| power.ups.mode | The MODE determines which part of the NUT is to be started, and
which configuration files must be modified
|
| hardware.cpu.amd.sev.mode | Mode to set for the SEV device.
|
| hardware.cpu.x86.msr.mode | Mode to set for devices of the msr kernel subsystem.
|
| hardware.cpu.amd.sevGuest.mode | Mode to set for the SEV guest device.
|
| networking.bonds.<name>.mode | DEPRECATED, use driverOptions
|
| services.pixiecore.mode | Which mode to use
|
| environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| boot.uvesafb.gfx-mode | Screen resolution in modedb format
|
| security.pam.yubico.mode | Mode of operation
|
| services.atticd.mode | Mode in which to run the server.
'monolithic' runs all components, and is suitable for single-node deployments.
'api-server' runs only the API server, and is suitable for clustering.
'garbage-collector' only runs the garbage collector periodically
|
| networking.macvlans.<name>.mode | The mode of the macvlan device.
|
| services.calibre-server.auth.mode | Choose the type of authentication used
|
| hardware.cpu.intel.sgx.provision.mode | Mode to set for the SGX provisioning device.
|
| services.varnish.listen.*.mode | Permission of the socket file (3-digit octal value).
|
| hardware.display.outputs.<name>.mode | A video kernel parameter (framebuffer mode) configuration for the specific output:
<xres>x<yres>[M][R][-<bpp>][@<refresh>][i][m][eDd]
See for more information:
|
| boot.loader.systemd-boot.consoleMode | The resolution of the console
|
| services.anuko-time-tracker.settings.email.mode | Mail sending mode
|
| services.shadowsocks.mode | Relay protocols.
|
| services.geth.<name>.gcmode | Blockchain garbage collection mode.
|
| services.suricata.settings.host-mode | If the Suricata box is a router for the sniffed networks, set it to 'router'
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode | IPsec Mode to establish CHILD_SA with.
tunnel negotiates the CHILD_SA in IPsec Tunnel Mode,
- whereas
transport uses IPsec Transport Mode.
transport_proxy signifying the special Mobile IPv6
Transport Proxy Mode.
beet is the Bound End to End Tunnel mixture mode,
working with fixed inner addresses without the need to include them in
each packet.
- Both
transport and beet modes are
subject to mode negotiation; tunnel mode is
negotiated if the preferred mode is not available.
pass and drop are used to install
shunt policies which explicitly bypass the defined traffic from IPsec
processing or drop it, respectively
|
| services.amazon-cloudwatch-agent.mode | Amazon CloudWatch Agent mode
|
| services.headscale.settings.policy.mode | The mode can be "file" or "database" that defines
where the ACL policies are stored and read from.
|
| hardware.uni-sync.devices.*.channels.*.mode | "PWM" to enable PWM sync. "Manual" to set speed.
|
| services.borgbackup.jobs.<name>.encryption.mode | Encryption mode to use
|
| services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| services.home-assistant.config.lovelace.mode | In what mode should the main Lovelace panel be, yaml or storage (UI managed).
|
| services.dependency-track.settings."alpine.database.mode" | Defines the database mode of operation
|
| services.crowdsec-firewall-bouncer.settings.mode | Firewall mode to use.
|
| services.geth.<name>.syncmode | Blockchain sync mode.
|
| systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| services.quorum.syncmode | Blockchain sync mode.
|
| services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| services.autorandr.profiles.<name>.config.<name>.mode | Output resolution.
|
| boot.initrd.systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.mode | The file access mode to use when creating this file or directory.
|
| services.matrix-synapse.settings.listeners.*.mode | File permissions on the UNIX domain socket.
|
| hardware.nvidia-container-toolkit.discovery-mode | The mode to use when discovering the available entities.
|
| services.llama-cpp.model | Model path.
|
| users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| hardware.usb-modeswitch.enable | Enable this option to support certain USB WLAN and WWAN adapters
|
| services.llama-cpp.modelsDir | Models directory.
|
| services.xtreemfs.mrc.syncMode | The sync mode influences how operations are committed to the disk
log before the operation is acknowledged to the caller.
-ASYNC mode the writes to the disk log are buffered in memory by the operating system
|
| services.xtreemfs.dir.syncMode | The sync mode influences how operations are committed to the disk
log before the operation is acknowledged to the caller.
