the specified route tables
will also be installed into /etc/iproute2/rt_tables.
|
| services.prometheus.configText | If non-null, this option defines the text that is written to
prometheus.yml
|
| services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| services.dnscrypt-proxy2.configFile | Path to TOML config file
|
| services.couchdb.configFile | Configuration file for persisting runtime changes
|
| services.nohang.configPath | Configuration file to use with nohang
|
| services.rss2email.config | The configuration to give rss2email
|
| services.opendkim.configFile | Additional opendkim configuration as a file.
|
| services.oxidized.configFile | Path to the oxidized configuration file.
|
| services.fedimintd.<name>.nginx.config.locations | Declarative location config
|
| services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.syslog-ng.configHeader | The very first lines of the configuration file
|
| services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| services.ejabberd.configFile | Configuration file for ejabberd in YAML format
|
| services.routedns.configFile | Path to RouteDNS TOML configuration file.
|
| services.snmpd.configText | The contents of the snmpd.conf
|
| services.jellyfin.configDir | Directory containing the server configuration files,
passed with --configdir see configuration-directory
|
| services.spiped.config.<name>.resolveRefresh | Resolution refresh time for the target socket, in seconds.
|
| services.akkoma.config.":pleroma"."Pleroma.Repo" | Database configuration
|
| services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| services.thanos.rule.tracing.config | Tracing configuration
|
| services.hardware.pommed.configFile | The path to the pommed.conf file
|
| services.miniflux.config.DATABASE_URL | Postgresql connection parameters
|
| services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| services.nextcloud.config.dbhost | Database host (+port) or socket path
|
| services.buffyboard.configFile | Path to an INI format configuration file to provide Buffyboard
|
| services.bonsaid.configFile | Path to a .json file specifying the state transitions
|
| services.ddclient.configFile | Path to configuration file
|
| services.pipewire.configPackages | List of packages that provide PipeWire configuration, in the form of
share/pipewire/*/*.conf files
|
| services.atalkd.interfaces.<name>.config | Optional configuration string for this interface.
|
| fonts.fontconfig.includeUserConf | Include the user configuration from
~/.config/fontconfig/fonts.conf or
~/.config/fontconfig/conf.d.
|
| services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| services.shorewall.configs | This option defines the Shorewall configs
|
| services.thanos.store.tracing.config | Tracing configuration
|
| services.thanos.query.tracing.config | Tracing configuration
|
| services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| services.jitsi-videobridge.config | Videobridge configuration
|
| services.uptime.configFile | The uptime configuration file
If mongodb: server != localhost, please set usesRemoteMongo = true
If you only want to run the monitor, please set enableWebService = false
and enableSeparateMonitoringService = true
If autoStartMonitor: false (recommended) and you want to run both
services, please set enableSeparateMonitoringService = true
|
| services.agorakit.config | Agorakit configuration options to set in the
.env file
|
| services.freeswitch.configDir | Override file in FreeSWITCH config template directory
|
| services.xserver.windowManager.i3.configFile | Path to the i3 configuration file
|
| services.nullmailer.config.idhost | The content of this attribute is used when building the message-id
string for the message
|
| services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| services.thanos.sidecar.reloader.config-file | Config file watched by the reloader.
|
| hardware.fw-fanctrl.config.defaultStrategy | Default strategy to use
|
| services.klipper.firmwares.<name>.configFile | Path to firmware config which is generated using klipper-genconf
|
| services.autorandr.profiles.<name>.config | Per output profile configuration.
|
| services.fedimintd.<name>.nginx.config.listen.*.ssl | Enable SSL.
|
| services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.trickster.configFile | Path to configuration file.
|
| hardware.fw-fanctrl.config.strategies | Additional strategies which can be used by fw-fanctrl
|
| services.kubernetes.kubelet.cni.config | Kubernetes CNI configuration.
|
| services.akkoma.config.":pleroma".":instance".email | Instance administrator email.
|
| services.synergy.server.configFile | The Synergy server configuration file.
|
| services.bookstack.config | BookStack configuration options to set in the
.env file
|
| services.hickory-dns.configFile | Path to an existing toml file to configure hickory-dns with
|
| services.spiped.config.<name>.weakHandshake | Use fast/weak handshaking: This reduces the CPU time spent
in the initial connection setup, at the expense of losing
perfect forward secrecy.
|
| services.headscale.configFile | Path to the configuration file of headscale.
|
| services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.thanos.rule.objstore.config | Object store configuration
|
| services.fedimintd.<name>.nginx.config.listen.*.addr | Listen address.
|
| services.fedimintd.<name>.nginx.config.default | Makes this vhost the default.
|
| services.factorio.configFile | The server's configuration file
|
| services.fedimintd.<name>.nginx.config.kTLS | Whether to enable kTLS support
|
| services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| services.fedimintd.<name>.nginx.config.serverName | Name of this virtual host
|
| services.matrix-synapse.configFile | Path to the configuration file on the target system
|
| services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| services.thanos.store.objstore.config | Object store configuration
|
| services.taskserver.config | Configuration options to pass to Taskserver
|
| services.xserver.windowManager.bspwm.configFile | Path to the bspwm configuration file
|
| services.fedimintd.<name>.nginx.config.extraConfig | These lines go to the end of the vhost verbatim.
|
| services.zwave-js.settings | Configuration settings for the generated config file
|
| services.vdirsyncer.jobs.<name>.config.general | general configuration
|
| services.shorewall6.configs | This option defines the Shorewall configs
|
| services.vdirsyncer.jobs.<name>.config.statusPath | vdirsyncer's status path
|
| services.sogo.configReplaces | Replacement-filepath mapping for sogo.conf
|
| services.autorandr.profiles.<name>.config.<name>.dpi | Output DPI configuration.
|
| services.miniflux.config.RUN_MIGRATIONS | Run database migrations.
|
| services.thanos.compact.tracing.config | Tracing configuration
|
| services.thanos.sidecar.tracing.config | Tracing configuration
|
| services.thanos.receive.tracing.config | Tracing configuration
|
| services.thermald.configFile | The thermald manual configuration file
|
| services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| services.spamassassin.config | The SpamAssassin local.cf config
If you are using this configuration:
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_
Then you can Use this sieve filter:
require ["fileinto", "reject", "envelope"];
if header :contains "X-Spam-Flag" "YES" {
fileinto "spam";
}
Or this procmail filter:
:0:
* ^X-Spam-Flag: YES
/var/vpopmail/domains/lastlog.de/js/.maildir/.spam/new
To filter your messages based on the additional mail headers added by spamassassin.
|
| services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| services.autorandr.profiles.<name>.config.<name>.rate | Output framerate.
|
| services.fedimintd.<name>.nginx.config.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| services.easytier.instances.<name>.configFile | Path to easytier config file
|
| services.logrotate.configFile | Override the configuration file used by logrotate
|
| services.apcupsd.configText | Contents of the runtime configuration file, apcupsd.conf
|
| services.home-assistant.config.lovelace.mode | In what mode should the main Lovelace panel be, yaml or storage (UI managed).
|
| services.lighttpd.cgit.configText | Verbatim contents of the cgit runtime configuration file
|
| services.nullmailer.config.maxpause | The maximum time to pause between successive queue runs, in seconds
|
| services.autorandr.profiles.<name>.config.<name>.crtc | Output video display controller.
|
| services.home-assistant.configWritable | Whether to make configuration.yaml writable
|
| services.ebusd.configpath | Directory to read CSV config files from
|
| services.freeradius.configDir | The path of the freeradius server configuration directory.
|
| services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| services.moonraker.configDir | Deprecated directory containing client-writable configuration files
|
| services.autorandr.profiles.<name>.config.<name>.gamma | Output gamma configuration.
|
| services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| services.vdirsyncer.jobs.<name>.config.storages | vdirsyncer storage configurations
|
| services.nextcloud.config.adminuser | Username for the admin account
|
| services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.nullmailer.config.helohost | Sets the environment variable $HELOHOST which is used by the
SMTP protocol module to set the parameter given to the HELO command
|
| services.xserver.windowManager.bspwm.sxhkd.configFile | Path to the sxhkd configuration file
|
| services.spiped.config.<name>.disableKeepalives | Disable transport layer keep-alives.
|
| services.thanos.rule.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.fedimintd.<name>.nginx.config.http3 | Whether to enable the HTTP/3 protocol
|
| services.thanos.sidecar.objstore.config | Object store configuration
|
| services.thanos.compact.objstore.config | Object store configuration
|
| services.thanos.receive.objstore.config | Object store configuration
|
| services.gitlab-runner.configFile | Configuration file for gitlab-runner.
configFile takes precedence over services.
checkInterval and concurrent will be ignored too
|
| services.gitlab.workhorse.config | Configuration options to add to Workhorse's configuration
file
|
| services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.autorandr.profiles.<name>.config.<name>.scale.y | Vertical scaling factor/pixels.
|
| services.autorandr.profiles.<name>.config.<name>.scale.x | Horizontal scaling factor/pixels.
|
| services.fedimintd.<name>.nginx.config.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.nextcloud.config.adminpassFile | The full path to a file that contains the admin's password
|
| services.autorandr.profiles.<name>.config.<name>.rotate | Output rotate configuration.
|
| services.simplesamlphp.<name>.configDir | Path to the SimpleSAMLphp config directory.
|
| services.autorandr.profiles.<name>.config.<name>.enable | Whether to enable the output.
|
| services.fedimintd.<name>.nginx.config.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.lavalink.plugins.*.configName | The name of the plugin to use as the key for the plugin configuration.
|
| services.displayManager.dms-greeter.configHome | Path to a user's home directory from which to copy DankMaterialShell
configuration files
|
| services.thanos.query.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.store.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| hardware.fw-fanctrl.config.strategies.<name>.speedCurve | How should the speed curve look like
|
| services.thanos.query-frontend.tracing.config | Tracing configuration
|
| services.pulseaudio.configFile | The path to the default configuration options the PulseAudio server
should use
|
| services.autorandr.profiles.<name>.config.<name>.primary | Whether output should be marked as primary
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.port | External port number.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| services.iptsd.config.Touchscreen.DisableOnPalm | Ignore all touchscreen inputs if a palm was registered on the display.
|
| services.komodo-periphery.configFile | Path to the periphery configuration file
|
| services.thanos.rule.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.thanos.sidecar.reloader.config-envsubst-file | Output file for environment variable substituted config file.
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.fedimintd.<name>.nginx.config.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| services.tailscale.serve.configFile | Path to a Tailscale Serve configuration file in JSON format
|
| services.vdirsyncer.jobs.<name>.configFile | existing configuration file
|
| services.yggdrasil.configFile | A file which contains JSON or HJSON configuration for yggdrasil
|
| services.sillytavern.configFile | Path to the SillyTavern configuration file.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.root | Root directory for requests.
|
| services.autorandr.profiles.<name>.config.<name>.scale.method | Output scaling method.
|
| hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.temp | Temperature in °C at which the fan speed should be changed
|
| services.nextcloud.config.objectstore.s3.key | The access key for the S3 bucket.
|
| services.autorandr.profiles.<name>.config.<name>.position | Output position
|
| services.thanos.store.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.prometheus.alertmanager.configText | Alertmanager configuration as YAML text
|
| services.fedimintd.<name>.nginx.config.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| hardware.fw-fanctrl.config.strategies.<name>.speedCurve.*.speed | Percent how fast the fan should run at
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.port | Listener port number
|
| services.fedimintd.<name>.nginx.config.locations.<name>.alias | Alias directory for requests.
|
| services.fedimintd.<name>.nginx.config.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.index | Adds index directive.
|
| services.fedimintd.<name>.nginx.config.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.nextcloud.config.objectstore.s3.useSsl | Use SSL for objectstore access.
|
| services.nextcloud.config.objectstore.s3.port | Required for some non-Amazon implementations.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.scheme | URL scheme.
|
| services.thanos.downsample.tracing.config | Tracing configuration
|
| services.home-assistant.config.http.server_port | The port on which to listen.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.ip | Listener IP address or Unix socket path
|
| services.iptsd.config.Touchscreen.DisableOnStylus | Ignore all touchscreen inputs if a stylus is in proximity.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.tryFiles | Adds try_files directive.
|
| services.thanos.sidecar.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.receive.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.thanos.compact.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.nullmailer.config.allmailfrom | If set, content will override the envelope sender on all messages.
|
| hardware.fw-fanctrl.config.strategyOnDischarging | Default strategy on discharging
|
| services.autorandr.profiles.<name>.config.<name>.scale | Output scale configuration
|
| programs.sway.enable | Whether to enable Sway, the i3-compatible tiling Wayland compositor
|
| services.akkoma.config.":logger".":ex_syslogger".level | Log level
|
| services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.akkoma.config.":pleroma"."Pleroma.Upload".base_url | Base path which uploads will be stored at
|
| services.spiped.config.<name>.disableReresolution | Disable target address re-resolution.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.akkoma.config.":pleroma".":instance".upload_dir | Directory where Akkoma will put uploaded files.
|
| services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| services.nextcloud.config.objectstore.s3.bucket | The name of the S3 bucket.
|
| services.nullmailer.config.pausetime | The minimum time to pause between successive queue runs when there
are messages in the queue, in seconds
|
| services.fedimintd.<name>.nginx.config.sslCertificate | Path to server SSL certificate.
|
| services.nextcloud.config.objectstore.s3.region | Required for some non-Amazon implementations.
|
| services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| services.thanos.downsample.objstore.config | Object store configuration
|
| services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| services.fedimintd.<name>.nginx.config.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.home-assistant.config.http.server_host | Only listen to incoming requests on specific IP/host
|
| services.blockbook-frontend.<name>.configFile | Location of the blockbook configuration file.
|
| services.autorandr.profiles.<name>.config.<name>.transform | Refer to
xrandr(1)
for the documentation of the transform matrix.
|
| services.xserver.windowManager.qtile.configFile | Path to the qtile configuration file
|
| services.postgrest.settings.db-config | Enables the in-database configuration.
https://docs.postgrest.org/en/stable/references/configuration.html#in-database-configuration
This is enabled by default upstream, but disabled by default in this module.
|
| services.akkoma.config.":pleroma".":media_proxy".enabled | Whether to enable proxying of remote media through the instance's proxy.
|
| services.matterbridge.configPath | The path to the matterbridge configuration file.
|
| services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| services.fedimintd.<name>.nginx.config.sslCertificateKey | Path to server SSL certificate key.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.kubernetes.kubelet.cni.configDir | Path to Kubernetes CNI configuration directory.
|
| services.thanos.compact.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.thanos.receive.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.thanos.sidecar.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| services.akkoma.config.":pleroma".":instance".description | Instance description.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| services.nextcloud.config.objectstore.s3.secretFile | The full path to a file that contains the access secret.
|
| services.xserver.windowManager.mlvwm.configFile | Path to the mlvwm configuration file
|
| services.flannel.kubeconfig | Path to kubeconfig to use for storing flannel config using the
Kubernetes API
|
| services.caddy.resume | Use saved config, if any (and prefer over any specified configuration passed with --config).
|
| services.fedimintd.<name>.nginx.config.listen.*.extraParameters | Extra parameters of this listen directive.
|
| services.lirc.configs | Configurations for lircd to load, see man:lircd.conf(5) for details (lircd.conf)
|
| services.nullmailer.config.sendtimeout | The time to wait for a remote module listed above to complete sending
a message before killing it and trying again, in seconds
|
| services.pipewire.wireplumber.configPackages | List of packages that provide WirePlumber configuration, in the form of
share/wireplumber/*/*.conf files
|
| services.freeswitch.configTemplate | Configuration template to use
|
| services.nebula.networks.<name>.enableReload | Enable automatic config reload on config change
|
| services.prometheus.exporters.borgmatic.configFile | The path to the borgmatic config file
|
| services.nextcloud.config.objectstore.s3.hostname | Required for some non-Amazon implementations.
|
| virtualisation.containerd.configFile | Path to containerd config file
|
| services.nextcloud.config.objectstore.s3.usePathStyle | Required for some non-Amazon S3 implementations
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.thanos.query-frontend.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| services.fedimintd.<name>.nginx.config.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| services.nextcloud.config.objectstore.s3.enable | Whether to enable S3 object storage as primary storage
|
| services.akkoma.config.":pleroma".":media_proxy".base_url | Base path for the media proxy
|
| services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| services.home-assistant.config.homeassistant.name | Name of the location where Home Assistant is running.
|
| services.matterbridge.configFile | WARNING: THIS IS INSECURE, as your password will end up in
/nix/store, thus publicly readable
|
| networking.supplicant.<name>.configFile.path | External wpa_supplicant.conf configuration file
|
| services.fedimintd.<name>.nginx.config.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.apache-kafka.configFiles.log4jProperties | Kafka log4j property configuration file path
|
| services.crossfire-server.configFiles | Text to append to the corresponding configuration files
|
| services.prometheus.exporters.pve.collectors.config | Collect PVE onboot status
|
| hardware.fw-fanctrl.config.strategies.<name>.fanSpeedUpdateFrequency | How often the fan speed should be updated in seconds
|
| services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| services.fedimintd.<name>.nginx.config.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.displayManager.dms-greeter.configFiles | List of DankMaterialShell configuration files to copy into the greeter
data directory at /var/lib/dms-greeter
|
| hardware.fw-fanctrl.config.strategies.<name>.movingAverageInterval | Interval (seconds) of the last temperatures to use to calculate the average temperature
|
| services.akkoma.config.":joken".":default_signer" | JWT signing secret
|
| services.nextcloud.config.dbtableprefix | Table prefix in Nextcloud's database.
Note: since Nextcloud 20 it's not an option anymore to create a database
schema with a custom table prefix
|
| services.prometheus.exporters.sql.configFile | Path to configuration file.
|
| services.thanos.downsample.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.prometheus.exporters.json.configFile | Path to configuration file.
|
| services.prometheus.exporters.ipmi.configFile | Path to configuration file.
|
| services.apache-kafka.configFiles.serverProperties | Kafka server.properties configuration file path
|
| services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| services.prometheus.exporters.mail.configFile | Specify the mailexporter configuration file to use.
|
| services.rss-bridge.config.system.enabled_bridges | Only enabled bridges are available for feed production
|
| services.suricata.settings.reference-config-file | Suricata reference configuration file.
|
| networking.supplicant.<name>.configFile.writable | Whether the configuration file at configFile.path should be written to by
wpa_supplicant.
|
| services.thanos.downsample.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.fedimintd.<name>.nginx.config.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.ebusd.scanconfig | Pick CSV config files matching initial scan ("none" or empty for no initial scan message, "full" for full scan, or a single hex address to scan, default is to send a broadcast ident message)
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| services.nullmailer.config.doublebounceto | If the original sender was empty (the original message was a
delivery status or disposition notification), the double bounce
is sent to the address in this attribute.
|
| services.hylafax.faxqConfig | Attribute set of lines for the global
faxq config file etc/config
|
| services.home-assistant.config.homeassistant.latitude | Latitude of your location required to calculate the time the sun rises and sets.
|
| services.awstats.configs | Attribute set of domains to collect stats for.
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| services.snapper.configs.<name>.TIMELINE_CLEANUP | Defines whether the timeline cleanup algorithm should be run for the config.
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| services.snapper.configs | Subvolume configuration
|
| services.home-assistant.config.homeassistant.longitude | Longitude of your location required to calculate the time the sun rises and sets.
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| services.home-assistant.config.homeassistant.time_zone | Pick your time zone from the column TZ of Wikipedia’s list of tz database time zones.
|
| services.znc.useLegacyConfig | Whether to propagate the legacy options under
services.znc.confOptions.* to the znc config
|
| fonts.fontconfig.localConf | System-wide customization file contents, has higher priority than
defaultFonts settings.
|
| services.prometheus.exporters.blackbox.configFile | Path to configuration file.
|
| services.h2o.hosts | The hosts config to be merged with the settings
|
| fonts.fontconfig.allowType1 | Allow Type-1 fonts
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".signing_salt | Signing salt
|
| services.searx.configureNginx | Whether to configure nginx as an frontend to uwsgi.
|
| services.bird.checkConfig | Whether the config should be checked at build time
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| security.tpm2.fapi.tcti | The TCTI which will be used
|
| services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| services.kismet.extraConfig | Literal Kismet config lines appended to the site config
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| services.awstats.configs.<name>.type | The type of log being collected.
|
| services.opentelemetry-collector.configFile | Specify a path to a configuration file that Opentelemetry Collector should use.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| services.home-assistant.config.homeassistant.unit_system | The unit system to use
|
| services.movim.h2o.settings | Attrset to be transformed into YAML for host config
|
| fonts.fontconfig.cache32Bit | Generate system fonts cache for 32-bit applications.
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.age | Delete a file when it reaches a certain age
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| services.cyrus-imap.imapdSettings.configdirectory | The pathname of the IMAP configuration directory.
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| boot.loader.grub.configurationName | GRUB entry name instead of default.
|
| boot.loader.grub.configurationLimit | Maximum of configurations in boot menu
|
| services.dnscrypt-proxy.upstreamDefaults | Whether to base the config declared in services.dnscrypt-proxy.settings on the upstream example config (https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml)
Disable this if you want to declare your dnscrypt config from scratch.
|
| programs.dmrconfig.package | The dmrconfig package to use.
|
| services.hylafax.commonModemConfig | Attribute set of default values for
modem config files etc/config.*
|
| services.zammad.nginx.configure | Whether to configure a local nginx for Zammad.
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.type | The type of operation to perform on the file
|
| programs.neovim.configure | Generate your init file from your list of plugins and custom commands
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.group | The group of the file
|
| services.xserver.windowManager.herbstluftwm.configFile | Path to the herbstluftwm configuration file
|
| fonts.fontconfig.enable | If enabled, a Fontconfig configuration file will be built
pointing to a set of default fonts
|
| services.h2o.hosts.<name>.settings | Attrset to be transformed into YAML for host config
|
| services.nats.validateConfig | If true, validate nats config at build time
|
| services.dnscrypt-proxy2.upstreamDefaults | Whether to base the config declared in services.dnscrypt-proxy2.settings on the upstream example config (https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml)
Disable this if you want to declare your dnscrypt config from scratch.
|
| services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| fonts.fontconfig.allowBitmaps | Allow bitmap fonts
|
| services.mjolnir.settings | Additional settings (see mjolnir default config for available settings)
|
| services.frigate.preCheckConfig | This script gets run before the config is checked
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".live_view.signing_salt | LiveView signing salt
|
| services.pfix-srsd.configurePostfix | Whether to configure the required settings to use pfix-srsd in the local Postfix instance.
|
| services.librenms.extraConfig | Additional config for LibreNMS that will be appended to the config.php
|
| services.traefik.useEnvSubst | Whether to use envSubst in the ExecStartPre phase to augment the generated static config
|
| services.searx.configureUwsgi | Whether to run searx in uWSGI as a "vassal", instead of using its
built-in HTTP server
|
| services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| system.configurationRevision | The Git revision of the top-level flake from which this configuration was built.
|
| services.warpgate.settings.config_provider | Source of truth of users
|
| services.snapper.configs.<name>.FSTYPE | Filesystem type
|
| services.akkoma.config.":web_push_encryption" | Web Push Notifications configuration
|
| services.hedgedoc.configureNginx | Whether to configure nginx as a reverse proxy.
|
| services.castopod.configureNginx | Configure nginx as a reverse proxy for CastoPod.
|
| services.peertube.configureNginx | Configure nginx as a reverse proxy for peertube.
|
| services.klipper.mutableConfig | Whether to manage the config outside of NixOS
|
| services.envoy.requireValidConfig | Whether a failure during config validation at build time is fatal
|
| services.teleport.settings | Contents of the teleport.yaml config file
|
| services.dnsproxy.settings | Contents of the config.yaml config file
|
| programs.dmrconfig.enable | Whether to configure system to enable use of dmrconfig
|
| services.awstats.configs.<name>.logFile | The log file to be scanned
|
| services.go-autoconfig.enable | Whether to enable IMAP/SMTP autodiscover feature for mail clients.
|
| specialisation.<name>.configuration | Arbitrary NixOS configuration
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.argument | An argument whose meaning depends on the type of operation
|
| services.mimir.configuration | Specify the configuration for Mimir in Nix.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| services.mopidy.configuration | The configuration that Mopidy should use.
|
| services.awstats.configs.<name>.extraConfig | Extra configuration to be appended to awstats.${name}.conf.
|
| services.loki.configuration | Specify the configuration for Loki in Nix
|
| services.dolibarr.h2o.settings | Attrset to be transformed into YAML for host config
|
| services.awstats.configs.<name>.hostAliases | List of aliases the site has.
|
| services.awstats.configs.<name>.logFormat | The log format being used
|
| services.paperless.configureTika | Whether to configure Tika and Gotenberg to process Office and e-mail files with OCR.
|
| services.paperless.configureNginx | Whether to configure nginx as a reverse proxy.
|
| services.roundcube.configureNginx | Configure nginx as a reverse proxy for roundcube.
|
| services.pleroma.configs | Pleroma public configuration
|
| services.znc.dataDir | The state directory for ZNC
|
| services.activemq.configurationURI | The URI that is passed along to the BrokerFactory to
set up the configuration of the ActiveMQ broker service
|
| fonts.fontconfig.antialias | Enable font antialiasing
|
| services.zapret.configureFirewall | Whether to setup firewall routing so that system http(s) traffic is forwarded via this service
|
| services.wivrn.defaultRuntime | Whether to enable WiVRn as the default OpenXR runtime on the system
|
| containers.<name>.nixpkgs | A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container
|
| services.postsrsd.configurePostfix | Whether to configure the required settings to use postsrsd in the local Postfix instance.
|
| services.salt.master.configuration | Salt master configuration as Nix attribute set.
|
| programs.npm.enable | Whether to enable npm global config.
|
| services.go-autoconfig.settings | Configuration for go-autoconfig
|
| services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| fonts.fontconfig.defaultFonts.serif | System-wide default serif font(s)
|
| services.buildbot-master.configurators | Configurator Steps, see https://docs.buildbot.net/latest/manual/configuration/configurators.html
|
| services.cryptpad.configureNginx | Configure Nginx as a reverse proxy for Cryptpad
|
| environment.freetds | Configure freetds database entries
|
| services.salt.minion.configuration | Salt minion configuration as Nix attribute set
|
| qt.platformTheme | Selects the platform theme to use for Qt applications
|
| services.confd.watch | Confd, whether to watch etcd config for changes.
|
| services.home-assistant.config.homeassistant.temperature_unit | Override temperature unit set by unit_system. C for Celsius, F for Fahrenheit.
|
| services.activemq.configurationDir | The base directory for ActiveMQ's configuration
|
| fonts.fontconfig.useEmbeddedBitmaps | Use embedded bitmaps in fonts like Calibri.
|
| services.artalk.settings | The artalk configuration
|
| services.filesender.configureNginx | Configure nginx as a reverse proxy for FileSender.
|
| services.gokapi.mutableSettings | Allow changes to the program config made by the program to persist between restarts
|
| services.hylafax.hfaxdConfig | Attribute set of lines for the global
hfaxd config file etc/hfaxd.conf
|
| fonts.fontconfig.hinting.style | Hintstyle is the amount of font reshaping done to line up
to the grid.
slight will make the font more fuzzy to line up to the grid but
will be better in retaining font shape, while full will be a
crisp font that aligns well to the pixel grid but will lose a
greater amount of font shape.
|
| fonts.fontconfig.hinting.enable | Enable font hinting
|
| fonts.fontconfig.defaultFonts.sansSerif | System-wide default sans serif font(s)
|
| services.postfix-tlspol.configurePostfix | Whether to configure the required settings to use postfix-tlspol in the local Postfix instance.
|
| boot.loader.systemd-boot.configurationLimit | Maximum number of latest generations in the boot menu
|
| services.dawarich.configureNginx | Configure nginx as a reverse proxy for dawarich
|
| services.homebridge.uiSettings | Configuration options for homebridge config UI plugin
|
| services.promtail.configuration | Specify the configuration for Promtail in Nix
|
| services.nginx.sso.configuration | nginx-sso configuration
(documentation)
as a Nix attribute set
|
| services.awstats.configs.<name>.webService.enable | Whether to enable awstats web service.
|
| services.prometheus.alertmanager.configuration | Alertmanager configuration as nix attribute set
|
| services.nextcloud.configureRedis | Whether to configure Nextcloud to use the recommended Redis settings for small instances.
The Nextcloud system check recommends to configure either Redis or Memcache for file lock caching.
