| security.ipa.domain | Domain of the IPA server.
|
| services.odoo.domain | Domain to host Odoo with nginx
|
| services.r53-ddns.domain | The name of your domain in Route53
|
| services.pfix-srsd.domain | The domain for which to enable srs
|
| services.cntlm.domain | Proxy account domain/workgroup name.
|
| services.ente.api.domain | The domain under which the api will be served.
|
| services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| services.flarum.domain | Domain to serve on.
|
| services.nar-serve.domain | When set, enables the feature of serving .
on top of /nix/store/-
|
| services.searx.domain | The domain under which searxng will be served
|
| services.samba-wsdd.domain | Set domain name (disables workgroup).
|
| services.skydns.domain | Skydns default domain if not specified by etcd config.
|
| networking.domain | The system domain name
|
| services.oink.domains | List of attribute sets containing configuration for each domain
|
| services.gitlab.smtp.domain | HELO domain to use for outgoing mail.
|
| security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| services.nixops-dns.domain | Fake domain name to resolve to NixOps virtual machines
|
| services.prosody.muc.*.domain | Domain name of the MUC
|
| services.postfix.domain | Domain to use
|
| services.keter.bundle.domain | The domain keter will bind to
|
| services.zammad.nginx.domain | The domain under which zammad will be reachable.
|
| services.lasuite-docs.domain | Domain name of the docs instance.
|
| services.lasuite-meet.domain | Domain name of the meet instance.
|
| services.pretix.nginx.domain | The domain name under which to set up the virtual host.
|
| services.avahi.domainName | Domain name for all advertisements.
|
| services.dolibarr.domain | Domain name of your server.
|
| services.iodine.server.domain | Domain or subdomain of which nameservers point to us
|
| services.slskd.domain | If non-null, enables an nginx reverse proxy virtual host at this FQDN,
at the path configurated with services.slskd.web.url_base.
|
| services.pretalx.nginx.domain | The domain name under which to set up the virtual host.
|
| services.automx2.domain | E-Mail-Domain for which mail client autoconfig/autoconfigure should be set up
|
| services.oauth2-proxy.cookie.domain | Optional cookie domains to force cookies to (ie: .yourcompany.com)
|
| services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| services.bird-lg.frontend.domain | Server name domain suffixes.
|
| services.netbird.server.domain | The domain under which the netbird server runs.
|
| services.paperless.domain | Domain under which paperless will be available.
|
| services.open-web-calendar.domain | The domain under which open-web-calendar is made available
|
| services.lxd-image-server.nginx.domain | Domain to use for nginx virtual host.
|
| services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| services.prosody.httpFileShare.domain | Domain name for a http_file_share service.
|
| services.prosody.uploadHttp.domain | Domain name for the http-upload service
|
| services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| services.kanboard.domain | FQDN for the Kanboard instance.
|
| services.pixelfed.domain | FQDN for the Pixelfed instance.
|
| services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| services.dspam.domainSocket | Path to local domain socket which is used for communication with the daemon
|
| security.pam.loginLimits.*.domain | Username, groupname, or wildcard this limit applies to
|
| services.awstats.configs.<name>.domain | The domain name to collect stats for.
|
| services.homer.virtualHost.domain | Domain to use for the virtual host
|
| services.dashy.virtualHost.domain | Domain to use for the virtual host
|
| services.portunus.domain | Subdomain which gets reverse proxied to Portunus webserver.
|
| services.netbird.server.signal.domain | The domain name for the signal service.
|
| services.netbird.server.coturn.domain | The domain under which the coturn server runs.
|
| services.tailscale.derper.domain | Domain name under which the derper server is reachable.
|
| services.prosody.virtualHosts.<name>.domain | Domain name
|
| services.engelsystem.domain | Domain to serve on.
|
| services.mediagoblin.domain | Domain under which mediagoblin will be served.
|
| services.vaultwarden.domain | The domain under which VaultWarden will be reachable.
|
| services.acme-dns.settings.general.domain | Domain name to serve the requests off of.
|
| services.firezone.server.domain.enable | Whether to enable the Firezone domain server.