-ASYNC mode the writes to the disk log are buffered in memory by the operating system
|
| boot.loader.grub.gfxmodeEfi | The gfxmode to pass to GRUB when loading a graphical boot interface under EFI.
|
| boot.loader.grub.gfxmodeBios | The gfxmode to pass to GRUB when loading a graphical boot interface under BIOS.
|
| users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| services.ollama.models | The directory that the ollama service will read models from and download new models to.
|
| systemd.services.<name>.confinement.mode | The value full-apivfs (the default) sets up
private /dev, /proc,
/sys, /tmp and /var/tmp file systems
in a separate user name space
|
| services.xserver.xkb.model | X keyboard model.
|
| services.hylafax.modems | Description of installed modems
|
| services.xserver.desktopManager.wallpaper.mode | The file ~/.background-image is used as a background image
|
| services.athens.index.postgres.params.sslmode | SSL mode for the Postgres database.
|
| services.mihomo.tunMode | Whether to enable necessary permission for Mihomo's systemd service for TUN mode to function properly
|
| services.xserver.cmt.models | Which models to enable cmt for
|
| programs.gamemode.enable | Whether to enable GameMode to optimise system performance on demand.
|
| services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| services.prosody.muc.*.moderation | Allow rooms to be moderated
|
| services.chhoto-url.settings.public_mode | Whether to enable public mode.
|
| services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| services.opengfw.pcapReplay | Path to PCAP replay file
|
| services.hylafax.modems.<name>.type | Name of modem configuration file,
will be searched for in config
in the spooling area directory.
|
| services.llama-cpp.modelsPreset | Models preset configuration as a Nix attribute set
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.mode | File permissions on the UNIX domain socket.
|
| security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| services.strongswan-swanctl.swanctl.connections.<name>.pull | If the default of yes is used, Mode Config works in pull mode, where the
initiator actively requests a virtual IP
|
| services.resolved.dnssec | If set to
"true":
all DNS lookups are DNSSEC-validated locally (excluding
LLMNR and Multicast DNS)
|
| services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| services.coder.database.sslmode | Password for accessing the database.
|
| services.teeworlds.game.tournamentMode | Whether to enable tournament mode
|
| programs.gamemode.enableRenice | Whether to enable CAP_SYS_NICE on gamemoded to support lowering process niceness.
|
| hardware.display.edid.modelines | Attribute set of XFree86 Modelines automatically converted
and exposed as edid/<name>.bin files in initrd
|
| power.ups.upsd.enable | Whether to enable upsd.
|
| services.grafana.settings.server.socket_mode | Mode where the socket should be set when protocol=socket
|
| hardware.sane.brscan4.netDevices.<name>.model | The model of the network device.
|
| hardware.sane.brscan5.netDevices.<name>.model | The model of the network device.
|
| programs.gamemode.settings | System-wide configuration for GameMode (/etc/gamemode.ini)
|
| programs.soundmodem.package | The soundmodem package to use.
|
| services.restic.server.appendOnly | Enable append only mode
|
| programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| services.litellm.settings.model_list | List of supported models on the server, with model-specific configs.
|
| services.node-red.safe | Whether to launch Node-RED in --safe mode.
|
| networking.modemmanager.package | The modemmanager package to use.
|
| boot.vesa | (Deprecated) This option, if set, activates the VESA 800x600 video
mode on boot and disables kernel modesetting
|
| boot.loader.grub.efiInstallAsRemovable | Whether to invoke grub-install with
--removable
|
| services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| power.ups.upsmon.enable | Whether to enable upsmon.
|
| systemd.enableEmergencyMode | Whether to enable emergency mode, which is an
sulogin shell started on the console if
mounting a filesystem fails
|
| hardware.nvidia.modesetting.enable | Whether to enable kernel modesetting when using the NVIDIA proprietary driver
|
| networking.modemmanager.enable | Whether to use ModemManager to manage modem devices
|
| services.tabby.model | Specify the model that tabby will use to generate completions
|
| services.uwsgi.instance | uWSGI configuration
|
| services.pgbouncer.settings.pgbouncer.pool_mode | Specifies when a server connection can be reused by other clients.
session
Server is released back to pool after client disconnects
|
| hardware.printers.ensurePrinters.*.model | Location of the ppd driver file for the printer.
lpinfo -m shows a list of supported models.
