| services.nullidentdmod.userid | User ID to return
|
| services.nullidentdmod.enable | Whether to enable the nullidentdmod identd daemon.
|
| services.nullmailer.user | User to use to run nullmailer-send.
|
| services.nullmailer.group | Group to use to run nullmailer-send.
|
| services.nullmailer.setSendmail | Whether to set the system sendmail to nullmailer's.
|
| services.nullmailer.enable | Whether to enable nullmailer daemon.
|
| services.nullmailer.config.me | The fully-qualifiled host name of the computer running nullmailer
|
| services.nullmailer.remotesFile | Path to the remotes control file
|
| services.nullmailer.config.idhost | The content of this attribute is used when building the message-id
string for the message
|
| services.github-runners.<name>.group | Group under which to run the service
|
| services.nullmailer.config.maxpause | The maximum time to pause between successive queue runs, in seconds
|
| services.nullmailer.config.helohost | Sets the environment variable $HELOHOST which is used by the
SMTP protocol module to set the parameter given to the HELO command
|
| services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| services.nullmailer.config.pausetime | The minimum time to pause between successive queue runs when there
are messages in the queue, in seconds
|
| services.nullmailer.config.allmailfrom | If set, content will override the envelope sender on all messages.
|
| services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| services.nullmailer.config.defaulthost | The content of this attribute is appended to any address that
is missing a host name
|
| services.nullmailer.config.sendtimeout | The time to wait for a remote module listed above to complete sending
a message before killing it and trying again, in seconds
|
| services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| services.mpd.settings | Configuration for MPD
|
| console.font | The font used for the virtual consoles
|
| services.ollama.user | User account under which to run ollama
|
| services.nullmailer.config.doublebounceto | If the original sender was empty (the original message was a
delivery status or disposition notification), the double bounce
is sent to the address in this attribute.
|
| services.incron.allow | Users allowed to use incrontab
|
| users.users.<name>.uid | The account UID
|
| users.groups.<name>.gid | The group GID
|
| time.timeZone | The time zone used when displaying times and dates
|
| users.extraUsers.<name>.uid | The account UID
|
| services.mpd.dbFile | The path to MPD's database
|
| services.invidious.hmacKeyFile | A path to a file containing the hmac_key
|
| services.restic.backups.<name>.paths | Which paths to backup, in addition to ones specified via
dynamicFilesFrom
|
| services.restic.backups.<name>.command | Command to pass to --stdin-from-command
|
| services.xserver.logFile | Controls the file Xorg logs to
|
| users.extraGroups.<name>.gid | The group GID
|
| services.prometheus.configText | If non-null, this option defines the text that is written to
prometheus.yml
|
| services.caddy.adapter | Name of the config adapter to use
|
| hardware.ksm.sleep | How many milliseconds ksmd should sleep between scans
|
| boot.loader.timeout | Timeout (in seconds) until loader boots the default menu item
|
| services.davis.nginx | Use this option to customize an nginx virtual host
|
| services.gitea.dump.file | Filename to be used for the dump
|
| services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| services.bcg.name | Name for the device
|
| environment.variables | A set of environment variables used in the global environment
|
| services.slskd.domain | If non-null, enables an nginx reverse proxy virtual host at this FQDN,
at the path configurated with services.slskd.web.url_base.
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| services.actual.user | User account under which Actual runs
|
| services.geth.<name>.network | The network to connect to
|
| services.klipper.logFile | Path of the file Klipper should log to
|
| services.tt-rss.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.klipper.user | User account under which Klipper runs
|
| services.grav.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.akkoma.nginx | Extra configuration for the nginx virtual host of Akkoma
|
| services.sympa.mainDomain | Main domain to be used in sympa.conf
|
| services.squid.configText | Verbatim contents of squid.conf
|
| services.ollama.group | Group under which to run ollama
|
| services.movim.h2o.acme.root | Directory for the ACME challenge, which is public
|
| programs.ssh.agentTimeout | How long to keep the private keys in memory
|
| services.forgejo.dump.file | Filename to be used for the dump
|
| boot.kernel.sysctl | Runtime parameters of the Linux kernel, as set by
sysctl(8)
|
| services.actual.group | Group account under which Actual runs
|
| services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| services.klipper.group | Group account under which Klipper runs
|
| services.davis.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.slskd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.movim.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.matrix-tuwunel.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| services.jicofo.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| services.thanos.rule.log.level | Log filtering level
|
| services.snipe-it.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.movim.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Movim
|
| services.h2o.hosts.<name>.acme.root | Directory for the ACME challenge, which is public
|
| services.jigasi.xmppDomain | Domain name of the XMMP server to which to connect as a component
|
| services.nsd.version | The version string replied for CH TXT version.server and version.bind
queries
|
| services.nagios.mainConfigFile | If non-null, overrides the main configuration file of Nagios.
