| power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| services.ttyd.port | Port to listen on (use 0 for random port)
|
| services.nsd.port | Port the service should bind do.
|
| services.ifm.port | Port on which to serve the IFM service
|
| services.nats.port | Port on which to listen.
|
| services.sslh.port | Listening port.
|
| services.honk.port | The port the server should listen to.
|
| services.ocis.port | Web interface port.
|
| services.yarr.port | Port to run server on.
|
| services.alps.port | TCP port the service should listen on.
|
| services.gpsd.port | The port where to listen for TCP connections.
|
| services.tika.port | The Apache Tike port to listen on
|
| services.ombi.port | The port for the Ombi web interface.
|
| services.send.port | Port the Send service listens on.
|
| services.pict-rs.port | The port which to bind the service to.
|
| services.node-red.port | Listening port.
|
| services.osrm.port | Port on which the web server will run.
|
| services.xrdp.port | Specifies on which port the xrdp daemon listens.
|
| services.morty.port | Listing port
|
| services.ebusd.port | The port on which to listen on
|
| services.cfssl.port | Port to bind.
|
| services.pykms.port | The port on which to listen.
|
| services.db-rest.port | The port the db-rest server should listen on.
|
| services.flood.port | Port to bind webserver.
|
| services.paisa.port | Port to serve Paisa on.
|
| services.omnom.port | The Omnom service port.
|
| services.movim.port | Movim daemon port.
|
| services.bcg.mqtt.port | Port of MQTT server.
|
| services.atuin.port | The port the atuin server should listen on.
|
| services.ympd.mpd.port | The port where MPD is listening.
|
| services.zwave-js.port | Port for the server to listen on.
|
| services.cook-cli.port | Which port cook-cli server will use.
|
| services.hydra.port | TCP port the web server should listen to.
|
| services.ncdns.port | The port the ncdns resolver will bind to.
|
| services.snmpd.port | The port to listen on for SNMP and AgentX messages.
|
| power.ups.upsd.listen.*.port | TCP port for upsd to listen on
|
| services.portunus.dex.port | Port where dex should listen on.
|
| services.i2pd.port | I2P listen port
|
| services.leaps.port | A port where leaps listens for incoming http requests
|
| services.toxvpn.port | udp port for toxcore, port-forward to help with connectivity if you run many nodes behind one NAT
|
| services.alerta.port | Port of Alerta
|
| services.redlib.port | The port to listen on
|
| services.llama-cpp.port | Listen port for LLaMA C++ server.
|
| services.mtr-exporter.port | Listen port for MTR exporter.
|
| services.tabby.port | Specifies the bind port on which the tabby server HTTP interface listens.
|
| services.nntp-proxy.port | Proxy listen port
|
| services.zammad.port | Web service port.
|
| services.whoami.port | The port whoami should listen on.
|
| services.nix-serve.port | Port number where nix-serve will listen on.
|
| services.nar-serve.port | Port number where nar-serve will listen on.
|
| services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| services.step-ca.port | The port the certificate authority should listen on
|
| services.portunus.port | Port where the Portunus webserver should listen on
|
| services.i2pd.ssu2.port | Port to listen for incoming SSU2 connections (0=auto).
|
| services.gerbil.port | Specifies the port to listen on for Gerbil.
|
| services.athens.port | Port number Athens listens on.
|
| services.immich.port | The port that immich will listen on.
|
| services.rustus.port | The port that rustus will connect to.
|
| services.shiori.port | The port of the Shiori web application
|
| services.mealie.port | Port on which to serve the Mealie service.
|
| services.pyload.port | Port to listen on for the web UI.
|
| services.ollama.port | Which port the ollama server listens to.
|
| services.tomcat.port | The TCP port Tomcat should listen on.
|
| services.llama-swap.port | Port that llama-swap listens on.
|
| services.lemmy.ui.port | Port where lemmy-ui should listen for incoming requests.
|
| services.tremor-rs.port | the port tremor should be listening on
|
| services.iperf3.port | Server port to listen on for iperf3 client requests.
|
| services.gitDaemon.port | Port to listen on.
|
| services.quorum.port | Override the default port on which to listen for connections.
|
| services.gollum.port | Port on which the web server will run.
|
| services.hoogle.port | Port number Hoogle will be listening to.
|
| services.statsd.port | Port that stats listens for messages on over UDP
|
| services.porn-vault.port | Which port Porn-Vault will use.
|
| services.open-webui.port | Which port the Open-WebUI server listens to.
|
| services.rsyncd.port | TCP port the daemon will listen on.
|
| services.ebusd.mqtt.port | The port on which to connect to MQTT
|
| services.alps.smtps.port | The SMTPS server port.
|
| services.alps.imaps.port | The IMAPS server port.
|
| services.send.redis.port | Port of the redis server.
|
| services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| services.db-rest.redis.port | Redis port.
|
| services.teleport.diag.port | Metrics and diagnostics port.
|
| services.snipe-it.mail.port | Mail host port.
|
| services.meme-bingo-web.port | Port to be used for the web server.
|
| services.netbox.port | Port the server will listen on
|
| services.nostr-rs-relay.port | Listen on this port.
|
| services.i2pd.ntcp2.port | Port to listen for incoming NTCP2 connections (0=auto).
|
| services.varnish.listen.*.port | The port to use for IP sockets
|
| services.automx2.port | Port used by automx2.
|
| services.code-server.port | The port the server should listen to.
|
| services.parsoid.port | Port to listen on.
|
| services.esphome.port | esphome port
|
| services.https-dns-proxy.port | The port on which to listen
|
| services.monetdb.port | Port to listen on.
|
| services.outline.port | Listening port.
|
| services.beszel.hub.port | Port for this beszel hub to listen on.
|
| services.gnunet.tcp.port | The TCP port for use by GNUnet.
|
| services.gnunet.udp.port | The UDP port for use by GNUnet.
|
| services.deluge.web.port | Deluge web UI port.
|
| services.molly-brown.port | TCP port for molly-brown to bind to.
|
| services.bacula-sd.port | Specifies port number on which the Storage daemon listens for
Director connections.
|
| services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| boot.initrd.network.ssh.port | Port on which SSH initrd service should listen.
|
| services.corteza.port | Port for the HTTP server.
|
| services.prefect.port | Prefect server port
|
| services.redmine.port | Port on which Redmine is ran.
|
| services.pdfding.port | Port on which PdfDing listens
|
| services.pgadmin.port | Port for pgadmin4 to run on
|
| services.webhook.port | The port webhook should be reachable from.
|
| services.monero.rpc.port | Port the RPC server will bind to.
|
| services.quorum.ws.port | Override the default port on which to listen for WS-RPC connections.
|
| services.movim.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.jackett.port | Port serving the web interface
|
| services.cockpit.port | Port where cockpit will listen.
|
| services.glances.port | Port the server will isten on.
|
| services.couchdb.port | Defined the port number to listen.
|
| services.kthxbye.port | The port to listen on for HTTP requests.
|
| services.marytts.port | Port to bind the MaryTTS server to.
|
| services.litellm.port | Which port the LiteLLM server listens to.
|
| services.monica.mail.port | Mail host port.
|
| services.uptermd.port | Port the server will listen on.
|
| services.vikunja.port | The TCP port exposed by the API.
|
| services.gitlab.port | GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're
service over https.
|
| services.quorum.rpc.port | Override the default port on which to listen for RPC connections.
|
| services.nipap.nipap-www.port | Port to bind to.
|
| services.i2pd.proto.sam.port | Bind port for sam endpoint.
|
| services.i2pd.proto.bob.port | Bind port for bob endpoint.
|
| services.hledger-web.port | Port to listen on.
|
| services.jupyter.port | Port number Jupyter will be listening on.
|
| services.dgraph.zero.port | The port which to run dgraph zero on.
|
| services.gitlab.smtp.port | Port of the SMTP server for GitLab.
|
| services.distccd.port | The TCP port which distccd will listen on.
|
| services.ergo.listen.port | Listen port for the Ergo node.
|
| services.zeronet.port | Optional zeronet web UI port.
|
| services.etesync-dav.port | The server host port.
|
| services.owncast.port | TCP port where owncast web-gui listens.
|
| services.gocd-server.port | Specifies port number on which the Go
|
| services.movim.h2o.http.port | Override the default HTTP port for this virtual host.