|
| services.vault.dev | In this mode, Vault runs in-memory and starts unsealed
|
| services.gitlab.smtp.tls | Whether to use TLS wrapper-mode.
|
| services.rspamd.debug | Whether to run the rspamd daemon in debug mode.
|
| services.chhoto-url.settings.public_mode_expiry_delay | The maximum expiry delay in seconds to force in public mode.
|
| networking.modemmanager.fccUnlockScripts | List of FCC unlock scripts to enable on the system, behaving as described in
https://modemmanager.org/docs/modemmanager/fcc-unlock/#integration-with-third-party-fcc-unlock-tools.
|
| networking.modemmanager.fccUnlockScripts.*.id | vid:pid of either the PCI or USB vendor and product ID
|
| networking.modemmanager.fccUnlockScripts.*.path | Path to the unlock script
|
| services.nghttpx.single-process | Run this program in a single process mode for debugging
purpose
|
| boot.loader.limine.secureBoot.enable | Whether to use sign the limine binary with sbctl.
This requires you to already have generated the keys and enrolled them with sbctl
|
| services.nextcloud.settings.mail_smtpmode | Which mode to use for sending mail
|
| services.samba-wsdd.listen | Listen on path or localhost port in discovery mode.
|
| programs.clash-verge.tunMode | Whether to enable Setcap for TUN Mode
|
| services.vwifi.client.spy | Whether to enable spy mode, useful for wireless monitors.
|
| services.suricata.settings.exception-policy | Define a common behavior for all exception policies
|
| services.hydra.debugServer | Whether to run the server in debug mode.
|
| services.minio.dataDir | The list of data directories or nodes for storing the objects
|
| services.stunnel.fipsMode | Enable FIPS 140-2 mode required for compliance.
|
| security.pam.makeHomeDir.umask | The user file mode creation mask to use on home directories
newly created by pam_mkhomedir.
|
| hardware.nvidia.nvidiaPersistenced | Whether to enable nvidia-persistenced a update for NVIDIA GPU headless mode, i.e
|
| services.code-server.socketMode | File mode of the socket.
|
| services.webdav-server-rs.debug | Enable debug mode.
|
| programs.throne.tunMode.enable | Whether to enable TUN mode of Throne.
|
| services.grafana.settings.database.ssl_mode | For Postgres, use either disable, require or verify-full
|
| services.prometheus.exporters.modemmanager.port | Port to listen on.
|
| services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| services.tlsrpt.collectd.settings.socketmode | Permissions on the UNIX socket.
|
| services.knot.enableXDP | Extends the systemd unit with permissions to allow for the use of
the eXpress Data Path (XDP).
Make sure to read up on functional limitations
when running in XDP mode.
|
| services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| services.suricata.settings.unix-command | Unix command socket that can be used to pass commands to Suricata
|
| services.openafsClient.startDisconnected | Start up in disconnected mode
|
| programs.clash-verge.serviceMode | Whether to enable Service Mode.
|
| services.prometheus.exporters.modemmanager.enable | Whether to enable the prometheus modemmanager exporter.
|
| services.kubernetes.addons.dns.reconcileMode | Controls the addon manager reconciliation mode for the DNS addon
|
| services.lact.enable | Whether to enable LACT, a tool for monitoring, configuring and overclocking GPUs.
If you are on an AMD GPU, it is recommended to enable overdrive mode by using
hardware.amdgpu.overdrive.enable = true; in your configuration
|
| services.quicktun.<name>.tunMode | Whether to operate in tun (IP) or tap (Ethernet) mode.
|
| programs.nekoray.tunMode.enable | Whether to enable TUN mode of nekoray.
|
| services.prometheus.exporters.modemmanager.extraFlags | Extra commandline options to pass to the modemmanager exporter.
|
| environment.etc.<name>.gid | GID of created file
|
| environment.etc.<name>.uid | UID of created file
|
| services.grafana.settings.database.cache_mode | For sqlite3 only.