The notify_push app requires Redis to be configured
|
| systemd.extraConfig | Extra config options for systemd
|
| services.nsd.extraConfig | Extra nsd config.
|
| fonts.fontconfig.hinting.autohint | Enable the autohinter in place of the default interpreter
|
| services.fluent-bit.configurationFile | Fluent Bit configuration
|
| services.awstats.configs.<name>.webService.urlPrefix | The URL prefix under which the awstats pages appear.
|
| services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| services.matrix-synapse.configureRedisLocally | Whether to automatically configure a local redis server for matrix-synapse.
|
| services.snapper.configs.<name>.TIMELINE_CREATE | Defines whether hourly snapshots should be created.
|
| services.borgmatic.configurations | Set of borgmatic configurations, see https://torsion.org/borgmatic/docs/reference/configuration/
|
| services.vaultwarden.configureNginx | Whether to configure nginx to serve VaultWarden.
|
| services.gotosocial.settings | Contents of the GoToSocial YAML config
|
| services.snapper.configs.<name>.SUBVOLUME | Path of the subvolume or mount point
|
| fonts.fontconfig.subpixel.rgba | Subpixel order
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_DAILY | Limits for timeline cleanup.
|
| services.tailscale.derper.configureNginx | Whether to enable nginx reverse proxy for derper
|
| services.static-web-server.configuration | Configuration for Static Web Server
|
| services.v2ray.enable | Whether to run v2ray server
|
| boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| systemd.oomd.extraConfig | Extra config options for systemd-oomd
|
| services.akkoma.config.":web_push_encryption".":vapid_details".subject | mailto URI for administrative contact.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_YEARLY | Limits for timeline cleanup.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_WEEKLY | Limits for timeline cleanup.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_HOURLY | Limits for timeline cleanup.
|
| services.nextcloud.config.objectstore.s3.verify_bucket_exists | Create the objectstore bucket if it does not exist.
|
| services.quorum.privateconfig | Configuration of privacy transaction manager.
|
| services.awstats.configs.<name>.webService.hostname | The hostname the web service appears under.
|
| services.confd.backend | Confd config storage backend to use.
|
| services.gitea.customDir | Gitea custom directory
|
| services.skydns.domain | Skydns default domain if not specified by etcd config.
|
| services.mastodon.configureNginx | Configure nginx as a reverse proxy for mastodon
|
| services.pipewire.extraLv2Packages | List of packages that provide LV2 plugins in lib/lv2 that should
be made available to PipeWire for [filter chains][wiki-filter-chain]
|
| services.recyclarr.configuration | Recyclarr YAML configuration as a Nix attribute set
|
| systemd.user.extraConfig | Extra config options for systemd user instances
|
| fonts.fontconfig.defaultFonts.emoji | System-wide default emoji font(s)
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config | Configures the scrape request's TLS settings.
|
| services.acme-dns.settings.logconfig.loglevel | Level to log on.
|
| services.weblate.configurePostgresql | Whether to enable and configure a local PostgreSQL server by creating a user and database for weblate
|
| services.avahi.extraConfig | Extra config to append to avahi-daemon.conf.
|
| services.github-runners.<name>.tokenType | Type of token to use for runner registration
|
| boot.plymouth.extraConfig | Literal string to append to configFile
and the config file generated by the plymouth module.
|
| services.amazon-cloudwatch-agent.configuration | See configurationFile.
configurationFile takes precedence over configuration.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_MONTHLY | Limits for timeline cleanup.
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| fonts.fontconfig.defaultFonts.monospace | System-wide default monospace font(s)
|
| fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| programs.zsh.ohMyZsh.custom | Path to a custom oh-my-zsh package to override config of oh-my-zsh.
(Can't be used along with customPkgs).
|
| services.zitadel.steps | Contents of the database initialization config file
|
| services.journalwatch.extraConfig | Extra lines to be added verbatim to the journalwatch/config configuration file
|
| services.kubernetes.kubeconfig.caFile | Default kubeconfig certificate authority file used to connect to kube-apiserver.
|
| services.vaultwarden.configurePostgres | Whether to configure a local PostgreSQL server.
|
| services.akkoma.config.":web_push_encryption".":vapid_details".public_key | base64-encoded public ECDH key.
|
| services.kubernetes.kubeconfig.keyFile | Default kubeconfig client key file used to connect to kube-apiserver.
|
| services.cntlm.extraConfig | Additional config appended to the end of the generated cntlm.conf.
|
| boot.loader.limine.extraConfig | A string which is prepended to limine.conf
|
| services.nsd.zones.<name>.data | The actual zone data
|
| services.turn-rs.settings | Turn-rs server config file
|
| services.conman.enable | Whether to enable Enable the conman Console manager
|
| services.prometheus.sachet.configuration | Sachet's configuration as a nix attribute set.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config | TLS configuration.
|
| services.kubernetes.kubeconfig.certFile | Default kubeconfig client certificate file used to connect to kube-apiserver.
|
| boot.loader.limine.enrollConfig | Whether or not to enroll the config
|
| services.hadoop.extraConfDirs | Directories containing additional config files to be added to HADOOP_CONF_DIR
|
| services.nginx.virtualHosts | Declarative vhost config
|
| services.kubernetes.kubeconfig.server | Default kubeconfig kube-apiserver server address.
|
| services.movim.podConfig | Pod configuration (values from php daemon.php config --help)
|
| systemd.sleep.extraConfig | Extra config options for systemd sleep state logic
|
| virtualisation.lxc.defaultConfig | Default config (default.conf) for new containers, i.e. for
network config
|
| virtualisation.vmware.host.extraConfig | Add extra config to /etc/vmware/config
|
| services.akkoma.config.":web_push_encryption".":vapid_details".private_key | base64-encoded private ECDH key
|
| services.athens.extraConfig | Extra configuration options for the athens config file.
|
| services.prometheus.remoteRead.*.tls_config | Configures the remote read request's TLS settings.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.dwm-status.extraConfig | Extra config in TOML format.
|
| services.athens.basicAuthPass | Password for basic auth
|
| services.goss.settings | The global options in config file in yaml format
|
| boot.loader.generic-extlinux-compatible.configurationLimit | Maximum number of configurations in the boot menu.
|
| containers.<name>.path | As an alternative to specifying
config, you can specify the path to
the evaluated NixOS system configuration, typically a
symlink to a system profile.
|
| services.kubernetes.proxy.kubeconfig.caFile | Kubernetes proxy certificate authority file used to connect to kube-apiserver.
|
| boot.modprobeConfig.enable | Whether to enable modprobe config
|
| services.artalk.allowModify | allow Artalk store the settings to config file persistently
|
| security.polkit.extraConfig | Any polkit rules to be added to config (in JavaScript ;-)
|
| services.prometheus.remoteWrite.*.tls_config | Configures the remote write request's TLS settings.
|
| services.kubernetes.proxy.kubeconfig.keyFile | Kubernetes proxy client key file used to connect to kube-apiserver.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config | TLS configuration.
|
| services.nextcloud-spreed-signaling.configureNginx | Whether to set up and configure an nginx virtual host according to upstream's recommendations
|
| services.simplesamlphp.<name>.configureNginx | Configure nginx as a reverse proxy for SimpleSAMLphp.
|
| services.datadog-agent.diskCheck | Disk check config
|
| services.crab-hole.settings | Crab-holes config
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config | Configures the Consul request's TLS settings.
|
| services.snapper.configs.<name>.TIMELINE_LIMIT_QUARTERLY | Limits for timeline cleanup.
|
| services.kubernetes.proxy.kubeconfig.certFile | Kubernetes proxy client certificate file used to connect to kube-apiserver.
|
| boot.loader.limine.extraEntries | A string which is appended to the end of limine.conf
|
| services.skydns.extraConfig | Skydns attribute set of extra config options passed as environment variables.
|
| services.kubernetes.proxy.kubeconfig.server | Kubernetes proxy kube-apiserver server address.
|
| services.crowdsec.settings.console.configuration | Attributes inside the console.yaml file.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.exporters.snmp.configuration | Snmp exporter configuration as nix attribute set
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| services.prometheus.exporters.sql.configuration | Exporter configuration as nix attribute set
|
| services.dgraph.settings | Contents of the dgraph config
|
| services.prosody.checkConfig | Check the configuration file with prosodyctl check config
|
| services.prometheus.exporters.snmp.configurationPath | Path to a snmp exporter configuration file
|
| services.logind.extraConfig | Extra config options for systemd-logind
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.exporters.idrac.configuration | Configuration for iDRAC exporter, as a nix attribute set
|
| services.kubernetes.kubelet.kubeconfig.caFile | Kubelet certificate authority file used to connect to kube-apiserver.
|
| services.zenohd.settings | Config options for zenoh.json5 configuration file
|
| services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.prometheus.scrapeConfigs.*.tls_config | Configures the scrape request's TLS settings.
|
| services.kubernetes.kubelet.kubeconfig.keyFile | Kubelet client key file used to connect to kube-apiserver.
|
| services.libretranslate.configureNginx | Configure nginx as a reverse proxy for LibreTranslate.
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| services.dae.openFirewall.port | Port to be opened
|
| services.gammu-smsd.extraConfig.smsd | Extra config lines to be added into [smsd] section
|
| services.oauth2-proxy.extraConfig | Extra config to pass to oauth2-proxy.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config | TLS configuration.
|
| services.amazon-cloudwatch-agent.configurationFile | Amazon CloudWatch Agent configuration file
|
| programs.htop.settings | Extra global default configuration for htop
which is read on first startup only
|
| services.caddy.globalConfig | Additional lines of configuration appended to the global config section
of the Caddyfile
|
| services.gokapi.settings | Configuration settings for the generated config json file
|
| services.zerobin.extraConfig | Extra configuration to be appended to the 0bin config file
(see https://0bin.readthedocs.org/en/latest/en/options.html)
|
| services.kubernetes.kubelet.kubeconfig.certFile | Kubelet client certificate file used to connect to kube-apiserver.
|
| boot.initrd.systemd.extraConfig | Extra config options for systemd
|
| services.athens.githubToken | Creates .netrc file with the given token to be used for GitHub
|
| services.collectd.include | Additional paths to load config from.
|
| services.forgejo.useWizard | Whether to use the built-in installation wizard instead of
declaratively managing the app.ini config file in nix.
|
| services.keter.globalKeterConfig | Global config for keter, see https://github.com/snoyberg/keter/blob/master/etc/keter-config.yaml for reference
|
| services.bind.zones.<name>.extraConfig | Extra zone config to be appended at the end of the zone section.
|
| services.znc.confOptions.extraZncConf | Extra config to znc.conf file.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| services.kubernetes.kubelet.kubeconfig.server | Kubelet kube-apiserver server address.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.grav.systemSettings | Settings written to user/config/system.yaml.
|
| services.dwm-status.settings | Config options for dwm-status, see https://github.com/Gerschtli/dwm-status#configuration
for available options.
|
| services.cgminer.hardware | List of config options for every GPU
|
| services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.squid.validateConfig | Validate config syntax.
|
| services.static-web-server.root | The location of files for SWS to serve
|
| services.kubernetes.pki.etcClusterAdminKubeconfig | Symlink a kubeconfig with cluster-admin privileges to environment path
(/etc/<path>).
|
| services.gitlab.extraGitlabRb | Extra configuration to be placed in config/extra-gitlab.rb
|
| services.resolved.extraConfig | Extra config to append to resolved.conf.
|
| services.gammu-smsd.extraConfig.gammu | Extra config lines to be added into [gammu] section
|
| services.opengfw.settings | Settings passed to OpenGFW. Example config
|
| services.snapraid.extraConfig | Extra config options for SnapRAID.
|
| services.minidlna.enable | Whether to enable MiniDLNA, a simple DLNA server
|
| services.sanoid.settings | Free-form settings written directly to the config file
|
| services.prometheus.exporters.sql.configuration.jobs | An attrset of metrics scraping jobs to run.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.matrix-synapse.settings.log_config | The file that holds the logging configuration.
|
| programs.neovim.enable | Whether to enable Neovim
|
| services.qui.settings | qui configuration options
|
| services.taler.settings | Global configuration options for the taler config file
|
| services.prometheus.remoteRead.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.collectd.plugins | Attribute set of plugin names to plugin config segments
|
| services.fluentd.plugins | A list of plugin paths to pass into fluentd
|
| services.dovecot2.quotaPort | The Port the dovecot quota service binds to
|
| services.prefect.workerPools | define a set of worker pools with submodule config. example:
workerPools.my-pool = {
installPolicy = "never";
};
|
| services.marytts.voices | Paths to the JAR files that contain additional voices for MaryTTS
|
| services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config | TLS configuration.
|
| services.dovecot2.extraConfig | Additional entries to put verbatim into Dovecot's config file.
|
| services.blocky.enableConfigCheck | Whether to enable checking the config during build time.
|
| services.public-inbox.settings | Settings for the public-inbox config file.
|
| services.taler.includes | Files to include into the config file using Taler's @inline@ directive
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.remoteWrite.*.queue_config | Configures the queue used to write to remote storage.
|
| services.jitsi-meet.extraConfig | Text to append to config.js web application config file
|
| services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| services.goeland.settings | Configuration of goeland
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.seafile.seahubExtraConf | Extra config to append to seahub_settings.py file
|
| services.gns3-server.settings | The global options in config file in ini format
|
| services.bird.preCheckConfig | Commands to execute before the config file check
|
| systemd.coredump.extraConfig | Extra config options for systemd-coredump
|
| services.prometheus.exporters.imap-mailstat.configurationFile | File containing the configuration
|
| services.prometheus.exporters.dnssec.configuration | dnssec exporter configuration as nix attribute set
|
| services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| services.kubernetes.scheduler.kubeconfig.caFile | Kubernetes scheduler certificate authority file used to connect to kube-apiserver.
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.athens.storage.s3.token | Token for the S3 storage backend
|
| services.forgejo.customDir | Base directory for custom templates and other options
|
| services.davis.nginx.locations | Declarative location config
|
| services.slskd.nginx.locations | Declarative location config
|
| services.maubot.settings.server | Listener config
|
| services.movim.nginx.locations | Declarative location config
|
| services.kubernetes.scheduler.kubeconfig.keyFile | Kubernetes scheduler client key file used to connect to kube-apiserver.
|
| nix.settings | Configuration for Nix, see
https://nixos.org/manual/nix/stable/command-ref/conf-file.html or
nix.conf(5) for available options
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.nginx.appendHttpConfig | Configuration lines to be appended to the generated http block
|
| services.mopidy.extraConfigFiles | Extra config file read by Mopidy when the service starts
|
| services.prometheus.exporters.junos-czerwonk.configuration | JunOS exporter configuration as nix attribute set
|
| services.prometheus.exporters.mikrotik.configuration | Mikrotik exporter configuration as nix attribute set
|
| services.postsrsd.socketPath | Path to the Unix socket for connecting to postsrsd
|
| services.datadog-agent.networkCheck | Network check config
|
| boot.swraid.enable | Whether to enable support for Linux MD RAID arrays
|
| services.slurm.extraConfigPaths | Slurm expects config files for plugins in the same path
as slurm.conf
|
| services.snipe-it.nginx.locations | Declarative location config
|
| services.prometheus.exporters.junos-czerwonk.configurationFile | Specify the JunOS exporter configuration file to use.
|
| services.kubernetes.scheduler.kubeconfig.certFile | Kubernetes scheduler client certificate file used to connect to kube-apiserver.
|
| security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.kubernetes.scheduler.kubeconfig.server | Kubernetes scheduler kube-apiserver server address.
|
| services.lubelogger.dataDir | Path to LubeLogger config and metadata inside of /var/lib/.
|
| services.warpgate.enable | Whether to enable Warpgate
|
| services.borgmatic.configurations.<name>.repositories.*.path | Path to the repository
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.datadog-agent.extraConfig | Extra configuration options that will be merged into the
main config file datadog.yaml.
|
| services.collectd.extraConfig | Extra configuration for collectd
|
| services.prometheus.exporters.mail.configuration.servers.*.to | Content of 'To' Header for probing mails.
|
| services.matrix-synapse.settings.app_service_config_files | A list of application service config file to use
|
| services.mattermost.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) which sets config options
for mattermost (see the Mattermost documentation)
|
| services.bitlbee.extraSettings | Will be inserted in the Settings section of the config file.
|
| networking.dhcpcd.extraConfig | Literal string to append to the config file generated for dhcpcd.
|
| services.journald.extraConfig | Extra config options for systemd-journald
|
| services.bitlbee.extraDefaults | Will be inserted in the Default section of the config file.
|
| services.athens.storage.gcp.jsonKey | Base64 encoded GCP service account key
|
| services.dnsproxy.flags | A list of extra command-line flags to pass to dnsproxy
|
| services.varnish.enableConfigCheck | Whether to enable checking the config during build time.
|
| i18n.inputMethod.fcitx5.ignoreUserConfig | Ignore the user configures. Warning: When this is enabled, the
user config files are totally ignored and the user dict can't be saved
and loaded.
|
| services.prometheus.scrapeConfigs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.borgmatic.configurations.<name>.repositories.*.label | Label to the repository
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.libeufin.settings | Global configuration options for the libeufin bank system config file.
|
| services.lokinet.settings | Configuration for Lokinet
|
| services.prometheus.exporters.mail.configuration.servers.*.port | Port to use for SMTP.
|
| services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file | Optional path to a kubeconfig file
|
| services.polaris.settings | Contents for the TOML Polaris config, applied each start
|
| services.prometheus.exporters.mail.configuration.servers.*.from | Content of 'From' Header for probing mails.
|
| services.gancio.nginx.locations | Declarative location config
|
| programs.zsh.enableGlobalCompInit | Enable execution of compinit call for all interactive zsh shells
|
| services.akkoma.nginx.locations | Declarative location config
|
| services.fluidd.nginx.locations | Declarative location config
|
| services.pihole-ftl.useDnsmasqConfig | Import options defined in services.dnsmasq.settings via
misc.dnsmasq_lines in Pi-hole's config.
|
| services.monica.nginx.locations | Declarative location config
|
| services.matomo.nginx.locations | Declarative location config
|
| services.epgstation.usePreconfiguredStreaming | Use preconfigured default streaming options
|
| services.pipewire.wireplumber.extraLv2Packages | List of packages that provide LV2 plugins in lib/lv2 that should
be made available to WirePlumber for [filter chains][wiki-filter-chain]
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| security.loginDefs.settings | Config options for the /etc/login.defs file, that defines
the site-specific configuration for the shadow password suite
|
| services.hound.settings | The full configuration of the Hound daemon
|
| services.radicale.settings | Configuration for Radicale
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.athens.storage.s3.secret | Secret key for the S3 storage backend
|
| services.supybot.plugins | Attribute set of additional plugins that will be symlinked to the
plugin subdirectory
|
| services.lighttpd.extraConfig | These configuration lines will be appended to the generated lighttpd
config file
|
| services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.frigate.settings | Frigate configuration as a nix attribute set
|
| services.lidarr.settings | Attribute set of arbitrary config options
|
| services.sonarr.settings | Attribute set of arbitrary config options
|
| services.radarr.settings | Attribute set of arbitrary config options
|
| services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| services.vector.validateConfig | Enable the checking of the vector config during build time
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| services.prometheus.exporters.mail.configuration.mailCheckTimeout | Timeout until mails are considered "didn't make it".
|
| services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.nginx.appendConfig | Configuration lines appended to the generated Nginx
configuration file
|
| services.gitlab.extraDatabaseConfig | Extra configuration in config/database.yml.
|
| nixpkgs.crossSystem | Systems with a recently generated hardware-configuration.nix
may instead specify only nixpkgs.buildPlatform,
or fall back to removing the nixpkgs.hostPlatform line from the generated config
|
| services.prometheus.exporters.mail.configuration.servers.*.server | Hostname of the server that should be probed.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.lact.settings | Settings for LACT
|
| services.webdav-server-rs.settings | Attrset that is converted and passed as config file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config | TLS configuration.
|
| services.miniupnpd.appendConfig | Configuration lines appended to the MiniUPnP config.
|
| services.strongswan.setup | A set of options for the ‘config setup’ section of the
ipsec.conf file
|
| _module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| services.jenkins.jobBuilder.accessUser | User id in Jenkins used to reload config.
|
| services.jupyter.kernels | Declarative kernel config
|
| services.saunafs.master.settings | Contents of config file (sfsmaster.cfg(5)).
|
| services.swapspace.settings | Config file for swapspace
|
| services.orangefs.server.extraConfig | Extra config for the global section.
|
| services.workout-tracker.settings | Extra config options.
|
| services.nginx.prependConfig | Configuration lines prepended to the generated Nginx
configuration file
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| services.firewalld.settings | FirewallD config file
|
| services.timesyncd.extraConfig | Extra config options for systemd-timesyncd
|
| services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.mailman.serve.uwsgiSettings | Extra configuration to merge into uwsgi config.
|
| services.readarr.settings | Attribute set of arbitrary config options
|
| systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.athens.index.mysql.password | Password for the MySQL database
|
| services.athens.storage.minio.secret | Secret key for the minio storage backend
|
| services.rspamd.workers.<name>.extraConfig | Additional entries to put verbatim into worker section of rspamd config file.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config | TLS configuration.
|
| services.jupyter.notebookConfig | Raw jupyter config
|
| services.prometheus.remoteRead.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.kubernetes.controllerManager.kubeconfig.caFile | Kubernetes controller manager certificate authority file used to connect to kube-apiserver.
|
| services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| services.keepalived.vrrpScripts | Declarative vrrp script config
|
| services.bluemap.storage.<name>.storage-type | Type of storage config
|
| services.dnscrypt-proxy.settings | Attrset that is converted and passed as TOML config file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.exporters.mail.configuration.disableFileDeletion | Disables the exporter's function to delete probing mails.
|
| services.scanservjs.settings | Config to set in config.local.js's afterConfig.
|
| services.kubernetes.controllerManager.kubeconfig.keyFile | Kubernetes controller manager client key file used to connect to kube-apiserver.
|
| programs.hyprland.enable | Whether to enable Hyprland, the dynamic tiling Wayland compositor that doesn't sacrifice on its looks
|
| services.headscale.settings | Overrides to config.yaml as a Nix attribute set
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs | List of DNS service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs | List of EC2 service discovery configurations.
|
| services.coturn.listening-ips | Listener IP addresses of relay server
|
| services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.orangefs.server.fileSystems | These options will create the <FileSystem> sections of config file.
|
| services.prometheus.remoteWrite.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.kubernetes.controllerManager.kubeconfig.certFile | Kubernetes controller manager client certificate file used to connect to kube-apiserver.
|
| networking.openconnect.interfaces.<name>.extraOptions | Extra config to be appended to the interface config
|
| services.hardware.lcd.server.extraConfig | Additional configuration added verbatim to the server config.
|
| services.hardware.lcd.client.extraConfig | Additional configuration added verbatim to the client config.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.pulseaudio.extraConfig | Literal string to append to configFile
and the config file generated by the pulseaudio module.
|
| services.kubernetes.controllerManager.kubeconfig.server | Kubernetes controller manager kube-apiserver server address.
|
| services.prometheus.scrapeConfigs.*.static_configs | List of labeled target groups for this job.
|
| services.fediwall.nginx.locations | Declarative location config
|
| security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| services.kanboard.nginx.locations | Declarative location config
|
| services.dolibarr.nginx.locations | Declarative location config
|
| services.agorakit.nginx.locations | Declarative location config
|
| services.librenms.nginx.locations | Declarative location config
|
| services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| services.tandoor-recipes.extraConfig | Extra tandoor recipes config options
|
| services.pixelfed.nginx.locations | Declarative location config
|
| services.mainsail.nginx.locations | Declarative location config
|
| services.monado.defaultRuntime | Whether to enable Monado as the default OpenXR runtime on the system
|
| services.dnscrypt-proxy2.settings | Attrset that is converted and passed as TOML config file
|
| services.hadoop.hbase.rest.restartIfChanged | Restart rest con config change.
|
| security.auditd.plugins.<name>.settings | Plugin-specific config file to link to /etc/audit/.conf
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs | List of Google Compute Engine service discovery configurations
|
| services.prowlarr.settings | Attribute set of arbitrary config options
|
| services.whisparr.settings | Attribute set of arbitrary config options
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.caddy.adapter | Name of the config adapter to use
|
| services.gotify.environment | Config environment variables for the gotify-server
|
| security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.prometheus.exporters.mail.configuration.servers.*.detectionDir | Directory in which new mails for the exporter user are placed
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| services.prometheus.remoteWrite.*.queue_config.capacity | Number of samples to buffer per shard before we block reading of more
samples from the WAL
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config | TLS configuration.
|
| services.radicle.httpd.nginx.locations | Declarative location config
|
| services.tuliprox.systemSettings | Main config file
Refer to the Tuliprox documentation for available attributes
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port | The port number used if the query type is not SRV.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| programs.miriway.enable | Whether to enable Miriway, a Mir based Wayland compositor
|
| services.lldap.environment | Environment variables passed to the service
|
| services.searx.settingsFile | The path of the Searx server settings.yml file
|
| services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.thinkfan.settings | Thinkfan settings
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.type | The type of DNS query to perform
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.zone | The zone of the scrape targets
|
| services.prometheus.remoteWrite.*.metadata_config | Configures the sending of series metadata to remote storage
|
| services.libeufin.bank.settings | Configuration options for the libeufin bank system config file
|
| services.prometheus.remoteWrite.*.queue_config.max_shards | Maximum number of shards, i.e. amount of concurrency.
|
| services.prometheus.remoteWrite.*.queue_config.min_shards | Minimum number of shards, i.e. amount of concurrency.
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names | A list of DNS SRV record names to be queried.
|
| services.prometheus.scrapeConfigs.*.relabel_configs | List of relabel configurations.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| services.anuko-time-tracker.nginx.locations | Declarative location config
|
| services.orangefs.server.extraDefaults | Extra config for <Defaults> section.
|
| services.mosquitto.includeDirs | Directories to be scanned for further config files to include
|
| services.swapspace.installWrapper | This will add swapspace wrapped with the generated config, to environment.systemPackages
|
| services.moodle.virtualHost.locations | Declarative location config
|
| services.nginx.virtualHosts.<name>.locations | Declarative location config
|
| services.nagios.virtualHost.locations | Declarative location config
|
| services.vmagent.prometheusConfig | Config for prometheus style metrics
|
| services.prometheus.exporters.mail.configuration.monitoringInterval | Time interval between two probe attempts.
|
| services.asterisk.confFiles | Sets the content of config files (typically ending with
.conf) in the Asterisk configuration directory
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs | List of Kuma service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.file_sd_configs | List of file service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs | List of HTTP service discovery configurations.
|
| i18n.inputMethod.fcitx5.settings.globalOptions | The global options in config file in ini format.
|
| services.spamassassin.initPreConf | The SpamAssassin init.pre config.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.prometheus.remoteWrite.*.metadata_config.send | Whether metric metadata is sent to remote storage or not.
|
| services.libeufin.nexus.settings | Configuration options for the libeufin nexus config file
|
| services.taler.exchange.settings | Configuration options for the taler exchange config file
|
| services.taler.merchant.settings | Configuration options for the taler merchant config file
|
| services.prometheus.scrapeConfigs.*.static_configs.*.labels | Labels assigned to all metrics scraped from the targets.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.bookstack.nginx.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region | The AWS Region
|
| services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.url | URL from which the targets are fetched.
|
| services.hadoop.hbase.master.restartIfChanged | Restart master con config change.
|
| services.gitlab.backup.uploadOptions | GitLab automatic upload specification
|
| services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| services.hadoop.hbase.thrift.restartIfChanged | Restart thrift con config change.
|
| services.ntpd-rs.useNetworkingTimeServers | Use source time servers from networking.timeServers in config.
|
| services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.project | The GCP Project.
|
| services.usbguard.rules | The USBGuard daemon will load this as the policy rule set
|
| services.prometheus.remoteWrite.*.queue_config.max_backoff | Maximum retry delay.
|
| services.prometheus.scrapeConfigs.*.static_configs.*.targets | The targets specified by the target group.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.snips-sh.settings | The configuration of snips-sh is done through environment variables,
therefore you must use upper snake case (e.g. SNIPS_HTTP_INTERNAL)
|
| services.renovate.validateSettings | Whether to run renovate's config validator on the built configuration.
|
| services.sitespeed-io.runs.*.settings | Configuration for sitespeed-io, see
https://www.sitespeed.io/documentation/sitespeed.io/configuration/
for available options
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| services.prometheus.remoteWrite.*.queue_config.min_backoff | Initial retry delay
|
| services.keepalived.vrrpInstances | Declarative vhost config
|
| services.postfix.submissionOptions | Options for the submission config in master.cf
|
| services.rkvm.client.settings.password | Shared secret token to authenticate the client
|
| services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| services.rkvm.server.settings.password | Shared secret token to authenticate the client
|
| services.lighttpd.mod_status | Show server status overview at /server-status, statistics at
/server-statistics and list of loaded modules at /server-config.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters | Filters can be used optionally to filter the instance list by other criteria.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.stash.mutableSettings | Whether the Stash config.yml is writeable by Stash
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter | Filter can be used optionally to filter the instance list by other
criteria Syntax of this filter string is described here in the filter
query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
|
| services.jenkins.jobBuilder.accessToken | User token in Jenkins used to reload config
|
| services.jirafeau.nginxConfig.locations | Declarative location config
|
| services.mympd.settings.http_port | The HTTP port where mympd's web interface will be available
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.caddy.settings | Structured configuration for Caddy to generate a Caddy JSON configuration file
|
| services.opencloud.settings | Additional YAML configuration for OpenCloud services
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint | Custom endpoint to be used.
|
| services.komodo-periphery.extraSettings | Extra settings to add to the generated TOML config.
|
| services.athens.index.postgres.password | Password for the Postgres database
|
| services.athens.singleFlight.redis.password | Password for the redis server
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name | See this list
for the available filters.
|
| nixpkgs.localSystem | Systems with a recently generated hardware-configuration.nix
do not need to specify this option, unless cross-compiling, in which case
you should set only nixpkgs.buildPlatform
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs | List of Azure service discovery configurations.
|
| services.send.environment | All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,
some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables
Values under services.send.environment will override the predefined values in the Send service.
- Time/duration should be in seconds
- Filesize values should be in bytes
|
| services.paperless.settings | Extra paperless config options
|
| services.zabbixWeb.nginx.virtualHost.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs | List of Uyuni Serverset service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs | List of AirBnB's Nerve service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.file_sd_configs.*.files | Patterns for files from which target groups are extracted
|
| services.asterisk.useTheseDefaultConfFiles | Sets these config files to the default content
|
| services.bcg.environmentFiles | File to load as environment file
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| services.dashy.enable | Whether to enable Dashy, a highly customizable, easy to use, privacy-respecting dashboard app
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server | Address of the Kuma Control Plane's MADS xDS server.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values | Value of the filter.
|
| services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| services.jupyterhub.kernels | Declarative kernel config
Kernels can be declared in any language that supports and has
the required dependencies to communicate with a jupyter server
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.action | Action to perform based on regex matching
|
| services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| services.cross-seed.useGenConfigDefaults | Whether to use the option defaults from the configuration generated by
cross-seed gen-config
|
| services.zabbixWeb.httpd.virtualHost.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.livekit.ingress.settings.rtc_config.port_range_end | End of UDP port range for WebRTC
|
| programs.nix-required-mounts.allowedPatterns | The hook config, describing which paths to mount for which system features
|
| services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| services.rathole.credentialsFile | Path to a TOML file to be merged with the settings
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| services.glusterfs.killMode | The systemd KillMode to use for glusterd.
glusterd spawns other daemons like gsyncd
|
| services.hadoop.hbase.regionServer.restartIfChanged | Restart regionServer con config change.