|
| services.akkoma.dist.cookie | Erlang release cookie
|
| services.mirakurun.port | Port to listen on
|
| services.vwifi.server.ports.spy | The spy interface port
|
| services.vwifi.server.ports.tcp | The TCP server port
|
| services.akkoma.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.baikal.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.gancio.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.thanos.query.log.level | Log filtering level
|
| services.tt-rss.database.host | Host of the database
|
| services.thanos.store.log.level | Log filtering level
|
| services.monica.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.redis.servers.<name>.bind | The IP interface to bind to.
null means "all interfaces".
|
| services.matomo.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.xserver.fontPath | Set the X server FontPath
|
| users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| services.echoip.virtualHost | Name of the nginx virtual host to use and setup
|
| services.tsmBackup.autoTime | The backup service will be invoked
automatically at the given date/time,
which must be in the format described in
systemd.time(5)
|
| swapDevices.*.priority | Specify the priority of the swap device
|
| services.dspam.domainSocket | Path to local domain socket which is used for communication with the daemon
|
| services.sabnzbd.configFile | Path to config file (deprecated, use settings instead and set this value to null)
|
| services.movim.settings | .env settings for Movim
|
| services.sympa.database.port | Database port
|
| services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| services.libinput.mouse.dev | Path for mouse device
|
| services.atuin.database.uri | URI to the database
|
| services.mighttpd2.cores | How many cores to use
|
| services.rss-bridge.virtualHost | Name of the nginx or caddy virtualhost to use and setup
|
| services.vwifi.client.serverPort | The server port port
|
| services.vwifi.server.ports.vhost | The vhost port
|
| boot.initrd.compressorArgs | Arguments to pass to the compressor for the initrd image, or null to use the compressor's defaults.
|
| users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.kubo.serviceFdlimit | The fdlimit for the Kubo systemd unit or null to have the daemon attempt to manage it
|
| security.doas.extraRules.*.cmd | The command the user is allowed to run
|
| boot.initrd.secrets | Secrets to append to the initrd
|
| boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| networking.proxy.noProxy | This option specifies the no_proxy environment variable
|
| hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| boot.loader.grub.splashImage | Background image used for GRUB
|
| systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.mounts.*.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.zammad.database.port | Database port
|
| services.bosun.opentsdbHost | Host and port of the OpenTSDB database that stores bosun data
|
| services.mchprs.maxRuntime | Automatically restart the server after
services.mchprs.maxRuntime
|
| services.thanos.store.chunk-pool-size | Maximum size of concurrently allocatable bytes for chunks
|
| services.minetest-server.port | Port number to bind to
|
| services.mpd.openFirewall | Open ports in the firewall for mpd
|
| users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| services.thanos.rule.http-address | Listen host:port for HTTP endpoints
|
| services.yggdrasil.group | Group to grant access to the Yggdrasil control socket
|
| services.github-runners.<name>.name | Name of the runner to configure
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| services.dolibarr.h2o.acme.root | Directory for the ACME challenge, which is public
|
| security.pam.u2f.settings | Options to pass to the PAM module
|
| services.thanos.sidecar.log.level | Log filtering level
|
| services.smokeping.host | Host/IP to bind to for the web server
|
| services.thanos.receive.log.level | Log filtering level
|
| services.thanos.compact.log.level | Log filtering level
|
| services.tts.servers.<name>.model | Name of the model to download and use for speech synthesis
|
| services.ncps.cache.storage.local | The local directory for storing configuration and cached store
paths
|
| environment.sessionVariables | A set of environment variables used in the global environment
|
| services.caddy.acmeCA |
Sets the acme_ca option
in the global options block of the resulting Caddyfile.
The URL to the ACME CA's directory
|
| services.thanos.store.index-cache-size | Maximum size of items held in the index cache
|
| services.nsd.statistics | Statistics are produced every number of seconds
|
| services.surrealdb.dbPath | The path that surrealdb will write data to
|
| services.rss-bridge.webserver | Type of virtualhost to use and setup
|
| systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| programs.river.package | The river package to use
|
| services.airsonic.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.dolibarr.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.agorakit.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.kanboard.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.librenms.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| nix.buildMachines.*.publicHostKey | The (base64-encoded) public host key of this builder
|
| services.cloudlog.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.fediwall.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| services.terraria.password | Sets the server password
|
| services.pixelfed.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.thanos.store.http-address | Listen host:port for HTTP endpoints
|
| services.mainsail.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.thanos.query.http-address | Listen host:port for HTTP endpoints
|
| users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| services.public-inbox.imap.port | Listening port
|
| services.sympa.domains.<name>.webHost | Domain part of the web interface URL (no web interface for this domain if null)
|
| services.public-inbox.http.port | Listening port or systemd's ListenStream= entry
to be used as a reverse proxy, eg. in nginx:
locations."/inbox".proxyPass = "http://unix:${config.services.public-inbox.http.port}:/inbox";
Set to null and use systemd.sockets.public-inbox-httpd.listenStreams
if you need a more advanced listening.