|
| services.invidious-router.nginx.domain | The domain on which invidious-router should be served.
|
| services.hedgedoc.settings.domain | Domain to use for website
|
| services.invidious.domain | The FQDN Invidious is reachable on
|
| services.firezone.server.domain.package | The firezone-server-domain package to use.
|
| services.dependency-track.nginx.domain | The domain name under which to set up the virtual host.
|
| services.netbird.server.dashboard.domain | The domain under which the dashboard runs.
|
| services.discourse.mail.outgoing.domain | HELO domain to use for outgoing mail.
|
| services.librespeed.domain | If not null, this will add an entry to services.librespeed.servers and
configure librespeed to use TLS.
|
| services.postsrsd.settings.srs-domain | Dedicated mail domain used for ephemeral SRS envelope addresses
|
| security.pam.services.<name>.limits.*.domain | Username, groupname, or wildcard this limit applies to
|
| services.grafana.settings.server.domain | The public facing domain name used to access grafana from a browser
|
| services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| services.netbird.server.management.domain | The domain under which the management API runs.
|
| services.gitlab.pages.settings.pages-domain | The domain to serve static pages on.
|
| services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| services.ente.web.domains.cast | The domain under which the cast frontend will be served.
|
| services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| services.zeronsd.servedNetworks.<name>.settings.domain | Domain under which ZeroTier records will be available.
|
| services.jitsi-videobridge.xmppConfigs.<name>.domain | Domain part of JID of the XMPP user, if it is different from hostName.
|
| services.prometheus.exporters.domain.enable | Whether to enable the prometheus domain exporter.
|
| services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| services.duckdns.domains | The domain(s) to update in DuckDNS
(without the .duckdns.org suffix)
|
| services.prometheus.exporters.domain.extraFlags | Extra commandline options to pass to the domain exporter.
|
| services.jibri.xmppEnvironments.<name>.call.login.domain | The domain part of the JID for the recorder.
|
| services.bitwarden-directory-connector-cli.domain | The domain the Bitwarden/Vaultwarden is accessible on.
|
| services.resolved.domains | A list of domains
|
| services.ente.web.domains.api | The domain under which the api is served
|
| services.ente.web.domains.photos | The domain under which the photos frontend will be served.
|
| services.ente.web.domains.albums | The domain under which the albums frontend will be served.
|
| services.postsrsd.domains | Domain names for rewrite
|
| services.sourcehut.settings."sr.ht".global-domain | Global domain name.
|
| services.ddclient.domains | Domain name(s) to synchronize.
|
| services.matrix-appservice-irc.settings.homeserver.domain | The 'domain' part for user IDs on this home server
|
| services.duckdns.domainsFile | The path to a file containing a
newline-separated list of DuckDNS
domain(s) to be updated
(without the .duckdns.org suffix)
|
| services.jibri.xmppEnvironments.<name>.control.muc.domain | The domain part of the MUC to connect to for control.
|
| services.listmonk.database.settings."privacy.domain_blocklist" | E-mail addresses with these domains are disallowed from subscribing.
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| services.dnscache.domainServers | Table of {hostname: server} pairs to use as authoritative servers for hosts (and subhosts)
|
| services.prometheus.exporters.domain.port | Port to listen on.
|
| services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| services.szurubooru.server.settings.domain | Full URL to the homepage of this szurubooru site (with no trailing slash).
|
| services.sourcehut.settings."lists.sr.ht".posting-domain | Posting domain.
|
| services.sourcehut.settings."git.sr.ht".outgoing-domain | Outgoing domain.
|
| services.sourcehut.settings."todo.sr.ht::mail".posting-domain | Posting domain.
|
| services.firezone.server.domain.settings | Environment variables for this component of the Firezone server
|
| services.ente.web.domains.accounts | The domain under which the accounts frontend will be served.
|
| services.prometheus.exporters.domain.listenAddress | Address to listen on.