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths | Paths can point to a single service, or the root of a tree of services.
|
| services.nextcloud-spreed-signaling.stateDir | Directory used for state & config files.
|
| services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| services.kanidm.provision.autoRemove | Determines whether deleting an entity in this provisioning config should automatically
cause them to be removed from kanidm, too
|
| services.librespeed.settings | LibreSpeed configuration written as Nix expression
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.server | The URL to connect to the Uyuni server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.k3s.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs | List of Consul service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs | List of Linode service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs | List of Docker service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs | List of Eureka service discovery configurations.
|
| services.spacecookie.settings | Settings for spacecookie
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs | List of Triton Serverset service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| services.rke2.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/rke2/agent/etc/containerd/config.toml.tmpl
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key | The AWS API key secret
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key | The AWS API key id
|
| services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| services.temporal.restartIfChanged | Automatically restart the service on config change
|
| services.saunafs.metalogger.settings | Contents of metalogger config file (see sfsmetalogger.cfg(5)).
|
| services.quickwit.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.servers | The Zookeeper servers.
|
| services.spark.worker.restartIfChanged | Automatically restart worker service on config change
|
| services.spark.master.restartIfChanged | Automatically restart master service on config change
|
| services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| services.mediagoblin.pluginPackages | Plugins to add to the environment of MediaGoblin
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout | Timeout value
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host | Address of the Docker daemon.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.hadoop.hdfs.zkfc.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.token | Consul token
|
| services.gokapi.environment.GOKAPI_CONFIG_DIR | Sets the directory for the config file.
|
| virtualisation.lxc.systemConfig | This is the system-wide LXC config
|
| virtualisation.lxc.bridgeConfig | This is the config file for override lxc-net bridge default settings.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| services.athens.storage.azureblob.accountKey | Account key for the Azure Blob storage backend
|
| services.mautrix-whatsapp.settings | config.yaml configuration as a Nix attribute set
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tags | An optional list of tags used to filter nodes for a given
service
|
| services.matrix-synapse.workers.<name>.worker_log_config | The file for log configuration
|
| services.gokapi.environment.GOKAPI_CONFIG_FILE | Sets the filename for the config file.
|
| services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.server | The URL to connect to the Eureka server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth | Authentication information used to authenticate to the API server.
password and password_file are mutually exclusive.
|
| services.audiobookshelf.dataDir | Path to Audiobookshelf config and metadata inside of /var/lib.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs | List of Hetzner service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.scheme | Consul scheme
Defaults to http in prometheus
when set to null.
|
| services.livekit.ingress.settings.rtc_config.use_external_ip | When set to true, attempts to discover the host's public IP via STUN
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server | Consul server to query
|
| services.postgresql.ensureUsers | Ensures that the specified users exist
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id | Optional client ID
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id | Optional tenant ID
|
| services.limesurvey.virtualHost.locations | Declarative location config
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.saunafs.chunkserver.settings | Contents of chunkserver config file (see sfschunkserver.cfg(5)).
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.account | The account to use for discovering new targets.
|
| services.livekit.ingress.settings.rtc_config.port_range_start | Start of UDP port range for WebRTC
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups | A list of groups for which targets are retrieved, only supported when targeting the container role
|
| services.hadoop.hdfs.httpfs.restartIfChanged | Automatically restart the service on config change
|
| services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| services.mediawiki.httpd.virtualHost.locations | Declarative location config
|
| services.gitlab.pages.settings | Configuration options to set in the GitLab Pages config
file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters | Optional filters to limit the discovery process to a subset of available resources.
|
| boot.kernelPatches | A list of additional patches to apply to the kernel
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator | The string by which Uyuni group names are joined into the groups label
Defaults to , in prometheus
when set to null.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.version | The Triton discovery API version
|
| services.firefox-syncserver.settings | Settings for the sync server
|
| services.druid.overlord.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.hbase.regionServer.overrideHosts | Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix
Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records
or /etc/hosts entries.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username | Consul username
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.password | Consul password
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.keepalived.vrrpInstances.<name>.virtualIps | Declarative vhost config
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.pangolin.environmentFile | Path to a file containing sensitive environment variables for Pangolin
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.services | A list of services for which targets are retrieved.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.role | The Hetzner role of entities that should be discovered
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role | The type of targets to discover, can be set to:
- "container" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton
- "cn" to discover compute nodes (servers/global zones) making up the Triton infrastructure
Defaults to container in prometheus
when set to null.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.transmission.settings | Settings whose options overwrite fields in
.config/transmission-daemon/settings.json
(each time the service starts)
|
| services.postfix.submissionsOptions | Options for the submission config via smtps in master.cf.
smtpd_tls_security_level will be set to encrypt, if it is missing
or has one of the values "may" or "none".
smtpd_tls_wrappermode with value "yes" will be added automatically.
|
| services.wordpress.sites.<name>.virtualHost.locations | Declarative location config
|
| virtualisation.lxc.lxcfs.enable | This enables LXCFS, a FUSE filesystem for LXC
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.endpoint | The Triton discovery endpoint (e.g. cmon.us-east-3b.triton.zone)
|
| services.ocis.environment | Extra config options
|
| services.mattermost.mutableConfig | Whether the Mattermost config.json is writeable by Mattermost
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.values | Value for the filter.
|
| services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| services.limesurvey.nginx.virtualHost.locations | Declarative location config
|
| services.opensearch.restartIfChanged | Automatically restart the service on config change
|
| virtualisation.lxc.usernetConfig | This is the config file for managing unprivileged user network
administration access in LXC
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name | Name of the filter
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs | List of Scaleway service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs | List of PuppetDB service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs | List of Marathon service discovery configurations.
|
| services.druid.middleManager.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.target_label | Label to which the resulting value is written in a replace action
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.node_meta | Node metadata used to filter nodes for a given service.
|
| security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| services.prometheus.remoteWrite.*.metadata_config.send_interval | How frequently metric metadata is sent to remote storage.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment | The Azure environment
|
| services.limesurvey.httpd.virtualHost.locations | Declarative location config
|
| services.synapse-auto-compressor.postgresUrl | Connection string to postgresql in the
[rust postgres crate config format](https://docs.rs/postgres/latest/postgres/config/struct
|
| services.woodpecker-server.environment | woodpecker-server config environment variables, for other options read the documentation
|
| services.wasabibackend.customConfigFile | Defines the path to a custom configuration file that is copied to the user's directory
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.entitlement | The entitlement string to filter eligible systems
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.datacenter | Consul datacenter
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.url | The URL of the PuppetDB root query endpoint.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.dns_suffix | The DNS suffix which should be applied to target.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role | Role of the targets to retrieve
|
| services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.hdfs.datanode.restartIfChanged | Automatically restart the service on config change
|
| services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| services.kubernetes.apiserver.webhookConfig | Kubernetes apiserver Webhook config file
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.fetch_timeout | The time after which the monitoring assignments are refreshed
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.query | Puppet Query Language (PQL) query
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.proxy_url | Optional proxy URL.
|
| networking.wireless.athUserRegulatoryDomain | If enabled, sets the ATH_USER_REGD kernel config switch to true to
disable the enforcement of EEPROM regulatory restrictions for ath
drivers
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.zone | Zone is the availability zone of your targets (e.g. fr-par-1)
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.bitwarden-directory-connector-cli.ldap | Options to configure the LDAP connection
|
| services.bitwarden-directory-connector-cli.sync | Options to configure what gets synced
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type | Sets the authentication type
|
| services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs | List of OpenStack service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs | List of Lightsail service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.serverset_sd_configs | List of Zookeeper Serverset service discovery configurations.
|
| services.druid.historical.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.allow_stale | Allow stale Consul results
(see https://www.consul.io/api/index.html#consistency-modes)
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.misskey.reverseProxy.webserver.nginx.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret | Optional client secret
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.api_url | API URL to use when doing the server listing requests
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.servers | List of URLs to be used to contact Marathon servers
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.role | The OpenStack role of entities that should be discovered.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.remoteWrite.*.write_relabel_configs | List of remote write relabel configurations.
|
| services.logrotate.checkConfig | Whether the config should be checked at build time
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| services.pantalaimon-headless.instances | Declarative instance config
|
| services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.region | The OpenStack Region.
|
| services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.paths | Paths can point to a single service, or the root of a tree of services.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.archisteamfarm.enable | If enabled, starts the ArchisSteamFarm service
|
| services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.athens.singleFlight.redisSentinel.sentinelPassword | Password for the sentinel server
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region | The AWS region
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.druid.coordinator.restartIfChanged | Automatically restart the service on config change
|
| services.woodpecker-agents.agents.<name>.environment | woodpecker-agent config environment variables, for other options read the documentation
|
| services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.servers | The Zookeeper servers.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs | List of Kubernetes service discovery configurations.
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile | Named AWS profile used to connect to the API.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.timeout | Timeout value
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.project_id | Project ID of the targets.
|
| services.grafana.settings.paths.provisioning | Folder that contains provisioning config files that grafana will apply on startup and while running
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval | Refresh interval to re-read the cloud instance list
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key | Access key to use. https://console.scaleway.com/project/credentials
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tag_separator | The string by which Consul tags are joined into the tag label
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator | The string by which Linode Instance tags are joined into the tag label
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.endpoint | Custom endpoint to be used.
|
| programs.singularity.packageOverriden | This option provides access to the overridden result of programs.singularity.package
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key | Secret key to use when listing targets. https://console.scaleway.com/project/credentials
It is mutually exclusive with secret_key_file.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid | username is required if using Identity V2 API
|
| services.grafana.provision.alerting.rules.settings.apiVersion | Config file version.
|
| services.transmission.credentialsFile | Path to a JSON file to be merged with the settings
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.subscription_id | The subscription ID.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token_file and other authentication mechanisms.
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.action | Action to perform based on regex matching
|
| services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.role | The Kubernetes role of entities that should be discovered
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.prometheus.remoteRead.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password | password for the Identity V2 and V3 APIs
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| systemd.enableStrictShellChecks | Whether to run shellcheck on the generated scripts for systemd
units
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.refresh_interval | Refresh interval to re-query the endpoint
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.refresh_interval | The time to wait between polling update requests
|
| services.prometheus.scrapeConfigs.*.file_sd_configs.*.refresh_interval | Refresh interval to re-read the files
|
| services.prometheus.remoteWrite.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| services.discourse.siteSettings | Discourse site settings
|
| services.prometheus.remoteWrite.*.queue_config.batch_send_deadline | Maximum time a sample will wait in buffer.
|
| services.elasticsearch.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.hdfs.journalnode.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.yarn.nodemanager.restartIfChanged | Automatically restart the service on config change
|
| services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tags_filter | Specify a tag filter (a server needs to have all defined tags to be listed) to apply on the server listing request.
|
| services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs | List of metric relabel configurations.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs | List of Docker Swarm service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.grafana.provision.dashboards.settings.apiVersion | Config file version.
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.taler.exchange.denominationConfig | This option configures the cash denomination for the coins that the exchange offers
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key | The AWS API keys
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key | The AWS API keys
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.host | Address of the Docker daemon.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.role | Role of the targets to retrieve
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.refresh_interval | Refresh interval to re-read the managed targets list
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.exporters.nginxlog.settings.consul | Consul integration options
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.alertmanager.checkConfig | Check configuration with amtool check-config
|
| services.grafana.provision.alerting.muteTimings.settings.apiVersion | Config file version.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id | The project_id and project_name fields are optional for the Identity V2 API
|
| services.prometheus.remoteWrite.*.queue_config.max_samples_per_send | Maximum number of samples per send.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.role | Selector role
|
| services.grafana.provision.alerting.policies.settings.apiVersion | Config file version.
|
| services.grafana.provision.datasources.settings.apiVersion | Config file version.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.action | Action to perform based on regex matching
|
| services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.field | Selector field
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.label | Selector label
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs | List of DigitalOcean service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces | Optional namespace discovery
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters | Optional filters to limit the discovery process to a subset of available resources.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.refresh_interval | The interval which should be used for refreshing targets
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.refresh_interval | The time after which the linode instances are refreshed
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.grafana.provision.alerting.contactPoints.settings.apiVersion | Config file version.
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability | The availability of the endpoint to connect to
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names | Namespace name.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.grafana.provision.alerting.templates.settings.apiVersion | Config file version.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.values | Value for the filter.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name | Name of the filter
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.victoriametrics.prometheusConfig | Config for prometheus style metrics
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.target_label | Label to which the resulting value is written in a replace action
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.refresh_interval | The time after which the servers are refreshed
|
| services.nextcloud.notify_push.bendDomainToLocalhost | Whether to add an entry to /etc/hosts for the configured nextcloud domain to point to localhost and add localhost to nextcloud's trusted_proxies config option
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file | Sets the secret key with the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.xserver.windowManager.xmonad.enableConfiguredRecompile | Enable recompilation even if config is set to a
non-null value
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token and other authentication mechanisms.
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.target_limit | Per-scrape config limit on number of unique targets that will be
accepted
|
| services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.refresh_interval | Polling interval
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| services.prometheus.alertmanager.environmentFile | File to load as environment file
|
| services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.refresh_interval | Refresh interval to re-read the resources list
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.refresh_interval | Refresh interval to re-read the managed targets list
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type | Sets the authentication type
|
| services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| services.nextcloud.settings.mail_smtpsecure | This depends on mail_smtpmode
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.target_label | Label to which the resulting value is written in a replace action
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors | Optional label and field selectors to limit the discovery process to a subset of available resources
|
| boot.loader.grub.efiInstallAsRemovable | Whether to invoke grub-install with
--removable
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.source_labels | The source labels select values from existing labels
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.maubot.settings.plugin_databases.postgres | The connection URL for plugin database
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| services.hadoop.yarn.resourcemanager.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host | The host to use if the container is in host networking mode
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method | The authentication method, either OAuth or ManagedIdentity
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.identity_endpoint | identity_endpoint specifies the HTTP endpoint that is required to work with
the Identity API of the appropriate version
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type | Sets the authentication type
|
| services.strongswan-swanctl.swanctl.connections.<name>.if_id_in | XFRM interface ID set on inbound policies/SA, can be overridden by child
config, see there for details
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| services.strongswan-swanctl.swanctl.connections.<name>.if_id_out | XFRM interface ID set on outbound policies/SA, can be overridden by child
config, see there for details
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.refresh_interval | The time after which the droplets are refreshed
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.pipewire.wireplumber.extraScripts | Additional scripts for WirePlumber to be used by configuration files
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| services.doh-server.settings.log_guessed_client_ip | Enable log IP from HTTPS-reverse proxy header: X-Forwarded-For or X-Real-IP
Note: http uri/useragent log cannot be controlled by this config
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret | The application_credential_secret field is required if using an application
credential to authenticate.
|
| services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| hardware.block.defaultSchedulerExclude | Device name pattern to exclude from default scheduler assignment
through config.hardware.block.defaultScheduler and
config.hardware.block.defaultSchedulerRotational
|
| services.matomo.nginx | With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo
|
| system.name | The name of the system used in the system.build.toplevel derivation
|
| services.radicle.httpd.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for radicle-httpd
|
| powerManagement.cpuFreqGovernor | Configure the governor used to regulate the frequency of the
available CPUs
|
| services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| services.matrix-synapse.workers | Options for configuring workers
|
| services.pomerium.settings | The contents of Pomerium's config.yaml, in Nix expressions
|
| system.copySystemConfiguration | If enabled, copies the NixOS configuration file
(usually /etc/nixos/configuration.nix)
and symlinks it from the resulting system
(getting to /run/current-system/configuration.nix)
|
| services.botamusique.settings | Your configuration.ini as a Nix attribute set
|
| services.hardware.openrgb.motherboard | CPU family of motherboard
|
| services.peroxide.settings | Configuration for peroxide
|
| nixpkgs.system | This option does not need to be specified for NixOS configurations
with a recently generated hardware-configuration.nix
|
| services.redmine.settings | Redmine configuration (configuration.yml)
|
| programs.regreet.enable | Enable ReGreet, a clean and customizable greeter for greetd
|
| services.netbox.extraConfig | Additional lines of configuration appended to the configuration.py
|
| services.netbox.settings | Configuration options to set in configuration.py
|
| services.ntopng.extraConfig | Configuration lines that will be appended to the generated ntopng
configuration file
|
| services.lighttpd.collectd.collectionCgi | Path to collection.cgi script from (collectd sources)/contrib/collection.cgi
This option allows to use a customized version
|
| services.akkoma.initDb.enable | Whether to automatically initialise the database on startup
|
| services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| services.matrix-synapse.package | Reference to the matrix-synapse wrapper with all extras
(e.g. for oidc or saml2) added to the PYTHONPATH of all executables
|
| services.thelounge.extraConfig | The Lounge's config.js contents as attribute set (will be
converted to JSON to generate the configuration file)
|
| services.moodle.extraConfig | Any additional text to be appended to the config.php
configuration file
|
| services.lavalink.plugins.*.extraConfig | The configuration for the plugin
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| image.repart.name | Name of the image
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| services.mautrix-discord.settings | config.yaml configuration as a Nix attribute set
|
| services.postfixadmin.extraConfig | Extra configuration for the postfixadmin instance, see postfixadmin's config.inc.php for available options.
|
| services.peering-manager.extraConfig | Additional lines of configuration appended to the configuration.py
|
| services.peering-manager.settings | Configuration options to set in configuration.py
|
| services.cloudlog.extraConfig | Any additional text to be appended to the config.php
configuration file
|
| services.omnom.settings | Configuration options for the /etc/omnom/config.yml file.
|
| services.selfoss.extraConfig | Extra configuration added to config.ini
|
| services.mautrix-telegram.settings | config.yaml configuration as a Nix attribute set
|
| services.consul.extraConfig | Extra configuration options which are serialized to json and added
to the config.json file.
|
| services.gitlab.extraShellConfig | Extra configuration to merge into shell-config.yml
|
| services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| services.ocis.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.porn-vault.settings | Configuration for Porn-Vault
|
| services.httpd.extraConfig | Configuration lines appended to the generated Apache
configuration file
|
| services.nvme-rs.settings | Configuration for nvme-rs in TOML format
|
| services.pangolin.settings | Additional attributes to be merged with the configuration options and written to Pangolin's config.yml file.
|
| services.wordpress.sites.<name>.extraConfig | Any additional text to be appended to the wp-config.php
configuration file
|
| services.mchprs.settings | Configuration for MCHPRS via Config.toml
|
| services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| services.mx-puppet-discord.settings | config.yaml configuration as a Nix attribute set
|
| networking.supplicant.<name>.extraConf | Configuration options for wpa_supplicant.conf
|
| services.matrix-hookshot.settings | config.yml configuration as a Nix attribute set
|
| services.homer.settings | Settings serialized into config.yml before build
|
| services.writefreely.settings | Writefreely configuration (config.ini)
|
| services.sourcehut.settings."sr.ht".service-key | An absolute file path (which should be outside the Nix-store)
to a key used for encrypting session cookies
|
| services.mattermost.settings | Additional configuration options as Nix attribute set in config.json schema.
|
| services.nginx.logError | Configures logging
|
| services.corerad.settings | Configuration for CoreRAD, see https://github.com/mdlayher/corerad/blob/main/internal/config/reference.toml
for supported values
|
| image.filePath | Path of the image, relative to $out in system.build.image
|
| services.cloud-init.enable | Enable the cloud-init service
|
| programs.bash.enable | Whenever to configure Bash as an interactive shell
|
| services.lact.enable | Whether to enable LACT, a tool for monitoring, configuring and overclocking GPUs.
If you are on an AMD GPU, it is recommended to enable overdrive mode by using
hardware.amdgpu.overdrive.enable = true; in your configuration
|
| services.mautrix-discord.settings.bridge | Bridge configuration
|
| services.dawarich.redis.createLocally | Whether to configure a local Redis server for Dawarich
|
| security.pam.yubico.mode | Mode of operation
|
| services.mautrix-discord.settings.logging | Logging configuration
|
| services.szurubooru.server.settings | Configuration to write to config.yaml
|
| services.immich.settings | Configuration for Immich
|
| services.traefik.static.settings | Static configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed to Traefik as --configfile.
|
| networking.supplicant | Interfaces for which to start wpa_supplicant
|
| services.dovecot2.imapsieve.mailbox.*.name | This setting configures the name of a mailbox for which administrator scripts are configured
|
| services.jmusicbot.stateDir | The directory where config.txt and serversettings.json is saved
|
| services.datadog-agent.checks | Configuration for all Datadog checks
|
| services.hostapd.radios | This option allows you to define APs for one or multiple physical radios
|
| power.ups.mode | The MODE determines which part of the NUT is to be started, and
which configuration files must be modified
|
| services.k3s.extraKubeletConfig | Extra configuration to add to the kubelet's configuration file
|
| services.fluent-bit.settings | See configurationFile.
configurationFile takes precedence over settings.
|
| boot.initrd.network.ifstate.cleanupSettings | Content of IfState's initrd cleanup configuration file
|
| services.rke2.extraKubeletConfig | Extra configuration to add to the kubelet's configuration file
|
| services.mautrix-discord.settings.appservice | Appservice configuration
|
| services.traefik.dynamic.settings | Dynamic configuration for Traefik, written in Nix
|
| services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| services.searx.domain | The domain under which searxng will be served
|
| services.udev.path | Packages added to the PATH environment variable when
executing programs from Udev rules.
coreutils, gnu{sed,grep}, util-linux and config.systemd.package are
automatically included.
|
| services.rss-bridge.dataDir | Location in which cache directory will be created
|
| services.k3s.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| services.nextcloud-spreed-signaling.settings.backend.backendtype | Type of backend configuration
|
| services.rke2.extraKubeProxyConfig | Extra configuration to add to the kube-proxy's configuration file
|
| networking.useDHCP | Whether to use DHCP to obtain an IP address and other
configuration for all network interfaces that do not have any manually
configured IPv4 addresses.
|
| services.journald.upload.settings.Upload.NetworkTimeoutSec | When network connectivity to the server is lost, this option
configures the time to wait for the connectivity to get restored
|
| specialisation | Additional configurations to build
|
| services.slskd.domain | If non-null, enables an nginx reverse proxy virtual host at this FQDN,
at the path configurated with services.slskd.web.url_base.
|
| services.outline.slackAuthentication | To configure Slack auth, you'll need to create an Application at
https://api.slack.com/apps
When configuring the Client ID, add a redirect URL under "OAuth & Permissions"
to https://[publicUrl]/auth/slack.callback.
|
| programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| services.rke2.environmentVars | Environment variables for configuring the rke2 service/agent
|
| services.outline.googleAuthentication | To configure Google auth, you'll need to create an OAuth Client ID at
https://console.cloud.google.com/apis/credentials
When configuring the Client ID, add an Authorized redirect URI to
https://[publicUrl]/auth/google.callback.
|
| services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| services.kavita.settings | Kavita configuration options, as configured in appsettings.json.
|
| services.adguardhome.settings | AdGuard Home configuration
|
| services.nginx.gitweb.group | Group that the CGI process will belong to. (Set to config.services.gitolite.group if you are using gitolite.)
|
| services.uwsgi.instance | uWSGI configuration
|
| services.dsnet.settings | The settings to use for dsnet
|
| services.invidious.http3-ytproxy.enable | Whether to enable http3-ytproxy for faster loading of images and video playback
|
| services.postgresqlBackup.pgdumpOptions | Command line options for pg_dump
|
| networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| services.rathole.settings | Rathole configuration, for options reference
see the example on GitHub
|
| boot.initrd.extraFirmwarePaths | Other firmware files (relative to "${config.hardware.firmware}/lib/firmware") to include in the final initrd we are building.
|
| services.clamav.clamonacc.enable | Whether to enable ClamAV on-access scanner
|
| services.open-web-calendar.calendarSettings | Configure the default calendar
|
| services.avahi.hostName | Host name advertised on the LAN
|
| services.traefik.dynamic.files | Dynamic configuration files to write
|
| services.webhook.hooks | The actual configuration of which hooks will be served
|
| services.wakapi.settings | Settings for Wakapi
|
| services.oink.domains | List of attribute sets containing configuration for each domain
|
| services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| services.molly-brown.certPath | Path to TLS certificate
|
| services.sympa.web.server | The webserver used for the Sympa web interface
|
| services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| boot.plymouth.themePackages | Extra theme packages for plymouth.
|
| services.resilio.enable | If enabled, start the Resilio Sync daemon
|
| services.part-db.enableNginx | Whether to enable nginx or not
|
| services.invidious.port | The port Invidious should listen on
|
| services.factorio.saveName | The name of the savegame that will be used by the server
|
| services.ncps.cache.lru.schedule | The cron spec for cleaning the store to keep it under
config.ncps.cache.maxSize
|
| services.blockbook-frontend.<name>.extraConfig | Additional configurations to be appended to coin.conf
|
| boot.initrd.network.ssh.ignoreEmptyHostKeys | Allow leaving config.boot.initrd.network.ssh.hostKeys empty,
to deploy ssh host keys out of band.
|
| power.ups.upsmon.settings | Additional settings to add to upsmon.conf.
|
| services.vwifi.module.macPrefix | The prefix for MAC addresses to use, without the trailing ':'
|
| services.opentelemetry-collector.validateConfigFile | Whether to enable Validate configuration file.
|
| services.jitsi-meet.jibri.enable | Whether to enable a Jibri instance and configure it to connect to Prosody
|
| services.jitsi-meet.jicofo.enable | Whether to enable JiCoFo instance and configure it to connect to Prosody
|
| services.stalwart.settings | Configuration options for the Stalwart server
|
| services.jitsi-meet.jigasi.enable | Whether to enable jigasi instance and configure it to connect to Prosody
|
| services.nextcloud.secrets | Secret files to read into entries in config.php
|
| services.kanidm.unixSettings | Configure Kanidm unix daemon
|
| networking.localCommands | Shell commands to be executed at the end of the
network-setup systemd service
|
| services.picom.settings | Picom settings
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| services.terraria.enable | If enabled, starts a Terraria server
|
| services.kanidm.unix.settings | Configure Kanidm unix daemon
|
| services.stalwart-mail.settings | Configuration options for the Stalwart email server
|
| boot.loader.systemd-boot.installDeviceTree | Install the devicetree blob specified by config.hardware.deviceTree.name
to the ESP and instruct systemd-boot to pass this DTB to linux.
|
| services.homer.virtualHost.domain | Domain to use for the virtual host
|
| services.dashy.virtualHost.domain | Domain to use for the virtual host
|
| services.gotosocial.environmentFile | File path containing environment variables for configuring the GoToSocial service
in the format of an EnvironmentFile as described by systemd.exec(5)
|
| services.maubot.extraConfigFile | A file for storing secrets
|
| services.invidious.settings | The settings Invidious should use
|
| services.hylafax.sendmailPath | Path to sendmail program
|
| services.bind.cacheNetworks | What networks are allowed to use us as a resolver
|
| services.opensnitch.rules | Declarative configuration of firewall rules
|
| services.neo4j.bolt.sslPolicy | Neo4j SSL policy for BOLT traffic
|
| services.wiki-js.settings | Settings to configure wiki-js
|
| services.kanidm.clientSettings | Configure Kanidm clients, needed for the PAM daemon
|
| services.livebook.environment | Environment variables to set
|
| services.kanidm.client.settings | Configure Kanidm clients, needed for the PAM daemon
|
| services.hostapd.radios.<name>.wifi7.enable | Enables support for IEEE 802.11be (WiFi 7, EHT)
|
| hardware.nvidia.prime.reverseSync.setupCommands.enable | Whether to enable configure the display manager to be able to use the outputs
attached to the NVIDIA GPU
|
| services.mattermost.preferNixConfig | If both mutableConfig and this option are set, the Nix configuration
will take precedence over any settings configured in the server
console.
|
| services.howdy.enable | Whether to enable Howdy and its PAM module for face recognition
|
| services.xserver.upscaleDefaultCursor | Upscale the default X cursor to be more visible on high-density displays
|
| services.firefly-iii.enableNginx | Whether to enable nginx or not
|
| services.thanos.rule.arguments | Arguments to the thanos rule command
|
| services.tt-rss.extraConfig | Additional lines to append to config.php.