|
| services.public-inbox.nntp.port | Listening port
|
| systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.youtrack.virtualHost | Name of the nginx virtual host to use and setup
|
| systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.powerdns-admin.saltFile | The salt used for serialization
|
| services.nagios.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.mirakurun.unixSocket | Path to unix socket to listen on
|
| services.moodle.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.thanos.rule.eval-interval | The default evaluation interval to use
|
| services.vwifi.server.ports.control | The control interface port
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.minetest-server.logPath | Path to logfile for logging
|
| services.radicle.httpd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.syncthing.relay.pools | Relay pools to join
|
| services.prometheus.alertmanager.configText | Alertmanager configuration as YAML text
|
| security.pam.rssh.settings | Options to pass to the pam_rssh module
|
| services.caddy.openFirewall | Whether to enable opening the specified http(s) ports in the firewall
|
| services.minetest-server.gameId | Id of the game to use
|
| services.thanos.rule.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.anuko-time-tracker.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.httpd.virtualHosts.<name>.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.nginx.virtualHosts.<name>.acmeRoot | Directory for the ACME challenge, which is public
|
| services.nipap.nipap-www.xmlrpcURIFile | Path to file containing XMLRPC URI for use by web UI - this is a secret, since it contains auth credentials
|
| services.syncplay.saltFile | Path to the file that contains the server salt
|
| systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.matrix-continuwuity.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| services.prosody.uploadHttp.userQuota | Maximum size of all uploaded files per user, in bytes
|
| services.dragonflydb.bind | The IP interface to bind to.
null means "all interfaces".
|
| services.akkoma.initDb.password | Password of the database user to initialise the database with
|
| boot.initrd.systemd.repart.device | The device to operate on
|
| services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| services.thanos.query.query.timeout | Maximum time to process query by query node
|
| services.minetest-server.world | Name of the world to use
|
| nixpkgs.crossSystem | Systems with a recently generated hardware-configuration.nix
may instead specify only nixpkgs.buildPlatform,
or fall back to removing the nixpkgs.hostPlatform line from the generated config
|
| system.autoUpgrade.rebootWindow | Define a lower and upper time value (in HH:MM format) which
constitute a time window during which reboots are allowed after an upgrade
|
| services.librespeed.domain | If not null, this will add an entry to services.librespeed.servers and
configure librespeed to use TLS.
|
| services.libinput.touchpad.dev | Path for touchpad device
|
| services.bookstack.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| services.syncplay.passwordFile | Path to the file that contains the server password
|
| services.nsd.zones.<name>.zoneStats | When set to something distinct to null NSD is able to collect
statistics per zone
|
| services.thanos.query.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| services.thanos.store.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| services.github-runners.<name>.user | User under which to run the service
|
| services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| programs.sway.package | The sway package to use
|
| services.jenkins.plugins | A set of plugins to activate
|
| services.rss2email.feeds.<name>.to | Email address to which to send feed items
|
| services.matomo.nginx | With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo
|
| services.xserver.synaptics.dev | Path for touchpad device
|
| nix.buildMachines.*.protocol | The protocol used for communicating with the build machine
|
| boot.loader.grub.mirroredBoots.*.efiSysMountPoint | The path to the efi system mount point
|
| services.thanos.compact.http-address | Listen host:port for HTTP endpoints
|
| services.thanos.receive.http-address | Listen host:port for HTTP endpoints
|
| services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| services.thanos.sidecar.http-address | Listen host:port for HTTP endpoints
|
| services.trickster.instance-id | Instance ID for when running multiple processes (default null).
|
| services.thanos.rule.query.sd-dns-interval | Interval between DNS resolutions
|
| services.minetest-server.configPath | Path to the config to use
|
| systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.icingaweb2.roles | roles.ini contents
|
| services.postfix.settings.main | The main.cf configuration file as key value set
|
| services.thanos.rule.tsdb.block-duration | Block duration for TSDB block
|
| services.thanos.query-frontend.log.level | Log filtering level
|
| services.jirafeau.nginxConfig.acmeRoot | Directory for the ACME challenge, which is public
|
| services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| services.apache-kafka.settings."broker.id" | Broker ID. -1 or null to auto-allocate in zookeeper mode.
|
| services.thanos.query.store.sd-dns-interval | Interval between DNS resolutions
|
| services.thanos.compact.startAt | When this option is set to a systemd.time
specification the Thanos compactor will run at the specified period
|
| services.thanos.rule.tsdb.retention | Block retention time on local disk
|
| services.sks.webroot | Source directory (will be symlinked, if not null) for the files the
built-in webserver should serve
|
| services.immich.settings | Configuration for Immich
|
| fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| services.thanos.rule.query.sd-interval | Refresh interval to re-read file SD files. (used as a fallback)
Defaults to 5m in Thanos
when set to null.