Shared cache setting used for connecting to the database.
|
| services.documize.offline | Set true for offline mode.
|
| services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| services.searx.runInUwsgi | Whether to run searx in uWSGI as a "vassal", instead of using its
built-in HTTP server
|
| services.disnix.enableMultiUser | Whether to support multi-user mode by enabling the Disnix D-Bus service
|
| services.pixiecore.cmdLine | Kernel commandline arguments
|
| services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| services.samba-wsdd.discovery | Enable discovery operation mode.
|
| services.stargazer.debugMode | Run Stargazer in debug mode.
|
| services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| services.prometheus.exporters.modemmanager.listenAddress | Address to listen on.
|
| boot.loader.grub.splashImage | Background image used for GRUB
|
| services.k3s.role | Whether k3s should run as a server or agent
|
| services.weechat.headless | Allows specifying if weechat should run in TUI or headless mode.
|
| services.prometheus.exporters.modemmanager.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.modemmanager.refreshRate | How frequently ModemManager will refresh the extended signal quality
information for each modem
|
| services.dbus.apparmor | AppArmor mode for dbus.
enabled enables mediation when it's
supported in the kernel, disabled
always disables AppArmor even with kernel support, and
required fails when AppArmor was not found
in the kernel.
|
| services.omnom.settings.app.debug | Whether to enable debug mode.
|
| services.zapret.httpMode | By default this service only changes the first packet sent, which is enough in most cases
|
| services.apache-kafka.formatLogDirs | Whether to format log dirs in KRaft mode if all log dirs are
unformatted, ie. they contain no meta.properties.
|
| services.pixiecore.initrd | Initrd path
|
| services.pixiecore.kernel | Kernel path
|
| services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| services.prometheus.exporters.modemmanager.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.modemmanager.openFirewall is true.
|
| security.loginDefs.settings.UMASK | The file mode creation mask is initialized to this value.
|
| services.apache-kafka.clusterId | KRaft mode ClusterId used for formatting log directories
|
| services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| services.pixiecore.apiServer | URI to connect to the API
|
| services.hostapd.radios.<name>.noScan | Disables scan for overlapping BSSs in HT40+/- mode
|
| services.prometheus.exporters.modemmanager.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.modemmanager.openFirewall
is true
|
| services.mediagoblin.settings.mediagoblin.email_debug_mode | Disable email debug mode to start sending outgoing mails
|
| services.zitadel.tlsMode | The TLS mode to use
|
| services.wyoming.faster-whisper.servers.<name>.model | Name of the voice model to use
|
| environment.etc.<name>.user | User name of file owner
|
| containers.<name>.bindMounts.<name>.isReadOnly | Determine whether the mounted path will be accessed in read-only mode.
|
| environment.etc.<name>.group | Group name of file owner
|
| hardware.amdgpu.overdrive.enable | Whether to enable amdgpu overdrive mode for overclocking.
|
| services.libinput.mouse.sendEventsMode | Sets the send events mode to disabled, enabled,
or disabled-on-external-mouse
|
| boot.loader.initScript.enable | Some systems require a /sbin/init script which is started
|
| services.displayManager.sddm.enableHidpi | Whether to enable automatic HiDPI mode.
|
| services.aria2.serviceUMask | The file mode creation mask for Aria2 service
|
| services.ghostunnel.servers | Server mode ghostunnels (TLS listener -> plain TCP/UNIX target)
|
| services.apache-kafka.settings."broker.id" | Broker ID. -1 or null to auto-allocate in zookeeper mode.
|
| programs.proxychains.quietMode | Whether to enable Quiet mode (no output from the library).
|
| services.misskey.settings.chmodSocket | The file access mode of the UNIX socket.
|
| services.prometheus.enableAgentMode | Whether to enable agent mode.
|
| services.hqplayerd.licenseFile | Path to the HQPlayer license key file
|
| services.neo4j.ssl.policies.<name>.trustAll | Makes this policy trust all remote parties
|
| services.ebusd.device | Use DEV as eBUS device [/dev/ttyUSB0]
|
| services.tt-rss.simpleUpdateMode | Enables fallback update mode where tt-rss tries to update feeds in
background while tt-rss is open in your browser
|
| services.searx.settingsFile | The path of the Searx server settings.yml file
|
| services.journald.gateway.cert | The path to a file or AF_UNIX stream socket to read the server
certificate from
|
| services.coturn.static-auth-secret | 'Static' authentication secret value (a string) for TURN REST API only
|
| networking.bonds.<name>.lacp_rate | DEPRECATED, use driverOptions
|
| services.searx.configureUwsgi | Whether to run searx in uWSGI as a "vassal", instead of using its
built-in HTTP server
|
| services.spamassassin.debug | Whether to run the SpamAssassin daemon in debug mode
|
| services.hbase-standalone.enable | Whether to enable HBase master in standalone mode with embedded regionserver and zookeper
|
| services.dragonflydb.cacheMode | Once this mode is on, Dragonfly will evict items least likely to be stumbled
upon in the future but only when it is near maxmemory limit.