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| services.privatebin.enableNginx | Whether to enable nginx or not
|
| services.thanos.store.arguments | Arguments to the thanos store command
|
| services.kubernetes.addons.dns.clusterIp | Dns addon clusterIP
|
| services.zoneminder.enable | Whether to enable ZoneMinder
|
| services.airsonic.transcoders | List of paths to transcoder executables that should be accessible
from Airsonic
|
| services.subsonic.transcoders | List of paths to transcoder executables that should be accessible
from Subsonic
|
| services.syncthing.key | Path to the key.pem file, which will be copied into Syncthing's
configDir.
|
| services._3proxy.services.*.extraConfig | Extra configuration for service
|
| services.home-assistant.lovelaceConfigFile | Your ui-lovelace.yaml managed as configuraton file
|
| services.minio.accessKey | Access key of 5 to 20 characters in length that clients use to access the server
|
| services.thanos.sidecar.arguments | Arguments to the thanos sidecar command
|
| services.thanos.compact.arguments | Arguments to the thanos compact command
|
| services.thanos.receive.arguments | Arguments to the thanos receive command
|
| services.minio.secretKey | Specify the Secret key of 8 to 40 characters in length that clients use to access the server
|
| services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
configDir.
|
| services.stalwart.credentials | Credentials envs used to configure Stalwart secrets
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| services.jitsi-meet.videobridge.enable | Jitsi Videobridge instance and configure it to connect to Prosody
|
| programs.gnupg.agent.pinentryPackage | Which pinentry package to use
|
| services.thanos.query.arguments | Arguments to the thanos query command
|
| services.firefox-syncserver.database.name | Database to use for storage
|
| services.foundationdb.openFirewall | Open the firewall ports corresponding to FoundationDB processes and coordinators
using config.networking.firewall.*.
|
| services.scanservjs.runAfterScan | Extra code to add to config.local.js's afterScan.
|
| services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| services.stalwart-mail.credentials | Credentials envs used to configure Stalwart-Mail secrets
|
| programs.firefox.preferences | Preferences to set from about:config
|
| services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| programs.uwsm.enable | Whether to enable uwsm, which wraps standalone Wayland compositors with a set
of Systemd units on the fly
|
| services.keyd.keyboards.<name>.settings | Configuration, except ids section, that is written to /etc/keyd/.conf
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.scanservjs.extraConfig | Extra code to add to config.local.js's afterConfig.
|
| services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|
| specialisation.<name>.inheritParentConfig | Include the entire system's configuration
|
| services.postgresqlBackup.pgdumpAllOptions | Command line options for pg_dumpall
|
| services.icingaweb2.generalConfig | config.ini contents
|
| services.nextcloud-spreed-signaling.settings.https.listen | IP and port to listen on for HTTPS requests, in the format of ip:port
|
| services.firefly-iii-data-importer.enableNginx | Whether to enable nginx or not
|
| services.scanservjs.extraActions | Actions to add to config.local.js's actions.
|
| services.thanos.downsample.arguments | Arguments to the thanos downsample command
|
| programs.starship.transientPrompt.enable | Whether to enable Starship's transient prompt
feature in fish shells
|
| services.mautrix-whatsapp.environmentFile | File containing environment variables to be passed to the mautrix-whatsapp service
|
| services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| security.dhparams.params | Diffie-Hellman parameters to generate
|
| services.kubernetes.addons.dns.reconcileMode | Controls the addon manager reconciliation mode for the DNS addon
|
| services.netdata.extraPluginPaths | Extra paths to add to the netdata global "plugins directory"
option
|
| boot.loader.generic-extlinux-compatible.useGenerationDeviceTree | Whether to generate Device Tree-related directives in the
extlinux configuration
|
| services.zigbee2mqtt.settings | Your configuration.yaml as a Nix attribute set
|
| services.crowdsec-firewall-bouncer.createRulesets | Whether to have the module create the appropriate firewall configuration
based on the bouncer settings
|
| services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| services.thanos.query-frontend.arguments | Arguments to the thanos query-frontend command
|
| services.scanservjs.extraDevicesConfig | Extra code to add to config.local.js's afterDevices.
|
| services.home-assistant.blueprints.script | List of script
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/script.
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.suricata.settings.outputs | Configure the type of alert (and other) logging you would like
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| services.nextcloud.settings | Extra options which should be appended to Nextcloud's config.php file.
|
| services.home-assistant.blueprints.template | List of template
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/template.
|
| services.nextcloud.secretFile | Secret options which will be appended to Nextcloud's config.php file (written as JSON, in the same
form as the services.nextcloud.settings option), for example
{"redis":{"password":"secret"}}.
|
| programs.bazecor.enable | Whether to enable Bazecor, the graphical configurator for Dygma Products.
|
| services.sourcehut.hg.group | Group for hg.sr.ht
|
| services.radicle.checkConfig | Whether to enable checking the config.json file resulting from services.radicle.settings.
|
| services.sourcehut.man.group | Group for man.sr.ht
|
| services.sourcehut.git.group | Group for git.sr.ht
|
| services.sourcehut.hub.group | Group for hub.sr.ht
|
| hardware.block.defaultSchedulerRotational | Default block I/O scheduler for rotational drives (e.g. hard disks)
|
| services.nextcloud.datadir | Nextcloud's data storage path
|
| services.sourcehut.todo.group | Group for todo.sr.ht
|
| services.sourcehut.meta.group | Group for meta.sr.ht
|
| services.nextcloud.caching.redis | Whether to load the Redis module into PHP
|
| services.xserver.wacom.enable | Whether to enable the Wacom touchscreen/digitizer/tablet
|
| services.movim.h2o.acme.root | Directory for the ACME challenge, which is public
|
| services.nezha-agent.settings | Generate to config.json as a Nix attribute set
|
| services.home-assistant.blueprints.automation | List of automation
blueprints to
install into ${config.services.home-assistant.configDir}/blueprints/automation.
|
| services.sourcehut.paste.group | Group for paste.sr.ht
|
| services.sourcehut.lists.group | Group for lists.sr.ht
|
| services.sourcehut.pages.group | Group for pages.sr.ht
|
| services.nextcloud-spreed-signaling.hostName | The host name to bind the nginx virtual host to, if
config.services.nextcloud-spreed-signaling.configureNginx is set to true.
|
| services.davis.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.slskd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.movim.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.postgresqlWalReceiver.receivers.<name>.slot | Require pg_receivewal to use an existing replication slot (see
Section 26.2.6 of the PostgreSQL manual)
|
| services.snipe-it.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| services.sourcehut.builds.group | Group for builds.sr.ht
|
| services.displayManager.ly.settings | Extra settings merged in and overwriting defaults in config.ini.
|
| services.akkoma.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.gancio.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.monica.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.matomo.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| services.epgstation.settings | Options to add to config.yml
|
| documentation.nixos.enable | Whether to install NixOS's own documentation.
|
| services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.nextcloud.caching.memcached | Whether to load the Memcached module into PHP
|
| services.dolibarr.h2o.acme.root | Directory for the ACME challenge, which is public
|
| security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| services.dolibarr.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.agorakit.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.kanboard.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.librenms.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.fediwall.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.pixelfed.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.mainsail.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.jenkinsSlave.enable | If true the system will be configured to work as a jenkins slave
|
| services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.nagios.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.moodle.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.github-runners.<name>.tokenFile | The full path to a file which contains either
- a fine-grained personal access token (PAT),
- a classic PAT
- or a runner registration token
Changing this option or the tokenFile’s content triggers a new runner registration
|
| services.radicle.httpd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| programs.rush.rules | The rule statement configures a GNU Rush rule
|
| services.nextcloud-spreed-signaling.settings.app.debug | Set to "true" to install pprof debug handlers
|
| systemd.nspawn | Definition of systemd-nspawn configurations.
|
| services.anuko-time-tracker.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| services.bookstack.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| documentation.nixos.includeAllModules | Whether the generated NixOS's documentation should include documentation for all
the options from all the NixOS modules included in the current
configuration.nix
|
| services.forgejo.settings | Free-form settings written directly to the app.ini configfile file
|
| services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| services.nginx.resolver | Configures name servers used to resolve names of upstream servers into addresses
|
| systemd.slices | Definition of slice configurations; see systemd.slice(5).
|
| services.jirafeau.nginxConfig.acmeRoot | Directory for the ACME challenge, which is public
|
| services.rdnssd.enable | Whether to enable the RDNSS daemon
(rdnssd), which configures DNS servers in
/etc/resolv.conf from RDNSS
advertisements sent by IPv6 routers.
|
| services.prosody.uploadHttp | Configures the old Prosody builtin HTTP server to handle user uploads.
|
| services.zabbixWeb.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.zabbixWeb.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| services.clickhouse.serverConfig | Your config.yaml as a Nix attribute set
|
| services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.prosody.httpFileShare | Configures the http_file_share module to handle user uploads
|
| services.emacs.defaultEditor | When enabled, configures emacsclient to be the default editor
using the EDITOR environment variable.
|
| services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| services.ratbagd.enable | Whether to enable ratbagd for configuring gaming mice.
|
| boot.zfs.package | Configured ZFS userland tools package.
|
| programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| boot.loader.initScript.enable | Some systems require a /sbin/init script which is started
|
| services.diod.statfsPassthru | This option configures statfs to return the host file system's type
rather than V9FS_MAGIC.
|
| programs.vscode.defaultEditor | When enabled, configures VSCode to be the default editor
using the EDITOR environment variable.
|
| services.nextcloud-spreed-signaling.settings.https.certificate | Path to the certificate used for the HTTPS listener
|
| services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| programs.neovim.defaultEditor | When enabled, installs neovim and configures neovim to be the default editor
using the EDITOR environment variable.
|
| system.nixos.tags | Strings to prefix to the default
system.nixos.label
|
| services.limesurvey.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.bluemap.enableNginx | Enable configuring a virtualHost for serving the bluemap webapp
|
| services.multipath.devices.*.rr_weight | If set to priorities the multipath configurator will assign path weights
as "path prio * rr_min_io".
|
| services.mediawiki.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.datadog-agent.package | The datadog-agent package to use. ::: {.note}
The provided package is expected to have an overridable pythonPackages-attribute
which configures the Python environment with the Datadog checks.
:::
|
| services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| power.ups.ups | This is where you configure all the UPSes that this system will be
monitoring directly
|
| services.syslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| services.limesurvey.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.limesurvey.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| i18n.inputMethod.fcitx5.settings.addons | The addon configures in conf folder in ini format with global sections
|
| services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| services.mautrix-discord.settings.homeserver | fullDataDiration
|
| system.autoUpgrade.fixedRandomDelay | Make the randomized delay consistent between runs
|
| services.cgit | Configure cgit instances.
|
| programs.flashprog.enable | Whether to enable configuring flashprog udev rules and
installing flashprog as system package
.
|
| system.autoUpgrade.allowReboot | Reboot the system into the new generation instead of a switch
if the new generation uses a different kernel, kernel modules
or initrd than the booted system
|
| services.rsyslogd.defaultConfig | The default syslog.conf file configures a
fairly standard setup of log files, which can be extended by
means of extraConfig.
|
| hardware.uni-sync.devices | List of controllers with their configurations.
|
| boot.initrd.systemd.slices | Definition of slice configurations.
|
| services.evdevremapkeys.settings | config.yaml for evdevremapkeys
|
| services.anubis.defaultOptions.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| services.misskey.settings.url | The final user-facing URL
|
| services.misskey.reverseProxy.webserver.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| services.icingaweb2.modules.monitoring.generalConfig.mutable | Make config.ini of the monitoring module mutable (e.g. via the web interface).
|
| i18n.inputMethod.fcitx5.plasma6Support | Use qt6 versions of fcitx5 packages
|
| services.k3s.role | Whether k3s should run as a server or agent
|
| programs.benchexec.users | Users that intend to use BenchExec
|
| services.prometheus.remoteWrite.*.sigv4 | Configures AWS Signature Version 4 settings.
|
| services.nghttpx.backends.*.params.proto | This option configures the protocol the backend server expects
to use
|
| services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| system.services | A collection of NixOS modular services that are configured as systemd services.
|
| programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| i18n.extraLocales | Additional locales that the system should support, besides the ones
configured with i18n.defaultLocale and
i18n.extraLocaleSettings
|
| containers | A set of NixOS system configurations to be run as lightweight
containers
|
| services.blockbook-frontend.<name>.rpc.passwordFile | File containing password of the RPC user
|
| services.blockbook-frontend.<name>.rpc.password | RPC password for JSON-RPC connections
|
| services.sssd.kcm | Whether to use SSS as a Kerberos Cache Manager (KCM)
|
| services.udp-over-tcp.tcp2udp | Mapping of TCP listening ports to UDP forwarding ports or configurations.
|
| services.udp-over-tcp.udp2tcp | Mapping of UDP listening ports to TCP forwarding ports or configurations.
|
| services.haven.blastrRelays | List of relay configurations for blastr
|
| services.g810-led.profile | Keyboard profile to apply at boot time
|
| services.datadog-agent.processAgentPackage | Which DataDog v7 agent package to use
|
| hardware.nvidia.prime.allowExternalGpu | Whether to enable configuring X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus
.
|
| services.jitsi-meet.prosody.enable | Whether to configure Prosody to relay XMPP messages between Jitsi Meet components
|
| services.inadyn.settings.provider.<name>.password | Password for this DDNS provider
|
| services.haven.importRelays | List of relay configurations for importing historical events
|
| services.k3s.environmentFile | File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile
|
| services.hound.home | The path to use as hound's $HOME
|
| services.dependency-track.javaArgs | Java options passed to JVM
|
| services.rke2.environmentFile | File path containing environment variables for configuring the rke2 service in the format of an EnvironmentFile
|
| services.matrix-synapse.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| services.wasabibackend.rpc.password | RPC password for the bitcoin endpoint
|
| services.flannel.backend | Type of backend to use and specific configurations for that backend.
|
| services.atticd.settings | Structured configurations of atticd
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| system.switch.enable | Whether to include the capability to switch configurations
|
| console.useXkbConfig | If set, configure the virtual console keymap from the xserver
keyboard settings.
|
| services.journaldriver.logName | Configures the name of the target log in Stackdriver Logging
|
| services.mautrix-discord.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| security.wrappers | This option effectively allows adding setuid/setgid bits, capabilities,
changing file ownership and permissions of a program without directly
modifying it
|
| services.microbin.enable | Whether to enable MicroBin is a super tiny, feature rich, configurable paste bin web application.
|
| services.waagent.settings.OS.RootDeviceScsiTimeout | Configures the SCSI timeout in seconds on the OS disk and data drives
|
| services.gocd-agent.group | If the default user "gocd-agent" is configured then this is the primary
group of that user.
|
| networking.sits.<name>.encapsulation | Configures the type of encapsulation.
|
| services.athens.networkMode | Configures how Athens will return the results
of the /list endpoint as it can be assembled from both its own
storage and the upstream VCS
|
| services.kanata.keyboards | Keyboard configurations.
|
| services.stunnel.servers | Define the server configurations
|
| services.automx2.domain | E-Mail-Domain for which mail client autoconfig/autoconfigure should be set up
|
| services.fwupd.daemonSettings | Configurations for the fwupd daemon.
|
| networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| services.k3s.clusterInit | Initialize HA cluster using an embedded etcd datastore
|
| services.vdirsyncer.jobs | vdirsyncer job configurations
|
| services.linux-enable-ir-emitter.enable | Whether to enable IR emitter hardware
|
| security.krb5.enable | Enable and configure Kerberos utilities
|
| services.bcg.device | Device name to configure gateway to use.
|
| services.journaldriver.logStream | Configures the name of the Stackdriver Logging log stream into
which to write journald entries
|
| services.coder.user | User under which the coder service runs.
If left as the default value this user will automatically be created
on system activation, otherwise it needs to be configured manually.
|
| services.journald.rateLimitInterval | Configures the rate limiting interval that is applied to all
messages generated on the system
|
| services.jenkins.home | The path to use as JENKINS_HOME
|
| services.jenkins.group | If the default user "jenkins" is configured then this is the primary
group of that user.
|
| services.gocd-server.group | If the default user "gocd-server" is configured then this is the primary group of that user.
|
| services.crowdsec.hub.branch | The git branch on which cscli is going to fetch configurations
|
| services.mastodon.sidekiqProcesses | How many Sidekiq processes should be used to handle background jobs, and which job classes they handle. Read the upstream documentation before configuring this!
|
| services.renovate.credentials | Allows configuring environment variable credentials for renovate, read from files
|
| services.confd.confDir | The path to the confd configs.
|
| programs.fish.enable | Whether to configure fish as an interactive shell.
|
| hardware.nvidia.powerManagement.enable | Whether to enable experimental power management through systemd
|
| services.beszel.agent.environmentFile | File path containing environment variables for configuring the beszel-agent service in the format of an EnvironmentFile
|
| services.coder.group | Group under which the coder service runs.
If left as the default value this group will automatically be created
on system activation, otherwise it needs to be configured manually.
|
| programs.adb.enable | Whether to configure system to use Android Debug Bridge (adb).
|
| programs.mtr.enable | Whether to add mtr to the global environment and configure a
setcap wrapper for it.
|
| services.bitcoind.<name>.extraConfig | Additional configurations to be appended to bitcoin.conf.
|
| services.stunnel.clients | Define the client configurations
|
| services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| containers.<name>.specialArgs | A set of special arguments to be passed to NixOS modules
|
| programs.vivid.enable | Whether to configure LS_COLORS with vivid.
|
| services.ncps.cache.redis | Configure Redis.
|
| services.crowdsec.hub.appSecConfigs | List of hub appsec configurations to install
|
| hardware.printers.ensurePrinters | Will regularly ensure that the given CUPS printers are configured as declared here
|
| programs.arp-scan.enable | Whether to configure a setcap wrapper for arp-scan.
|
| programs.xonsh.enable | Whether to configure xonsh as an interactive shell.
|
| services.davis.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.slskd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.movim.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| programs.thefuck.alias | thefuck needs an alias to be configured
|
| services.snipe-it.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.sitespeed-io.runs | A list of run configurations
|
| services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| services.movim.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Movim
|
| services.journald.upload.settings.Upload.ServerKeyFile | SSL key in PEM format
|
| services.davis.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.slskd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.movim.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fwupd.uefiCapsuleSettings | UEFI capsule configurations for the fwupd daemon.
|
| services.zoneminder.webserver | The webserver to configure for the PHP frontend
|
| services.jenkinsSlave.home | The path to use as JENKINS_HOME
|
| services.zwave-js-ui.serialPort | Serial port for the Z-Wave controller
|
| services.snipe-it.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| hardware.flirc.enable | Whether to enable software to configure a Flirc USB device.
|
| services.gancio.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.fluidd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.akkoma.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.monica.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.matomo.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| services.journaldriver.googleCloudProject | Configures the name of the Google Cloud project to which to
forward journald logs
|
| networking.search | The list of domain search paths that are considered for resolving
hostnames with fewer dots than configured in the ndots option,
which defaults to 1 if unset.
|
| services.jenkinsSlave.group | If the default slave agent user "jenkins" is configured then this is
the primary group of that user.
|
| services.akkoma.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fluidd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.gancio.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.monica.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| services.matomo.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| programs.zsh.setOptions | Configure zsh options
|
| services.maddy.openFirewall | Open the configured incoming and outgoing mail server ports.
|
| services.xserver.cmt.enable | Enable chrome multitouch input (cmt)
|
| services.postsrsd.settings.srs-domain | Dedicated mail domain used for ephemeral SRS envelope addresses
|
| nixpkgs.flake.setNixPath | Whether to set NIX_PATH to include nixpkgs=flake:nixpkgs such that <nixpkgs>
lookups receive the version of nixpkgs that the system was built with, in concert with
nixpkgs.flake.setFlakeRegistry
|
| services.vmalert.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| services.frigate.settings.cameras | Attribute set of cameras configurations.
https://docs.frigate.video/configuration/cameras
|
| services.tt-rss.enableGZipOutput | Selectively gzip output to improve wire performance
|
| services.woodpecker-agents.agents | woodpecker-agents configurations
|
| services.journald.rateLimitBurst | Configures the rate limiting burst limit (number of messages per
interval) that is applied to all messages generated on the system
|
| networking.domain | The system domain name
|
| environment.extraOutputsToInstall | Entries listed here will be appended to the meta.outputsToInstall attribute for each package in environment.systemPackages, and the files from the corresponding derivation outputs symlinked into /run/current-system/sw
|
| services.archisteamfarm.web-ui.enable | Whether to start the web-ui
|
| services.akkoma.extraStatic | Attribute set of extra paths to add to the static files directory
|
| programs.pay-respects.alias | pay-respects needs an alias to be configured
|
| services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.borgmatic.enableConfigCheck | Whether to enable checking all configurations during build time.
|
| programs.tmux.enable | Whenever to configure tmux system-wide.
|
| services.k3s.serverAddr | The k3s server to connect to
|
| services.kmscon.useXkbConfig | Whether to configure keymap from xserver keyboard settings.
|
| services.akkoma.extraPackages | List of extra packages to include in the executable search path of the service unit
|
| services.dolibarr.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.fediwall.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.librenms.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.kanboard.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.agorakit.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.pixelfed.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.mainsail.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.flannel.subnetLen | The size of the subnet allocated to each host
|
| services.polaris.openFirewall | Open the configured port in the firewall.
|
| services.ncps.cache.lock.redisKeyPrefix | Prefix for all Redis lock keys (only used when Redis is
configured).
|
| services.webhook.enable | Whether to enable Webhook, a server written in Go that allows you to create HTTP endpoints (hooks),
which execute configured commands for any person or service that knows the URL
.
|
| services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| services.cloudflared.tunnels.<name>.originRequest.proxyAddress | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.prometheus.scrapeConfigs | A list of scrape configurations.
|
| services.nginx.proxyCachePath | Configure a proxy cache path entry
|
| networking.nat.enable | Whether to enable Network Address Translation (NAT)
|
| services.dolibarr.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fediwall.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.kanboard.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.agorakit.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.librenms.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.mainsail.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.pixelfed.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.radicle.httpd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.munin-node.extraAutoPlugins | Additional Munin plugins to autoconfigure, using
munin-node-configure --suggest
|
| services.cloudflared.tunnels.<name>.originRequest.proxyType | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.ntp.restrictSource | The restriction flags to be set on source
|
| hardware.sata.timeout.deciSeconds | Set SCT Error Recovery Control timeout in deciseconds for use in RAID configurations
|
| programs.wavemon.enable | Whether to add wavemon to the global environment and configure a
setcap wrapper for it.
|
| services.netbox.enable | Enable Netbox
|
| services.anuko-time-tracker.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.radicle.httpd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.journald.remote.port | The port to listen to
|
| security.acme.defaults | Default values inheritable by all configured certs
|
| services.prosody.muc.*.roomLockTimeout | Timeout after which the room is destroyed or unlocked if not
configured, in seconds
|
| networking.fooOverUDP | This option allows you to configure Foo Over UDP and Generic UDP Encapsulation
endpoints
|
| hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| services.hbase-standalone.settings | configurations in hbase-site.xml, see https://github.com/apache/hbase/blob/master/hbase-server/src/test/resources/hbase-site.xml for details.
|
| programs.fish.useBabelfish | If enabled, the configured environment will be translated to native fish using babelfish
|
| services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| services.mysqlBackup.calendar | Configured when to run the backup service systemd unit (DayOfWeek Year-Month-Day Hour:Minute:Second).
|
| services.bookstack.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.anuko-time-tracker.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.nginx.virtualHosts.<name>.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| programs.tcpdump.enable | Whether to configure a setcap wrapper for tcpdump
|
| hardware.sata.timeout.drives | List of drives for which to configure the timeout.
|
| services.rustus.storage | Storages are used to actually store your files
|
| services.dysnomia.extraContainerPaths | A list of paths containing additional container configurations that are added to the search folders
|
| boot.initrd.allowMissingModules | Whether the initrd can be built even though modules listed in
boot.initrd.kernelModules or
boot.initrd.availableKernelModules are missing from
the kernel
|
| services.journald.upload.settings.Upload.ServerCertificateFile | SSL CA certificate in PEM format
|
| services.bookstack.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| hardware.display.outputs.<name>.edid | An EDID filename to be used for configured display, as in edid/<filename>
|
| services.syncoid.user | The user for the service
|
| users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| services.jirafeau.nginxConfig.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.bepasty.servers | configure a number of bepasty servers which will be started with
gunicorn.
|
| services.privoxy.enableTor | Whether to configure Privoxy to use Tor's faster SOCKS port,
suitable for HTTP.
|
| services.sharkey.setupRedis | Whether to automatically set up a local Redis cache and configure Sharkey to use it.
|
| services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| programs.msmtp.accounts | Named accounts and their respective configurations
|
| services.xserver.desktopManager.phosh.phocConfig | Configurations for the Phoc compositor.
|
| services.davis.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| programs.throne.tunMode.setuid | Whether to enable setting suid bit for throne-core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| services.slskd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prosody.muc.*.roomLocking | Enables room locking, which means that a room must be
configured before it can be used
|
| services.movim.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.public-inbox.inboxes | Inboxes to configure, where attribute names are inbox names.
|
| services.zabbixWeb.nginx.virtualHost.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.jirafeau.nginxConfig.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| services.snipe-it.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| programs.ssh.enableAskPassword | Whether to configure SSH_ASKPASS in the environment.
|
| systemd.mounts.*.startLimitBurst | Configure unit start rate limiting
|
| systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| services.webhook.openFirewall | Open the configured port in the firewall for external ingress traffic
|
| services.zabbixWeb.nginx.virtualHost.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.librenms.distributedPoller.enable | Configure this LibreNMS instance as a distributed poller
|
| services.mastodon.user | User under which mastodon runs
|
| services.nsd.zones.<name>.multiMasterCheck | If enabled, checks all masters for the last zone version
|
| system.build.separateActivationScript | A separate activation script package that's not part of the system profile
|
| programs.nekoray.tunMode.setuid | Whether to enable setting suid bit for nekobox_core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| hardware.amdgpu.amdvlk.settings | Runtime settings for AMDVLK to be configured /etc/amd/amdVulkanSettings.cfg
|
| services.akkoma.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.gancio.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.longview.nginxStatusUrl | The Nginx status page URL
|
| services.monica.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.matomo.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| services.mautrix-discord.registrationServiceUnit | The registration service that generates the registration file
|
| services.portunus.ldap.searchUserName | The login name of the search user
|
| services.dovecot2.enablePAM | Whether to enable creating a own Dovecot PAM service and configure PAM user logins.
|
| services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| services.datadog-agent.ddUrl | Custom dd_url to configure the agent with
|
| systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.lasuite-meet.enableNginx | Whether to enable enable and configure Nginx for reverse proxying.
|
| systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.lasuite-docs.enableNginx | Whether to enable enable and configure Nginx for reverse proxying.
|
| boot.initrd.network.enable | Add network connectivity support to initrd
|
| services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| hardware.nfc-nci.settings | Configuration to be written to the libncf-nci configuration files
|
| services.trafficserver.records | List of configurable variables used by Traffic Server
|
| system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| services.eintopf.settings | Settings to configure web service
|
| services.evremap.settings | Settings for evremap
|
| services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| services.prometheus.enableReload | Reload prometheus when configuration file changes (instead of restart)
|
| networking.wireless.allowAuxiliaryImperativeNetworks | Whether to allow configuring networks "imperatively" (e.g. via
wpa_supplicant_gui) and declaratively via
networking.wireless.networks.
|
| security.duosec.autopush | If true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable
|
| services.ncps.cache.lock.postgresKeyPrefix | Prefix for all PostgreSQL advisory lock keys (only used when
PostgreSQL is configured as lock backend).
|
| services.netbird.server.coturn.enable | Whether to enable a Coturn server for Netbird, will also open the firewall on the configured range.
|
| services.db-rest.redis.createLocally | Configure a local redis server for db-rest.
|
| system.nssDatabases.shadow | List of shadow entries to configure in /etc/nsswitch.conf
|
| system.nssDatabases.group | List of group entries to configure in /etc/nsswitch.conf
|
| system.nssDatabases.hosts | List of hosts entries to configure in /etc/nsswitch.conf
|
| systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.github-runners.<name>.name | Name of the runner to configure
|
| services.xandikos.nginx.enable | Configure the nginx reverse proxy settings.
|
| nixpkgs.flake.setFlakeRegistry | Whether to pin nixpkgs in the system-wide flake registry (/etc/nix/registry.json) to the
store path of the sources of nixpkgs used to build the NixOS system
|
| services.dsnet.settings.Networks | The CIDR networks that should route through this server
|
| services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| services.bluemap.defaultWorld | The world used by the default map ruleset
|
| programs.bandwhich.enable | Whether to add bandwhich to the global environment and configure a
setcap wrapper for it.
|
| services.kimai.webserver | The webserver to configure for the PHP frontend
|
| programs.nexttrace.enable | Whether to enable Nexttrace to the global environment and configure a setcap wrapper for it.
|
| services.ncdns.settings | ncdns settings
|
| services.frigate.hostname | Hostname of the nginx vhost to configure
|
| services.btrbk.extraPackages | Extra packages for btrbk, like compression utilities for stream_compress.
Note: This option will get deprecated in future releases
|
| services.prosody.muc.*.maxHistoryMessages | Specifies a limit on what each room can be configured to keep
|
| services.pid-fan-controller.enable | Whether to enable the PID fan controller, which controls the configured fans by running a closed-loop PID control loop.
|
| services.invidious.domain | The FQDN Invidious is reachable on
|
| services.cloud-init.network.enable | Allow the cloud-init service to configure network interfaces
through systemd-networkd.
|
| services.bluemap.storage | Where the rendered map will be stored
|
| services.sks.extraDbConfig | Set contents of the files "KDB/DB_CONFIG" and "PTree/DB_CONFIG" within
the ${dataDir} directory
|
| services.errbot.instances | Errbot instance configs
|
| system.checks | Packages that are added as dependencies of the system's build, usually
for the purpose of validating some part of the configuration
|
| services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.collectd.buildMinimalPackage | Build a minimal collectd package with only the configured services.collectd.plugins
|
| services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.syncoid.commands.<name>.useCommonArgs | Whether to add the configured common arguments to this command.
|
| services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| services.tarsnap.archives | Tarsnap archive configurations
|
| services.nitter.redisCreateLocally | Configure local Redis server for Nitter.
|
| systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.dawarich.sidekiqThreads | Worker threads used by the dawarich-sidekiq-all service
|
| services.mastodon.sidekiqThreads | Worker threads used by the mastodon-sidekiq-all service
|
| services.thanos.query.endpoints | Addresses of statically configured Thanos API servers (repeatable)
|
| services.filebeat.modules | Filebeat modules provide a quick way to get started
processing common log formats
|
| programs.k3b.enable | Whether to enable k3b, the KDE disk burning application
|
| system.nssDatabases.passwd | List of passwd entries to configure in /etc/nsswitch.conf
|
| systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.powerdns-admin.saltFile | The salt used for serialization
|
| users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mastodon.mediaAutoRemove.enable | Automatically remove remote media attachments and preview cards older than the configured amount of days
|
| services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.nomad.extraSettingsPaths | Additional settings paths used to configure nomad
|
| services.trilium-server.nginx.enable | Configure the nginx reverse proxy settings.
|
| system.nssDatabases.sudoers | List of sudoers entries to configure in /etc/nsswitch.conf
|
| services.nginx.httpConfig | Configuration lines to be set inside the http block
|
| services.sabnzbd.allowConfigWrite | By default we create the sabnzbd configuration read-only,
which keeps the nixos configuration as the single source
of truth
|
| programs.traceroute.enable | Whether to configure a setcap wrapper for traceroute.
|
| services.memos.settings | The environment variables to configure Memos.