|
| services.zabbixWeb.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.zabbixWeb.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| services.dokuwiki.sites.<name>.acl | Access Control Lists: see https://www.dokuwiki.org/acl
Mutually exclusive with services.dokuwiki.aclFile
Set this to a value other than null to take precedence over aclFile option
|
| nixpkgs.flake.source | The path to the nixpkgs sources used to build the system
|
| services.icingaweb2.virtualHost | Name of the nginx virtualhost to use and setup
|
| services.pulseaudio.tcp.port | TCP connection port
|
| services.drupal.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| hardware.block.defaultScheduler | Default block I/O scheduler
|
| security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| services.thanos.store.sync-block-duration | Repeat interval for syncing the blocks between local and remote view
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| services.komodo-periphery.configFile | Path to the periphery configuration file
|
| networking.fooOverUDP.<name>.protocol | Protocol number of the encapsulated packets
|
| services.tuned.settings.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| services.restic.backups.<name>.timerConfig | When to run the backup
|
| services.thanos.sidecar.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| services.thanos.receive.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| services.discourse.database.host | Discourse database hostname. null means
“prefer local unix socket connection”.
|
| services.icecream.scheduler.netName | Network name for the icecream scheduler
|
| programs.river-classic.package | The river-classic package to use
|
| services.dockerRegistry.storagePath | Docker registry storage path for the filesystem storage backend
|
| services.thanos.query.store.sd-interval | Refresh interval to re-read file SD files
|
| services.ntopng.redis.createInstance | Local Redis instance name
|
| services.icecream.daemon.hostname | Hostname of the daemon in the icecream infrastructure
|
| services.dawarich.sidekiqThreads | Worker threads used by the dawarich-sidekiq-all service
|
| services.openafsClient.globalCellServDBFile | Global CellServDB file to be deployed
|
| services.mastodon.sidekiqThreads | Worker threads used by the mastodon-sidekiq-all service
|
| services.powerdns-admin.secretKeyFile | The secret used to create cookies
|
| services.duplicity.cleanup.maxAge | If non-null, delete all backup sets older than the given time
|
| services.invidious.database.host | The database host Invidious should use
|
| services.logcheck.ignoreCron.<name>.timeArgs | "min hr dom mon dow" crontab time args, to auto-create a cronjob too
|
| services.thanos.downsample.log.level | Log filtering level
|
| services.radicle.httpd.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for radicle-httpd
|
| services.duplicity.frequency | Run duplicity with the given frequency (see
systemd.time(7) for the format)
|
| services.avahi.allowInterfaces | List of network interfaces that should be used by the avahi-daemon
|
| services.dragonflydb.maxMemory | The maximum amount of memory to use for storage (in bytes).
null means this will be automatically set.
|
| services.thanos.store.max-time | End of time range limit to serve
|
| services.protonmail-bridge.logLevel | Log level of the Proton Mail Bridge service
|
| services.tuned.settings.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| services.tor.relay.onionServices.<name>.path | Path where to store the data files of the hidden service
|
| services.thanos.store.min-time | Start of time range limit to serve
|
| services.rsyncd.settings.sections | attribute set of section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| services.sympa.database.host | Database host address
|
| services.biboumi.settings.db_name | The name of the database to use
|
| services.duplicity.cleanup.maxIncr | If non-null, delete incremental sets of all backups sets that are
older than the count:th last full backup (in other words, keep only
old full backups and not their increments).
|
| services.ipfs-cluster.secretFile | File containing the cluster secret in the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.onlyoffice.jwtSecretFile | Path to a file that contains the secret to sign web requests using JSON Web Tokens
|
| systemd.automounts.*.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.watchdog.rebootTime | The amount of time which can elapse after a reboot has been triggered
before a watchdog hardware device will automatically reboot the system
|
| services.duplicity.cleanup.maxFull | If non-null, delete all backups sets that are older than the count:th last full
backup (in other words, keep the last count full backups and
associated incremental sets).
|
| services.borgbackup.jobs.<name>.wrapper | Name of the wrapper that is installed into PATH
|
| services.thanos.query-frontend.http-address | Listen host:port for HTTP endpoints
|
| services.timesyncd.servers | The set of NTP servers from which to synchronise
|
| services.kapacitor.loadDirectory | Directory where to load services from, such as tasks, templates and handlers (or null to disable service loading on startup)
|
| services.hardware.pommed.configFile | The path to the pommed.conf file
|
| services.mysql.initialDatabases.*.schema | The initial schema of the database; if null (the default),
an empty database is created.
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.postfix.masterConfig.<name>.maxproc | The maximum number of processes to spawn for this service
|
| services.resolved.fallbackDns | A list of IPv4 and IPv6 addresses to use as the fallback DNS servers
|
| services.keepalived.snmp.socket | Socket to use for connecting to SNMP master agent
|
| services.fedimintd.<name>.nginx.config.acmeRoot | Directory for the ACME challenge, which is public
|
| services.pomerium.useACMEHost | If set, use a NixOS-generated ACME certificate with the specified name
|
| services.rsyncd.settings.globalSection | global section of an INI file (attrs of INI atom (null, bool, int, float or string))
|
| virtualisation.bios | An alternate BIOS (such as qboot) with which to start the VM
|
| services.vwifi.client.serverAddress | The address of the server
|
| boot.loader.limine.maxGenerations | Maximum number of latest generations in the boot menu
|
| boot.loader.refind.maxGenerations | Maximum number of latest generations in the boot menu
|
| services.thanos.rule.tracing.config | Tracing configuration
|
| services.vsmartcard-vpcd.hostname | Hostname of a waiting vpicc server vpcd will be connecting to
|
| services.postfix.masterConfig.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| services.thanos.receive.remote-write.address | Address to listen on for remote write requests
|
| services.keycloak.database.caCert | The SSL / TLS CA certificate that verifies the identity of the
database server
|
| services.mattermost.plugins | Plugins to add to the configuration
|
| services.limesurvey.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.icecream.daemon.maxProcesses | Maximum number of compile jobs started in parallel for this daemon
|
| services.hickory-dns.settings.zones.*.file | Path to the .zone file
|
| boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| services.thanos.receive.tsdb.retention | How long to retain raw samples on local storage.