|
| services.cntlm.port | Specifies on which ports the cntlm daemon listens.
|
| services.podgrab.port | The port on which Podgrab will listen for incoming HTTP traffic.
|
| services.kismet.httpd.port | The port to listen on.
|
| services.i2pd.proto.i2cp.port | Bind port for i2cp endpoint.
|
| services.i2pd.proto.http.port | Bind port for http endpoint.
|
| services.devpi-server.port | The port on which Devpi Server will listen.
|
| services.zammad.redis.port | Port of the redis server.
|
| services.mirakurun.port | Port to listen on
|
| services.jenkins.port | Specifies port number on which the jenkins HTTP interface listens
|
| services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| services.crabfit.api.port | The internal listening port of the API.
|
| services.dgraph.alpha.port | The port which to run dgraph alpha on.
|
| services.lk-jwt-service.port | Port that lk-jwt-service should listen on.
|
| services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| services.tmate-ssh-server.port | Listen port for the ssh server
|
| services.anki-sync-server.port | Port number anki-sync-server listens to.
|
| services.bacula-fd.port | This specifies the port number on which the Client listens for
Director connections
|
| services.docuseal.port | DocuSeal port.
|
| services.rtorrent.port | The rtorrent port.
|
| services.pairdrop.port | The port to listen on.
|
| services.ostinato.port | Port to listen on.
|
| services.pinnwand.port | The port to listen on.
|
| services.cadvisor.port | Cadvisor listening port
|
| services.c2fmzq-server.port | The local port to use.
|
| services.firebird.port | Port Firebird uses.
|
| services.factorio.port | The port to which the service should bind.
|
| services.terraria.port | Specifies the port to listen on.
|
| services.opentsdb.port | Which port OpenTSDB listens on.
|
| services.syncplay.port | TCP port to bind to.
|
| services.logstash.port | Port on which to start webserver.
|
| services.sympa.database.port | Database port
|
| services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| services.guix.publish.port | Port of the substitute server to listen on.
|
| services.outline.smtp.port | TCP port of the SMTP server.
|
| services.darkhttpd.port | Port to listen on
|
| services.mpd.network.port | This setting is the TCP port that is desired for the daemon to get assigned
to.
|
| services.duckling.port | Port on which duckling will run.
|
| services.bitbox-bridge.port | Listening port for the bitbox-bridge.
|
| services.chromadb.port | Defined the port number to listen.
|
| services.documize.port | The http/https port number.
|
| services.lavalink.port | The port that Lavalink will use.
|
| services.netatalk.port | TCP port to be used for AFP.
|
| services.quake3-server.port | UDP Port the server should listen on.
|
| services.tautulli.port | TCP port where Tautulli listens.
|
| services.xandikos.port | The port of the Xandikos web application
|
| services.murmur.port | Ports to bind to (UDP and TCP).
|
| services.bacula-dir.port | Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections
|
| services.nitter.server.port | The port to listen on.
|
| services.polaris.port | The port which the Polaris REST api and web UI should listen to
|
| services.immich.redis.port | The port that redis will listen on
|
| services.ergo.api.listen.port | Listen port for the API endpoint if api.keyHash is defined.
|
| services.chisel-server.port | Port to listen on, falls back to 8080
|
| services.lighttpd.port | TCP port number for lighttpd to bind to.
|
| services.matter-server.port | Port to expose the matter-server service on.
|
| services.znc.confOptions.port | Specifies the port on which to listen.
|
| services.redis.servers.<name>.port | The TCP port to accept connections
|
| services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| services.pgmanage.port | This tells pgmanage what port to listen on for browser requests.
|
| services.rabbitmq.port | Port on which RabbitMQ will listen for AMQP connections.
|
| services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| services.spoolman.port | TCP port where spoolman web-gui listens.
|
| services.docling-serve.port | Which port the Docling Serve server listens to.
|
| services.pihole-web.ports | Port(s) for the webserver to serve on
|
| services.hadoop.hbase.rest.port | RPC port
|
| services.coturn.cli-port | CLI server port.
|
| services.domoticz.port | Port to bind to for HTTP, set to 0 to disable HTTP.
|
| services.zammad.database.port | Database port
|
| services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| services.qui.settings.port | The port qui listens on.
|
| services.i2pd.proto.httpProxy.port | Bind port for httpproxy endpoint.
|
| services.livekit.redis.port | Port to bind local redis instance to.
|
| services.etebase-server.port | Port to listen on.
|
| services.whoogle-search.port | Port to listen on.
|
| services.graphite.web.port | Graphite web frontend port.
|
| services.nextjs-ollama-llm-ui.port | The port under which the Ollama UI interface should be accessible.
|
| services.zabbixWeb.server.port | The port of the Zabbix server to connect to.
|
| services.trilium-server.port | The port number to bind to.
|
| services.airsonic.port | The port on which Airsonic will listen for
incoming HTTP traffic
|
| services.subsonic.port | The port on which Subsonic will listen for
incoming HTTP traffic
|
| services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| services.metabase.ssl.port | Listen port over SSL (https) for Metabase.
|
| services.xtreemfs.mrc.port | The port to listen on for incoming connections (TCP).
|
| services.xtreemfs.dir.port | The port to listen on for incoming connections (TCP).
|
| services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| services.agorakit.mail.port | Mail host port.
|
| services.xtreemfs.osd.port | The port to listen on for incoming connections (TCP and UDP).
|
| services.ethercalc.port | Port to bind to.
|
| services.glitchtip.port | The port to listen on.
|
| services.infinoted.port | Port to listen on
|
| services.kapacitor.port | Port of Kapacitor
|
| services.memcached.port | The port to bind to.
|
| services.sickbeard.port | Port to bind to.
|
| services.moonraker.port | The port to listen on.
|
| networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| services.distccd.stats.port | The TCP port which the distccd statistics HTTP server will listen
on.
|
| services.athens.index.mysql.port | Port for the MySQL database.
|
| services.syncthing.relay.port | Port to listen on for relay traffic
|
| services.mpd.settings.port | This setting is the TCP port that is desired for the daemon to get assigned
to.
|
| services.pulseaudio.tcp.port | TCP connection port
|
| services.headscale.port | Listening port of headscale.
|
| services.gotenberg.port | Port on which the API should listen.
|
| services.octoprint.port | Port to bind OctoPrint to.
|
| services.mediatomb.port | The network port to listen on.
|
| services.paperless.port | Web interface port.
|
| services.pixiecore.port | Port to listen on for HTTP
|
| services.opencloud.port | Web server port.
|
| services.zookeeper.port | Zookeeper Client port.
|
| services.i2pd.proto.socksProxy.port | Bind port for socksproxy endpoint.
|
| services.endlessh.port | Specifies on which port the endlessh daemon listens for SSH
connections
|
| services.wiki-js.settings.port | TCP port the process should listen to.
|
| services.immich-public-proxy.port | The port that IPP will listen on.
|
| services.duplicati.port | Port serving the web interface
|
| services.lanraragi.port | Port for LANraragi's web interface.
|
| services.teeworlds.port | Port the server will listen on.
|
| services.surrealdb.port | The port that surrealdb will connect to.
|
| services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| services.mastodon.redis.port | Redis port.
|
| services.peertube.redis.port | Redis port.
|
| services.imaginary.port | Bind port
|
| services.pinchflat.port | Port on which the Pinchflat web interface is available.
|
| services.thelounge.port | TCP port to listen on for http connections.
|
| services.overseerr.port | The port which the Overseerr web UI should listen on.
|
| services.docuseal.redis.port | Port of the redis server.
|
| services.gitea.database.port | Database host port.
|
| services.local-content-share.port | Port on which the service will be available
|
| services.stash.settings.port | The port that Stash should listen on.
|
| services.zabbixProxy.listen.port | Listen port for trapper.
|
| services.endlessh-go.port | Specifies on which port the endlessh-go daemon listens for SSH
connections
|
| services.tailscale.port | The port to listen on for tunnel traffic (0=autoselect).
|
| services.calibre-server.port | The port on which to listen for connections
|
| services.firezone.relay.port | The port to listen on for STUN messages
|
| services.calibre-web.listen.port | Listen port for Calibre-Web.
|
| services.tsidp.settings.port | Port to listen on (default: 443).