|
| services.blockbook-frontend.<name>.debug | Debug mode, return more verbose errors, reload templates on each request.
|
| hardware.tuxedo-drivers.enable | Whether to enable The tuxedo-drivers driver enables access to the following on TUXEDO notebooks:
- Driver for Fn-keys
- SysFS control of brightness/color/mode for most TUXEDO keyboards
- Hardware I/O driver for TUXEDO Control Center
For more inforation it is best to check at the source code description: https://gitlab.com/tuxedocomputers/development/packages/tuxedo-drivers
.
|
| services.cockroachdb.insecure | Run in insecure mode.
|
| services.autorandr.hooks.preswitch | Preswitch hook executed before mode switch.
|
| services.teeworlds.game.enableReadyMode | Whether to enable "ready mode"; where players can pause/unpause the game
and start the game in warmup, using their ready state.
|
| services.gpsd.readonly | Whether to enable the broken-device-safety, otherwise
known as read-only mode
|
| services.libinput.touchpad.sendEventsMode | Sets the send events mode to disabled, enabled,
or disabled-on-external-mouse
|
| hardware.nvidia-container-toolkit.csv-files | The path to the list of CSV files to use when generating the CDI specification in CSV mode.
|
| networking.wlanInterfaces.<name>.fourAddr | Whether to enable 4-address mode with type managed.
|
| services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| services.vmalert.settings."notifier.url" | Prometheus Alertmanager URL
|
| boot.loader.grub.timeoutStyle |
menu shows the menu.
countdown uses a text-mode countdown.
hidden hides GRUB entirely
|
| programs.tmux.customPaneNavigationAndResize | Override the hjkl and HJKL bindings for pane navigation and resizing in VI mode.
|
| boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| services.sillytavern.whitelist | Enables whitelist mode.
|
| services.xserver.displayManager.xpra.desktop | Start a desktop environment instead of seamless mode
|
| services.headscale.settings.policy.path | If the mode is set to "file", the path to a
HuJSON file containing ACL policies.
|
| services.autorandr.hooks.postswitch | Postswitch hook executed after mode switch.
|
| services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| security.wrappers.<name>.permissions | The permissions of the wrapper program
|
| services.nextcloud.settings.mail_sendmailmode | For smtp, the sendmail binary is started with the parameter -bs: Use the SMTP protocol on standard input and output
|
| services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| services.reposilite.settings.debugEnabled | Whether to enable debug mode.
|
| services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| services.healthchecks.settings.DEBUG | Enable debug mode.
|
| nix.settings.sandbox | If set, Nix will perform builds in a sandboxed environment that it
will set up automatically for each build
|
| services.athens.networkMode | Configures how Athens will return the results
of the /list endpoint as it can be assembled from both its own
storage and the upstream VCS
|
| virtualisation.graphics | Whether to run QEMU with a graphics window, or in nographic mode
|
| services.routinator.settings.rtr-listen | An array of string values each providing an address and port on which the RTR server should listen in TCP mode
|
| services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| services.routinator.settings.refresh | An integer value specifying the number of seconds Routinator should wait between consecutive validation runs in server mode
|
| services.ocsinventory-agent.settings.debug | Whether to enable debug mode.
|
| services.autorandr.profiles.<name>.hooks.preswitch | Preswitch hook executed before mode switch.
|
| services.teeworlds.server.enableHighBandwidth | Whether to enable high bandwidth mode on LAN servers
|
| services.teeworlds.game.restrictSpectators | Whether to restrict access to information such as health, ammo and armour in spectator mode.
|
| services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| services.teeworlds.server.inactivePenalty | Specify what to do when a client goes inactive (see services.teeworlds.server.inactiveTime).