0d - disables this retention
Defaults to 15d in Thanos
when set to null.
|
| services.thanos.store.tracing.config | Tracing configuration
|
| services.thanos.query.tracing.config | Tracing configuration
|
| services.thanos.query-frontend.grpc-address | Listen ip:port address for gRPC endpoints (StoreAPI)
|
| services.mediawiki.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.xserver.windowManager.qtile.configFile | Path to the qtile configuration file
|
| services.dragonflydb.memcachePort | To enable memcached compatible API on this port.
null means disabled.
|
| programs.tsmClient.servers | Server definitions ("stanzas")
for the client system-options file
|
| security.tpm2.fapi.ekFingerprint | The fingerprint of the endorsement key
|
| services.thanos.query.query.max-concurrent | Maximum number of queries processed concurrently by query node
|
| services.xserver.windowManager.bspwm.configFile | Path to the bspwm configuration file
|
| services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| services.icecream.daemon.schedulerHost | Explicit scheduler hostname, useful in firewalled environments
|
| services.borgbackup.jobs.<name>.prune.prefix | Only consider archive names starting with this prefix for pruning
|
| services.tor.relay.onionServices.<name>.secretKey | Secret key of the onion service
|
| services.thanos.rule.objstore.config | Object store configuration
|
| services.icingaweb2.groupBackends | groups.ini contents
|
| services.librespeed.frontend.enable | Enables the LibreSpeed frontend and adds a nginx virtual host if
not explicitly disabled and services.librespeed.domain is not null.
|
| networking.wlanInterfaces.<name>.mac | MAC address to use for the device
|
| services.wordpress.sites.<name>.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.librespeed.settings | LibreSpeed configuration written as Nix expression
|
| services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| services.thanos.sidecar.prometheus.url | URL at which to reach Prometheus's API
|
| services.anubis.defaultOptions.botPolicy | Anubis policy configuration in Nix syntax
|
| services.dovecot2.mailboxes.<name>.specialUse | Null if no special use flag is set
|
| security.pam.yubico.challengeResponsePath | If not null, set the path used by yubico pam module where the challenge expected response is stored
|
| services.thanos.store.objstore.config | Object store configuration
|
| services.postsrsd.settings.srs-domain | Dedicated mail domain used for ephemeral SRS envelope addresses
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| services.cassandra.fullRepairInterval | Set the interval how often full repairs are run, i.e.
nodetool repair --full is executed
|
| networking.interfaces.<name>.useDHCP | Whether this interface should be configured with DHCP
|
| services.thanos.query.store.unhealthy-timeout | Timeout before an unhealthy store is cleaned from the store UI page
|
| programs.ssh.forwardX11 | Whether to request X11 forwarding on outgoing connections by default
|
| services.prometheus.scrapeConfigs.*.scheme | The URL scheme with which to fetch metrics from targets
|
| services.thanos.compact.tracing.config | Tracing configuration
|
| services.limesurvey.httpd.virtualHost.acmeRoot | Directory for the acme challenge which is PUBLIC, don't put certs or keys in here
|
| services.limesurvey.nginx.virtualHost.acmeRoot | Directory for the ACME challenge, which is public
|
| services.mediawiki.extensions | Attribute set of paths whose content is copied to the extensions
subdirectory of the MediaWiki installation and enabled in configuration
|
| services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| services.thanos.sidecar.tracing.config | Tracing configuration
|
| services.thanos.receive.tracing.config | Tracing configuration
|
| system.nixos.label | NixOS version name to be used in the names of generated
outputs and boot labels
|
| virtualisation.diskImage | Path to the disk image containing the root filesystem
|
| services.thanos.query.store.response-timeout | If a Store doesn't send any data in this specified duration then a
Store will be ignored and partial data will be returned if it's
enabled. 0 disables timeout
|
| services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| services.thanos.store.block-sync-concurrency | Number of goroutines to use when syncing blocks from object storage
|
| services.postfix.settings.master.<name>.private | Whether the service's sockets and storage directory is restricted to
be only available via the mail system
|
| services.xserver.windowManager.bspwm.sxhkd.configFile | Path to the sxhkd configuration file
|
| services.icingaweb2.resources | resources.ini contents
|
| services.cloudflare-dyndns.frequency | Run cloudflare-dyndns with the given frequency (see
systemd.time(7) for the format)
|
| services.biboumi.settings.password | The password used to authenticate the XMPP component to your XMPP server
|
| services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| services.gitlab.sidekiq.concurrency | How many processor threads to use for processing sidekiq background job queues
|
| networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| services.paperless.exporter.onCalendar | When to run the exporter
|
| services.transmission.webHome | If not null, sets the value of the TRANSMISSION_WEB_HOME
environment variable used by the service
|
| services.waagent.settings.OS.RootDeviceScsiTimeout | Configures the SCSI timeout in seconds on the OS disk and data drives
|
| services.icingaweb2.generalConfig | config.ini contents
|
| services.matrix-synapse.settings.database.args.user | Username to connect with psycopg2, set to null
when using sqlite3.