At time of writing, there is no clear documentation about possible values
|
| services.zitadel.tlsMode | The TLS mode to use
|
| services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| services.cloudflare-warp.udpPort | The UDP port to open in the firewall
|
| virtualisation.efi.OVMF | OVMF firmware package, defaults to OVMF configured with secure boot if needed.
|
| boot.binfmt.emulatedSystems | List of systems to emulate
|
| services.searx.redisCreateLocally | Configure a local Redis server for SearXNG
|
| services.nghttpx.backends.*.params | Parameters to configure a backend.
|
| services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| services.gotosocial.openFirewall | Open the configured port in the firewall
|
| services.radicle.httpd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.thanos.rule.query.addresses | Addresses of statically configured query API servers
|
| power.ups.upsd | Options for the upsd.conf configuration file.
|
| services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| services.limesurvey.nginx.virtualHost.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.dovecot2.mailboxes | Configure mailboxes and auto create or subscribe them.
|
| services.lasuite-meet.livekit.enable | Whether to enable Configure local livekit server.
|
| i18n.extraLocaleSettings | A set of additional system-wide locale settings other than LANG
which can be configured with i18n.defaultLocale
|
| services.heisenbridge.extraArgs | Heisenbridge is configured over the command line
|
| services.limesurvey.nginx.virtualHost.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.anuko-time-tracker.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| programs.nethoscope.enable | Whether to add nethoscope to the global environment and configure a
setcap wrapper for it.
|
| services.peertube.enableWebHttps | Whether clients will access your PeerTube instance with HTTPS
|
| systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| powerManagement.powertop.postStart | Shell commands executed after powertop is started
|
| services.mympd.settings | Manages the configuration files declaratively
|
| services.resolved.domains | A list of domains
|
| services.pihole-ftl.openFirewallWebserver | Open ports in the firewall for pihole-FTL's webserver, as configured in settings.webserver.port.
|
| services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| services.librespeed.domain | If not null, this will add an entry to services.librespeed.servers and
configure librespeed to use TLS.
|
| services.fedimintd.<name>.nginx.enable | Whether to configure nginx for fedimintd
|
| services.peering-manager.enable | Enable Peering Manager
|
| services.munin-cron.enable | Enable munin-cron
|
| networking.networkmanager.ensureProfiles.secrets.entries | A list of secrets to provide to NetworkManager by reading their values from configured files
|
| services.bookstack.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.ostinato.rateAccuracy | To ensure that the actual transmit rate is as close as possible to
the configured transmit rate, Drone runs a busy-wait loop
|
| services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| services.hadoop.gatewayRole.enable | Whether to enable gateway role for deploying hadoop configs.
|
| services.nomad.extraSettingsPlugins | Additional plugins dir used to configure nomad.
|
| system.nssDatabases.services | List of services entries to configure in /etc/nsswitch.conf
|
| systemd.mounts.*.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.osquery.settings | Configuration to be written to the osqueryd JSON configuration file
|
| services._3proxy.resolution | Use this option to configure name resolution and DNS caching.
|
| programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| services.nomad.credentials | Credentials envs used to configure nomad secrets.
|
| services.thinkfan.enable | Whether to enable thinkfan, a fan control program.
This module targets IBM/Lenovo thinkpads by default, for
other hardware you will have configure it more carefully.
|
| services.paisa.settings | Paisa configuration
|
| system.preSwitchChecks | A set of shell script fragments that are executed before the switch to a
new NixOS system configuration
|
| boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| networking.wireless.networks.<name>.bssid | If set, this network block is used only when associating with
the AP using the configured BSSID.
|
| services.jirafeau.nginxConfig.http2 | Whether to enable the HTTP/2 protocol
|
| i18n.inputMethod.fcitx5.settings.inputMethod | The input method configure in profile file in ini format.
|
| services.mastodon.smtp.createLocally | Configure local Postfix SMTP server for Mastodon.
|
| services.redsocks.redsocks | Local port to proxy associations to be performed
|
| services.peertube.smtp.createLocally | Configure local Postfix SMTP server for PeerTube.
|
| services.ncps.openTelemetry.grpcURL | Configure OpenTelemetry gRPC URL
|
| services.tailscale.derper.stunPort | STUN port to listen on
|
| services.mosquitto.listeners | Listeners to configure on this broker.
|
| services.nghttpx.frontends.*.params | Parameters to configure a backend.
|
| boot.zfs.pools | Configuration for individual pools to override global defaults.
|
| services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| services.filesender.settings.admin | UIDs (as per the configured saml_uid_attribute) of FileSender administrators
|
| services.mailpit.instances | Configure mailpit instances
|
| systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.lasuite-docs.redis.createLocally | Configure local Redis cache server for docs.
|
| systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| security.duosec.prompts | If a user fails to authenticate with a second factor, Duo
Unix will prompt the user to authenticate again
|
| services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| services.zabbixWeb.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.misskey.reverseProxy.webserver.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| system.switch.enableNg | Whether to use switch-to-configuration-ng, the Rust-based
re-implementation of the original Perl switch-to-configuration.
|
| services.peertube.redis.createLocally | Configure local Redis server for PeerTube.
|
| services.tailscale.derper.enable | Whether to enable Tailscale Derper
|
| services.mastodon.redis.createLocally | Configure local Redis server for Mastodon.
|
| services.miniflux.createDatabaseLocally | Whether a PostgreSQL database should be automatically created and
configured on the local host
|
| services.jupyterhub.extraConfig | Extra contents appended to the jupyterhub configuration
Jupyterhub configuration is a normal python file using
Traitlets. https://jupyterhub.readthedocs.io/en/stable/getting-started/config-basics.html
|
| services.misskey.reverseProxy.webserver.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.mailman.enablePostfix | Enable Postfix integration
|
| systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.lasuite-meet.redis.createLocally | Whether to enable Configure local Redis cache server for meet.
|
| networking.dhcpcd.persistent | Whether to leave interfaces configured on dhcpcd daemon
shutdown
|
| services._3proxy.resolution.nserver | List of nameservers to use
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| networking.nftables.enable | Whether to enable nftables and use nftables based firewall if enabled.
nftables is a Linux-based packet filtering framework intended to
replace frameworks like iptables
|
| services.invidious.serviceScale | How many invidious instances to run
|
| security.chromiumSuidSandbox.enable | Whether to install the Chromium SUID sandbox which is an executable that
Chromium may use in order to achieve sandboxing
|
| programs.ssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| services.deluge.openFirewall | Whether to open the firewall for the ports in
services.deluge.config.listen_ports
|
| programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| services.openbao.settings.listener | Configure a listener for responding to requests.
|
| services.part-db.enablePostgresql | Whether to configure the postgresql database for part-db
|
| services.strongswan-swanctl.swanctl.connections.<name>.rekey_time | IKE rekeying refreshes key material using a Diffie-Hellman exchange, but
does not re-check associated credentials
|
| services.karakeep.extraEnvironment | Environment variables to pass to Karakaeep
|
| services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| services.syncthing.overrideDevices | Whether to delete the devices which are not configured via the
devices option
|
| programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| services.dockerRegistry.storagePath | Docker registry storage path for the filesystem storage backend
|
| services.pdns-recursor.settings | PowerDNS Recursor settings
|
| services.subsonic.defaultMusicFolder | Configure Subsonic to use this folder for music
|
| systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.automounts.*.startLimitBurst | Configure unit start rate limiting
|
| services.sftpgo.settings.ftpd.bindings | Configure listen addresses and ports for ftpd.
|
| services.mealie.database.createLocally | Configure local PostgreSQL database server for Mealie.
|
| systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.powerdns-admin.secretKeyFile | The secret used to create cookies
|
| services.github-runners.<name>.url | Repository to add the runner to
|
| systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.spark.confDir | Spark configuration directory
|
| virtualisation.lxd.zfsSupport | Enables lxd to use zfs as a storage for containers
|
| services.firewalld.settings.LogDenied | Add logging rules right before reject and drop rules in the INPUT, FORWARD and OUTPUT chains for the default rules and also final reject and drop rules in zones for the configured link-layer packet type.
|
| services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| services.sharkey.setupPostgresql | Whether to automatically set up a local PostgreSQL database and configure Sharkey to use it.
|
| services.writefreely.acme.enable | Whether or not to automatically fetch and configure SSL certs.
|
| services.biboumi.settings.password | The password used to authenticate the XMPP component to your XMPP server
|
| services.cassandra.rpcAddress | The address or interface to bind the native transport server to
|
| services.keepalived.enableScriptSecurity | Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.
|
| services.thelounge.public | Make your The Lounge instance public
|
| networking.tempAddresses | Whether to enable IPv6 Privacy Extensions for interfaces not
configured explicitly in
networking.interfaces._name_.tempAddress
|
| services.jitsi-videobridge.xmppConfigs.<name>.mucJids | JID of the MUC to join
|
| services.pdns-recursor.yaml-settings | PowerDNS Recursor settings
|
| services.gitea.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.glitchtip.redis.createLocally | Whether to enable and configure a local Redis instance.
|
| services.limesurvey.webserver | Webserver to configure for reverse-proxying limesurvey.
|
| services.sftpgo.settings.httpd.bindings | Configure listen addresses and ports for httpd.
|
| services.sftpgo.settings.sftpd.bindings | Configure listen addresses and ports for sftpd.
|
| services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| services.strongswan-swanctl.swanctl.connections | Section defining IKE connection configurations, each in its own subsection
with an arbitrary yet unique name
|
| services.patroni.softwareWatchdog | This will configure Patroni to use the software watchdog built into the Linux kernel
as described in the documentation.
|
| services.writefreely.nginx.enable | Whether or not to enable and configure nginx as a proxy for WriteFreely.
|
| services.jellyfin.hardwareAcceleration.device | Path to the hardware acceleration device that Jellyfin should use
|
| networking.wg-quick.interfaces.<name>.dns | The IP addresses of DNS servers to configure.
|
| services.homebox.database.createLocally | Configure local PostgreSQL database server for Homebox.
|
| systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.postfix.enableSubmissions | Whether to enable the submissions service configured in master.cf
|
| services.dovecot2.imapsieve.mailbox | Configure Sieve filtering rules on IMAP actions
|
| services.gpsd.readonly | Whether to enable the broken-device-safety, otherwise
known as read-only mode
|
| programs.wayland.miracle-wm.enable | Whether to enable miracle-wm, a tiling Mir based Wayland compositor
|
| services.zipline.database.createLocally | Whether to enable and configure a local PostgreSQL database server.
|
| services.akkoma.nginx | Extra configuration for the nginx virtual host of Akkoma
|
| services.gitea.extraConfig | Configuration lines appended to the generated gitea configuration file.
|
| services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| services.syncthing.overrideFolders | Whether to delete the folders which are not configured via the
folders option
|
| services.subsonic.defaultPodcastFolder | Configure Subsonic to use this folder for Podcasts
|
| programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| services.squid.extraConfig | Squid configuration
|
| users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| services.smokeping.databaseConfig | Configure the ping frequency and retention of the rrd files
|
| programs.thunderbird.preferences | Preferences to set from about:config
|
| services.xserver.resolutions | The screen resolutions for the X server
|
| services.tt-rss.sphinx.index | Index names in Sphinx configuration
|
| power.ups.upsmon | Options for the upsmon.conf configuration file.
|
| virtualisation.lxd.startTimeout | Time to wait (in seconds) for LXD to become ready to process requests
|
| services.dovecot2.imapsieve.mailbox.*.from | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when the message originates from the indicated mailbox
|
| services.dovecot2.imapsieve.mailbox.*.causes | Only execute the administrator Sieve scripts for the mailbox configured with services.dovecot2.imapsieve.mailbox..name when one of the listed IMAPSIEVE causes apply
|
| services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| services.postfix.enableSubmission | Whether to enable the `submission` service configured in master.cf
|
| services.tailscale.serve.services | Services to configure for Tailscale Serve
|
| services.mastodon.database.createLocally | Configure local PostgreSQL database server for Mastodon.
|
| services.peertube.database.createLocally | Configure local PostgreSQL database server for PeerTube.
|
| systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| services.cassandra.listenAddress | Address or interface to bind to and tell other Cassandra nodes
to connect to
|
| services.frp.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| services.isso.settings | Configuration for isso
|
| services.slurm.extraConfig | Extra configuration options that will be added verbatim at
the end of the slurm configuration file.
|
| services.pdns-recursor.old-settings | Older PowerDNS Recursor settings
|
| services.forgejo.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.openssh.knownHosts.<name>.hostNames | A list of host names and/or IP numbers used for accessing
the host's ssh service
|
| services.sftpgo.settings.webdavd.bindings | Configure listen addresses and ports for webdavd.
|
| services.warpgate.settings.sso_providers.*.provider | SSO provider configurations.
|
| services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.yggdrasil.settings | Configuration for yggdrasil, as a structured Nix attribute set
|
| networking.interfaces.<name>.ipv4.routes.*.type | Type of the route
|
| networking.interfaces.<name>.ipv6.routes.*.type | Type of the route
|
| services.rspamd.extraConfig | Extra configuration to add at the end of the rspamd configuration
file.
|
| services.vsftpd.extraConfig | Extra configuration to add at the bottom of the generated configuration file.
|
| services.invidious.sig-helper.enable | Whether to enable and configure inv-sig-helper to emulate the youtube client's javascript
|
| services.subsonic.defaultPlaylistFolder | Configure Subsonic to use this folder for playlists
|
| services.trafficserver.sni | Configure aspects of TLS connection handling for both inbound and
outbound connections
|
| services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| services.prometheus.exporters.varnish.healthPath | Path under which to expose healthcheck
|
| services.limesurvey.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.mattermost.database.peerAuth | If set, will use peer auth instead of connecting to a Postgres server
|
| services.munin-node.disabledPlugins | Munin plugins to disable, even if
munin-node-configure --suggest tries to enable
them
|
| services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| virtualisation.incus.startTimeout | Time to wait (in seconds) for incusd to become ready to process requests
|
| services.polipo.extraConfig | Polio configuration
|
| services.pgscv.settings | Configuration for pgSCV, in YAML format
|
| systemd.automounts.*.startLimitIntervalSec | Configure unit start rate limiting
|
| services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| services.legit.settings | The primary legit configuration
|
| services.dawarich.database.createLocally | Whether to configure a local PostgreSQL server and database for Dawarich
|
| services.neo4j.directories.data | Path of the data directory
|
| services.parsedmarc.provision.localMail.enable | Whether Postfix and Dovecot should be set up to receive
mail locally. parsedmarc will be configured to watch the
local inbox as the automatically created user specified in
services.parsedmarc.provision.localMail.recipientName
|
| services.paperless.database.createLocally | Configure local PostgreSQL database server for Paperless.
|
| services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| services.parsoid.extraConfig | Extra configuration to add to parsoid configuration.
|
| services.siproxd.extraConfig | Extra configuration to add to siproxd configuration.
|
| services.alice-lg.settings | alice-lg configuration, for configuration options see the example on github
|
| security.isolate.extraConfig | Extra configuration to append to the configuration file.
|
| services.glitchtip.database.createLocally | Whether to enable and configure a local PostgreSQL database server.
|
| services.librespeed.frontend.useNginx | Configure nginx for the LibreSpeed frontend
|
| services.dependency-track.settings."alpine.oidc.client.id" | Defines the client ID to be used for OpenID Connect
|
| systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| services.step-ca.settings | Settings that go into ca.json
|
| nix.enable | Whether to enable Nix
|
| networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| hardware.facter.detected.dhcp.interfaces | List of network interface names to configure with DHCP
|
| services.mediagoblin.settings.mediagoblin.email_debug_mode | Disable email debug mode to start sending outgoing mails
|
| services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.xserver.desktopManager.xfce.waylandSessionCompositor | Command line to run a Wayland compositor, defaults to labwc --startup
if not specified
|
| programs.tsmClient.dsmSysText | This configuration key contains the effective text
of the client system-options file "dsm.sys"
|
| services.godns.settings | Configuration for GoDNS
|
| services.connman.extraConfig | Configuration lines appended to the generated connman configuration file.
|
| services.sympa.settings | The sympa.conf configuration file as key value set
|
| services.nghttpx.extraConfig | Extra configuration options to be appended to the generated
configuration file.
|
| services.karakeep.meilisearch.enable | Enable Meilisearch and configure Karakeep to use it
|
| services.tandoor-recipes.database.createLocally | Configure local PostgreSQL database server for Tandoor Recipes.
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| qt.enable | Whether to enable Qt configuration, including theming
|
| programs.foot.settings | Configuration for foot terminal emulator
|
| services.clight.settings | Additional configuration to extend clight.conf
|
| services.neard.settings | Neard INI-style configuration file as a Nix attribute set
|
| services.sftpgo.settings | The primary sftpgo configuration
|
| services.trafficserver.logging | Configure logs
|
| services.lasuite-docs.postgresql.createLocally | Configure local PostgreSQL database server for docs.
|
| services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.litellm.settings.model_list | List of supported models on the server, with model-specific configs.
|
| services.zerotierone.localConf | Optional configuration to be written to the Zerotier JSON-based local.conf
|
| systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| services.keter.globalKeterConfig.listeners | You want that ip-from-header in
the nginx setup case
|
| services.calibre-web.options.enableBookConversion | Configure path to the Calibre's ebook-convert in the DB.
|
| services.lasuite-meet.postgresql.createLocally | Whether to enable Configure local PostgreSQL database server for meet.
|
| hardware.tuxedo-drivers.settings.charging-profile | The maximum charge level to help reduce battery wear:
high_capacity charges to 100% (driver default)
balanced charges to 90%
stationary charges to 80% (maximum lifespan)
Note: Regardless of the configured charging profile, the operating system will always report the battery as being charged to 100%.
|
| networking.jool.enable | Whether to enable Jool, an Open Source implementation of IPv4/IPv6
translation on Linux
|
| services.opensnitch.settings.Ebpf.ModulesPath | Configure eBPF modules path
|
| virtualisation.libvirtd.sshProxy | Whether to configure OpenSSH to use the SSH Proxy.
|
| services._3proxy.extraConfig | Extra configuration, appended to the 3proxy configuration file
|
| services.go2rtc.settings | go2rtc configuration as a Nix attribute set
|
| services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| services.parsedmarc.provision.geoIp | Whether to enable and configure the geoipupdate
service to automatically fetch GeoIP databases
|
| services.mpd.extraConfig | Extra directives added to to the end of MPD's configuration file,
mpd.conf
|
| services.llama-swap.settings | llama-swap configuration
|
| services.phpfpm.extraConfig | Extra configuration that should be put in the global section of
the PHP-FPM configuration file
|
| services.automysqlbackup.calendar | Configured when to run the backup service systemd unit (DayOfWeek Year-Month-Day Hour:Minute:Second).
|
| services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| services.bosun.extraConfig | Extra configuration options for Bosun
|
| services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| services.heisenbridge.namespaces | Configure the 'namespaces' section of the registration.yml for the bridge and the server
|
| services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| services.sourcehut.settings.objects.s3-upstream | Configure the S3-compatible object storage service.
|
| services.ceph.client.extraConfig | Extra configuration to add to the client section
|
| services.nginx.enableReload | Reload nginx when configuration file changes (instead of restart)
|
| services.sharkey.settings | Configuration options for Sharkey
|
| services.invoiceplane.sites.<name>.cron.enable | Enable cron service which periodically runs Invoiceplane tasks
|
| services.mediagoblin.createDatabaseLocally | Whether to configure a local postgres database and connect to it.
|
| services.suricata.settings.logging.stacktrace-on-signal | Requires libunwind to be available when Suricata is configured and built
|
| security.auditd.settings.admin_space_left | This is a numeric value in mebibytes (MiB) that tells the audit daemon when to perform a configurable action because the system is running
low on disk space
|
| security.audit.enable | Whether to enable the Linux audit system
|
| services.neo4j.extraServerConfig | Extra configuration for Neo4j Community server
|
| services.xinetd.extraDefaults | Additional configuration lines added to the default section of xinetd's configuration.
|
| services.nextcloud-spreed-signaling.backends.<name>.secretFile | The path to the file containing the value for backends.<name>.secret
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| services.guacamole-client.settings | Configuration written to guacamole.properties.
The Guacamole web application uses one main configuration file called
guacamole.properties
|
| services.jellyfin.transcoding.enableIntelLowPowerEncoding | Enable low-power encoding mode for Intel Quick Sync Video
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| services.tor.relay.onionServices | See torrc manual.
Because tor.service runs in its own RootDirectory=,
when using a onion service to reverse-proxy to a Unix socket,
you need to make that Unix socket available
within the mount namespace of tor.service
|
| services.opensnitch.settings.Audit.AudispSocketPath | Configure audit socket path
|
| services.dbus.packages | Packages whose D-Bus configuration files should be included in
the configuration of the D-Bus system-wide or session-wide
message bus
|
| services.prometheus.scrapeConfigs.*.bearer_token | Sets the Authorization header on every scrape request with
the configured bearer token
|
| services.traefik.dynamic.file | Path to Traefik's dynamic configuration file.
You cannot use this option alongside the declarative configuration options.
|
| systemd.sysupdate.timerConfig | The timer configuration for performing the update
|
| services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| services.dependency-track.settings."alpine.oidc.teams.claim" | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| services.tabby.model | Specify the model that tabby will use to generate completions
|
| services.prometheus.checkConfig | Check configuration with promtool check
|
| services.kubernetes.kubelet.extraConfig | Kubernetes kubelet extra configuration file entries
|
| services.postfix-tlspol.settings.server.socket-permissions | Permissions to the UNIX socket, if configured.
Due to hardening on the systemd unit the socket can never be created world readable/writable.
|
| hardware.apple.touchBar.settings | Configuration for tiny-dfr
|
| services.livekit.settings | LiveKit configuration file expressed in nix
|
| services.vmagent.checkConfig | Check configuration
|
| services.suricata.settings.logging.default-log-level | The default log level: can be overridden in an output section
|
| services.ente.api.settings | Museum yaml configuration
|
| services.temporal.settings | Temporal configuration
|
| services.oncall.settings | Extra configuration options to append or override
|
| programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| services.trafficserver.sslMulticert | Configure SSL server certificates to terminate the SSL sessions
|
| services.prometheus.scrapeConfigs.*.authorization | Sets the Authorization header on every scrape request with the configured credentials.
|
| services.drupal.sites.<name>.extraConfig | Extra configuration values that you want to insert into settings.php
|
| services.harmonia.settings | Settings to merge with the default configuration
|
| services.auto-cpufreq.settings | Configuration for auto-cpufreq
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.kea.dhcp4 | DHCP4 Server configuration
|
| services.kea.dhcp6 | DHCP6 Server configuration
|
| services.phpfpm.pools.<name>.extraConfig | Extra lines that go into the pool configuration
|
| services.postsrsd.settings | Configuration options for the postsrsd.conf file
|
| services.librenms.useDistributedPollers | Enables distributed pollers
for this LibreNMS instance
|
| services.mysql.settings | MySQL configuration
|
| services.znc.mutable | Indicates whether to allow the contents of the
dataDir directory to be changed by the user at
run-time
|
| services.nextcloud.notify_push.nextcloudUrl | Configure the nextcloud URL notify_push tries to connect to.
|
| services.znapzend.features.lowmemRecurse | Whether to enable use lowmemRecurse on systems where you have too many datasets, so a
recursive listing of attributes to find backup plans exhausts the
memory available to znapzend: instead, go the slower
way to first list all impacted dataset names, and then query their
configs one by one
.
|
| boot.uki.settings | The configuration settings for ukify
|
| system.build.images | Different target images generated for this NixOS configuration.
|
| services.flannel.extraNetworkConfig | Extra configuration to be added to the net-conf.json/etcd-backed network configuration.
|
| services.couchdb.extraConfigFiles | Extra configuration files
|
| services.sunshine.settings | Settings to be rendered into the configuration file
|
| services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| networking.interfaces.<name>.ipv4.addresses.*.address | IPv4 address of the interface
|
| networking.interfaces.<name>.ipv6.addresses.*.address | IPv6 address of the interface
|
| services.outline.azureAuthentication | To configure Microsoft/Azure auth, you'll need to create an OAuth
Client
|
| services.outline.oidcAuthentication | To configure generic OIDC auth, you'll need some kind of identity
provider
|
| services.buildbot-master.masterCfg | Optionally pass master.cfg path
|
| services.xtreemfs.dir.extraConfig | Configuration of XtreemFS DIR service
|
| services.xtreemfs.osd.extraConfig | Configuration of XtreemFS OSD service
|
| services.xtreemfs.mrc.extraConfig | Configuration of XtreemFS MRC service
|
| services.canaille.settings.CANAILLE_SQL.DATABASE_URI | The SQL server URI
|
| services.warpgate.settings.sso_providers | Configure OIDC single sign-on providers.
|
| services.tayga.ipv6 | IPv6-specific configuration.
|
| services.tayga.ipv4 | IPv4-specific configuration.
|
| services.kea.dhcp-ddns | Kea DHCP-DDNS configuration
|
| services.draupnir.settings | Free-form settings written to Draupnir's configuration file
|
| services.ddclient.extraConfig | Extra configuration
|
| services.mediawiki.extraConfig | Any additional text to be appended to MediaWiki's
LocalSettings.php configuration file
|
| services.postfix.settings.main.smtpd_tls_security_level | The server TLS security level
|
| services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| services.lavalink.extraConfig | Configuration to write to application.yml
|
| xdg.terminal-exec.settings | Configuration options for the Default Terminal Execution Specification
|
| services.prometheus.scrapeConfigs.*.scrape_timeout | Per-target timeout when scraping this job
|
| services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| services.mpd.dbFile | The path to MPD's database
|
| programs.npm.npmrc | The system-wide npm configuration
|
| services.create_ap.settings | Configuration for create_ap
|
| services.pinchflat.extraConfig | The configuration of Pinchflat is handled through environment variables
|
| services.nominatim.settings | Nominatim configuration settings
|
| services.firefox-syncserver.enable | Whether to enable the Firefox Sync storage service
|
| services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| services.knot-resolver.settings | Nix-based (RFC 42) configuration for Knot Resolver
|
| services.zoneminder.extraConfig | Additional configuration added verbatim to the configuration file.
|
| services.outline.discordAuthentication | To configure Discord auth, you'll need to create an application at
https://discord.com/developers/applications/
See https://docs.getoutline.com/s/hosting/doc/discord-g4JdWFFub6
for details on setting up your Discord app.
|
| services.klipper.firmwares.<name>.enableKlipperFlash | Whether to enable flashings scripts for firmware
|
| services.reaction.settings | Configuration for reaction
|
| networking.networkmanager.appendNameservers | A list of name servers that should be appended
to the ones configured in NetworkManager or received by DHCP.
|
| networking.networkmanager.insertNameservers | A list of name servers that should be inserted before
the ones configured in NetworkManager or received by DHCP.
|
| services.fusionInventory.extraConfig | Configuration that is injected verbatim into the configuration file.
|
| services.peertube-runner.settings | Configuration for peertube-runner
|
| services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| systemd.sysupdate.reboot.timerConfig | The timer configuration for rebooting after an update
|
| services.matrix-synapse.settings | The primary synapse configuration
|
| services.mattermost.database.fromEnvironment | Use services.mattermost.environmentFile to configure the database instead of writing the database URI
to the Nix store
|
| services.go2rtc.settings.streams | Stream source configuration
|
| systemd.repart.partitions | Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value
|
| services.kea.ctrl-agent | Kea Control Agent configuration
|
| virtualisation.vmware.host.enable | This enables VMware host virtualisation for running VMs.
vmware-vmx will cause kcompactd0 due to
Transparent Hugepages feature in kernel
|
| services.xserver.displayManager.lightdm.greeters.mini.enable | Whether to enable lightdm-mini-greeter as the lightdm greeter
|
| services.xserver.displayManager.lightdm.greeters.tiny.enable | Whether to enable lightdm-tiny-greeter as the lightdm greeter
|
| services.prometheus.scrapeConfigs.*.scrape_interval | How frequently to scrape targets from this job
|
| services.bepasty.servers.<name>.extraConfig | Extra configuration for bepasty server to be appended on the
configuration.
see https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty
for all options.
|
| services.openldap.mutableConfig | Whether to allow writable on-line configuration
|
| services.syncthing.settings.folders.<name>.ignorePatterns | Syncthing can be configured to ignore certain files in a folder using ignore patterns
|
| boot.initrd.network.flushBeforeStage2 | Whether to clear the configuration of the interfaces that were set up in
the initrd right before stage 2 takes over
|
| services.druid.log4j | Log4j Configuration for the druid process
|
| services.snapserver.settings | Snapserver configuration
|
| services.smartdns.settings | A set that will be generated into configuration file, see the SmartDNS README for details of configuration parameters
|
| services.sharkey.settings.fulltextSearch.provider | Which provider to use for full text search
|
| services.boinc.dataDir | The directory in which to store BOINC's configuration and data files.
|
| services.prometheus.globalConfig | Parameters that are valid in all configuration contexts
|
| services.postgresqlWalReceiver.receivers.<name>.synchronous | Flush the WAL data to disk immediately after it has been received
|
| services.drupal.webserver | Whether to use nginx or caddy for virtual host management
|
| services.invidious-router.settings | Configuration for invidious-router
|
| services.journald.remote.settings | Configuration in the journal-remote configuration file
|
| services.zammad.database.settings | The database.yml configuration file as key value set
|
| programs.rush.wrap | Whether to wrap the rush binary with a SUID-enabled wrapper
|
| services.etcd.extraConf | Etcd extra configuration
|
| services.ceph.enable | Whether to enable Ceph global configuration.
|
| services.esdm.enable | Whether to enable ESDM service configuration.
|
| services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay | Interval to check the liveness of a peer actively using IKEv2
INFORMATIONAL exchanges or IKEv1 R_U_THERE messages
|
| services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| services.amule.dataDir | Directory holding configuration and by default also incoming and temporary files
|
| services.cjdns.confFile | Ignore all other cjdns options and load configuration from this file.
|
| services.sks.dataDir | Data directory (-basedir) for SKS, where the database and all
configuration files are located (e.g
|
| services.gitolite.extraGitoliteRc | Extra configuration to append to the default ~/.gitolite.rc
|
| services.collabora-online.settings | Configuration for Collabora Online WebSocket Daemon, see
https://sdk.collaboraonline.com/docs/installation/Configuration.html, or
https://github.com/CollaboraOnline/online/blob/master/coolwsd.xml.in for the default
configuration.
|
| services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| systemd.sysupdate.transfers | Specify transfers as a set of the names of the transfer files as the
key and the configuration as its value
|
| services.matrix-synapse.extras | Explicitly install extras provided by matrix-synapse
|
| virtualisation.tpm.provisioning | Script to provision the TPM before control is handed off to the VM.