-
spectator: send the client into spectator mode
-
spectator/kick: send the client into a free spectator slot, otherwise kick the client
-
kick: kick the client
|
| services.hostapd.radios | This option allows you to define APs for one or multiple physical radios
|
| boot.loader.limine.resolution | The framebuffer resolution to set when booting Linux entries
|
| services.home-assistant.customLovelaceModules | List of custom lovelace card packages to load as lovelace resources
|
| containers.<name>.ephemeral | Runs container in ephemeral mode with the empty root filesystem at boot
|
| services.autorandr.profiles.<name>.hooks.postswitch | Postswitch hook executed after mode switch.
|
| services.xserver.displayManager.lightdm.greeter.enable | If set to false, run lightdm in greeterless mode
|
| programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| services.ocsinventory-agent.settings.local | If specified, the OCS Inventory Agent will run in offline mode
and the resulting inventory file will be stored in the specified path.
|
| services.yggdrasil.denyDhcpcdInterfaces | Disable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| networking.networkmanager.dns | Set the DNS (resolv.conf) processing mode
|
| services.mail.sendmailSetuidWrapper.permissions | The permissions of the wrapper program
|
| services.home-assistant.defaultIntegrations | List of integrations set are always set up, unless in recovery mode.
|
| networking.firewall.checkReversePath | Performs a reverse path filter test on a packet
|
| services.nullmailer.config.pausetime | The minimum time to pause between successive queue runs when there
are messages in the queue, in seconds
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| services.resolved.dnsovertls | If set to
"true":
all DNS lookups will be encrypted
|
| services.victoriametrics.enable | Whether to enable VictoriaMetrics in single-node mode
|
| virtualisation.docker.rootless.enable | This option enables docker in a rootless mode, a daemon that manages
linux containers
|
| services.prometheus.alertmanagerGotify.debug | Enables extended logs for debugging purposes
|
| services.prometheus.exporters.wireguard.verbose | Whether to enable verbose logging mode for prometheus-wireguard-exporter.
|
| services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| services.nextcloud-spreed-signaling.settings.grpc.targets | For target type static: List of GRPC targets to connect to for clustering mode.
|
| services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| services.netbird.server.management.disableSingleAccountMode | If set to true, disables single account mode
|
| services.jellyfin.transcoding.enableIntelLowPowerEncoding | Enable low-power encoding mode for Intel Quick Sync Video
|
| documentation.man.mandoc.settings.output.width | The ASCII and UTF-8 output width, default is 78
|
| virtualisation.virtualbox.guest.seamless | Whether to enable seamless mode
|
| services.system76-scheduler.settings.cfsProfiles.default.preempt | Preemption mode.
|
| services.kubernetes.apiserver.authorizationMode | Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/Webhook/RBAC/Node)
|
| services.strongswan-swanctl.swanctl.connections.<name>.vips | List of virtual IPs to request in IKEv2 configuration payloads or IKEv1
Mode Config
|
| services.system76-scheduler.settings.cfsProfiles.responsive.preempt | Preemption mode.
|
| services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| services.grafana.provision.datasources.settings.datasources.*.access | Access mode. proxy or direct (Server or Browser in the UI)
|
| services.headscale.settings.database.sqlite.write_ahead_log | Enable WAL mode for SQLite
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df | Whether to copy the DF bit to the outer IPv4 header in tunnel mode
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn | Whether to copy the ECN (Explicit Congestion Notification) header field
to/from the outer IP header in tunnel mode
|
| virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| environment.memoryAllocator.provider | The system-wide memory allocator
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload | Enable hardware offload for this CHILD_SA, if supported by the IPsec
implementation
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host | The host to use if the container is in host networking mode
|
| services.grafana.settings.security.content_security_policy_report_only | Set to true to add the Content-Security-Policy-Report-Only header to your requests
|
| services.ollama.loadModels | Download these models using ollama pull as soon as ollama.service has started
|
| programs.qgroundcontrol.blacklistModemManagerFromTTYUSB | Disallow ModemManager from interfering with serial connections that QGroundControl might use
|
| services.draupnir.enable | Whether to enable Draupnir, a moderations bot for Matrix.
|
| services.mjolnir.enable | Whether to enable Mjolnir, a moderation tool for Matrix.
|
| services.microsocks.enable | Whether to enable Tiny, portable SOCKS5 server with very moderate resource usage.
|
| services.prosody.muc.*.roomDefaultModerated | If set, the MUC rooms will be moderated by default.
|
| services.hylafax.areaCode | Area code for server and all modems.