|
| services.discourse.backendSettings | Additional settings to put in the
discourse.conf file
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| services.pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| services.thanos.sidecar.objstore.config | Object store configuration
|
| services.thanos.compact.objstore.config | Object store configuration
|
| services.thanos.receive.objstore.config | Object store configuration
|
| services.timesyncd.fallbackServers | The set of fallback NTP servers from which to synchronise
|
| services.discourse.mail.incoming.apiKeyFile | A file containing the Discourse API key used to add
posts and messages from mail
|
| i18n.inputMethod.type | Select the enabled input method
|
| systemd.services.<name>.confinement.binSh | The program to make available as /bin/sh inside
the chroot
|
| services.jellyfin.transcoding.threadCount | Number of threads to use when transcoding
|
| services.borgbackup.jobs.<name>.archiveBaseName | How to name the created archives
|
| programs.starship.transientPrompt.left | Fish code composing the body of the starship_transient_prompt_func function
|
| services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| programs.starship.transientPrompt.right | Fish code composing the body of the starship_transient_rprompt_func function
|
| services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| services.dawarich.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| services.mastodon.sidekiqProcesses.<name>.threads | Number of threads this process should use for executing jobs
|
| services.anubis.defaultOptions.settings.POLICY_FNAME | The policy file to use
|
| services.misskey.reverseProxy.webserver.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.thanos.query-frontend.tracing.config | Tracing configuration
|
| services.hardware.openrgb.motherboard | CPU family of motherboard
|
| services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| boot.kernelPatches | A list of additional patches to apply to the kernel
|
| services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| services.thanos.compact.compact.concurrency | Number of goroutines to use when compacting groups
|
| services.thanos.compact.consistency-delay | Minimum age of fresh (non-compacted) blocks before they are being
processed
|
| services.mastodon.elasticsearch.host | Elasticsearch host
|
| services.thanos.store.store.grpc.series-max-concurrency | Maximum number of concurrent Series calls
|
| services.prometheus.pushgateway.log.level | Only log messages with the given severity or above.
null will default to info.
|
| services.jitsi-meet.videobridge.passwordFile | File containing password to the Prosody account for videobridge
|
| services.thanos.store.store.limits.request-samples | The maximum samples allowed for a single Series request
|
| services.taskserver.pki.auto.expiration.ca | The expiration time of the CA certificate in days or null for no
expiration time.
|
| virtualisation.bootPartition | The path (inside the VM) to the device containing the EFI System Partition (ESP)
|
| services.immich.accelerationDevices | A list of device paths to hardware acceleration devices that immich should
have access to
|
| services.prometheus.pushgateway.log.format | Set the log target and format.
null will default to logger:stderr.
|
| services.thanos.downsample.tracing.config | Tracing configuration
|
| services.adguardhome.settings | AdGuard Home configuration
|
| services.taskserver.pki.auto.expiration.crl | The expiration time of the certificate revocation list (CRL) in days or null for no
expiration time.
|
| services.grafana.declarativePlugins | If non-null, then a list of packages containing Grafana plugins to install
|
| boot.loader.systemd-boot.configurationLimit | Maximum number of latest generations in the boot menu
|
| services.bluesky-pds.settings.PDS_BLOBSTORE_DISK_LOCATION | Store blobs at this location, set to null to use e.g
|
| services.tarsnap.archives.<name>.checkpointBytes | Create a checkpoint every checkpointBytes
of uploaded data (optionally specified using an SI prefix).
1GB is the minimum value
|
| services.thanos.compact.retention.resolution-raw | How long to retain raw samples in bucket.
0d - disables this retention
Defaults to 0d in Thanos
when set to null.
|
| hardware.block.defaultSchedulerRotational | Default block I/O scheduler for rotational drives (e.g. hard disks)
|
| services.thanos.compact.retention.resolution-5m | How long to retain samples of resolution 1 (5 minutes) in bucket.
0d - disables this retention
Defaults to 0d in Thanos
when set to null.
|
| services.thanos.compact.retention.resolution-1h | How long to retain samples of resolution 2 (1 hour) in bucket.