TPM2TOOLS_TCTI will be provided to configure tpm2-tools to use the
swtpm instance transparently.
TCTI is also provided as a generic value, consumer is expected to
re-export it however it may need (TPM2OPENSSL_TCTI, TPM2_PKCS11_TCTI,
...).
|
| services.komga.stateDir | State and configuration directory Komga will use.
|
| services.nntp-proxy.users | NNTP-Proxy user configuration
|
| services.filesender.settings.log_facilities | Defines where FileSender logging is sent
|
| services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.birdwatcher.settings | birdwatcher configuration, for configuration options see the example on github
|
| services.meshtasticd.settings | The Meshtastic configuration file
|
| services.reaction.settingsFiles | Configuration for reaction, see the wiki.
reaction supports JSON, YAML and JSONnet
|
| programs.nncp.enable | Whether to enable NNCP (Node to Node copy) utilities and configuration.
|
| programs.nano.nanorc | The system-wide nano configuration
|
| services.prosody.log | Logging configuration
|
| services.prosody.muc | Multi User Chat (MUC) configuration
|
| services.prometheus.remoteRead.*.bearer_token_file | Sets the Authorization header on every remote read request with the bearer token
read from the configured file
|
| services.rsnapshot.extraConfig | rsnapshot configuration option in addition to the defaults from
rsnapshot and this module
|
| services.fluidd.nginx | Extra configuration for the nginx virtual host of fluidd.
|
| services.gancio.nginx | Extra configuration for the nginx virtual host of gancio.
|
| services.nfs.extraConfig | Extra nfs-utils configuration.
|
| services.prometheus.remoteWrite.*.bearer_token_file | Sets the Authorization header on every remote write request with the bearer token
read from the configured file
|
| virtualisation.libvirtd.qemu.verbatimConfig | Contents written to the qemu configuration file, qemu.conf
|
| services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| services.freshrss.webserver | Whether to use nginx or caddy for virtual host management
|
| services.dokuwiki.webserver | Whether to use nginx or caddy for virtual host management
|
| services.suricata.settings.includes | Files to include in the suricata configuration
|
| services.bird.autoReload | Whether bird should be automatically reloaded when the configuration changes.
|
| system.autoUpgrade.flake | The Flake URI of the NixOS configuration to build
|
| services.prometheus.scrapeConfigs.*.honor_labels | Controls how Prometheus handles conflicts between labels
that are already present in scraped data and labels that
Prometheus would attach server-side ("job" and "instance"
labels, manually configured target labels, and labels
generated by service discovery implementations)
|
| services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| boot.loader.grub.fsIdentifier | Determines how GRUB will identify devices when generating the
configuration file
|
| services.caddy.logFormat | Configuration for the default logger
|
| programs.nixbit.enable | Whether to enable Nixbit configuration.
|
| services.cfssl.dbConfig | Certificate db configuration file
|
| boot.loader.grub.extraConfig | Additional GRUB commands inserted in the configuration file
just before the menu entries.
|
| services.diod.extraConfig | Extra configuration options for diod.conf.
|
| services.i2pd.enable | Enables I2Pd as a running service upon activation
|
| services.sogo.extraConfig | Extra sogo.conf configuration lines
|
| xdg.portal.wlr.enable | Whether to enable desktop portal for wlroots-based desktops
|
| services.prometheus.scrapeConfigs.*.bearer_token_file | Sets the Authorization header on every scrape request with
the bearer token read from the configured file
|
| services.displayManager.dms-greeter.compositor.customConfig | Custom compositor configuration to use for the greeter session
|
| services.displayManager.lemurs.settings | Configuration for lemurs, provided as a Nix attribute set and automatically
serialized to TOML
|
| services.freeswitch.enableReload | Issue the reloadxml command to FreeSWITCH when configuration directory changes (instead of restart)
|
| services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.postsrsd.settings.socketmap | Listener configuration in socket map format native to Postfix configuration.
|
| networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| services.strongswan-swanctl.swanctl.connections.<name>.keyingtries | Number of retransmission sequences to perform during initial
connect
|
| services.uhub.<name>.plugins | Uhub plugin configuration.
|
| services.nipap.enable | Whether to enable global Neat IP Address Planner (NIPAP) configuration.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| services.anubis.defaultOptions.botPolicy | Anubis policy configuration in Nix syntax
|
| services.ncps.cache.dataPath | The local directory for storing configuration and cached store paths
|
| services.h2o.settings | Configuration for H2O (see https://h2o.examp1e.net/configure.html)
|
| services.dspam.extraConfig | Additional dspam configuration.
|
| security.sudo.extraConfig | Extra configuration text appended to sudoers.
|
| services.hitch.extraConfig | Additional configuration lines
|
| services.soju.extraConfig | Lines added verbatim to the generated configuration file.
|
| services.redis.servers | Configuration of multiple redis-server instances.
|
| services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| services.nextcloud-spreed-signaling.settings.clients.internalsecretFile | The path to the file containing the value for clients.internalsecret
|
| services.wordpress.webserver | Whether to use apache2 or nginx for virtual host management
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity | Timeout before closing CHILD_SA after inactivity
|
| services.hydra.extraConfig | Extra lines for the Hydra configuration.
|
| programs.yazi.settings | Configuration included in $YAZI_CONFIG_HOME.
|
| security.sudo-rs.extraConfig | Extra configuration text appended to sudoers.
|
| programs.xfconf.enable | Whether to enable Xfconf, the Xfce configuration storage system.
|
| services.httpd.user | User account under which httpd children processes run
|
| programs.throne.enable | Whether to enable Throne, a GUI proxy configuration manager.
|
| services._3proxy.confFile | Ignore all other 3proxy options and load configuration from this file.
|
| services.tlp.extraConfig | Verbatim additional configuration variables for TLP
|
| services.saned.extraConfig | Extra saned configuration lines.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.misskey.reverseProxy.webserver.caddy | Extra configuration for the caddy virtual host of Misskey
|
| services.strongswan-swanctl.includes | Extra configuration files to include in the swanctl configuration
|
| services.misskey.reverseProxy.webserver.nginx | Extra configuration for the nginx virtual host of Misskey
|
| services.n8n.settings | Configuration for n8n, see https://docs.n8n.io/hosting/environment-variables/configuration-methods/
for supported values.
|
| services.bind.extraConfig | Extra lines to be added verbatim to the generated named configuration file.
|
| services.knot.settings | Extra configuration as nix values.
|
| services.quassel.dataDir | The directory holding configuration files, the SQlite database and the SSL Cert.
|
| services.sunshine.applications | Configuration for applications to be exposed to Moonlight
|
| services.meshcentral.settings | Settings for MeshCentral
|
| services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| services.ceph.osd.extraConfig | Extra configuration to add to the OSD section.
|
| services.lemmy.settings | Lemmy configuration
|
| services.ceph.mon.extraConfig | Extra configuration to add to the monitor section.
|
| services.aesmd.settings | AESM configuration
|
| programs.bat.settings | Parameters to be written to the system-wide bat configuration file.
|
| services.ceph.mds.extraConfig | Extra configuration to add to the MDS section.
|
| services.redmine.extraEnv | Extra configuration in additional_environment.rb
|
| services.rspamd.locals | Local configuration files, written into /etc/rspamd/local.d/{name}.
|
| services.pdnsd.extraConfig | Extra configuration directives that should be added to
pdnsd.conf.
|
| services.tomcat.serverXml | Verbatim server.xml configuration
|
| services.znapzend.zetup | Znapzend configuration.
|
| services.stash.settings | Stash configuration
|
| xdg.portal.wlr.settings | Configuration for xdg-desktop-portal-wlr
|
| services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| services.mpd.settings | Configuration for MPD
|
| services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| services.gitea.useWizard | Do not generate a configuration and use gitea' installation wizard instead
|
| services.coturn.extraConfig | Additional configuration options
|
| services.httpd.phpOptions | Options appended to the PHP configuration file php.ini.
|
| services.couchdb.argsFile | vm.args configuration
|
| services.bacula-fd.port | This specifies the port number on which the Client listens for
Director connections
|
| services.homer.enable | Whether to enable A dead simple static HOMepage for your servER to keep your services on hand, from a simple yaml configuration file.
.
|
| services.gocd-agent.agentConfig | Agent registration configuration.
|
| services.gollum.extraConfig | Content of the configuration file
|
| services.knot.checkConfig | Toggles the configuration test at build time
|
| services.caddy.extraConfig | Additional lines of configuration appended to the automatically
generated Caddyfile.
|
| services.odoo.settings | Odoo configuration settings
|
| services.tomcat.baseDir | Location where Tomcat stores configuration files, web applications
and logfiles
|
| services.ntfy-sh.settings | Configuration for ntfy.sh, supported values are here.
|
| nixpkgs.hostPlatform | Specifies the platform where the NixOS configuration will run
|
| i18n.inputMethod.kime.extraConfig | extra kime configuration
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.fastnetmon-advanced.settings | Extra configuration options to declaratively load into FastNetMon Advanced
|
| services.n8n.webhookUrl | WEBHOOK_URL for n8n, in case we're running behind a reverse proxy
|
| services.envoy.settings | Specify the configuration for Envoy in Nix.
|
| services.ceph.client.enable | Whether to enable Ceph client configuration.
|
| programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| services.ceph.mgr.extraConfig | Extra configuration to add to the global section for manager daemons.
|
| services.ceph.extraConfig | Extra configuration to add to the global section
|
| services.bee.settings | Ethereum Swarm Bee configuration
|
| services.nagios.extraConfig | Configuration to add to /etc/nagios.cfg
|
| services.part-db.poolConfig | Options for the PartDB PHP pool
|
| services.statsd.extraConfig | Extra configuration options for statsd
|
| services.murmur.extraConfig | Extra configuration to put into murmur.ini.
|
| services.xandikos.nginx | Configuration for nginx reverse proxy.
|
| programs.nekoray.enable | Whether to enable nekoray, a GUI proxy configuration manager.
|
| services.komga.settings | Komga configuration
|
| programs.openvpn3.netcfg | Network configuration
|
| services.druid.commonConfig | (key=value) Configuration to be written to common.runtime.properties
|
| services.angrr.settings | Global configuration for angrr in TOML format.
|
| services.confd.enable | Whether to enable confd, a service to manage local application configuration files using templates and data from etcd/consul/redis/zookeeper.
|
| services.dunst.settings | Dunst configuration, see dunst(5)
|
| services.ifm.settings | Configuration of the IFM service
|
| services.snipe-it.poolConfig | Options for the snipe-it PHP pool
|
| services.sslh.settings | sslh configuration
|
| services.zrepl.settings | Configuration for zrepl
|
| services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| services.interception-tools.udevmonConfig | String of udevmon YAML configuration, or path to a udevmon YAML
configuration file.
|
| services.opencloud.environment | Extra environment variables to set for the service
|
| services.davis.poolConfig | Options for the davis PHP pool
|
| services.kubo.settings | Attrset of daemon configuration
|
| services.howdy.settings | Howdy configuration file
|
| services.gonic.settings | Configuration for Gonic, see https://github.com/sentriz/gonic#configuration-options for supported values.
|
| services.chrony.extraConfig | Extra configuration directives that should be added to
chrony.conf
|
| services.clatd.settings | Configuration of clatd
|
| services.gitDaemon.options | Extra configuration options to be passed to Git daemon.
|
| services.syslog-ng.extraConfig | Configuration added to the end of syslog-ng.conf.
|
| services.plikd.settings | Configuration for plikd, see https://github.com/root-gg/plik/blob/master/server/plikd.cfg
for supported values.
|
| services.nats.settings | Declarative NATS configuration
|
| services.monero.extraConfig | Extra lines to be added verbatim to monerod configuration.
|
| services.mainsail.nginx | Extra configuration for the nginx virtual host of mainsail.
|
| services.netbox.enableLdap | Enable LDAP-Authentication for Netbox
|
| services.speechd.clients | Client specific configuration.
|
| services.slskd.settings | Application configuration for slskd
|
| services.nginx.streamConfig | Configuration lines to be set inside the stream block.
|
| services.nginx.eventsConfig | Configuration lines to be set inside the events block.
|
| services.nipap.settings | Configuration options to set in /etc/nipap/nipap.conf.
|
| services.xray.settings | The configuration object
|
| virtualisation.vswitch.resetOnStart | Whether to reset the Open vSwitch configuration database to a default
configuration on every start of the systemd ovsdb.service.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| services.cgit.<name>.settings | cgit configuration, see cgitrc(5)
|
| programs.yazi.settings.vfs | Configuration included in vfs.toml
|
| services.karma.settings | Karma dashboard configuration as nix attributes
|
| boot.loader.grub.extraPerEntryConfig | Additional GRUB commands inserted in the configuration file
at the start of each NixOS menu entry.
|
| services.gitweb.extraConfig | Verbatim configuration text appended to the generated gitweb.conf file.
|
| boot.extraModprobeConfig | Any additional configuration to be appended to the generated
modprobe.conf
|
| services.actkbd.extraConfig | Literal contents to append to the end of actkbd configuration file.
|
| services.hatsu.settings | Configuration for Hatsu, see
|
| services.gitea.settings | Gitea configuration
|
| power.ups.ups.<name>.directives | List of configuration directives for this UPS.
|
| services.bacula-dir.extraConfig | Extra configuration for Bacula Director Daemon.
|
| services.pdnsd.globalConfig | Global configuration that should be added to the global directory
of pdnsd.conf.
|
| services.salt.master.enable | Whether to enable Salt configuration management system master service.
|
| services.tuned.settings | Configuration for TuneD
|
| services.mbpfan.settings | INI configuration for Mbpfan.
|
| services.pdnsd.serverConfig | Server configuration that should be added to the server directory
of pdnsd.conf.
|
| services.speechd.modules | Configuration files of output modules.
|
| services.uhub.<name>.settings | Configuration of uhub
|
| services.salt.minion.enable | Whether to enable Salt configuration management system minion service.
|
| services.phpfpm.phpOptions | Options appended to the PHP configuration file php.ini.
|
| services.munin-node.extraConfig | munin-node.conf extra configuration
|
| services.xmrig.settings | XMRig configuration
|
| containers.<name>.flake | The Flake URI of the NixOS configuration to use for the container
|
| services.hostapd.radios.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the global segment was generated and may dynamically
append global options the generated configuration file
|
| security.doas.extraConfig | Extra configuration text appended to doas.conf
|
| programs.bat.extraPackages | Extra bat scripts to be added to the system configuration.
|
| programs.ssh.extraConfig | Extra configuration text prepended to ssh_config
|
| services.dolibarr.stateDir | State and configuration directory dolibarr will use.
|
| services.cloud-init.settings | Structured cloud-init configuration.
|
| services.bind.extraOptions | Extra lines to be added verbatim to the options section of the
generated named configuration file.
|
| services.kresd.extraConfig | Extra lines to be added verbatim to the generated configuration file
|
| services.ejabberd.ctlConfig | Configuration of ejabberdctl
|
| services.gatus.settings | Configuration for Gatus
|
| services.ulogd.settings | Configuration for ulogd
|
| services.nfs.settings | General configuration for NFS daemons and tools
|
| services.moodle.poolConfig | Options for the Moodle PHP pool
|
| services.slurm.mpi.extraMpiConfig | Extra configuration for that will be added to mpi.conf.
|
| services.syncoid.service | Systemd configuration common to all syncoid services.
|
| services.tempo.settings | Specify the configuration for Tempo in Nix
|
| services.nagios.mainConfigFile | If non-null, overrides the main configuration file of Nagios.
|
| services.searx.uwsgiConfig | Additional configuration of the uWSGI vassal running searx
|
| services.zabbixWeb.extraConfig | Additional configuration to be copied verbatim into zabbix.conf.php.
|
| services.vector.settings | Specify the configuration for Vector in Nix.
|
| programs.yazi.settings.yazi | Configuration included in yazi.toml
|
| services.ejabberd.loadDumps | Configuration dumps that should be loaded on the first startup
|
| services.cyrus-imap.cyrusConfigFile | Path to the configuration file used for Cyrus.
|
| boot.initrd.verbose | Verbosity of the initrd
|
| services.couchdb.extraConfig | Extra configuration options for CouchDB
|
| boot.initrd.unl0kr.settings | Configuration for unl0kr
|
| hardware.display.outputs | Hardware/kernel-level configuration of specific outputs.
|
| security.please.settings | Please configuration
|
| security.krb5.settings | Structured contents of the krb5.conf file
|
| programs.msmtp.extraConfig | Extra lines to add to the msmtp configuration verbatim
|
| services.cjdns.extraConfig | Extra configuration, given as attrs, that will be merged recursively
with the rest of the JSON generated by this module, at the root node.
|
| services.garage.settings | Garage configuration, see https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/ for reference.
|
| services.trilium-server.nginx | Configuration for nginx reverse proxy.
|
| services.umami.settings | Additional configuration (environment variables) for Umami, see
https://umami.is/docs/environment-variables for supported values.
|
| services.mihomo.tunMode | Whether to enable necessary permission for Mihomo's systemd service for TUN mode to function properly
|
| services.trilium-server.dataDir | The directory storing the notes database and the configuration.
|
| services.xserver.dpi | Force global DPI resolution to use for X server
|
| services.xtreemfs.dir.replication.extraConfig | Configuration of XtreemFS DIR replication plugin
|
| services.xtreemfs.mrc.replication.extraConfig | Configuration of XtreemFS MRC replication plugin
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| boot.loader.grub.mirroredBoots | Mirror the boot configuration to multiple partitions and install grub
to the respective devices corresponding to those partitions.
|
| services.hebbot.settings | Configuration for Hebbot, see, for examples:
|
| services.cyrus-imap.imapdConfigFile | Path to the configuration file used for cyrus-imap.
|
| services.graylog.extraConfig | Any other configuration options you might want to add
|
| services.gancio.settings | Configuration for Gancio, see https://gancio.org/install/config for supported values.
|
| programs.direnv.settings | Direnv configuration
|
| services.rsyncd.settings | Configuration for rsyncd
|
| services.mongodb.extraConfig | MongoDB extra configuration in YAML format
|
| services.oxidized.enable | Whether to enable the oxidized configuration backup service.
|
| services.nvme-rs.settings.email | Email notification configuration
|
| services.monica.poolConfig | Options for the monica PHP pool
|
| services.kea.dhcp4.settings | Kea DHCP4 configuration as an attribute set, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html.
|
| services.frigate.checkConfig | Whether to check the configuration at build time.
|
| services.ytdl-sub.instances | Configuration for ytdl-sub instances.
|
| services.zabbixWeb.poolConfig | Options for the Zabbix PHP pool
|
| services.kea.dhcp6.settings | Kea DHCP6 configuration as an attribute set, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html.
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.blocky.settings | Blocky configuration
|
| services.erigon.settings | Configuration for Erigon
Refer to https://github.com/ledgerwatch/erigon#usage for details on supported values.
|
| services.greetd.settings | greetd configuration (documentation)
as a Nix attribute set.
|
| services.gobgpd.settings | GoBGP configuration
|
| image.repart.partitions | Specify partitions as a set of the names of the partitions with their
configuration as the key.
|
| hardware.system76.enableAll | Whether to enable all recommended configuration for system76 systems.
|
| services.fluent-bit.graceLimit | The grace time limit
|
| services.rauc.settings | Rauc configuration that will be converted to INI
|
| services.nncp.daemon.enable | Whether to enable NNCP TCP synronization daemon
|
| services.soft-serve.settings | The contents of the configuration file for soft-serve
|
| services.qdrant.settings | Configuration for Qdrant
Refer to https://github.com/qdrant/qdrant/blob/master/config/config.yaml for details on supported values.
|
| services.gerrit.settings | Gerrit configuration
|
| services.weblate.extraConfig | Text to append to settings.py Weblate configuration file.
|
| services.zeyple.settings | Zeyple configuration. refer to
https://github.com/infertux/zeyple/blob/master/zeyple/zeyple.conf.example
for details on supported values.
|
| services.uptime.usesRemoteMongo | Whether the configuration file specifies a remote mongo instance
|
| services.postfix.extraConfig | Extra lines to be added verbatim to the main.cf configuration file.
|
| programs.yazi.settings.theme | Configuration included in theme.toml
|
| services.lemmy.database.uri | The connection URI to use
|
| services.aria2.settings.conf-path | Configuration file path.
|
| security.auditd.settings | auditd configuration file contents
|
| services.etcd.initialCluster | Etcd initial cluster configuration for bootstrapping.
|
| services.printing.extraConf | Extra contents of the configuration file of the CUPS daemon
(cupsd.conf).
|
| services.mopidy.settings | The configuration that Mopidy should use
|
| services.openssh.settings | Configuration for sshd_config(5).
|
| services.strfry.settings | Configuration options to set for the Strfry service
|
| services.nncp.caller.enable | Whether to enable cron'ed NNCP TCP daemon caller
|
| services.xray.settingsFile | The absolute path to the configuration file
|
| services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| services.httpd.virtualHosts | Specification of the virtual hosts served by Apache
|
| services.kmonad.keyboards | Keyboard configuration.
|
| programs.openvpn3.log-service | Log service configuration
|
| services.icecast.extraConfig | Extra configuration added to icecast.xml inside the <icecast> element.
|
| services.chhoto-url.settings | Configuration of Chhoto URL
|
| security.krb5.settings.module | Modules to obtain Kerberos configuration from.
|
| services.doh-server.settings | Configuration of doh-server in toml
|
| programs.schroot.profiles | Custom configuration profiles for schroot.
|
| security.sudo.extraRules | Define specific rules to be in the sudoers file
|
| services.moodle.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts
|
| services.part-db.settings | Options for part-db configuration
|
| services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| services.nfs.idmapd.settings | libnfsidmap configuration
|
| services.pihole-ftl.settings | Configuration options for pihole.toml
|
| services.prosody.muc.*.extraConfig | Additional MUC specific configuration
|
| services.sftpgo.settings.smtp | SMTP configuration section.
|
| services.nsd.zones | Define your zones here
|
| services.nagios.cgiConfigFile | Derivation for the configuration file of Nagios CGI scripts
that can be used in web servers for running the Nagios web interface.
|
| services.pghero.settings | PgHero configuration
|
| services.litellm.settings | Configuration for LiteLLM
|
| services.nagios.objectDefs | A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the
network that you want Nagios to monitor.
|
| services.printing.clientConf | The contents of the client configuration.
(client.conf)
|
| services.nagios.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts
|
| services.kea.dhcp-ddns.settings | Kea DHCP-DDNS configuration as an attribute set, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html.
|
| services.xserver.extraConfig | Additional contents (sections) included in the X server configuration file
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| services.yggdrasil-jumper.retrieveListenAddresses | Automatically retrieve listen addresses from the Yggdrasil router configuration
|
| security.sudo-rs.extraRules | Define specific rules to be in the sudoers file
|
| services.amule.settings | Free form attribute set for aMule settings
|
| programs.lazygit.settings | Lazygit configuration
|
| services.tomcat.extraConfigFiles | Extra configuration files to pull into the tomcat conf directory
|
| services.netbox.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| services.pptpd.extraPptpdOptions | Adds extra lines to the pptpd configuration file.
|
| services.pcscd.readerConfigs | Configuration for devices that aren't hotpluggable
|
| services.rkvm.server.settings | Structured server daemon configuration
|
| services.logstash.inputConfig | Logstash input configuration.
|
| services.rkvm.client.settings | Structured client daemon configuration
|
| services.tuned.ppdSettings.main | Core configuration for power-profiles-daemon support.
|
| services.dex.settings | The available options can be found in
the example configuration
|
| services.evcc.settings | evcc configuration as a Nix attribute set
|
| services.waagent.settings | The waagent.conf configuration, see https://learn.microsoft.com/en-us/azure/virtual-machines/extensions/agent-linux for documentation.
|
| services.zipline.settings | Configuration of Zipline
|
| services.zookeeper.extraConf | Extra configuration for Zookeeper.
|
| services.xl2tpd.extraXl2tpOptions | Adds extra lines to the xl2tpd configuration file.
|
| services.dependency-track.settings."alpine.oidc.issuer" | Defines the issuer URL to be used for OpenID Connect
|
| services.yggdrasil-jumper.appendListenAddresses | Append Yggdrasil router configuration with listeners on loopback
addresses (127.0.0.1) and preselected ports to support peering
using client-server protocols like quic and tls
|
| services.onlyoffice.securityNonceFile | File holding nginx configuration that sets the nonce used to create secret links
|
| services.gateone.settingsDir | Path of configuration files for GateOne.
|
| services.influxdb.extraConfig | Extra configuration options for influxdb
|
| services.crowdsec.localConfig | The configuration for a crowdsec security engine.
|
| programs.regreet.settings | ReGreet configuration file
|
| hardware.sane.brscan4.enable | When enabled, will automatically register the "brscan4" sane
backend and bring configuration files to their expected location.
|
| services.firewalld.zones | firewalld zone configuration files
|
| services.darkhttpd.extraArgs | Additional configuration passed to the executable.
|
| services.davfs2.settings | Extra settings appended to the configuration of davfs2
|
| services.nfs.server.extraNfsdConfig | Extra configuration options for the [nfsd] section of /etc/nfs.conf.
|
| services.opkssh.providers | OpenID Connect providers configuration
|
| services.traefik.static.file | Path to Traefik's static configuration file.
|
| services.molly-brown.settings | molly-brown configuration
|
| services.samba.settings | Configuration file for the Samba suite in ini format
|
| services.telegraf.extraConfig | Extra configuration options for telegraf
|
| services.mealie.settings | Configuration of the Mealie service
|
| services.riemann-dash.dataDir | Location of the riemann-base dir
|
| services.outline.smtp.tlsCiphers | Override SMTP cipher configuration.
|
| services.xandikos.nginx.hostName | The hostname use to setup the virtualhost configuration
|
| services.veilid.settings | Build veilid-server.conf with nix expression
|
| networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| programs.yazi.settings.keymap | Configuration included in keymap.toml
|
| services.autobrr.settings | Autobrr configuration options
|
| services.klipper.settings | Configuration for Klipper
|
| services.readeck.settings | Additional configuration for Readeck, see
https://readeck.org/en/docs/configuration
for supported values.
|
| services.misskey.settings | Configuration for Misskey, see
example.yml
for all supported options.
|
| services.slurm.extraCgroupConfig | Extra configuration for cgroup.conf
|
| services.maubot.settings | YAML settings for maubot
|
| services.zitadel.settings | Contents of the runtime configuration file
|
| services.vikunja.settings | Vikunja configuration
|
| services.uptime-kuma.settings | Additional configuration for Uptime Kuma, see
https://github.com/louislam/uptime-kuma/wiki/Environment-Variables
for supported values.
|
| services.kea.ctrl-agent.settings | Kea Control Agent configuration as an attribute set, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html.
|
| systemd.network.links.<name>.extraConfig | Extra configuration append to unit
|
| services.prometheus.exporters.snmp.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.corteza.settings | Configuration for Corteza, will be passed as environment variables
|
| services.factorio.stateDirName | Name of the directory under /var/lib holding the server's data
|
| programs.schroot.settings | Schroot configuration settings
|
| services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| programs.steam.package | The Steam package to use
|
| services.go-httpbin.settings | Configuration of go-httpbin
|
| services.bacula-fd.extraClientConfig | Extra configuration to be passed in Client directive.
|
| services.kimai.sites.<name>.poolConfig | Options for the Kimai PHP pool
|
| services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| services.peertube.settings | Configuration for peertube.
|
| services.movim.h2o.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| services.reaction.checkConfig | Check the syntax of the configuration files at build time
|
| services.quickwit.settings | Quickwit configuration.
|
| services.outline.cdnUrl | If using a Cloudfront/Cloudflare distribution or similar it can be set
using this option
|
| services.orthanc.settings | Configuration written to a json file that is read by orthanc
|
| services.self-deploy.switchCommand | The switch-to-configuration subcommand used.
|
| services.jirafeau.extraConfig | Jirefeau configuration
|
| services.zeronet.settings | zeronet.conf configuration
|
| services.warpgate.settings | Warpgate configuration.
|
| services.jirafeau.nginxConfig | Extra configuration for the nginx virtual host of Jirafeau.
|
| services.xserver.displayManager.lightdm.greeters.enso.extraConfig | Extra configuration that should be put in the greeter.conf
configuration file
|
| services.xserver.displayManager.lightdm.greeters.gtk.extraConfig | Extra configuration that should be put in the lightdm-gtk-greeter.conf
configuration file.
|
| services.xserver.displayManager.lightdm.greeters.mini.extraConfig | Extra configuration that should be put in the lightdm-mini-greeter.conf
configuration file.
|
| services.firefly-iii.poolConfig | Options for the Firefly III PHP pool
|
| services.gitlab.statePath | GitLab state directory
|
| security.krb5.settings.include | Files to include in the Kerberos configuration.
|
| programs.corectrl.package | The corectrl package to use
|
| services.displayManager.autoLogin | Auto login configuration attrset.
|
| services.consul.extraConfigFiles | Additional configuration files to pass to consul
NOTE: These will not trigger the service to be restarted when altered.
|
| services.cyrus-imap.cyrusSettings | Cyrus configuration settings
|
| services.cyrus-imap.imapdSettings | IMAP configuration settings
|
| services.udisks2.settings | Options passed to udisksd
|
| services.pdns-recursor.luaConfig | The content Lua configuration file for PowerDNS Recursor
|
| services.prosody.ssl.extraOptions | Extra SSL configuration options.
|
| services.logstash.filterConfig | logstash filter configuration.
|
| services.powerdns.extraConfig | PowerDNS configuration
|
| services.merecat.settings | Merecat configuration
|
| services.opendkim.settings | Additional opendkim configuration
|
| services.tor.torsocks.enable | Whether to build /etc/tor/torsocks.conf
containing the specified global torsocks configuration.
|
| services.sabnzbd.settings | The sabnzbd configuration (see also
sabnzbd's wiki
for extra documentation)
|
| services.pretix.settings | pretix configuration as a Nix attribute set
|
| services.logstash.outputConfig | Logstash output configuration.
|
| services.nzbget.settings | NZBGet configuration, passed via command line using switch -o
|
| services.xserver.filesSection | Contents of the first Files section of the X server configuration file.