|
| services.dolibarr.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.icecast.listen.port | TCP port that will be used to accept client connections.
|
| services.hadoop.hbase.thrift.port | RPC port
|
| services.snipe-it.database.port | Database host port.
|
| services.tandoor-recipes.port | Web interface port.
|
| services.workout-tracker.port | Web interface port.
|
| services.lemmy.settings.port | Port where lemmy should listen for incoming requests.
|
| services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| services.sourcehut.hg.port | Port on which the "hg" backend should listen.
|
| services.dae.openFirewall.port | Port to be opened
|
| services.pdns-recursor.dns.port | Port number Recursor DNS server will bind to.
|
| services.peering-manager.port | Port the server will listen on.
|
| services.zabbixAgent.listen.port | Agent will listen on this port for connections from the server.
|
| services.tt-rss.database.port | The database's port
|
| services.tailscale.derper.port | The port the derper process will listen on
|
| services.i2pd.proto.i2pControl.port | Bind port for i2pcontrol endpoint.
|
| services.davis.nginx.listen.*.port | Port number to listen on
|
| services.movim.nginx.listen.*.port | Port number to listen on
|
| services.slskd.nginx.listen.*.port | Port number to listen on
|
| services.pdns-recursor.api.port | Port number Recursor REST API server will bind to.
|
| services.sourcehut.git.port | Port on which the "git" backend should listen.
|
| services.sourcehut.hub.port | Port on which the "hub" backend should listen.
|
| services.sourcehut.man.port | Port on which the "man" backend should listen.
|
| services.ente.api.settings.db.port | The database port
|
| services.dolibarr.h2o.http.port | Override the default HTTP port for this virtual host.
|
| services.dockerRegistry.port | Docker registry port to bind to.
|
| services.eternal-terminal.port | The port the server should listen on
|
| services.actual.settings.port | The port to listen on
|
| services.acme-dns.settings.api.port | Listen port for the HTTP API.
|
| services.namecoind.rpc.port | Port the RPC server will bind to.
|
| services.magnetico.web.port | Port the web interface will listen to.
|
| services.snipe-it.nginx.listen.*.port | Port number to listen on
|
| services.nsd.remoteControl.port | Port number for remote control operations (uses TLS over TCP).
|
| services.slskd.settings.web.port | The HTTP listen port.
|
| services.xinetd.services.*.port | Port number of the service.
|
| services.openvscode-server.port | The port the server should listen to
|
| services.bookstack.mail.port | Mail host port.
|
| services.immich.database.port | Port of the postgresql server.
|
| services.graphite.seyren.port | Seyren listening port.
|
| services.moodle.database.port | Database host port.
|
| services.monica.database.port | Database host port.
|
| services.metabase.listen.port | Listen port for Metabase.
|
| services.nginx.defaultListen.*.port | Port number.
|
| services.zabbixServer.listen.port | Listen port for trapper.
|
| services.akkoma.dist.portMax | Upper bound for Erlang distribution protocol TCP port.
|
| services.akkoma.dist.portMin | Lower bound for Erlang distribution protocol TCP port.
|
| services.keycloak.database.port | Port of the database to connect to.
|
| services.sourcehut.meta.port | Port on which the "meta" backend should listen.
|
| services.sourcehut.todo.port | Port on which the "todo" backend should listen.
|
| services.artalk.settings.port | Artalk server listen port
|
| services.gitlab.registry.port | GitLab container registry port.
|
| services.i2pd.websocket.port | Bind port for websockets endpoint.
|
| services.broadcast-box.web.port | Port the HTTP server listens on.
|
| services.chhoto-url.settings.port | The port to listen on.
|
| services.buildbot-master.port | Specifies port number on which the buildbot HTTP interface listens.
|
| services.gatus.settings.web.port | The TCP port to serve the Gatus service at.
|
| services.owncast.rtmp-port | TCP port where owncast rtmp service listens.
|
| services.headphones.port | Port to bind to.
|
| services.prometheus.port | Port to listen on.
|
| services.zoneminder.port | The port on which to listen.
|
| services.cross-seed.settings.port | Port the cross-seed daemon listens on.
|
| services.zabbixWeb.database.port | Database host port.
|
| services.hockeypuck.port | HKP port to listen on.
|
| services.photoprism.port | Web interface port.
|
| services.microsocks.port | Port on which microsocks should listen.
|
| services.phylactery.port | Listen port for Phylactery
|
| services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| services.mchprs.settings.port | Port for the server
|
| services.omnom.settings.smtp.port | SMTP server port address.
|
| services.pgadmin.emailServer.port | SMTP server port for email delivery
|
| services.gancio.nginx.listen.*.port | Port number to listen on
|
| services.fluidd.nginx.listen.*.port | Port number to listen on
|
| services.akkoma.nginx.listen.*.port | Port number to listen on
|
| services.matomo.nginx.listen.*.port | Port number to listen on
|
| services.monica.nginx.listen.*.port | Port number to listen on
|
| services.magnetico.crawler.port | Port to be used for indexing DHT nodes
|
| services.minetest-server.port | Port number to bind to
|
| services.public-inbox.imap.port | Listening port
|
| services.public-inbox.nntp.port | Listening port
|
| services.snapserver.port | The port that snapclients can connect to.
|
| services.mattermost.port | Port for Mattermost server to listen on.
|
| services.linkwarden.port | The port that Linkwarden will listen on.
|
| services.invidious.port | The port Invidious should listen on
|
| services.public-inbox.http.port | Listening port or systemd's ListenStream= entry
to be used as a reverse proxy, eg. in nginx:
locations."/inbox".proxyPass = "http://unix:${config.services.public-inbox.http.port}:/inbox";
Set to null and use systemd.sockets.public-inbox-httpd.listenStreams
if you need a more advanced listening.
|
| services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| services.sourcehut.lists.port | Port on which the "lists" backend should listen.
|
| services.sourcehut.paste.port | Port on which the "paste" backend should listen.
|
| services.sourcehut.pages.port | Port on which the "pages" backend should listen.
|
| services.jellyseerr.port | The port which the Jellyseerr web UI should listen to.
|
| services.lanraragi.redis.port | Port for LANraragi's Redis server.
|
| services.jupyterhub.port | Port number Jupyterhub will be listening on
|
| services.lubelogger.port | The TCP port LubeLogger will listen on.
|
| services.onlyoffice.port | Port the OnlyOffice document server should listen on.
|
| services.dawarich.redis.port | The port of the redis server Dawarich will connect to
|
| services.journald.gateway.port | The port to listen to.
|
| services.pdfding.database.port | PostgreSQL port
|
| services.toxBootstrapd.port | Listening port (UDP).
|
| services.collabora-online.port | Listening port
|
| services.invidious-router.port | Port to bind to.
|
| services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| services.firewalld.zones.<name>.ports.*.port | |
| services.forgejo.database.port | Database host port.
|
| services.karakeep.browser.port | The port the browser should run on.
|
| services.redmine.database.port | Database host port.
|
| services.firezone.server.api.port | The port under which the api will be served locally
|
| services.crabfit.frontend.port | The internal listening port of the frontend.
|
| services.freeciv.settings.port | Listen for clients on given port
|
| services.firezone.server.smtp.port | Outbound SMTP port
|
| services.sftpgo.settings.smtp.port | Port of the SMTP Server.
|
| services.misskey.settings.port | The port your Misskey server should listen on.
|
| services.trezord.emulator.port | Listening port for the Trezor emulator.
|
| services.sharkey.settings.port | The port that Sharkey will listen on.
|
| services.xonotic.settings.port | The port Xonotic will listen on.
|
| services.journald.remote.port | The port to listen to
|
| services.firezone.server.web.port | The port under which the web interface will be served locally
|
| services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| services.guacamole-server.port | The port the guacd server should listen to.
|
| services.komodo-periphery.port | Port for the Periphery agent to listen on.
|
| services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| services.misskey.settings.db.port | The PostgreSQL port.
|
| services.plausible.server.port | Port where the service should be available.
|
| services.zabbixProxy.database.port | Database host port.
|
| services.invidious.database.port | The port of the database Invidious should use
|
| services.livekit.settings.port | Main TCP port for RoomService and RTC endpoint.
|
| services.snapserver.tcp.port | The port where the TCP JSON-RPC listens on.