0d - disables this retention
Defaults to 0d in Thanos
when set to null.
|
| services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| services.thanos.query.query.default-evaluation-interval | Set default evaluation interval for sub queries
|
| services.thanos.rule.alertmanagers.send-timeout | Timeout for sending alerts to alertmanager
|
| services.thanos.downsample.objstore.config | Object store configuration
|
| services.firezone.server.settingsSecret.TOKENS_SALT | A file containing a unique base64 encoded secret for the
TOKENS_SALT
|
| services.taskserver.pki.auto.expiration.client | The expiration time of client certificates in days or null for no
expiration time.
|
| services.nextcloud-spreed-signaling.settings.https.key | Path to the private key used for the HTTPS listener
|
| services.taskserver.pki.auto.expiration.server | The expiration time of the server certificate in days or null for no
expiration time.
|
| services.firezone.server.settingsSecret.TOKENS_KEY_BASE | A file containing a unique base64 encoded secret for the
TOKENS_KEY_BASE
|
| services.firezone.server.settingsSecret.SECRET_KEY_BASE | A file containing a unique base64 encoded secret for the
SECRET_KEY_BASE
|
| services.nextcloud-spreed-signaling.settings.grpc.listen | IP and port to listen on for GRPC requests
|
| services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength | The prefix length of the subnet
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| services.ollama.acceleration | What interface to use for hardware acceleration
|
| services.thanos.query-frontend.query-frontend.downstream-url | URL of downstream Prometheus Query compatible API
|
| services.nextcloud-spreed-signaling.settings.http.listen | IP and port to listen on for HTTP requests, in the format of ip:port
|
| services.tabby.acceleration | Specifies the device to use for hardware acceleration.
cpu: no acceleration just use the CPU
rocm: supported by modern AMD GPUs
cuda: supported by modern NVIDIA GPUs
metal: supported on darwin aarch64 machines
Tabby will try and determine what type of acceleration that is
already enabled in your configuration when acceleration = null.
- nixpkgs.config.cudaSupport
- nixpkgs.config.rocmSupport
- if stdenv.hostPlatform.isDarwin && stdenv.hostPlatform.isAarch64
IFF multiple acceleration methods are found to be enabled or if you
haven't set either cudaSupport or rocmSupport you will have to
specify the device type manually here otherwise it will default to
the first from the list above or to cpu.
|
| services.prometheus.pushgateway.web.listen-address | Address to listen on for the web interface, API and telemetry.
null will default to :9091.
|
| services.cassandra.incrementalRepairInterval | Set the interval how often incremental repairs are run, i.e.
nodetool repair is executed
|
| services.firezone.server.settingsSecret.RELEASE_COOKIE | A file containing a unique secret identifier for the Erlang
cluster
|
| services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| services.prometheus.pushgateway.web.telemetry-path | Path under which to expose metrics.
null will default to /metrics.
|
| services.firezone.server.settingsSecret.LIVE_VIEW_SIGNING_SALT | A file containing a unique base64 encoded secret for the
LIVE_VIEW_SIGNING_SALT
|
| services.firezone.server.settingsSecret.COOKIE_SIGNING_SALT | A file containing a unique base64 encoded secret for the
COOKIE_SIGNING_SALT
|
| services.prometheus.scrapeConfigs.*.metrics_path | The HTTP resource path on which to fetch metrics from targets
|
| services.xserver.displayManager.lightdm.greeters.gtk.clock-format | Clock format string (as expected by strftime, e.g. "%H:%M")
to use with the lightdm gtk greeter panel
|
| services.archisteamfarm.bots.<name>.passwordFile | Path to a file containing the password
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| services.jellyfin.transcoding.maxConcurrentStreams | Maximum number of concurrent transcoding streams
|
| services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes | List of path prefixes to ignore
|
| services.nextcloud-spreed-signaling.settings.https.listen | IP and port to listen on for HTTPS requests, in the format of ip:port
|
| services.prometheus.scrapeConfigs.*.label_limit | Per-scrape limit on number of labels that will be accepted for a sample
|
| services.angrr.settings.temporary-root-policies.<name>.ignore-prefixes-in-home | Path prefixes to ignore under home directory
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| virtualisation.fileSystems.<name>.overlay.upperdir | The path to the upperdir
|
| services.postgresql.ensureUsers.*.ensureClauses.inherit | Grants the user created inherit permissions
|
| services.icingaweb2.authentications | authentication.ini contents
|
| services.kanidm.serverSettings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.prometheus.scrapeConfigs.*.sample_limit | Per-scrape limit on number of scraped samples that will be accepted
|
| services.prometheus.globalConfig.scrape_timeout | How long until a scrape request times out
|
| networking.wireguard.interfaces.<name>.socketNamespace | The pre-existing network namespace in which the
WireGuard interface is created, and which retains the socket even if the
interface is moved via interfaceNamespace
|
| services.kanidm.server.settings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.xserver.windowManager.xmonad.enableConfiguredRecompile | Enable recompilation even if config is set to a
non-null value
|
| services.firezone.server.settingsSecret.COOKIE_ENCRYPTION_SALT | A file containing a unique base64 encoded secret for the
COOKIE_ENCRYPTION_SALT
|
| services.postgresql.ensureUsers.*.ensureClauses.createdb | Grants the user, created by the ensureUser attr, createdb permissions
|
| services.prometheus.scrapeConfigs.*.target_limit | Per-scrape config limit on number of unique targets that will be
accepted
|
| security.virtualisation.flushL1DataCache | Whether the hypervisor should flush the L1 data cache before
entering guests
|
| services.nextcloud-spreed-signaling.settings.https.certificate | Path to the certificate used for the HTTPS listener
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.type | The type of DNS query to perform
|
| virtualisation.oci-containers.containers.<name>.podman | Podman-specific settings in OCI containers
|
| services.prometheus.globalConfig.scrape_interval | How frequently to scrape targets by default
|
| services.postgresql.ensureUsers.*.ensureClauses.login | Grants the user, created by the ensureUser attr, login permissions
|
| services.nextcloud-spreed-signaling.settings.stats.allowed_ips | List of IP addresses that are allowed to access the debug, stats and metrics endpoints
|
| networking.wireguard.interfaces.<name>.interfaceNamespace | The pre-existing network namespace the WireGuard
interface is moved to
|
| services.prometheus.pushgateway.persistence.interval | The minimum interval at which to write out the persistence file.