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| hardware.bluetooth.input | Set configuration for the input service (/etc/bluetooth/input.conf)
|
| services.haste-server.settings | Configuration for haste-server
|
| services.influxdb.settings | Extra configuration options for influxdb
|
| services.librenms.poolConfig | Options for the LibreNMS PHP pool
|
| services.knot.settingsFile | As alternative to settings, you can provide whole configuration
directly in the almost-YAML format of Knot DNS
|
| services.glpiAgent.settings | GLPI Agent configuration options
|
| services.asterisk.extraConfig | Extra configuration options appended to the default
asterisk.conf file.
|
| security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| services.crowdsec.settings | Set of various configuration attributes
|
| services.etcd.initialClusterState | Etcd initial cluster configuration for bootstrapping.
|
| services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| services.tremor-rs.loggerSettings | Tremor logger configuration
|
| services.mautrix-discord.dataDir | Directory to store the bridge's configuration and database files
|
| services.munin-node.extraPluginConfig | plugin-conf.d extra plugin configuration
|
| services.openldap.settings | Configuration for OpenLDAP, in OLC format
|
| services.minidlna.settings | Configuration for minidlna.conf(5).
|
| services.ncps.cache.storage.local | The local directory for storing configuration and cached store
paths
|
| services.zabbixProxy.settings | Zabbix Proxy configuration
|
| services.jirafeau.poolConfig | Options for Jirafeau PHP pool
|
| services.zabbixAgent.settings | Zabbix Agent configuration
|
| <imports = [ pkgs.php.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.victoriametrics.checkConfig | Check configuration
|
| services.xserver.displayManager.lightdm.greeters.slick.extraConfig | Extra configuration that should be put in the lightdm-slick-greeter.conf
configuration file.
|
| programs.turbovnc.ensureHeadlessSoftwareOpenGL | Whether to set up NixOS such that TurboVNC's built-in software OpenGL
implementation works
|
| services.keyd.keyboards | Configuration for one or more device IDs
|
| services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| services.hedgedoc.settings | HedgeDoc configuration, see
https://docs.hedgedoc.org/configuration/
for documentation.
|
| programs.java.enable | Install and setup the Java development kit.
This adds JAVA_HOME to the global environment, by sourcing the
jdk's setup-hook on shell init
|
| services.dolibarr.poolConfig | Options for the Dolibarr PHP pool
|
| services.homebox.settings | The homebox configuration as environment variables
|
| networking.dhcpcd.enable | Whether to enable dhcpcd for device configuration
|
| services.aerospike.extraConfig | Extra configuration
|
| services.smokeping.probeConfig | Probe configuration
|
| services.printing.extraFilesConf | Extra contents of the configuration file of the CUPS daemon
(cups-files.conf).
|
| services.smokeping.alertConfig | Configuration for alerts.
|
| services.rspamd.overrides | Overridden configuration files, written into /etc/rspamd/override.d/{name}.
|
| services.throttled.extraConfig | Alternative configuration
|
| services.olivetin.settings | Configuration of OliveTin
|
| services.nginx.validateConfigFile | Whether to enable validating configuration with pkgs.writeNginxConfig.
|
| services.unbound.settings | Declarative Unbound configuration
See the unbound.conf(5) manpage for a list of
available options.
|
| services.lxd-image-server.settings | Configuration for lxd-image-server
|
| services.trilium-server.nginx.hostName | The hostname use to setup the virtualhost configuration
|
| services.routedns.settings | Configuration for RouteDNS, see https://github.com/folbricht/routedns/blob/master/doc/configuration.md
for more information.
|
| services.zookeeper.logging | Zookeeper logging configuration, logback.xml.
|
| services.vault.telemetryConfig | Telemetry configuration
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window | IPsec replay window to configure for this CHILD_SA
|
| services.vmalert.settings | vmalert configuration, passed via command line flags
|
| services.agorakit.poolConfig | Options for the agorakit PHP pool
|
| services.ergochat.settings | Ergo IRC daemon configuration file.
https://raw.githubusercontent.com/ergochat/ergo/master/default.yaml
|
| services.bacula-dir.port | Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections
|
| programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| programs.gnupg.agent.settings | Configuration for /etc/gnupg/gpg-agent.conf
|
| services.h2o.hosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| services.drupal.sites.<name>.poolConfig | Options for the Drupal PHP pool
|
| services.traccar.settingsFile | File used as configuration for traccar
|
| services.spotifyd.settings | Configuration for Spotifyd
|
| services.sonic-server.settings | Sonic Server configuration options
|
| services.netatalk.settings | Configuration for Netatalk
|
| services.xserver.moduleSection | Contents of the Module section of the X server configuration file.
|
| services.prometheus.exporters.restic.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.seafile.ccnetSettings | Configuration for ccnet, see
https://manual.seafile.com/config/ccnet-conf/
for supported values.
|
| services.klipper.extraSettings | Extra lines to append to the generated Klipper configuration.
|
| services.fediwall.settings | Fediwall configuration
|
| services.gitolite.enable | Enable gitolite management under the
gitolite user
|
| services.davis.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.bacula-sd.extraStorageConfig | Extra configuration to be passed in Storage directive.
|
| services.drupal.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| services.infinoted.extraConfig | Additional configuration to append to infinoted.conf
|
| services.ferretdb.settings | Additional configuration for FerretDB, see
https://docs.ferretdb.io/configuration/flags/
for supported values.
|
| services.heartbeat.extraConfig | Any other configuration options you want to add
|
| programs.starship.settings | Configuration included in starship.toml
|
| services.slskd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.patroni.settings | The primary patroni configuration
|
| services.movim.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.sing-box.settings | The sing-box configuration, see https://sing-box.sagernet.org/configuration/ for documentation
|
| services.printing.browsedConf | The contents of the configuration. file of the CUPS Browsed daemon
(cups-browsed.conf)
|
| services.xserver.deviceSection | Contents of the first Device section of the X server configuration file.
|
| services.xserver.screenSection | Contents of the first Screen section of the X server configuration file.
|
| services.traefik.staticConfigFile | Path to traefik's static configuration to use.
(Using that option has precedence over staticConfigOptions and dynamicConfigOptions)
|
| services.gitlab-runner.settings | Global gitlab-runner configuration
|
| services.bluemap.onCalendar | How often to trigger rendering the map,
in the format of a systemd timer onCalendar configuration
|
| services.atalkd.interfaces | Per-interface configuration for atalkd.
|
| hardware.nvidia.nvidiaSettings | Whether to enable nvidia-settings, NVIDIA's GUI configuration tool
.
|
| networking.useNetworkd | Whether we should use networkd as the network configuration backend or
the legacy script based system
|
| services.dendrite.settings | Configuration for dendrite, see:
https://github.com/matrix-org/dendrite/blob/main/dendrite-sample.yaml
for available options with which to populate settings.
|
| boot.loader.grub.users | User accounts for GRUB
|
| services.gitolite.enableGitAnnex | Enable git-annex support
|
| services.pretalx.settings | pretalx configuration as a Nix attribute set
|
| services.synergy.server.screenName | Use the given name instead of the hostname to identify
this screen in the configuration.
|
| services.sshwifty.settings | Configuration for Sshwifty
|
| services.movim.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.llama-cpp.modelsPreset | Models preset configuration as a Nix attribute set
|
| services.snipe-it.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.roundcube.extraConfig | Extra configuration for roundcube webmail instance
|
| services.munin-cron.extraGlobalConfig | munin.conf extra global configuration
|
| services.nagios.validateConfig | if true, the syntax of the nagios configuration file is checked at build time
|
| services.zabbixServer.settings | Zabbix Server configuration
|
| system.switch.inhibitors | Attribute set of strings that will prevent switching into a configuration when
they change
|
| services.clamav.daemon.settings | ClamAV configuration
|
| security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| services.crowdsec.settings.capi | CAPI Configuration attributes
|
| services.flannel.storageBackend | Determines where flannel stores its configuration at runtime
|
| hardware.trackpoint.enable | Enable sensitivity and speed configuration for trackpoints.
|
| services.crowdsec.settings.lapi | LAPI Configuration attributes
|
| services.blendfarm.serverConfig | Server configuration
|
| services.froide-govplan.settings | Configuration options to set in extra_settings.py.
|
| networking.dhcpcd.IPv6rs | Force enable or disable solicitation and receipt of IPv6 Router Advertisements
|
| services.pairdrop.rtcConfig | Configuration for STUN/TURN servers
|
| services.prosody-filer.settings | Configuration for Prosody Filer
|
| services.phpfpm.pools.<name>.phpOptions | "Options appended to the PHP configuration file php.ini used for this PHP-FPM pool."
|
| services.prometheus.ruleFiles | Any additional rules files to include in this configuration.
|
| services.smokeping.targetConfig | Target configuration
|
| services.zabbixWeb.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| services.sourcehut.settings | The configuration for the sourcehut network.
|
| services.kanidm.serverSettings | Settings for Kanidm, see
the documentation
and example configuration
for possible values.
|
| programs.spacefm.settings | The system-wide spacefm configuration
|
| services.fcgiwrap.instances | Configuration for fcgiwrap instances.
|
| services.actual.settings | Server settings, refer to the documentation for available options
|
| networking.iproute2.enable | Whether to enable copying IP route configuration files.
|
| services.bitmagnet.settings | Bitmagnet configuration (https://bitmagnet.io/setup/configuration.html).
|
| services.cross-seed.settings | Configuration options for cross-seed
|
| services.radicale.rights | Configuration for Radicale's rights file
|
| services.octoprint.extraConfig | Extra options which are added to OctoPrint's YAML configuration file.
|
| services.patroni.namespace | Path within the configuration store where Patroni will keep information about the cluster.
|
| services.tailscale.serve.enable | Whether to enable Tailscale Serve configuration.
|
| services.quickwit.settings.rest | Rest server configuration for Quickwit
|
| services.tinyproxy.settings | Configuration for tinyproxy.
|
| systemd.network.netdevs.<name>.extraConfig | Extra configuration append to unit
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.postfix.networks | Net masks for trusted - allowed to relay mail to third parties -
hosts
|
| services.buildbot-master.extraConfig | Extra configuration to append to master.cfg
|
| services.greetd.useTextGreeter | Whether the greeter uses text-based user interfaces (For example, tuigreet)
|
| services.bookstack.poolConfig | Options for the Bookstack PHP pool
|
| services.gancio.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.dockerRegistry.extraConfig | Docker extra registry configuration.
|
| boot.initrd.network.ssh.enable | Start SSH service during initrd boot
|
| services.fluidd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.akkoma.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.matomo.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.mediawiki.nginx.hostName | The hostname to use for the nginx virtual host
|
| services.monica.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.mediawiki.poolConfig | Options for the MediaWiki PHP pool
|
| services.moosefs.master.settings | Master configuration options (mfsmaster.cfg).
|
| services.nextcloud.poolConfig | Options for Nextcloud's PHP pool
|
| services.searx.settings | Searx settings
|
| services.stubby.settings | Content of the Stubby configuration file
|
| systemd.network.netdevs.<name>.enable | Whether to manage network configuration using systemd-network
|
| users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| environment.memoryAllocator.provider | The system-wide memory allocator
|
| services.invoiceplane | InvoicePlane configuration.
|
| services.traefik.dynamicConfigFile | Path to traefik's dynamic configuration to use.
(Using that option has precedence over dynamicConfigOptions)
|
| services.glitchtip.settings | Configuration of GlitchTip
|
| services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.immich-kiosk.settings | Configuration for immich-kiosk
|
| services.influxdb2.settings | configuration options for influxdb2, see https://docs.influxdata.com/influxdb/v2.0/reference/config-options for details.
|
| services.rosenpass.settings | Configuration for Rosenpass, see https://rosenpass.eu/ for further information.
|
| services.public-inbox.spamAssassinRules | SpamAssassin configuration specific to public-inbox.
|
| services.manticore.settings | Configuration for Manticoresearch
|
| services.maddy.tls.extraConfig | Arguments for the specified certificate loader
|
| services.opensearch.logging | opensearch logging configuration.
|
| services.mosquitto.settings | Global configuration options for the mosquitto broker.
|
| services.neo4j.https.sslPolicy | Neo4j SSL policy for HTTPS traffic
|
| services.microbin.settings | Additional configuration for MicroBin, see
https://microbin.eu/docs/installation-and-configuration/configuration/
for supported values
|
| services.kanidm.server.settings | Settings for Kanidm, see
the documentation
and example configuration
for possible values.
|
| services.xserver.monitorSection | Contents of the first Monitor section of the X server configuration file.
|
| services.vault.storageConfig | HCL configuration to insert in the storageBackend section
|
| services.wastebin.settings | Additional configuration for wastebin, see
https://github.com/matze/wastebin#usage for supported values
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| services.peering-manager.enableOidc | Enable OIDC-Authentication for Peering Manager
|
| services.traefik.staticConfigOptions | Static configuration for Traefik.
|
| services.bacula-fd.extraMessagesConfig | Extra configuration to be passed in Messages directive.
|
| services.c2fmzq-server.settings | Configuration for c2FmZQ-server passed as CLI arguments
|
| fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| services.cntlm.proxy | A list of NTLM/NTLMv2 authenticating HTTP proxies
|
| services.bacula-sd.extraMessagesConfig | Extra configuration to be passed in Messages directive.
|
| hardware.bluetooth.network | Set configuration for the network service (/etc/bluetooth/network.conf)
|
| services.immich-public-proxy.settings | Configuration for IPP
|
| services.scion.scion-router.settings | scion-router configuration
|
| services.peering-manager.enableLdap | Enable LDAP-Authentication for Peering Manager
|
| services.navidrome.settings | Configuration for Navidrome, see https://www.navidrome.org/docs/usage/configuration-options/ for supported values.
|
| services.scion.scion-daemon.settings | scion-daemon configuration
|
| services.pgbouncer.settings | Configuration for PgBouncer, see https://www.pgbouncer.org/config.html
for supported values.
|
| services.xserver.serverFlagsSection | Contents of the ServerFlags section of the X server configuration file.
|
| services.cryptpad.settings | Cryptpad configuration settings
|
| services.bacula-dir.extraMessagesConfig | Extra configuration to be passed in Messages directive.
|
| services.clamav.updater.settings | freshclam configuration
|
| services.graphite.seyren.extraConfig | Extra seyren configuration
|
| services.bacula-dir.extraDirectorConfig | Extra configuration to be passed in Director directive.
|
| programs.gamemode.settings | System-wide configuration for GameMode (/etc/gamemode.ini)
|
| services.factorio.extraSettings | Extra game configuration that will go into server-settings.json
|
| services.etebase-server.settings | Configuration for etebase-server
|
| services.moonraker.settings | Configuration for Moonraker
|
| services.redis.servers.<name>.settings | Redis configuration
|
| services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| services.matrix-tuwunel.settings | Generates the tuwunel.toml configuration file
|
| services.transfer-sh.settings | Additional configuration for transfer-sh, see
https://github.com/dutchcoders/transfer.sh#usage-1
for supported values
|
| services.typesense.settings | Typesense configuration
|
| services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| services.tinc.networks.<name>.hosts | The name of the host in the network as well as the configuration for that host
|
| services.quake3-server.extraConfig | Extra configuration options
|
| services.tomcat.purifyOnStart | On startup, the baseDir directory is populated with various files,
subdirectories and symlinks
|
| containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.lasuite-docs.settings | Configuration options of docs
|
| services.librenms.settings | Attrset of the LibreNMS configuration
|
| boot.initrd.network.ifstate.settings | Content of IfState's initrd configuration file
|
| services.castopod.poolSettings | Options for Castopod's PHP pool
|
| services.firewalld.services | firewalld service configuration files
|
| services.gemstash.settings | Configuration for Gemstash
|
| services.renovate.settings | Renovate's global configuration
|
| services.schleuder.settings | Settings for schleuder.yml
|
| services.privoxy.settings | This option is mapped to the main Privoxy configuration file
|
| services.nominatim.enable | Whether to enable nominatim
|
| services.rspamd.workers.<name>.includes | List of files to include in configuration
|
| services.xinetd.services.*.extraConfig | Extra configuration-lines added to the section of the service.
|
| services.aerospike.networkConfig | network section of configuration file
|
| services.caddy.virtualHosts.<name>.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| networking.ifstate.settings | Content of IfState's configuration file
|
| services.cassandra.logbackConfig | XML logback configuration for cassandra
|
| services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| services.roundcube.enable | Whether to enable roundcube
|
| services.xserver.xkb.extraLayouts | Extra custom layouts that will be included in the xkb configuration
|
| services.watchdogd.settings | Configuration to put in watchdogd.conf
|
| services.xserver.inputClassSections | Content of additional InputClass sections of the X server configuration file.
|
| services.lasuite-meet.settings | Configuration options of meet
|
| systemd.network.networks.<name>.extraConfig | Extra configuration append to unit
|
| services.seafile.seafileSettings | Configuration for seafile-server, see
https://manual.seafile.com/config/seafile-conf/
for supported values.
|
| services.dokuwiki.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| programs.proxychains.enable | Whether to enable proxychains configuration.
|
| programs.steam.fontPackages | Font packages to use in Steam
|
| services.keepalived.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| services.dokuwiki.sites.<name>.poolConfig | Options for the DokuWiki PHP pool
|
| services.dolibarr.h2o.serverAliases | Additional names of virtual hosts served by this virtual host
configuration.
|
| services.postfix.settings.main | The main.cf configuration file as key value set
|
| services.teeworlds.extraOptions | Extra configuration lines for the teeworlds.cfg
|
| services.slurm.extraPlugstackConfig | Extra configuration that will be added to the end of plugstack.conf.
|
| services.postgresql.checkConfig | Check the syntax of the configuration file at compile time
|
| services.radicle.ci.broker.settings | Configuration of radicle-ci-broker
|
| services.scollector.extraConfig | Extra scollector configuration added to the end of scollector.toml
|
| services.opensearch.settings | OpenSearch configuration.
|
| services.maubot.settings.logging | Python logging configuration
|
| services.zram-generator.settings | Configuration for zram-generator,
see https://github.com/systemd/zram-generator for documentation.
|
| services.wgautomesh.settings | Configuration for wgautomesh.
|
| systemd.network.networks.<name>.enable | Whether to manage network configuration using systemd-network
|
| services.xserver.serverLayoutSection | Contents of the ServerLayout section of the X server configuration file.
|
| services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.prometheus.alertmanagerIrcRelay.settings | Configuration for Alertmanager IRC Relay as a Nix attribute set
|
| services.guacamole-server.logbackXml | Configuration file that correspond to logback.xml.
|
| services.traefik.dynamicConfigOptions | Dynamic configuration for Traefik.
|
| services.guacamole-client.logbackXml | Configuration file that correspond to logback.xml.
|
| services.gitDaemon.enable | Enable Git daemon, which allows public hosting of git repositories
without any access controls
|
| services.postfix-tlspol.settings | The postfix-tlspol configuration file as a Nix attribute set
|
| services.suricata.settings.app-layer | app-layer configuration, see upstream docs.
|
| services.suwayomi-server.settings | Configuration to write to server.conf
|
| services.scion.scion-control.settings | scion-control configuration
|
| services.open-web-calendar.settings | Configuration for the server
|
| services.rebuilderd.settings | Configuration for rebuilderd (rebuilderd.conf)
|
| services.tinc.networks.<name>.settings | Configuration of the Tinc daemon for this network
|
| services.yggdrasil-jumper.extraConfig | Configuration for Yggdrasil Jumper in plaintext.
|
| services.caddy.virtualHosts.<name>.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| services.firefly-iii.settings | Options for firefly-iii configuration
|
| services.anubis.defaultOptions.policy | Anubis policy configuration
|
| services.fail2ban.daemonSettings | The contents of Fail2ban's main configuration file
|
| services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| services.coturn.listening-port | TURN listener port for UDP and TCP
|
| hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| services.limesurvey.poolConfig | Options for the LimeSurvey PHP pool
|
| services.livekit.ingress.settings | LiveKit Ingress configuration
|
| services.nsd.zonefilesWrite | Write changed secondary zones to their zonefile every N seconds
|
| services.toxBootstrapd.extraConfig | Configuration for bootstrap daemon
|
| services.reposilite.settings | Configuration written to the reposilite.cdn file
|
| services.rke2.cisHardening | Enable CIS Hardening for RKE2
|
| services.peering-manager.oidcConfigPath | Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
|
| services.anubis.instances.<name>.policy | Anubis policy configuration
|
| hardware.bluetooth.settings | Set configuration for system-wide bluetooth (/etc/bluetooth/main.conf)
|
| programs.openvpn3.netcfg.settings | Options stored in /etc/openvpn3/netcfg.json configuration file
|
| services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| services.postfix.settings.master | The master.cf configuration file as an attribute set of service
defitions
|
| services.peering-manager.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| services.sourcehut.nginx.virtualHost | Virtual-host configuration merged with all Sourcehut's virtual-hosts.
|
| services.crowdsec.settings.console | Console Configuration attributes
|
| services.caddy.enableReload | Reload Caddy instead of restarting it when configuration file changes
|
| security.duosec.acceptEnvFactor | Look for factor selection or passcode in the
$DUO_PASSCODE environment variable before
prompting the user for input
|
| services.scion.scion-ip-gateway.trafficConfig | scion-ip-gateway traffic configuration
|
| services.quickwit.settings.version | Configuration file version.
|
| services.metricbeat.settings | Configuration for metricbeat
|
| services.syncoid.commands.<name>.service | Systemd configuration specific to this syncoid service.
|
| services.pulseaudio.extraClientConf | Extra configuration appended to pulse/client.conf file.
|
| services.slurm.dbdserver.extraConfig | Extra configuration for slurmdbd.conf See also:
slurmdbd.conf(8).
|
| services.routinator.settings | Configuration for Routinator 3000, see https://routinator.docs.nlnetlabs.nl/en/stable/manual-page.html#configuration-file for options.
|
| services.privatebin.poolConfig | Options for the PrivateBin PHP pool
|
| services.dolibarr.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| networking.wireless.extraConfig | Extra lines appended to the configuration file
|
| services.dokuwiki.sites.<name>.extraConfigs | Path(s) to additional configuration files that are then linked to the 'conf' directory.
|
| services.librenms.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.jitsi-meet.interfaceConfig | Client-side web-app interface settings that override the defaults in interface_config.js
|
| services.kanboard.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.apache-kafka.settings | Kafka broker configuration
server.properties
|
| services.fediwall.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| networking.interfaces | The configuration for each network interface
|
| services.apache-kafka.log4jProperties | Kafka log4j property configuration.
|
| hardware.keyboard.zsa.enable | Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I
|
| services.agorakit.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.invidious-router.nginx.enable | Whether to enable Automatic nginx proxy configuration
.
|
| services.mainsail.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.schleuder.listDefaults | Default settings for lists (list-defaults.yml)
|
| services.lubelogger.settings | Additional configuration for LubeLogger, see https://docs.lubelogger.com/Environment%20Variables for supported values.
|
| services.tinc.networks.<name>.extraConfig | Extra lines to add to the tinc service configuration file
|
| services.tomcat.virtualHosts.*.webapps | List containing web application WAR files and/or directories containing
web applications and configuration files for the virtual host.
|
| services.pixelfed.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.filesender.settings | Configuration options used by FileSender
|
| services.guacamole-server.userMappingXml | Configuration file that correspond to user-mapping.xml.
|
| services.keepalived.extraGlobalDefs | Extra lines to be added verbatim to the 'global_defs' block of the
configuration file
|
| services.homebridge.settings | Configuration options for homebridge
|
| services.freeciv.settings.Database | Enable database connection with given configuration.
|
| networking.wireless.extraConfigFiles | Extra wpa_supplicant configuration files to load.
|
| services.dolibarr.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.guacamole-client.userMappingXml | Configuration file that correspond to user-mapping.xml.
|
| services.homepage-dashboard.docker | Homepage docker configuration
|
| services.hedgedoc.settings.db | Specify the configuration for sequelize
|
| services.journald.upload.settings | Configuration for journal-upload
|
| services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| services.privatebin.settings | Options for privatebin configuration
|
| systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.matrix-synapse.settings.redis | Redis configuration for synapse
|
| system.activationScripts | A set of shell script fragments that are executed when a NixOS
system configuration is activated
|
| services.limesurvey.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| services.buildkite-agents.<name>.extraConfig | Extra lines to be added verbatim to the configuration file.
|
| programs.mepo.locationBackends.gpsd | Whether to enable location detection via gpsd
|
| services.clickhouse.extraUsersConfig | Additional raw XML configuration for ClickHouse server.
|
| networking.resolvconf.enable | Whether DNS configuration is managed by resolvconf.
|
| services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| services.journalbeat.extraConfig | Any other configuration options you want to add
|
| services.rutorrent.poolSettings | Options for ruTorrent's PHP pool
|
| services.opensnitch.settings | opensnitchd configuration
|
| services.nagios.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.prosody.virtualHosts.<name>.extraConfig | Additional virtual host specific configuration
|
| services.nebula.networks.<name>.settings | Nebula configuration
|
| services.moodle.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.tinc.networks.<name>.hostSettings | The name of the host in the network as well as the configuration for that host
|
| services.x2goserver.settings | x2goserver.conf ini configuration as nix attributes
|
| services.yggdrasil-jumper.settings | Configuration for Yggdrasil Jumper as a Nix attribute set.
|
| services.vdirsyncer.jobs.<name>.timerConfig | systemd timer configuration
|
| services.wordpress.sites.<name>.poolConfig | Options for the WordPress PHP pool
|
| services.wordpress.sites.<name>.mergedConfig | Read only representation of the final configuration.
|
| services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| services.eris-server.listenCoap | Server CoAP listen address
|
| services.immich.environment | Extra configuration environment variables
|
| services.autotierfs.settings | The contents of the configuration file for autotier
|
| services.prometheus.exporters | Prometheus exporter configuration
|
| services.radicle.httpd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.orangefs.server.fileSystems.<name>.id | File system ID (must be unique within configuration).
|
| services.mediawiki.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts
|
| services.wordpress.sites.<name>.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.
|
| users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| services.strongswan-swanctl.swanctl.connections.<name>.children | CHILD_SA configuration sub-section
|
| services.centrifugo.settings | Declarative Centrifugo configuration
|
| services.hbase-standalone.enable | Whether to enable HBase master in standalone mode with embedded regionserver and zookeper
|
| services.crowdsec.settings.general | Settings for the main CrowdSec configuration file
|
| services.dysnomia.containers | An attribute set in which each key represents a container and each value an attribute set providing its configuration properties
|
| security.krb5.settings.includedir | Directories containing files to include in the Kerberos configuration.
|
| services.tuliprox.mappingSettings | Templates configuration
Refer to the Tuliprox documentation for available attributes
|
| services.nvme-rs.settings.thresholds | Threshold configuration for NVMe monitoring
|
| services.pipewire.extraConfig.jack | Additional configuration for the PipeWire JACK server and client library
|
| services.shairport-sync.settings | Configuration options for Shairport-Sync
|
| services.errbot.instances.<name>.identity | Errbot identity configuration
|
| services.glance.settings | Configuration written to a yaml file that is read by glance
|
| services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.anuko-time-tracker.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| services.matrix-conduit.settings | Generates the conduit.toml configuration file
|
| services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.nextcloud.webfinger | Enable this option if you plan on using the webfinger plugin
|
| services.nghttpx.backends.*.params.sni | Override the TLS SNI field value
|
| services.wakapi.database.createLocally | Whether to enable automatic database configuration.
Only PostgreSQL is supported for the time being.