|
| services.netbird.server.signal.port | Internal port of the signal server.
|
| services.sourcehut.builds.port | Port on which the "builds" backend should listen.
|
| services.vsmartcard-vpcd.port | Port number vpcd will be listening on.
|
| services.legit.settings.server.port | Legit port.
|
| services.biboumi.settings.port | The TCP port to use to connect to the local XMPP component.
|
| services.pretix.settings.mail.port | Port of the SMTP server to use for mail delivery.
|
| services.kimai.sites.<name>.database.port | Database host port.
|
| services.bitlbee.portNumber | Number of the port BitlBee will be listening to.
|
| services.athens.index.postgres.port | Port for the Postgres database.
|
| services.karma.settings.listen.port | HTTP port to listen on.
|
| services.nipap.settings.nipapd.port | Port to bind nipapd to.
|
| services.pingvin-share.backend.port | The port that the backend service of Pingvin Share will listen to.
|
| services.quassel.portNumber | The port number the Quassel daemon will be listening to.
|
| services.snapserver.http.port | The port where the HTTP JSON-RPC listens on.
|
| services.komga.settings.server.port | The port that Komga will listen on.
|
| services.moodle.virtualHost.listen.*.port | Port to listen on
|
| services.nagios.virtualHost.listen.*.port | Port to listen on
|
| services.prometheus.exporters.frr.port | Port to listen on.
|
| services.prometheus.exporters.nut.port | Port to listen on.
|
| services.prometheus.exporters.pve.port | Port to listen on.
|
| services.prometheus.exporters.kea.port | Port to listen on.
|
| services.prometheus.exporters.sql.port | Port to listen on.
|
| services.prometheus.exporters.lnd.port | Port to listen on.
|
| services.prometheus.exporters.zfs.port | Port to listen on.
|
| services.hedgedoc.settings.port | Port to listen on.
|
| services.meshtasticd.port | Port to listen on
|
| services.whitebophir.port | Port to bind to.
|
| services.redsocks.redsocks.*.port | Port on which redsocks should listen.
|
| services.dolibarr.database.port | Database host port.
|
| services.agorakit.database.port | Database host port.
|
| services.dawarich.database.port | Port of the postgresql server.
|
| services.freshrss.database.port | Database port for FreshRSS.
|
| services.peertube.database.port | Database host port.
|
| services.mastodon.database.port | Database host port.
|
| services.zabbixServer.database.port | Database host port.
|
| services.goatcounter.port | Web interface port.
|
| services.rmfakecloud.port | Listening port number.
|
| services.shadowsocks.port | Port which the server uses.
|
| services.prometheus.exporters.ping.port | Port to listen on.
|
| services.prometheus.exporters.bind.port | Port to listen on.
|
| services.prometheus.exporters.bird.port | Port to listen on.
|
| services.prometheus.exporters.ebpf.port | Port to listen on.
|
| services.prometheus.exporters.php-fpm.port | Port to listen on.
|
| services.prometheus.exporters.knot.port | Port to listen on.
|
| services.prometheus.exporters.flow.port | Port to listen on.
|
| services.prometheus.exporters.ipmi.port | Port to listen on.
|
| services.prometheus.exporters.mqtt.port | Port to listen on.
|
| services.prometheus.exporters.snmp.port | Port to listen on.
|
| services.prometheus.exporters.node.port | Port to listen on.
|
| services.prometheus.exporters.nats.port | Port to listen on.
|
| services.prometheus.exporters.json.port | Port to listen on.
|
| services.prometheus.exporters.mail.port | Port to listen on.
|
| services.adguardhome.port | Port to serve HTTP pages on.
|
| services.dragonflydb.port | The TCP port to accept connections.
|
| services.immichframe.port | The port that ImmichFrame will listen on.
|
| services.lidarr.settings.server.port | Port Number
|
| services.maubot.settings.server.port | The port to listen on
|
| services.radarr.settings.server.port | Port Number
|
| services.spacecookie.port | Port the gopher service should be exposed on.
|
| services.sonarr.settings.server.port | Port Number
|
| services.sillytavern.port | Port on which SillyTavern will listen.
|
| services.zerotierone.port | Network port used by ZeroTier.
|
| services.dependency-track.port | On which port dependency-track should listen for new HTTP connections.
|
| services.drupal.sites.<name>.database.port | Database host port.
|
| services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| services.glance.settings.server.port | Glance port to listen on
|
| services.coturn.max-port | Upper bound of UDP relay endpoints
|
| services.coturn.min-port | Lower bound of UDP relay endpoints
|
| services.misskey.settings.redis.port | The Redis port.
|
| services.sabnzbd.settings.misc.port | Port for the Web UI to listen on for incoming connections.
|
| services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| services.mpdscribble.port | Port for the mpdscribble daemon to search for a mpd daemon on.
|
| services.selfoss.database.port | The database's port
|
| services.agorakit.nginx.listen.*.port | Port number to listen on
|
| services.dolibarr.nginx.listen.*.port | Port number to listen on
|
| services.fediwall.nginx.listen.*.port | Port number to listen on
|
| services.librenms.nginx.listen.*.port | Port number to listen on
|
| services.kanboard.nginx.listen.*.port | Port number to listen on
|
| services.mainsail.nginx.listen.*.port | Port number to listen on
|
| services.pixelfed.nginx.listen.*.port | Port number to listen on
|
| services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| services.librenms.database.port | Port of the MySQL/MariaDB server
|
| services.prometheus.exporters.redis.port | Port to listen on.
|
| services.prometheus.exporters.dmarc.port | Port to listen on.
|
| services.prometheus.exporters.kafka.port | Port to listen on.
|
| services.prometheus.exporters.v2ray.port | Port to listen on.
|
| services.prometheus.exporters.jitsi.port | Port to listen on.
|
| services.prometheus.exporters.nginx.port | Port to listen on.
|
| services.prometheus.exporters.idrac.port | Port to listen on.
|
| services.prometheus.exporters.fritz.port | Port to listen on.
|
| services.ostinato.portList.include | For a port to pass the filter and appear on the port list managed
by drone, it be allowed by this include list.
|
| services.matrix-appservice-irc.port | The port to listen on
|
| services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| services.prometheus.exporters.exportarr-sonarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-bazarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-radarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-lidarr.port | Port to listen on.
|
| services.minidlna.settings.port | Port number for HTTP traffic (descriptions, SOAP, media transfer).
|
| services.prometheus.exporters.node-cert.port | Port to listen on.
|
| services.pingvin-share.frontend.port | The port that the frontend service of Pingvin Share will listen to.
|
| services.sunshine.settings.port | Base port -- others used are offset from this one, see https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port for details.
|
| services.szurubooru.server.port | Port to expose HTTP service.
|
| services.prometheus.sachet.port | The port Sachet will listen to.
|
| services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| services.radicle.httpd.nginx.listen.*.port | Port number to listen on
|
| services.jitsi-meet.excalidraw.port | The port which the Excalidraw backend for Jitsi should listen to.
|
| services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| services.znc.confOptions.networks.<name>.port | IRC server port.
|
| services.readarr.settings.server.port | Port Number
|
| services.coturn.listening-port | TURN listener port for UDP and TCP
|
| services.prometheus.exporters.domain.port | Port to listen on.
|
| services.prometheus.exporters.chrony.port | Port to listen on.
|
| services.prometheus.exporters.restic.port | Port to listen on.
|
| services.prometheus.exporters.tibber.port | Port to listen on.
|
| services.prometheus.exporters.dnssec.port | Port to listen on.
|
| services.prometheus.exporters.pihole.port | Port to listen on.
|
| services.prometheus.exporters.statsd.port | Port to listen on.
|
| services.prometheus.exporters.script.port | Port to listen on.
|
| services.prometheus.exporters.mysqld.port | Port to listen on.
|
| services.prometheus.exporters.deluge.port | Port to listen on.
|
| services.prometheus.exporters.shelly.port | Port to listen on.
|
| services.prometheus.exporters.rspamd.port | Port to listen on.
|
| services.prometheus.exporters.fastly.port | Port to listen on.
|
| services.immich-kiosk.settings.kiosk.port | Port on which immich-kiosk will listen.
|
| services.lighthouse.beacon.port | Port number the Beacon node will be listening on.
|
| services.prometheus.exporters.exportarr-readarr.port | Port to listen on.