|
| services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| services.headscale.settings.dns.base_domain | Defines the base domain to create the hostnames for MagicDNS
|
| services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| services.movim.podConfig.xmppdomain | The default XMPP server domain
|
| services.sympa.domains | Email domains handled by this instance
|
| networking.fqdn | The fully qualified domain name (FQDN) of this host
|
| services.cloudflare-dyndns.domains | List of domain names to update records for.
|
| services.prometheus.exporters.domain.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.domain.openFirewall
is true
|
| services.cloudflare-ddns.domains | List of domain names (FQDNs) to manage
|
| services.opendkim.domains | Local domains set (see opendkim(8) for more information on datasets)
|
| services.oauth2-proxy.email.domains | Authenticate emails with the specified domains
|
| services.grafana.settings.server.enforce_domain | Redirect to correct domain if the host header does not match the domain
|
| services.dkimproxy-out.domains | List of domains DKIMproxy can sign for.
|
| services.sympa.domains.<name>.webLocation | URL path part of the web interface.
|
| systemd.network.networks.<name>.domains | A list of domains to pass to the network config.
|
| services.nextcloud.settings.mail_domain | The return address that you want to appear on emails sent by the Nextcloud server, for example nc-admin@example.com, substituting your own domain, of course.
|
| services.sympa.domains.<name>.settings | The robot.conf configuration file as key value set
|
| networking.fqdnOrHostName | Either the fully qualified domain name (FQDN), or just the host name if
it does not exist
|
| services.postsrsd.settings.domains | List of local domains, that do not require rewriting.
|
| services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| security.ipa.enable | Whether to enable FreeIPA domain integration.
|
| virtualisation.xen.dom0Resources.maxVCPUs | Amount of virtual CPU cores allocated to Domain 0 on boot
|
| services.flarum.baseUrl | Change domain instead.
|
| services.ttyd.socket | UNIX domain socket path to bind.
|
| services.sympa.database.host | Database host address
|
| services.davis.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.slskd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.movim.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| virtualisation.xen.dom0Resources.memory | Amount of memory (in MiB) allocated to Domain 0 on boot
|
| services.bind.enable | Whether to enable BIND domain name server.
|
| services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.parsedmarc.provision.localMail.hostname | The hostname to use when configuring Postfix
|
| services.akkoma.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.gancio.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.monica.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.matomo.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| hardware.nvidia.prime.intelBusId | Bus ID of the Intel GPU
|
| services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| services.pihole-web.hostName | Domain name for the website.
|
| hardware.nvidia.prime.nvidiaBusId | Bus ID of the NVIDIA GPU
|
| hardware.nvidia.prime.amdgpuBusId | Bus ID of the AMD APU
|
| services.prosody.httpFileShare.http_host | To avoid an additional DNS record and certificate, you may set this option to your primary domain (e.g. "example.com")
or use a reverse proxy to handle the HTTP for that domain.
|
| services.pihole-ftl.lists | Deny (or allow) domain lists to use
|
| services.pangolin.dashboardDomain | The domain where the application will be hosted
|
| services.bluemap.host | Domain on which nginx will serve the bluemap webapp
|
| services.devpi-server.host | domain/ip address to listen on
|
| services.mlmmj.listDomain | Set the mailing list domain
|
| services.pihole-ftl.lists.*.url | URL of the domain list
|
| services.dkimproxy-out.selector | The selector to use for DKIM key identification
|
| services.certspotter.watchlist | Domain names to watch
|
| services.sks.hkpAddress | Domain names, IPv4 and/or IPv6 addresses to listen on for HKP
requests.
|
| services.agorakit.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.librenms.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.kanboard.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.dolibarr.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.fediwall.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.pixelfed.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.mainsail.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.radicle.httpd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.coder.accessUrl | Access URL should be a external IP address or domain with DNS records pointing to Coder.
|
| services.anuko-time-tracker.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.nginx.virtualHosts.<name>.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.bookstack.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.jigasi.userDomain | Domain part of the JID for XMPP user connection.
|
| services.jicofo.userDomain | Domain part of the JID for XMPP user connection.
|
| services.sympa.mainDomain | Main domain to be used in sympa.conf
|
| virtualisation.xen.domains.extraConfig | Options defined here will override the defaults for xendomains
|
| services.dnsdist.enable | Whether to enable dnsdist domain name server.