null will default to 5m.
|
| services.postgresql.ensureUsers.*.ensureClauses.bypassrls | Grants the user, created by the ensureUser attr, replication permissions
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| services.nextcloud.settings.mail_smtpmode | Which mode to use for sending mail
|
| services.postgresql.ensureUsers.*.ensureClauses.superuser | Grants the user, created by the ensureUser attr, superuser permissions
|
| services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.action | Action to perform based on regex matching
|
| services.prometheus.scrapeConfigs.*.body_size_limit | An uncompressed response body larger than this many bytes will cause the
scrape to fail. 0 means no limit
|
| services.postgresql.ensureUsers.*.ensureClauses.replication | Grants the user, created by the ensureUser attr, replication permissions
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.maubot.settings.plugin_directories.trash | The directory where old plugin versions and conflicting plugins should be moved
|
| services.postgresql.ensureUsers.*.ensureClauses.createrole | Grants the user, created by the ensureUser attr, createrole permissions
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout | Timeout value
|
| services.prometheus.scrapeConfigs.*.honor_labels | Controls how Prometheus handles conflicts between labels
that are already present in scraped data and labels that
Prometheus would attach server-side ("job" and "instance"
labels, manually configured target labels, and labels
generated by service discovery implementations)
|
| services.matrix-tuwunel.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| services.prometheus.scrapeConfigs.*.honor_timestamps | honor_timestamps controls whether Prometheus respects the timestamps present
in scraped data
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.scheme | Consul scheme
Defaults to http in prometheus
when set to null.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server | Consul server to query
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| virtualisation.oci-containers.containers.<name>.capabilities | Capabilities to configure for the container
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.version | The Triton discovery API version
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator | The string by which Uyuni group names are joined into the groups label
Defaults to , in prometheus
when set to null.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.globalConfig.evaluation_interval | How frequently to evaluate rules by default
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role | The type of targets to discover, can be set to:
- "container" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton
- "cn" to discover compute nodes (servers/global zones) making up the Triton infrastructure
Defaults to container in prometheus
when set to null.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment | The Azure environment
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.entitlement | The entitlement string to filter eligible systems
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port | The port to scrape metrics from
|
| services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.fetch_timeout | The time after which the monitoring assignments are refreshed
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.zone | Zone is the availability zone of your targets (e.g. fr-par-1)
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type | Sets the authentication type
|
| users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.api_url | API URL to use when doing the server listing requests
|
| users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| services.matrix-continuwuity.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.timeout | Timeout value
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval | Refresh interval to re-read the cloud instance list
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tag_separator | The string by which Consul tags are joined into the tag label
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator | The string by which Linode Instance tags are joined into the tag label
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.action | Action to perform based on regex matching
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.refresh_interval | Refresh interval to re-query the endpoint
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.refresh_interval | The time to wait between polling update requests
|
| services.prometheus.scrapeConfigs.*.file_sd_configs.*.refresh_interval | Refresh interval to re-read the files
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type | Sets the authentication type
|
| users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.refresh_interval | Refresh interval to re-read the managed targets list
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.action | Action to perform based on regex matching
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.refresh_interval | The interval which should be used for refreshing targets
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.refresh_interval | The time after which the linode instances are refreshed
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability | The availability of the endpoint to connect to
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval | The time after which the provided names are refreshed
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.refresh_interval | The time after which the servers are refreshed
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.label_name_length_limit | Per-scrape limit on length of labels name that will be accepted for a sample
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.refresh_interval | Polling interval
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.replacement | Replacement value against which a regex replace is performed if the
regular expression matches
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.refresh_interval | Refresh interval to re-read the resources list
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.refresh_interval | Refresh interval to re-read the managed targets list
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.label_value_length_limit | Per-scrape limit on length of labels value that will be accepted for a sample
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host | The host to use if the container is in host networking mode
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method | The authentication method, either OAuth or ManagedIdentity
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval | The time after which the containers are refreshed
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.refresh_interval | The time after which the droplets are refreshed
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|