|
| services.mailcatcher.http.port | The port address of the http server.
|
| services.mailcatcher.smtp.port | The port address of the smtp server.
|
| services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| services.bookstack.database.port | Database host port.
|
| services.mediawiki.database.port | Database host port.
|
| services.nominatim.database.port | Port of the postgresql database.
|
| services.beanstalkd.listen.port | TCP port that will be used to accept client connections.
|
| services.sftpgo.settings.ftpd.bindings.*.port | The port for serving FTP requests
|
| services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| services.hardware.openrgb.server.port | Set server port of openrgb.
|
| services.firewalld.services.<name>.ports.*.port | |
| services.prometheus.exporters.nvidia-gpu.port | Port to listen on.
|
| services.anuko-time-tracker.nginx.listen.*.port | Port number to listen on
|
| services.cockroachdb.http.port | Port to bind to for http-based Admin UI
|
| services.prometheus.exporters.dmarc.imap.port | Port of the IMAP server to connect to.
|
| services.wstunnel.servers.<name>.listen.port | The port.
|
| services.prometheus.exporters.rtl_433.port | Port to listen on.
|
| services.go-csp-collector.settings.port | The port to listen on.
|
| services.icecream.scheduler.port | Server port to listen for icecream daemon requests.
|
| services.heisenbridge.port | The port to listen on
|
| services.zabbixWeb.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.trickster.proxy-port | Port that the Proxy server will listen on.
|
| services.bookstack.nginx.listen.*.port | Port number to listen on
|
| services.mediagoblin.paste.port | Port under which paste will listen.
|
| services.prometheus.exporters.varnish.port | Port to listen on.
|
| services.prometheus.exporters.postfix.port | Port to listen on.
|
| services.prometheus.exporters.bitcoin.port | Port to listen on.
|
| services.prometheus.exporters.klipper.port | Port to listen on.
|
| services.prometheus.exporters.dnsmasq.port | Port to listen on.
|
| services.prometheus.exporters.libvirt.port | Port to listen on.
|
| services.prometheus.exporters.dovecot.port | Port to listen on.
|
| services.prometheus.exporters.unbound.port | Port to listen on.
|
| services.prometheus.exporters.mongodb.port | Port to listen on.
|
| services.prometheus.exporters.systemd.port | Port to listen on.
|
| services.prometheus.exporters.sabnzbd.port | Port to listen on.
|
| services.prometheus.exporters.process.port | Port to listen on.
|
| services.prometheus.exporters.ecoflow.port | Port to listen on.
|
| services.prometheus.exporters.apcupsd.port | Port to listen on.
|
| services.sftpgo.settings.sftpd.bindings.*.port | The port for serving SFTP requests
|
| services.prometheus.exporters.exportarr-prowlarr.port | Port to listen on.
|
| services.languagetool.port | Port on which LanguageTool listens.
|
| services.sftpgo.settings.httpd.bindings.*.port | The port for serving HTTP(S) requests
|
| services.healthchecks.port | Port the server will listen on.
|
| services.openssh.listenAddresses.*.port | Port to listen to.
|
| services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| services.kubernetes.kubelet.port | Kubernetes kubelet info server listening port.
|
| services.mtprotoproxy.port | TCP port to accept mtproto connections on.
|
| services.prowlarr.settings.server.port | Port Number
|
| services.whisparr.settings.server.port | Port Number
|
| services.lighthouse.beacon.http.port | Port number of Beacon node RPC service.
|
| services.prometheus.exporters.py-air-control.port | Port to listen on.
|
| services.chatgpt-retrieval-plugin.port | Port the chatgpt-retrieval-plugin service listens on.
|
| services.gmediarender.port | Port that will be used to accept client connections.
|
| services.misskey.settings.redisForJobQueue.port | The Redis port.
|
| services.flaresolverr.port | The port on which FlareSolverr will listen for incoming HTTP traffic.
|
| services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| services.prometheus.exporters.mailman3.port | Port to listen on.
|
| services.jirafeau.nginxConfig.listen.*.port | Port number to listen on
|
| services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| services.filesender.database.port | Database port.
|
| services.scanservjs.settings.port | The port to listen on.
|
| services.prometheus.exporters.blackbox.port | Port to listen on.
|
| services.prometheus.exporters.fritzbox.port | Port to listen on.
|
| services.prometheus.exporters.keylight.port | Port to listen on.
|
| services.prometheus.exporters.graphite.port | Port to listen on.
|
| services.prometheus.exporters.influxdb.port | Port to listen on.
|
| services.prometheus.exporters.smartctl.port | Port to listen on.
|
| services.prometheus.exporters.unpoller.port | Port to listen on.
|
| services.prometheus.exporters.nginxlog.port | Port to listen on.
|
| services.prometheus.exporters.mikrotik.port | Port to listen on.
|
| services.prometheus.exporters.opnsense.port | Port to listen on.
|
| services.prometheus.exporters.postgres.port | Port to listen on.
|
| services.prometheus.exporters.collectd.port | Port to listen on.
|
| services.cockroachdb.listen.port | Port to bind to for intra-cluster communication
|
| services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| services.limesurvey.database.port | Database host port.
|
| services.misskey.settings.redisForPubsub.port | The Redis port.
|
| services.mattermost.database.port | Port to use for the database.
|
| services.reposilite.settings.port | The TCP port to bind to.
|
| services.postgresql.settings.port | The port on which PostgreSQL listens.
|
| services.szurubooru.database.port | The port under which PostgreSQL listens to.
|
| services.reposilite.database.port | Database TCP port.
|
| services.linkwarden.database.port | Port of the postgresql server.
|
| services.zabbixWeb.nginx.virtualHost.listen.*.port | Port number to listen on
|
| services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| services.epgstation.settings.port | HTTP port for EPGStation to listen on.
|
| services.discourse.mail.outgoing.port | The port of the SMTP server Discourse should use to
send email.
|
| services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| services.scrutiny.settings.web.listen.port | Port for web application to listen on.
|
| services.prometheus.exporters.imap-mailstat.port | Port to listen on.
|
| services.sftpgo.settings.webdavd.bindings.*.port | The port for serving WebDAV requests
|
| services.homebridge.uiSettings.port | The port the UI web service should listen on
|
| services.mosquitto.listeners.*.port | Port to listen on
|
| services.ostinato.portList.exclude | A list of ports does not appear on the port list managed by drone.
|
| services.snapserver.settings.tcp.port | Port to listen on for snapclient connections.
|
| services.wordpress.sites.<name>.database.port | Database host port.
|
| services.prometheus.exporters.pgbouncer.port | Port to listen on.
|
| services.prometheus.exporters.tailscale.port | Port to listen on.
|
| services.prometheus.exporters.surfboard.port | Port to listen on.
|
| services.prometheus.exporters.rasdaemon.port | Port to listen on.
|
| services.prometheus.exporters.nextcloud.port | Port to listen on.
|
| services.prometheus.exporters.smokeping.port | Port to listen on.
|
| services.prometheus.exporters.borgmatic.port | Port to listen on.
|
| services.prometheus.exporters.wireguard.port | Port to listen on.
|
| services.prometheus.exporters.junos-czerwonk.port | Port to listen on.
|
| services.endlessh-go.prometheus.port | Specifies on which port the endlessh-go daemon listens for Prometheus
queries.
|
| security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| services.torrentstream.port | TorrentStream port.
|
| services.coturn.alt-tls-listening-port | Alternative listening port for TLS and DTLS protocols.
|
| services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| services.parsedmarc.settings.imap.port | The IMAP server port.
|
| services.parsedmarc.settings.smtp.port | The SMTP server port.
|
| services.trickster.metrics-port | Port that the /metrics endpoint will listen on.
|
| services.aria2.settings.listen-port | Set UDP listening port range used by DHT(IPv4, IPv6) and UDP tracker.
|
| programs.proxychains.proxies.<name>.port | Proxy port
|
| services.keter.globalKeterConfig.listeners.*.port | port
|
| services.snapserver.settings.http.port | Port to listen on for snapclient connections.
|
| services.matrix-alertmanager.port | Port that matrix-alertmanager listens on.
|
| services.matrix-appservice-discord.port | Port number on which the bridge should listen for internal communication with the Matrix homeserver.
|
| services.netbird.server.management.port | Internal port of the management server.