|
| services.unbound.enable | Whether to enable Unbound domain name server.
|
| services.jirafeau.nginxConfig.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.pingvin-share.https | Whether to enable HTTPS for the domain.
|
| security.ipa.ipaHostname | Fully-qualified hostname used to identify this host in the IPA domain.
|
| services.nezha-agent.genUuid | Whether to generate uuid from fqdn automatically
|
| services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| services.zabbixWeb.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| services.movim.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Movim
|
| services.postfix.lookupMX | Whether relay specified is just domain whose MX must be used.
|
| services.code-server.proxyDomain | Domain used for proxying ports.
|
| services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| services.nixops-dns.enable | Whether to enable the nixops-dns resolution
of NixOps virtual machines via dnsmasq and fake domain name.
|
| services.headscale.settings.oidc.strip_email_domain | Whether the domain part of the email address should be removed when generating namespaces.
|
| services.postfix.settings.main.relay_domains | List of domains delivered via the relay transport.
https://www.postfix.org/postconf.5.html#relay_domains
|
| networking.search | The list of domain search paths that are considered for resolving
hostnames with fewer dots than configured in the ndots option,
which defaults to 1 if unset.
|
| services.tt-rss.database.host | Host of the database
|
| services.maddy.primaryDomain | Primary MX domain to use
|
| services.powerdns.enable | Whether to enable PowerDNS domain name server.
|
| services.weblate.localDomain | The domain name serving your Weblate instance.
|
| services.cntlm.username | Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).
|
| services.fedimintd.<name>.nginx.config.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.davis.hostname | Domain of the host to serve davis under
|
| services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| security.agnos.settings.accounts.*.certificates.*.domains | Domains the certificate represents
|
| services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| services.castopod.localDomain | The domain serving your CastoPod instance.
|
| services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| services.peertube.localDomain | The domain serving your PeerTube instance.
|
| security.ipa.chromiumSupport | Whether to whitelist the FreeIPA domain in Chromium.
|
| services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| services.public-inbox.http.mounts | Root paths or URLs that public-inbox will be served on
|
| services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| services.headscale.settings.dns.search_domains | Search domains to inject to Tailscale clients.
|
| services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| services.nextcloud.settings.trusted_domains | Trusted domains, from which the nextcloud installation will be
accessible
|
| services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| services.cryptpad.settings | Cryptpad configuration settings
|
| services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| services.filesender.localDomain | The domain serving your FileSender instance.
|
| security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| services.nghttpx.backends.*.server | Backend server location specified as either a host:port pair
or a unix domain docket.
|
| services.nextcloud.notify_push.bendDomainToLocalhost | Whether to add an entry to /etc/hosts for the configured nextcloud domain to point to localhost and add localhost to nextcloud's trusted_proxies config option
|
| services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| services.postgrey.greylistText | Response status text for greylisted messages; use %%s for seconds left until greylisting is over and %%r for mail domain of recipient
|
| services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| services.memcached.enableUnixSocket | Whether to enable Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port
|
| services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| services.mosquitto.listeners.*.port | Port to listen on
|
| services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| virtualisation.xen.trace | Whether to enable Xen debug tracing and logging for Domain 0.
|
| services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| services.nghttpx.frontends.*.server | Frontend server interface binding specification as either a
host:port pair or a unix domain docket
|
| services.crab-hole.settings.blocklist.include_subdomains | Whether to enable Include subdomains.
|
| virtualisation.xen.debug | Whether to enable Xen debug features for Domain 0
|
| services.cloudflare-ddns.proxied | Whether the managed DNS records should be proxied through Cloudflare ('orange cloud')
|
| services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.firezone.server.provision.enable | Whether to enable provisioning of the Firezone domain server.
|
| services.kubernetes.addons.dns.clusterDomain | Dns cluster domain
|
| services.netbird.server.management.dnsDomain | Domain used for peer resolution.
|
| services.kubernetes.kubelet.clusterDomain | Use alternative domain.