.
|
| nix.daemonIOSchedClass | Nix daemon process I/O scheduling class
|
| services.homepage-dashboard.proxmox | Homepage proxmox configuration
|
| services.grafana-image-renderer.settings | Configuration attributes for grafana-image-renderer.
|
| services.homepage-dashboard.widgets | Homepage widgets configuration
|
| programs.openvpn3.log-service.settings | Options stored in /etc/openvpn3/log-service.json configuration file
|
| services.librechat.settings | A free-form attribute set that will be written to librechat.yaml
|
| services.jitsi-meet.nginx.enable | Whether to enable nginx virtual host that will serve the javascript application and act as
a proxy for the XMPP server
|
| services.collectd.validateConfig | Validate the syntax of collectd configuration file at build time
|
| services.clickhouse.extraServerConfig | Additional raw XML configuration for ClickHouse server.
|
| services.rutorrent.nginx.enable | Whether to enable nginx virtual host management
|
| services.nomad.settings | Configuration for Nomad
|
| services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| services.cachefilesd.extraConfig | Additional configuration file entries
|
| services.bookstack.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.deluge.declarative | Whether to use a declarative deluge configuration
|
| services.libvirtd.autoSnapshot.vms | If specified only the list of VMs will be snapshotted else all existing one
|
| services.moosefs.cgiserver.settings | GUI server configuration options.
|
| services.scrutiny.settings | Scrutiny settings to be rendered into the configuration file
|
| services.pretix.environmentFile | Environment file to pass secret configuration values
|
| services.rsnapshot.cronIntervals | Periodicity at which intervals should be run by cron
|
| services.dex.environmentFile | Environment file (see systemd.exec(5)
"EnvironmentFile=" section for the syntax) to define variables for dex
|
| services.filesender.poolSettings | Options for FileSender's PHP pool
|
| services.headscale.settings.dns.split | Split DNS configuration (map of domains and which DNS server to use for each)
|
| services.autosuspend.settings | Configuration for autosuspend, see
https://autosuspend.readthedocs.io/en/latest/configuration_file.html#general-configuration
for supported values.
|
| programs.dms-shell.systemd.restartIfChanged | Whether to restart the dms.service when the DankMaterialShell package or
configuration changes
|
| services.immichframe.settings | Configuration for ImmichFrame
|
| services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| services.mollysocket.settings | Configuration for MollySocket
|
| systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| systemd.suppressedSystemUnits | A list of units to skip when generating system systemd configuration directory
|
| system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| networking.resolvconf.extraConfig | Extra configuration to append to resolvconf.conf.
|
| services.firefly-iii-data-importer.poolConfig | Options for the Firefly III Data Importer PHP pool
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| services.opentracker.extraOptions | Configuration Arguments for opentracker
See https://erdgeist.org/arts/software/opentracker/ for all params
|
| services.syncthing.settings.options | The options element contains all other global configuration options
|
| system.userActivationScripts | A set of shell script fragments that are executed by a systemd user
service when a NixOS system configuration is activated
|
| services.gatus.environmentFile | File to load as environment file
|
| boot.loader.grub.timeoutStyle |
menu shows the menu.
countdown uses a text-mode countdown.
hidden hides GRUB entirely
|
| networking.wireless.networks | The network definitions to automatically connect to when
wpa_supplicant is running
|
| hardware.nvidia.datacenter.settings | Additional configuration options for fabricmanager.
|
| services.prosody.virtualHosts.<name>.ssl.extraOptions | Extra SSL configuration options.
|
| services.postgrest.settings | PostgREST configuration as documented in:
https://docs.postgrest.org/en/stable/references/configuration.html#list-of-parameters
db-uri is represented as an attribute set, see settings.db-uri
The settings.jwt-secret option is blocked
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.settings | PHP FPM configuration
|
| services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| services.dsnet.settings.ExternalIP | The external IP address of the server
|
| services.openafsServer.roles.backup.fabsExtraConfig | Additional configuration parameters for the FABS backup server.
|
| services.limesurvey.httpd.virtualHost | Apache configuration can be done by adapting services.httpd.virtualHosts.<name>
|
| services.limesurvey.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| services.pipewire.extraConfig.client | Additional configuration for the PipeWire client library, used by most applications
|
| services.mattermost.plugins | Plugins to add to the configuration
|
| services.meilisearch.settings | Configuration settings for Meilisearch
|
| services.pairdrop.environment | Additional configuration (environment variables) for PairDrop, see
https://github.com/schlagmichdoch/PairDrop/blob/master/docs/host-your-own.md#environment-variables
for supported values.
|
| services.jirafeau.nginxConfig.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| environment.deepin.excludePackages | List of default packages to exclude from the configuration
|
| documentation.man.man-db.package | The man-db derivation to use
|
| services.homepage-dashboard.services | Homepage services configuration
|
| hardware.nvidia-container-toolkit.enable | Enable dynamic CDI configuration for Nvidia devices by running
nvidia-container-toolkit on boot.
|
| services.bitmagnet.settings.postgres | PostgreSQL database configuration
|
| services.mtprotoproxy.extraConfig | Extra configuration options for mtprotoproxy.
|
| services.networkd-dispatcher.rules | Declarative configuration of networkd-dispatcher rules
|
| services.searx.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile=" section for the syntax) to define variables for Searx
|
| services.sabnzbd.secretFiles | Path to a list of ini file containing confidential settings such as credentials
|
| systemd.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.matrix-appservice-irc.settings | Configuration for the appservice, see
https://github.com/matrix-org/matrix-appservice-irc/blob/4.0.0/config.sample.yaml
for supported values
|
| systemd.mounts.*.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| boot.specialFileSystems.<name>.depends | List of paths that should be mounted before this one
|
| services.keyd.keyboards.<name>.extraConfig | Extra configuration that is appended to the end of the file.
Do not write ids section here, use a separate option for it
|
| services.zabbixWeb.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.zabbixWeb.nginx.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| services.drupal.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.dnsmasq.settings | Configuration of dnsmasq
|
| services.anubis.defaultOptions.settings | Freeform configuration via environment variables for Anubis
|
| services.dokuwiki.sites.<name>.settings | Structural DokuWiki configuration
|
| services.dsnet.settings.ExternalIP6 | The external IPv6 address of the server
|
| services.keycloak.settings.hostname | The hostname part of the public URL used as base for
all frontend requests
|
| security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| services.elasticsearch.extraConf | Extra configuration for elasticsearch.
|
| boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| services.lidarr.environmentFiles | Environment file to pass secret configuration values
|
| services.outline.slackIntegration | For a complete Slack integration with search and posting to channels
this configuration is also needed
|
| services.nextcloud.poolSettings | Options for nextcloud's PHP pool
|
| services.moosefs.metalogger.settings | Metalogger configuration options (mfsmetalogger.cfg).
|
| services.system76-scheduler.useStockConfig | Use the (reasonable and featureful) stock configuration
|
| services.sonarr.environmentFiles | Environment file to pass secret configuration values
|
| services.radarr.environmentFiles | Environment file to pass secret configuration values
|
| environment.plasma5.excludePackages | List of default packages to exclude from the configuration
|
| environment.plasma6.excludePackages | List of default packages to exclude from the configuration
|
| boot.initrd.systemd.suppressedUnits | A list of units to skip when generating system systemd configuration directory
|
| services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| services.triggerhappy.extraConfig | Literal contents to append to the end of triggerhappy configuration file.
|
| services.renovate.environment | Extra environment variables to export to the Renovate process
from the systemd unit configuration
|
| services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| virtualisation.vmVariant | Machine configuration to be added for the vm script produced by nixos-rebuild build-vm.
|
| systemd.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| systemd.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.kubernetes.addons.dns.corefile | Custom coredns corefile configuration
|
| services.bookstack.settings | Options for Bookstack configuration
|
| services.knot-resolver.settings.network.listen | List of interfaces to listen to and its configuration.
|
| services.canaille.settings.CANAILLE_LDAP | Configuration for the LDAP backend
|
| services.logrotate.settings.<name>.files | Single or list of files for which rules are defined
|
| services.suricata.settings.threshold-file | Suricata threshold configuration file.
|
| services.scion.scion-dispatcher.settings | scion-dispatcher configuration
|
| <imports = [ pkgs.ghostunnel.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.youtrack.generalParameters | General configuration parameters and other JVM options
|
| documentation.man.mandoc.extraConfig | Extra configuration to write to man.conf(5).
|
| services.adguardhome.allowDHCP | Allows AdGuard Home to open raw sockets (CAP_NET_RAW), which is
required for the integrated DHCP server
|
| services.clamav.fangfrisch.settings | fangfrisch configuration
|
| services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.routinator.settings.log-file | A string value containing the path to a file to which log messages will be appended if the log configuration value is set to file
|
| services.mchprs.declarativeSettings | Whether to use a declarative configuration for MCHPRS.
|
| services.prometheus.xmpp-alerts.settings | Configuration for prometheus xmpp-alerts, see
https://github.com/jelmer/prometheus-xmpp-alerts/blob/master/xmpp-alerts.yml.example
for supported values.
|
| systemd.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| systemd.user.paths.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| services.homepage-dashboard.bookmarks | Homepage bookmarks configuration
|
| documentation.man.mandoc.package | The mandoc derivation to use
|
| services.postgresql.settings | PostgreSQL configuration
|
| services.your_spotify.settings | Your Spotify Configuration
|
| services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| programs.firefox.policies | Group policies to install
|
| services.activemq.javaProperties | Specifies Java properties that are sent to the ActiveMQ
broker service with the "-D" option
|
| services.filebeat.settings | Configuration for filebeat
|
| services.elasticsearch.logging | Elasticsearch logging configuration.
|
| documentation.man.mandoc.settings | Configuration for man.conf(5)
|
| programs.uwsm.waylandCompositors | Configuration for UWSM-managed Wayland Compositors
|
| services.readarr.environmentFiles | Environment file to pass secret configuration values
|
| services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| services.archisteamfarm.bots | Bots name and configuration.
|
| services.gerrit.replicationSettings | Replication configuration
|
| services.postfixadmin.enable | Whether to enable postfixadmin
|
| services.jitsi-meet.prosody.lockdown | Whether to disable Prosody features not needed by Jitsi Meet
|
| services.mediawiki.extensions | Attribute set of paths whose content is copied to the extensions
subdirectory of the MediaWiki installation and enabled in configuration
|
| services.github-runners.<name>.group | Group under which to run the service
|
| systemd.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| virtualisation.cri-o.settings | Configuration for cri-o, see
https://github.com/cri-o/cri-o/blob/master/docs/crio.conf.5.md.
|
| systemd.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| security.tpm2.tctiEnvironment.deviceConf | Configuration part of the device TCTI, e.g. the path to the TPM device
|
| services.jitterentropy-rngd.enable | Whether to enable jitterentropy-rngd service configuration.
|
| services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| services.jenkins.jobBuilder.enable | Whether to enable the Jenkins Job Builder (JJB) service
|
| systemd.user.slices.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.xserver.windowManager.awesome.luaModules | List of lua packages available for being used in the Awesome configuration.
|
| systemd.mounts.*.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.user.timers.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| systemd.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.dovecot2.mailPlugins.globally.enable | mail plugins to enable as a list of strings to append to the top-level $mail_plugins configuration variable
|
| services.firefox-syncserver.singleNode.enable | Whether to enable auto-configuration for a simple single-node setup.
|
| security.tpm2.tctiEnvironment.tabrmdConf | Configuration part of the tabrmd TCTI, like the D-Bus bus name
|
| services.languagetool.settings | Configuration file options for LanguageTool, see
'languagetool-http-server --help'
for supported settings.
|
| services.interception-tools.plugins | A list of interception tools plugins that will be made available to use
inside the udevmon configuration.
|
| services.privoxy.settings.filterfile | List of paths to Privoxy filter files
|
| services.shadowsocks.extraConfig | Additional configuration for shadowsocks that is not covered by the
provided options
|
| services.nebula-lighthouse-service.settings | Configuration for nebula-lighthouse-service.
|
| services.moosefs.chunkserver.settings | Chunkserver configuration options (mfschunkserver.cfg).
|
| systemd.user.services.<name>.notSocketActivated | If set, a changed unit is never assumed to be
socket-activated on configuration switch, even if
it might have associated socket units
|
| services.hostapd.radios.<name>.settings | Extra configuration options to put at the end of global initialization, before defining BSSs
|
| services.linkwarden.environment | Extra configuration environment variables
|
| services.netbird.tunnels.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| services.paretosecurity.users | Per-user Pareto Security configuration.
|
| services.netbird.clients.<name>.environment | Environment for the netbird service, used to pass configuration options.
|
| services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| services.davis.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.biboumi.credentialsFile | Path to a configuration file to be merged with the settings
|
| services.movim.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.mattermost.environment | Extra environment variables to export to the Mattermost process
from the systemd unit configuration.
|
| services.tinc.networks.<name>.hostSettings.<name>.settings | Configuration for this host
|
| services.prowlarr.environmentFiles | Environment file to pass secret configuration values
|
| services.slskd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| systemd.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.whisparr.environmentFiles | Environment file to pass secret configuration values
|
| systemd.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.waagent.settings.ResourceDisk.SwapSizeMB | Specifies the size of the swap file in MiB (1024×1024 bytes)
|
| programs.tsmClient.defaultServername | If multiple server stanzas are declared with
programs.tsmClient.servers,
this option may be used to name a default
server stanza that IBM TSM uses in the absence of
a user-defined dsm.opt file
|
| services.homepage-dashboard.kubernetes | Homepage kubernetes configuration
|
| services.snipe-it.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| systemd.user.sockets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| systemd.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.limesurvey.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| networking.getaddrinfo.reload | Determines whether a process should detect changes to the configuration file since it was last read
|
| services.syncthing.settings | Extra configuration options for Syncthing
|
| systemd.user.units.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.user.paths.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| virtualisation.vswitch.enable | Whether to enable Open vSwitch
|
| services.invoiceplane.sites.<name>.poolConfig | Options for the InvoicePlane PHP pool
|
| services.firefly-iii-data-importer.settings | Options for firefly-iii data importer configuration
|
| services.globalprotect.settings | GlobalProtect-openconnect configuration
|
| networking.wireless.networks.<name>.extraConfig | Extra configuration lines appended to the network block
|
| services.mediawiki.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.matrix-appservice-irc.settings.ircService | IRC bridge configuration
|
| services.keycloak.settings | Configuration options corresponding to parameters set in
conf/keycloak.conf
|
| services.gancio.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| services.dovecot2.mailPlugins.perProtocol.<name>.enable | mail plugins to enable as a list of strings to append to the corresponding per-protocol $mail_plugins configuration variable
|
| services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.commafeed.environment | Extra environment variables passed to CommaFeed, refer to
https://github.com/Athou/commafeed/blob/master/commafeed-server/config.yml.example
for supported values
|
| networking.wireguard.useNetworkd | Whether to use networkd as the network configuration backend for
Wireguard instead of the legacy script-based system.
Some options have slightly different behavior with the networkd and
script-based backends
|
| services.akkoma.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.matomo.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.monica.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.grafana-image-renderer.provisionGrafana | Whether to enable Grafana configuration for grafana-image-renderer.
|
| services.komodo-periphery.environmentFile | Environment file for additional configuration via environment variables.
|
| systemd.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| virtualisation.lxd.preseed | Configuration for LXD preseed, see
https://documentation.ubuntu.com/lxd/en/latest/howto/initialize/#initialize-preseed
for supported values
|
| services.hockeypuck.settings | Configuration file for hockeypuck, here you can override
certain settings (loglevel and
openpgp.db.dsn) by just setting those values
|
| services.immichframe.settings.Accounts | Accounts configuration, multiple are permitted
|
| services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.ocsinventory-agent.settings | Configuration for /etc/ocsinventory-agent/ocsinventory-agent.cfg
|
| services.matrix-continuwuity.settings | Generates the continuwuity.toml configuration file
|
| services.trafficserver.plugins | Controls run-time loadable plugins available to Traffic Server, as
well as their configuration
|
| services.nextcloud-spreed-signaling.settings | Declarative configuration
|
| systemd.user.timers.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.user.slices.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.matrix-appservice-irc.settings.database | Configuration for the database
|
| services.xserver.desktopManager.surf-display.extraConfig | Extra configuration options to append to /etc/default/surf-display.
|
| services.invoiceplane.sites.<name>.settings | Structural InvoicePlane configuration
|
| services.privoxy.settings.actionsfile | List of paths to Privoxy action files
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.wordpress.sites.<name>.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| systemd.user.services.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| nix.daemonCPUSchedPolicy | Nix daemon process CPU scheduling policy
|
| services.strongswan-swanctl.swanctl.pools | Section defining named pools
|
| services.kubernetes.apiserver.runtimeConfig | Api runtime configuration
|
| services.simplesamlphp.<name>.settings | Configuration options used by SimpleSAMLphp
|
| services.grafana.provision.alerting.rules.path | Path to YAML rules configuration
|
| virtualisation.xen.store.settings | The OCaml-based Xen Store Daemon configuration
|
| services.prometheus.exporters.ping.settings | Configuration for ping_exporter, see
https://github.com/czerwonk/ping_exporter
for supported values.
|
| virtualisation.emptyDiskImages.*.driveConfig | Drive configuration to pass to virtualisation.qemu.drives
|
| virtualisation.vmVariantWithBootLoader | Machine configuration to be added for the vm script produced by nixos-rebuild build-vm-with-bootloader.
|
| services.waagent.settings.ResourceDisk.EnableSwap | If enabled, the agent creates a swap file (/swapfile) on the resource disk
and adds it to the system swap space
|
| environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| services.limesurvey.nginx.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.minecraft-server.declarative | Whether to use a declarative Minecraft server configuration
|
| services.prometheus.exporters.fritz.settings | Configuration settings for fritz-exporter.
|
| services.persistent-evdev.devices | A set of virtual proxy device labels with backing physical device ids
|
| services.limesurvey.httpd.virtualHost.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| virtualisation.installBootLoader | Install boot loader to target image
|
| services.xserver.exportConfiguration | Whether to symlink the X server configuration under
/etc/X11/xorg.conf.
|
| systemd.user.sockets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| systemd.user.targets.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.waagent.settings.ResourceDisk.MountPoint | This option specifies the path at which the resource disk is mounted
|
| virtualisation.incus.preseed | Configuration for Incus preseed, see
https://linuxcontainers.org/incus/docs/main/howto/initialize/#non-interactive-configuration
for supported values
|
| boot.loader.generic-extlinux-compatible.mirroredBoots | Mirror the boot configuration to multiple paths.
|
| services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| systemd.automounts.*.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| virtualisation.libvirtd.extraConfig | Extra contents appended to the libvirtd configuration file,
libvirtd.conf.
|
| boot.loader.generic-extlinux-compatible.enable | Whether to generate an extlinux-compatible configuration file
under /boot/extlinux.conf
|
| services.misskey.reverseProxy.webserver.caddy.logFormat | Configuration for HTTP request logging (also known as access logs)
|
| services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| services.scrutiny.collector.settings | Collector settings to be rendered into the collector configuration file
|
| services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| services.parsedmarc.settings | Configuration parameters to set in
parsedmarc.ini
|
| containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| services.xserver.xrandrHeads | Multiple monitor configuration, just specify a list of XRandR
outputs
|
| services.agorakit.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.librenms.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.kanboard.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.coturn.tls-listening-port | TURN listener port for TLS
|
| services.dolibarr.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.fediwall.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.grafana.provision.dashboards.path | Path to YAML dashboard configuration
|
| services.mainsail.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.pixelfed.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.suricata.settings.dpdk.interfaces | See upstream docs: docs/capture-hardware/dpdk and docs/configuration/suricata-yaml.html#data-plane-development-kit-dpdk.
|
| services.waagent.settings.ResourceDisk.FileSystem | The file system type for the resource disk
|
| services.immich.machine-learning.environment | Extra configuration environment variables
|
| services.lifecycled.queueCleaner.frequency | How often to trigger the queue cleaner
|
| networking.getaddrinfo.enable | Enables custom address sorting configuration for getaddrinfo(3) according to RFC 3484
|
| services.misskey.reverseProxy.webserver.caddy.extraConfig | Additional lines of configuration appended to this virtual host in the
automatically generated Caddyfile.
|
| services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|
| services.mastodon.elasticsearch.preset | It controls the ElasticSearch indices configuration (number of shards and replica).
|
| systemd.user.services.<name>.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| boot.loader.generic-extlinux-compatible.populateCmd | Contains the builder command used to populate an image,
honoring all options except the -c <path-to-default-configuration>
argument
|
| services.neo4j.ssl.policies.<name>.baseDirectory | The mandatory base directory for cryptographic objects of this
policy
|
| services.radicle.httpd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.tinc.networks.<name>.hostSettings.<name>.subnets | The subnets which this tinc daemon will serve
|
| services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| services.pipewire.extraConfig.pipewire-pulse | Additional configuration for the PipeWire PulseAudio server
|
| services.anuko-time-tracker.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.roundcube.maxAttachmentSize | The maximum attachment size in MB.
[upstream issue comment]: https://github.com/roundcube/roundcubemail/issues/7979#issuecomment-808879209
Since there is some overhead in base64 encoding applied to attachments, + 37% will be added
to the value set in this option in order to offset the overhead
|
| virtualisation.containers.enable | This option enables the common /etc/containers configuration module.
|
| services.geoipupdate.settings | geoipupdate configuration options
|
| virtualisation.docker.daemon.settings | Configuration for docker daemon
|
| services.matrix-appservice-irc.settings.homeserver | Homeserver configuration
|
| services.bookstack.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| environment.corePackages | Set of core packages for a normal interactive system
|
| hardware.nvidia.prime.sync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via PRIME
|
| services.grafana.provision.alerting.rules.settings | Grafana rules configuration in Nix
|
| boot.loader.generic-extlinux-compatible.mirroredBoots.*.path | The path to the boot directory where the extlinux-compatible
configuration files will be written.
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| systemd.automounts.*.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.grafana.provision.alerting.muteTimings.path | Path to YAML mute timings configuration
|
| services.grafana.provision.datasources.path | Path to YAML datasource configuration
|
| services.glance.environmentFile | Path to an environment file as defined in systemd.exec(5)
|
| services.misskey.reverseProxy.webserver.caddy.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.misskey.reverseProxy.webserver.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.opensmtpd.serverConfiguration | The contents of the smtpd.conf configuration file
|
| services.waagent.settings.ResourceDisk.Format | If set to true, waagent formats and mounts the resource disk that the platform provides,
unless the file system type in `ResourceDisk
|
| services.biboumi.settings.persistent_by_default | Whether all rooms will be persistent by default:
the value of the “persistent” option in the global configuration of each
user will be “true”, but the value of each individual room will still
default to false
|
| services.armagetronad.servers.<name>.settings | Armagetron Advanced server rules configuration
|
| services.grafana.provision.alerting.policies.path | Path to YAML notification policies configuration
|
| services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| services.jirafeau.nginxConfig.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| programs.zsh.autosuggestions.extraConfig | Attribute set with additional configuration values
|
| services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| services.grafana.provision.dashboards.settings | Grafana dashboard configuration in Nix
|
| services.mjolnir.pantalaimon.options.extraSettings | Extra configuration options
|
| services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| services.zabbixWeb.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| services.athens.storage.s3.useDefaultConfiguration | Use default configuration for the S3 storage backend.
|
| services.grafana.provision.alerting.contactPoints.path | Path to YAML contact points configuration
|
| services.grafana.provision.alerting.templates.path | Path to YAML templates configuration
|
| services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.automysqlbackup.settings | automysqlbackup configuration
|
| services.tabby.acceleration | Specifies the device to use for hardware acceleration.
cpu: no acceleration just use the CPU
rocm: supported by modern AMD GPUs
cuda: supported by modern NVIDIA GPUs
metal: supported on darwin aarch64 machines
Tabby will try and determine what type of acceleration that is
already enabled in your configuration when acceleration = null.
- nixpkgs.config.cudaSupport
- nixpkgs.config.rocmSupport
- if stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64
IFF multiple acceleration methods are found to be enabled or if you
haven't set either cudaSupport or rocmSupport you will have to
specify the device type manually here otherwise it will default to
the first from the list above or to cpu.
|
| services.armagetronad.servers.<name>.roundSettings | Armagetron Advanced server per-round configuration
|
| services.opentelemetry-collector.settings | Specify the configuration for Opentelemetry Collector in Nix
|
| services.prometheus.alertmanager-ntfy.settings | Configuration of alertmanager-ntfy
|
| system.includeBuildDependencies | Whether to include the build closure of the whole system in
its runtime closure
|
| services.grafana.provision.alerting.muteTimings.settings | Grafana mute timings configuration in Nix
|
| services.lasuite-docs.collaborationServer.settings | Configuration options of collaboration server
|
| services.grafana.provision.datasources.settings | Grafana datasource configuration in Nix
|
| services.netbird.server.management.settings | Configuration of the netbird management server
|
| services.postgres-websockets.environment | postgres-websockets configuration as defined in:
https://github.com/diogob/postgres-websockets/blob/master/src/PostgresWebsockets/Config.hs#L71-L87
PGWS_DB_URI is represented as an attribute set, see [`environment
|
| services.grafana.provision.alerting.policies.settings | Grafana notification policies configuration in Nix
|
| services.kerberos_server.settings.module | Modules to obtain Kerberos configuration from.
|
| networking.networkmanager.settings | Configuration added to the generated NetworkManager.conf, note that you can overwrite settings with this
|
| services.pipewire.extraConfig.pipewire | Additional configuration for the PipeWire server
|
| services.bacula-sd.autochanger.<name>.extraAutochangerConfig | Extra configuration to be passed in Autochanger directive.
|
| services.suricata.settings.classification-file | Suricata classification configuration file.
|
| services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| services.waagent.settings.Provisioning.Enable | Whether to enable provisioning functionality in the agent
|
| services.grafana.provision.alerting.contactPoints.settings | Grafana contact points configuration in Nix
|
| services.foundationdb.memory | Maximum memory used by the process
|
| services.grafana.provision.alerting.templates.settings | Grafana templates configuration in Nix
|
| documentation.man.mandoc.cachePath | Change the paths where mandoc makewhatis(8)generates the
manual page index caches. documentation.man.generateCaches
should be enabled to allow cache generation
|
| services.kerberos_server.settings.include | Files to include in the Kerberos configuration.
|
| virtualisation.containers.storage.settings | storage.conf configuration
|
| boot.loader.systemd-boot.sortKey | The sort key used for the NixOS bootloader entries
|
| services.prometheus.exporters.graphite.mappingSettings | Mapping configuration for the exporter, see
https://github.com/prometheus/graphite_exporter#yaml-config for
available options.
|
| virtualisation.docker.rootless.daemon.settings | Configuration for docker daemon
|
| services.suricata.settings.dpdk.interfaces.*.interface | See upstream docs: docs/capture-hardware/dpdk and docs/configuration/suricata-yaml.html#data-plane-development-kit-dpdk.
|
| virtualisation.fileSystems.<name>.depends | List of paths that should be mounted before this one
|
| services.prometheus.exporters.script.settings | Free-form configuration for script_exporter, expressed as a Nix attrset and rendered to YAML.
Migration note:
The previous format using script = "sleep 5" is no longer supported
|
| services.youtrack.environmentalParameters | Environmental configuration parameters, set imperatively
|
| services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| hardware.nvidia.prime.reverseSync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via reverse
PRIME
|
| services.limesurvey.nginx.virtualHost.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| programs.opengamepadui.inputplumber.enable | Whether to enable Run InputPlumber service for input management and gamepad configuration.
.
|
| services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| services.strongswan-swanctl.swanctl.connections.<name>.pools | List of named IP pools to allocate virtual IP addresses
and other configuration attributes from
|
| networking.networkmanager.connectionConfig | Configuration for the [connection] section of NetworkManager.conf
|
| services.adguardhome.settings.schema_version | Schema version for the configuration
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.bacula-sd.autochanger.<name>.changerDevice | The specified name-string must be the generic SCSI device name of the
autochanger that corresponds to the normal read/write Archive Device
specified in the Device resource
|
| services.kerberos_server.settings.includedir | Directories containing files to include in the Kerberos configuration.
|
| virtualisation.directBoot.enable | If enabled, the virtual machine will boot directly into the kernel instead of through a bootloader
|
| virtualisation.containers.containersConf.settings | containers.conf configuration
|
| services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| services.prometheus.exporters.exportarr-sonarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-lidarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-bazarr.environment | See the configuration guide for available options.
|
| security.auditd.settings.space_left | If the free space in the filesystem containing log_file drops below this value, the audit daemon takes the action specified by
space_left_action
|
| services.prometheus.exporters.exportarr-readarr.environment | See the configuration guide for available options.
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.prometheus.exporters.exportarr-prowlarr.environment | See the configuration guide for available options.
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid | Fixed reqid to use for this CHILD_SA
|
| services.grafana.provision.datasources.settings.datasources.*.uid | Custom UID which can be used to reference this datasource in other parts of the configuration, if not specified will be generated automatically.
|
| security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| services.amazon-cloudwatch-agent.commonConfigurationFile | Amazon CloudWatch Agent common configuration
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchType | NetworkManager connection type
The NetworkManager configuration settings reference roughly corresponds to connection types
|
| services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| networking.networkmanager.ensureProfiles.environmentFiles | Files to load as environment file
|
| services.grafana.provision.datasources.settings.datasources.*.secureJsonData | Datasource specific secure configuration
|
| services.pgbouncer.settings.pgbouncer.default_pool_size | How many server connections to allow per user/database pair
|
| services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.strongswan-swanctl.swanctl.connections.<name>.local_addrs | Local address(es) to use for IKE communication
|
| services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs | Remote address(es) to use for IKE communication
|
| services.grafana.settings.security.strict_transport_security | Set to true if you want to enable HTTP Strict-Transport-Security (HSTS) response header
|
| services.xserver.videoDrivers | The names of the video drivers the configuration
supports
|