|
| services.elasticsearch.port | Elasticsearch port to listen for HTTP traffic.
|
| services.kubernetes.scheduler.port | Kubernetes scheduler listening port.
|
| services.heisenbridge.identd.port | identd listen port
|
| services.filebrowser.settings.port | The port to listen on.
|
| services.lighthouse.beacon.metrics.port | Port number of Beacon node metrics service.
|
| services.taskchampion-sync-server.port | Port on which to serve
|
| services.suwayomi-server.settings.server.port | The port that Suwayomi will listen to.
|
| services.limesurvey.virtualHost.listen.*.port | Port to listen on
|
| services.mollysocket.settings.port | Listening port of the web server
|
| services.prometheus.exporters.buildkite-agent.port | Port to listen on.
|
| services.aria2.settings.rpc-listen-port | Specify a port number for JSON-RPC/XML-RPC server to listen to
|
| services.mediawiki.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.writefreely.database.port | The port used when connecting to the database host.
|
| services.prometheus.exporters.scaphandre.port | Port to listen on.
|
| services.prometheus.exporters.storagebox.port | Port to listen on.
|
| services.wasabibackend.rpc.port | Port for RPC connection to bitcoind.
|
| services.grafana_reporter.port | Listening port.
|
| services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| services.coturn.alt-listening-port | Alternative listening port for UDP and TCP listeners;
default (or zero) value means "listening port plus one"
|
| services.rabbitmq.managementPlugin.port | On which port to run the management plugin
|
| services.mqtt2influxdb.mqtt.port | MQTT server port.
|
| services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| services.kubernetes.kubelet.healthz.port | Kubernetes kubelet healthz port.
|
| services.keycloak.settings.http-port | On which port Keycloak should listen for new HTTP connections.
|
| services.homebridge.settings.bridge.port | The port homebridge listens on
|
| services.snapserver.settings.stream.port | Port to listen on for snapclient connections.
|
| services.listmonk.database.settings.smtp.*.port | Port for the SMTP server
|
| services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| services.trickster.profiler-port | Port that the /debug/pprof endpoint will listen on.
|
| services.firefox-syncserver.settings.port | Port to bind to.
|
| services.keycloak.settings.https-port | On which port Keycloak should listen for new HTTPS connections.
|
| xdg.portal.enable | Whether to enable xdg desktop integration.
|
| services.matrix-continuwuity.settings.global.port | The port(s) continuwuity will be running on
|
| services.armagetronad.servers.<name>.port | Port to listen on
|
| services.prometheus.exporters.artifactory.port | Port to listen on.
|
| services.misskey.settings.redisForTimelines.port | The Redis port.
|
| services.opensearch.settings."transport.port" | The port to listen on for transport traffic.
|
| services.limesurvey.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.szurubooru.server.settings.smtp.port | Port of the SMTP server.
|
| security.acme.defaults.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| services.audiobookshelf.port | The TCP port Audiobookshelf will listen on.
|
| services.snapserver.settings.tcp-control.port | Port to listen on for snapclient connections.
|
| services.coturn.tls-listening-port | TURN listener port for TLS
|
| services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| services.firewalld.zones.<name>.sourcePorts.*.port | |
| services.writefreely.settings.server.port | The port WriteFreely should listen on.
|
| services.matrix-synapse.settings.listeners.*.port | The port to listen for HTTP(S) requests on.
|
| services.elasticsearch-curator.port | the port that elasticsearch is listening on
|
| services.botamusique.settings.server.port | Port of the mumble server to connect to.
|
| services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| services.lighthouse.beacon.execution.port | Port number the Beacon node will be listening on for the execution layer.
|
| services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| services.limesurvey.nginx.virtualHost.listen.*.port | Port number to listen on
|
| services.grafana_reporter.grafana.port | Grafana port.
|
| virtualisation.forwardPorts.*.host.port | The host port to be mapped.
|
| services.prometheus.exporters.modemmanager.port | Port to listen on.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.port | External port number.
|
| services.suricata.settings.vars.port-groups | The port group variables for suricata.
|
| services.sourcehut.settings.mail.smtp-port | Outgoing SMTP port.
|
| services.misskey.settings.meilisearch.port | The Meilisearch port.
|
| services.lighthouse.validator.metrics.port | Port number of Validator node metrics service.
|
| services.grafana-image-renderer.settings.service.port | The TCP port to use for the rendering server.
|
| services.firewalld.zones.<name>.forwardPorts.*.port | |
| virtualisation.forwardPorts.*.guest.port | The guest port to be mapped.
|
| services.mastodon.elasticsearch.port | Elasticsearch port.
|
| services.sourcehut.settings."hg.sr.ht".debug-port | Port to bind the debug server to.
|
| services.postgrest.settings.server-port | The TCP port to bind the web server.
|
| services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| services.vsftpd.portPromiscuous | Set to YES if you want to disable the PORT security check that ensures that
outgoing data connections can only connect to the client
|
| services.opensearch.settings."http.port" | The port to listen on for HTTP traffic.
|
| services.mqtt2influxdb.influxdb.port | InfluxDB server port
|
| services.sourcehut.settings."hub.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."git.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."man.sr.ht".debug-port | Port to bind the debug server to.
|
| services.bitmagnet.settings.dht_server.port | DHT listen port
|
| services.wasabibackend.endpoint.port | Port for P2P connection to bitcoind.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.port | Listener port number
|
| services.invoiceplane.sites.<name>.database.port | Database host port.
|
| services.vwifi.server.ports.spy | The spy interface port
|
| services.vwifi.server.ports.tcp | The TCP server port
|
| networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| services.changedetection-io.port | Port the server will listen on.
|
| services.sourcehut.settings."meta.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."todo.sr.ht".debug-port | Port to bind the debug server to.
|
| services.snapserver.settings.tcp-streaming.port | Port to listen on for snapclient connections.
|
| services.bitwarden-directory-connector-cli.ldap.port | Port LDAP is accessible on.
|
| services.typesense.settings.server.api-port | Port on which the Typesense API service listens.
|
| services.seafile.seafileSettings.fileserver.port | The tcp port used by seafile fileserver.
|
| services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| services.prometheus.alertmanager.port | Port to listen on for the web interface and API.
|
| users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| services._3proxy.services.*.type | Service type
|
| services.sourcehut.settings."paste.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."pages.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."lists.sr.ht".debug-port | Port to bind the debug server to.
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.port | Port number to listen on
|
| virtualisation.podman.networkSocket.port | TCP port number for receiving TLS connections.
|
| services.headscale.settings.database.postgres.port | Database host port.
|
| services.firewalld.services.<name>.sourcePorts.*.port | |
| services.bitmagnet.settings.http_server.port | HTTP server listen port
|
| services.lasuite-docs.collaborationServer.port | Port used by the collaboration server to listen.
|
| services.vwifi.server.ports.vhost | The vhost port
|
| services.croc.ports | Ports of the relay.
|
| services.postgrest.settings.admin-server-port | Specifies the port for the admin server, which can be used for healthchecks.
https://docs.postgrest.org/en/stable/references/admin_server.html#admin-server
|
| xdg.portal.lxqt.styles | Extra Qt styles that will be available to the
lxqt.xdg-desktop-portal-lxqt.
|
| services.sourcehut.settings."builds.sr.ht".debug-port | Port to bind the debug server to.
|
| services.transmission.settings.peer-port-random-low | The minimal peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.transmission.settings.peer-port-random-high | The maximum peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.libretranslate.port | The the application should listen on.
|
| services.prometheus.alertmanagerGotify.port | The local port the bridge is listening on.
|
| services.zapret.httpSupport | Whether to route http traffic on port 80
|
| services.mympd.settings.http_port | The HTTP port where mympd's web interface will be available
|
| services.statsd.mgmt_port | Port to run the management TCP interface on
|
| services.transmission.settings.rpc-port | The RPC port to listen to.
|
| services.prometheus.exporters.collectd.collectdBinary.port | Network address on which to accept collectd binary network packets.
|
| services.prometheus.exporters.mail.configuration.servers.*.port | Port to use for SMTP.
|
| services.transmission.settings.peer-port | The peer port to listen for incoming connections.