|
| services.postgrest.settings.server-unix-socket | Unix domain socket where to bind the PostgREST web server.
|
| services.hedgedoc.settings.protocolUseSSL | Use https:// for all links
|
| services.netbird.server.management.turnDomain | The domain of the TURN server to use.
|
| services.immich.settings.server.externalDomain | Domain for publicly shared links, including http(s)://.
|
| services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| virtualisation.xen.bootParams | Xen Command Line parameters passed to Domain 0 at boot time
|
| services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| services.matrix-synapse.settings.listeners.*.mode | File permissions on the UNIX domain socket.
|
| services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| services.plausible.database.postgres.socket | Path to the UNIX domain-socket to communicate with postgres.
|
| services.trafficserver.hosting | Partition the cache according to origin server or domain
Consult the
upstream documentation for more details.
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| virtualisation.xen.boot.params | Xen Command Line parameters passed to Domain 0 at boot time.
|
| services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| services.matrix-synapse.settings.listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| services.taler.merchant.settings.merchant.SERVE | Whether the HTTP server should listen on a UNIX domain socket ("unix") or on a TCP socket ("tcp").
|
| virtualisation.xen.enable | Whether to enable the Xen Project Hypervisor, a virtualisation technology defined as a type-1 hypervisor, which allows multiple virtual machines, known as domains, to run concurrently on the physical machine
|
| services.sftpgo.settings.ftpd.bindings.*.address | Network listen address
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| services.sftpgo.settings.sftpd.bindings.*.address | Network listen address
|
| services.sftpgo.settings.httpd.bindings.*.address | Network listen address
|
| services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| services.cyrus-imap.imapdSettings.notifysocket | Unix domain socket that the mail notification daemon listens on.
|
| services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| services.akkoma.config.":pleroma"."Pleroma.Upload".base_url | Base path which uploads will be stored at
|
| services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|
| services.healthchecks.settings.ALLOWED_HOSTS | The host/domain names that this site can serve.
|
| networking.hostName | The name of the machine
|
| services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| services.sftpgo.settings.webdavd.bindings.*.address | Network listen address
|
| services.netbird.server.coturn.useAcmeCertificates | Whether to use ACME certificates corresponding to the given domain for the server.
|
| services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| services.prometheus.exporters.unbound.unbound.host | Path to the unbound control socket
|
| services.syncthing.settings.options.limitBandwidthInLan | Whether to apply bandwidth limits to devices in the same broadcast domain as the local device.
|
| services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| services.nextcloud-spreed-signaling.configureNginx | Whether to set up and configure an nginx virtual host according to upstream's recommendations
|
| services.matrix-synapse.enableRegistrationScript | Whether to install the register_new_matrix_user script, that
allows account creation on the terminal.
This script does not work when the client listener uses UNIX domain sockets
|
| virtualisation.xen.dom0Resources.maxMemory | Maximum amount of memory (in MiB) that Domain 0 can
dynamically allocate to itself
|
| services.akkoma.config.":pleroma".":media_proxy".base_url | Base path for the media proxy
|
| services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| services.postfix.settings.main.mydestination | List of domain names intended for local delivery using /etc/passwd and /etc/aliases.
Do not include virtual domains in this list.
https://www.postfix.org/postconf.5.html#mydestination
|
| services.discourse.mail.notificationEmailAddress | The from: email address used when
sending all essential system emails
|
| virtualisation.xen.store.settings.conflict.burstLimit | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| programs.tsmClient.servers.<name>.tcpserveraddress | Host/domain name or IP address of the IBM TSM server.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.address | The address of this resource
|
| virtualisation.xen.store.settings.quota.maxOutstanding | Maximum outstanding requests, i.e. in-flight requests / domain.