|
| services.wyoming.openwakeword.customModelsDirectories | Paths to directories with custom wake word models (*.tflite model files).
|
| services.rtorrent.configText | The content of rtorrent.rc
|
| hardware.display.edid.packages | List of packages containing EDID binary files at $out/lib/firmware/edid
|
| services.hylafax.countryCode | Country code for server and all modems.
|
| services.draupnir.settings.managementRoom | The room ID or alias where moderators can use the bot's functionality
|
| services.hylafax.longDistancePrefix | Long distance prefix for server and all modems.
|
| hardware.nvidia.prime.sync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via PRIME
|
| hardware.nvidia.prime.reverseSync.enable | Whether to enable NVIDIA Optimus support using the NVIDIA proprietary driver via reverse
PRIME
|
| services.eg25-manager.enable | Whether to enable Quectel EG25 modem manager service.
|
| services.hylafax.internationalPrefix | International prefix for server and all modems.
|
| services.geoclue2.enableModemGPS | Whether to enable Modem-GPS source.
|
| services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| services.openssh.settings.StrictModes | Whether sshd should check file modes and ownership of directories
|
| services.ollama.syncModels | Synchronize all currently installed models with those declared in services.ollama.loadModels,
removing any models that are installed but not currently declared there.
|
| services.hylafax.commonModemConfig | Attribute set of default values for
modem config files etc/config.*
|
| networking.jool.enable | Whether to enable Jool, an Open Source implementation of IPv4/IPv6
translation on Linux
|
| services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| services.tabby.enable | Whether to enable Self-hosted AI coding assistant using large language models.
|
| networking.bonds.<name>.xmit_hash_policy | DEPRECATED, use driverOptions
|
| services.ollama.enable | Whether to enable ollama server for local large language models.
|
| services.private-gpt.enable | Whether to enable private-gpt for local large language models.
|
| hardware.cpu.x86.msr.enable | Whether to enable the msr (Model-Specific Registers) kernel module and configure udev rules for its devices (usually /dev/cpu/*/msr).
|
| services.ollama.package | The ollama package to use
|
| services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| services.mainsail.enable | Whether to enable a modern and responsive user interface for Klipper.
|
| services.ollama.acceleration | What interface to use for hardware acceleration
|
| services.tabby.acceleration | Specifies the device to use for hardware acceleration.
cpu: no acceleration just use the CPU
rocm: supported by modern AMD GPUs
cuda: supported by modern NVIDIA GPUs
metal: supported on darwin aarch64 machines
Tabby will try and determine what type of acceleration that is
already enabled in your configuration when acceleration = null.
- nixpkgs.config.cudaSupport
- nixpkgs.config.rocmSupport
- if stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64
IFF multiple acceleration methods are found to be enabled or if you
haven't set either cudaSupport or rocmSupport you will have to
specify the device type manually here otherwise it will default to
the first from the list above or to cpu.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| security.forcePageTableIsolation | Whether to force-enable the Page Table Isolation (PTI) Linux kernel
feature even on CPU models that claim to be safe from Meltdown
|
| services.ollama.rocmOverrideGfx | Override what rocm will detect your gpu model as
|
| services.wyoming.piper.servers.<name>.voice | Name of the voice model to use
|
| programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| services.wyoming.piper.servers.<name>.speaker | ID of a specific speaker in a multi-speaker model.
|
| hardware.trackpoint.fakeButtons | Switch to "bare" PS/2 mouse support in case Trackpoint buttons are not recognized
properly
|
| services.samba.winbindd.enable | Whether to enable Samba's winbindd, which provides a number of services
to the Name Service Switch capability found in most modern C libraries,
to arbitrary applications via PAM and ntlm_auth and to Samba itself.
|
| services.nextjs-ollama-llm-ui.enable | Whether to enable Simple Ollama web UI service; an easy to use web frontend for a Ollama backend service
|
| services.libretranslate.updateModels | Update language models at startup
|
| virtualisation.tpm.deviceModel | QEMU device model for the TPM, uses the appropriate default based on th guest platform system and the package passed.
|
| services.wyoming.openwakeword.preloadModels | List of wake word models to preload after startup.
|
| services.openafsServer.roles.backup.enable | Whether to enable the backup server role
|
| services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| services.cassandra.heapNewSize | Must be left blank or set together with heapNewSize
|
| hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.h2o.defaultTLSRecommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|