|
| xdg.portal.wlr.enable | Whether to enable desktop portal for wlroots-based desktops
|
| services.nsd.reuseport | Whether to enable SO_REUSEPORT on all used sockets
|
| services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| services.vwifi.server.ports.control | The control interface port
|
| xdg.portal.lxqt.enable | Whether to enable the desktop portal for the LXQt desktop environment
|
| services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| services.nextcloud.config.objectstore.s3.port | Required for some non-Amazon implementations.
|
| services.gitea.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| boot.loader.grub.zfsSupport | Whether GRUB should be built against libzfs.
|
| boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| boot.loader.grub.efiSupport | Whether GRUB should be built with EFI support.
|
| boot.initrd.luks.gpgSupport | Enables support for authenticating with a GPG encrypted password.
|
| services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| services.livekit.settings.rtc.port_range_start | Start of UDP port range for WebRTC
|
| services.ax25.axports | Specification of one or more AX.25 ports.
|
| programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| services.portunus.user | User account under which Portunus runs its webserver.
|
| services.transmission.settings.peer-port-random-on-start | Randomize the peer port.
|
| services.livekit.settings.rtc.port_range_end | End of UDP port range for WebRTC
|
| services.forgejo.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.cjdns.admin.bind | Bind the administration port to this address and port.
|
| services.prometheus.alertmanagerGotify.gotifyEndpoint.port | The port your gotify endpoint is running.
|
| xdg.portal.wlr.settings | Configuration for xdg-desktop-portal-wlr
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Web.Endpoint".http.port | The port to run the server
|
| services.portunus.group | Group account under which Portunus runs its webserver.
|
| boot.initrd.luks.fido2Support | Enables support for authenticating with FIDO2 devices.
|
| services.lldap.settings.ldap_port | The port on which to have the LDAP server.
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port | The port number used if the query type is not SRV.
|
| services.openssh.ports | Specifies on which ports the SSH daemon listens.
|
| xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| services.portunus.stateDir | Path where Portunus stores its state.
|
| services.networking.websockify.portMap | Ports to map by default.
|
| services.lldap.settings.http_port | The port on which to have the HTTP server, for user login and administration.
|
| services.umurmur.settings.bindport | Port to bind to (UDP and TCP).
|
| boot.loader.limine.efiSupport | Whether or not to install the limine EFI files.
|
| services.aria2.openPorts | Open listen and RPC ports found in settings.listen-port and
settings.rpc-listen-port options in the firewall.
|
| services.portunus.ldap.user | User account under which Portunus runs its LDAP server.
|
| hardware.facter.report | Hardware report data generated by nixos-facter
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| boot.loader.limine.biosSupport | Whether or not to install limine for BIOS.
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| services.portunus.seedPath | Path to a portunus seed file in json format
|
| services.prometheus.exporters.exportarr-radarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-lidarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-bazarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-sonarr.openFirewall | Open port in firewall for incoming connections.
|
| services.portunus.domain | Subdomain which gets reverse proxied to Portunus webserver.
|
| services.nvme-rs.settings.email.smtp_port | SMTP server port
|
| services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| services.hitch.backend | The host and port Hitch connects to when receiving
a connection in the form [HOST]:PORT
|
| services.akkoma.dist.epmdPort | TCP port to bind Erlang Port Mapper Daemon to.
|
| services.prometheus.exporters.exportarr-readarr.openFirewall | Open port in firewall for incoming connections.
|
| services.portunus.ldap.group | Group account under which Portunus runs its LDAP server.
|
| services.tuned.ppdSupport | Whether to enable translation of power-profiles-daemon API calls to TuneD.
|
| xdg.portal.extraPortals | List of additional portals to add to path
|
| services.portunus.package | The portunus package to use.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| boot.zfs.forceImportRoot | Forcibly import the ZFS root pool(s) during early boot
|
| services.prometheus.exporters.exportarr-prowlarr.openFirewall | Open port in firewall for incoming connections.
|
| services.mtr-exporter.jobs | List of MTR jobs
|
| services.haven.importRelays | List of relay configurations for importing historical events
|
| xdg.portal.configPackages | List of packages that provide XDG desktop portal configuration, usually in
the form of share/xdg-desktop-portal/$desktop-portals.conf
|
| services.teleport.diag.addr | Metrics and diagnostics address.
|
| services.nbd.server.listenPort | Port to listen on
|
| services.nbd.server.exports | Files or block devices to make available over the network.
|
| services.hitch.frontend | The port and interface of the listen endpoint in the
form [HOST]:PORT[+CERT].
|
| services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| services.synergy.client.serverAddress | The server address is of the form: [hostname][:port]
|
| services.zapret.udpSupport | Enable UDP routing
|
| services.teleport.enable | Whether to enable the Teleport service.
|
| services.livekit.ingress.settings.rtc_config.port_range_start | Start of UDP port range for WebRTC
|
| services.i2pd.inTunnels.<name>.inPort | Service port
|
| services.youtrack.environmentalParameters.listen-port | The port YouTrack will listen on.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| services.nfs.server.exports | Contents of the /etc/exports file
|
| services.prometheus.exporters.exportarr-lidarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-bazarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-radarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-sonarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.portunus.ldap.package | The openldap package to use.
|
| services.prometheus.exporters.mqtt.mqttPort | TCP port of MQTT broker.
|
| services.documize.forcesslport | Redirect given http port number to TLS.
|
| services.diod.exportopts | Establish a default set of export options
|
| services.mtr-exporter.enable | Whether to enable a Prometheus exporter for MTR.
|
| services.grafana.settings.server.http_port | Listening port.
|
| services.ax25.axports.<name>.window | Default window size for this interface.
|
| services.nixseparatedebuginfod.port | port to listen
|
| services.mtr-exporter.jobs.*.flags | Additional flags to pass to MTR.
|
| services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.portunus.ldap.suffix | The DN of the topmost entry in your LDAP directory
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| services.prometheus.exporters.exportarr-readarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.jitsi.url | Jitsi Videobridge metrics URL to monitor
|
| services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| services.vwifi.client.serverPort | The server port port
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.teleport.package | The teleport package to use.
|
| services.slskd.openFirewall | Whether to open the firewall for the soulseek network listen port (not the web interface port).
|
| services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| services.portunus.dex.oidcClients.*.id | ID of the OIDC client
|
| hardware.facter.reportPath | Path to a hardware report generated by nixos-facter
|
| services.buildbot-master.pbPort | The buildmaster will listen on a TCP port of your choosing
for connections from workers
|
| services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| services.livekit.ingress.settings.rtc_config.port_range_end | End of UDP port range for WebRTC
|
| services.athens.traceExporter | Trace exporter to use.
|
| services.athens.statsExporter | Stats exporter to use.
|
| services.prometheus.exporters.exportarr-lidarr.enable | Whether to enable the prometheus exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-bazarr.enable | Whether to enable the prometheus exportarr-bazarr exporter.
|
| services.prometheus.exporters.exportarr-sonarr.enable | Whether to enable the prometheus exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.enable | Whether to enable the prometheus exportarr-radarr exporter.
|
| services.biboumi.settings.identd_port | The TCP port on which to listen for identd queries.
|
| services.livekit.ingress.settings.rtmp_port | TCP port for RTMP connections
|
| services.livekit.ingress.settings.whip_port | TCP port for WHIP connections
|
| services.prometheus.exporters.exportarr-readarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| services.mtr-exporter.address | Listen address for MTR exporter.
|
| services.mtr-exporter.package | The mtr-exporter package to use.
|
| services.mtr-exporter.extraFlags | Extra command line options to pass to MTR exporter.