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| virtualisation.xen.store.settings.conflict.maxHistorySeconds | Limits applied to domains whose writes cause other domains' transaction
commits to fail
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.grafana.settings.security.strict_transport_security_subdomains | Set to true to enable HSTS includeSubDomains option
|
| services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid | username is required if using Identity V2 API
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username | username is required if using Identity V2 API
|
| services.zapret.blacklist | Specify a list of domains NOT to bypass
|
| services.zapret.whitelist | Specify a list of domains to bypass
|
| services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| services.cloudflare-ddns.ip4Domains | Explicit list of domains to manage only for IPv4
|
| services.cloudflare-ddns.ip6Domains | Explicit list of domains to manage only for IPv6
|
| services.cntlm.noproxy | A list of domains where the proxy is skipped.
|
| services.realmd.enable | Whether to enable realmd service for managing system enrollment in Active Directory domains.
|
| services.pihole-ftl.lists.*.type | Whether domains on this list should be explicitly allowed, or blocked
|
| services.maddy.localDomains | Define list of allowed domains.
|
| services.ncdns.enable | Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS
|
| services.awstats.configs | Attribute set of domains to collect stats for.
|
| services.avahi.browseDomains | List of non-local DNS domains to be browsed.
|
| services.pdfding.allowedHosts | Domains where PdfDing is allowed to run
|
| services.postfix.relayDomains | List of domains we agree to relay to
|
| services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| services.coder.wildcardAccessUrl | If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the root and wildcard domains.
|
| services.pdns-recursor.serveRFC1918 | Whether to directly resolve the RFC1918 reverse-mapping domains:
10.in-addr.arpa,
168.192.in-addr.arpa,
16-31.172.in-addr.arpa
This saves load on the AS112 servers.
|
| services.prosody.s2sSecureDomains | Even if you leave s2s_secure_auth disabled, you can still require valid
certificates for some domains by specifying a list here.
|
| services.stash.settings.no_proxy | A list of domains for which the proxy must not be used
|
| services.nginx.uwsgiResolveWhileRunning | Resolves domains of uwsgi targets at runtime
and not only at start, you have to set
services.nginx.resolver, too.
|
| services.hedgedoc.settings.allowOrigin | List of domains to whitelist.
|
| services.postfix.destination | Full (!) list of domains we deliver locally
|
| services.pdns-recursor.resolveNamecoin | Resolve .bit top-level domains using ncdns and namecoin.
|
| services.headscale.settings.dns.split | Split DNS configuration (map of domains and which DNS server to use for each)
|
| services.nginx.proxyResolveWhileRunning | Resolves domains of proxyPass targets at runtime and not only at startup
|
| services.gotenberg.downloadFrom.denyList | Deny accepting URLs from these domains in the downloadFrom API field
|
| services.invidious-router.nginx.extraDomains | Additional domains to serve invidious-router on.
|
| services.prosody.s2sInsecureDomains | Some servers have invalid or self-signed certificates
|
| services.tinyproxy.settings.Filter | Tinyproxy supports filtering of web sites based on URLs or domains
|
| services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| networking.stevenblack.whitelist | Domains to exclude from blocking.
|
| virtualisation.libvirtd.hooks.lxc | Hooks that will be placed under /var/lib/libvirt/hooks/lxc.d/
and called for lxc domains begin/end events
|
| virtualisation.libvirtd.hooks.qemu | Hooks that will be placed under /var/lib/libvirt/hooks/qemu.d/
and called for qemu domains begin/end/migrate events
|
| virtualisation.libvirtd.hooks.libxl | Hooks that will be placed under /var/lib/libvirt/hooks/libxl.d/
and called for libxl-handled xen domains begin/end events
|
| services.spamassassin.config | The SpamAssassin local.cf config
If you are using this configuration:
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_
Then you can Use this sieve filter:
require ["fileinto", "reject", "envelope"];
if header :contains "X-Spam-Flag" "YES" {
fileinto "spam";
}
Or this procmail filter:
:0:
* ^X-Spam-Flag: YES
/var/vpopmail/domains/lastlog.de/js/.maildir/.spam/new
To filter your messages based on the additional mail headers added by spamassassin.
|
| services.warpgate.settings.http.sni_certificates | Certificates for additional domains.
|
| services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|
| services.dendrite.settings.global.trusted_third_party_id_servers | Lists of domains that the server will trust as identity
servers to verify third party identifiers such as phone
numbers and email addresses
|