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| services.prometheus.exporters.exportarr-prowlarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.nbd.server.exports.<name>.path | File or block device to export.
|
| services.portunus.dex.enable | Whether to enable Dex ldap connector
|
| services.prometheus.exporters.bitcoin.rpcPort | RPC port number.
|
| services.prometheus.exporters.exportarr-bazarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-sonarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-lidarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-radarr.package | The exportarr package to use.
|
| services.hickory-dns.settings.listen_port | Port to listen on (applies to all listen addresses).
|
| services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| services.prometheus.exporters.exportarr-bazarr.extraFlags | Extra commandline options to pass to the exportarr-bazarr exporter.
|
| services.prometheus.exporters.exportarr-sonarr.extraFlags | Extra commandline options to pass to the exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-lidarr.extraFlags | Extra commandline options to pass to the exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.extraFlags | Extra commandline options to pass to the exportarr-radarr exporter.
|
| services.mtr-exporter.mtrPackage | The mtr package to use.
|
| services.shairport-sync.user | User account name under which to run shairport-sync
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port | The port to scrape metrics from
|
| services.elasticsearch.tcp_port | Elasticsearch port for the node to node communication.
|
| security.ipa.chromiumSupport | Whether to whitelist the FreeIPA domain in Chromium.
|
| services.teleport.diag.enable | Whether to enable endpoints for monitoring purposes
|
| services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-readarr.enable | Whether to enable the prometheus exportarr-readarr exporter.
|
| services.nixseparatedebuginfod2.port | port to listen
|
| services.portunus.seedSettings | Seed settings for users and groups
|
| services.tor.settings.ServerTransportPlugin.transports | List of pluggable transports.
|
| services.jack.alsa.support32Bit | Whether to support sound for 32-bit ALSA applications on 64-bit system.
|
| services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| services.athens.traceExporterURL | URL endpoint that traces will be sent to.
|
| services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| <imports = [ pkgs.php.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.prometheus.exporters.exportarr-readarr.package | The exportarr package to use.
|
| services.portunus.ldap.searchUserName | The login name of the search user
|
| services.prometheus.exporters.deluge.delugePort | Port where deluge server is listening.
|
| services.prometheus.exporters.exportarr-readarr.extraFlags | Extra commandline options to pass to the exportarr-readarr exporter.
|
| services.prometheus.exporters.pihole.piholePort | The port Pi-Hole webinterface is reachable on
|
| services.diod.exportall | Export all file systems listed in /proc/mounts
|
| services.shairport-sync.group | Group account name under which to run shairport-sync
|
| services.prometheus.exporters.exportarr-prowlarr.enable | Whether to enable the prometheus exportarr-prowlarr exporter.
|
| services.prometheus.exporters.sql.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nut.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.frr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kea.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.zfs.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pve.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.lnd.openFirewall | Open port in firewall for incoming connections.
|
| services.home-assistant.config.http.server_port | The port on which to listen.
|
| services.mtr-exporter.jobs.*.address | Target address for MTR client.
|
| services.cassandra.jmxPort | Specifies the default port over which Cassandra will be available for
JMX connections
|
| services.pixiecore.statusPort | HTTP port for status information (can be the same as --port)
|
| services.prometheus.exporters.exportarr-radarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-lidarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-sonarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-bazarr.listenAddress | Address to listen on.
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| services.moosefs.master.exports | Export definitions for MooseFS (see mfsexports.cfg).
|
| services.prometheus.exporters.exportarr-prowlarr.package | The exportarr package to use.
|
| services.prometheus.exporters.ipmi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.knot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bind.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mail.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bird.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.flow.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.php-fpm.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ebpf.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mqtt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nats.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.snmp.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ping.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.json.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.node.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-prowlarr.extraFlags | Extra commandline options to pass to the exportarr-prowlarr exporter.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port | The port to scrape metrics from
|
| services.quickwit.settings.rest.listen_port | The port to listen on for HTTP REST traffic.
|
| services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| services.gitDaemon.exportAll | Publish all directories that look like Git repositories (have the objects
and refs subdirectories), even if they do not have the git-daemon-export-ok file
|
| services.saunafs.master.exports | Paths to exports file (see sfsexports.cfg(5)).
|
| services.sks.hkpPort | HKP port to listen on.
|
| services.pdns-recursor.exportHosts | Whether to export names and IP addresses defined in /etc/hosts.
|
| services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| services.prometheus.exporters.exportarr-readarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dmarc.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.v2ray.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.idrac.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kafka.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginx.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.jitsi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.redis.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritz.openFirewall | Open port in firewall for incoming connections.
|
| services.slskd.settings.soulseek.listen_port | The port on which to listen for incoming connections.
|
| services.oauth2-proxy.httpAddress | HTTPS listening address
|
| services.davis.nginx.reuseport | Create an individual listening socket
|
| services.slskd.nginx.reuseport | Create an individual listening socket
|
| services.movim.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| services.uptime-kuma.appriseSupport | Whether to enable apprise support for notifications.
|
| services.prometheus.exporters.opnsense.enabledExporter | Collectors to enable or disable
|
| services.prometheus.exporters.ecoflow.exporterType | The type of exporter you'd like to use
|
| services.prometheus.exporters.exportarr-sonarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-sonarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-lidarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-lidarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-bazarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-bazarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-radarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-radarr.openFirewall is true.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| services.tlsrpt.reportd.extraFlags | List of extra flags to pass to the tlsrpt-reportd executable
|
| services.peertube.listenWeb | The public-facing port that PeerTube will be accessible at (likely 80 or 443 if running behind a reverse proxy)
|
| i18n.inputMethod.fcitx5.plasma6Support | Use qt6 versions of fcitx5 packages
|
| services.postfix.transport | Entries for the transport map, cf. man-page transport(5).
|
| services.snipe-it.nginx.reuseport | Create an individual listening socket
|
| services.portunus.dex.oidcClients | List of OIDC clients
|
| services.firefly-iii-data-importer.user | User account under which firefly-iii-data-importer runs.
|
| services.shairport-sync.package | The shairport-sync package to use.
|
| services.thinkfan.smartSupport | Whether to build thinkfan with S
|
| services.prometheus.exporters.fastly.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.statsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.rspamd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tibber.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.script.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnssec.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.deluge.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mysqld.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.restic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.chrony.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pihole.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.shelly.openFirewall | Open port in firewall for incoming connections.
|
| services.resilio.listeningPort | Listening port
|
| services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| services.shairport-sync.enable | Enable the shairport-sync daemon
|
| services.prometheus.exporters.exportarr-prowlarr.listenAddress | Address to listen on.
|
| services.teleport.settings | Contents of the teleport.yaml config file
|
| services.prometheus.exporters.dnssec.listenAddress | Listen address as host IP and port definition.
|
| services.prometheus.exporters.exportarr-readarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-readarr.openFirewall is true.
|
| services.prometheus.exporters.nvidia-gpu.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.opnsense.disabledExporter | Collectors to enable or disable
|
| services.firefly-iii-data-importer.dataDir | The place where firefly-iii data importer stores its state.
|
| services.mediatomb.ps3Support | Whether to enable ps3 specific tweaks
|
| services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| services.gancio.nginx.reuseport | Create an individual listening socket
|
| services.fluidd.nginx.reuseport | Create an individual listening socket
|
| services.akkoma.nginx.reuseport | Create an individual listening socket
|
| services.matomo.nginx.reuseport | Create an individual listening socket
|
| services.monica.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.rtl_433.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-radarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-radarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-lidarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-lidarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-sonarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-sonarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-bazarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-bazarr.openFirewall
is true
|
| services.prometheus.exporters.systemd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.gatewayPort | The port of the FRITZ!Box UPnP service.
|
| services.prometheus.exporters.klipper.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dovecot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postfix.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.varnish.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.libvirt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bitcoin.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.process.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.apcupsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mongodb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.sabnzbd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnsmasq.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.unbound.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ecoflow.openFirewall | Open port in firewall for incoming connections.
|
| services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| services.mtr-exporter.jobs.*.schedule | Schedule of MTR checks
|
| services.outline.maximumImportSize | The maximum size of document imports
|
| services.mediatomb.dsmSupport | Whether to enable D-Link DSM 320 specific tweaks
|
| services.wgautomesh.settings.gossip_port | wgautomesh gossip port, this MUST be the same number on all nodes in
the wgautomesh network.
|
| services.displayManager.ly.x11Support | Whether to enable support for X11
|
| services.photoprism.importPath | Relative or absolute to the originalsPath from where the files should be imported.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port | The port to scrape metrics from
|
| services.diod.exports | List the file systems that clients will be allowed to mount
|
| services.prometheus.exporters.exportarr-prowlarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-prowlarr.openFirewall is true.
|
| services.hebbot.templates.report | A path to the Markdown file for the report template.
|
| services.mediatomb.tg100Support | Whether to enable Telegent TG100 specific tweaks.
|
| services.prometheus.exporters.py-air-control.openFirewall | Open port in firewall for incoming connections.
|
| programs.hyprland.portalPackage | The xdg-desktop-portal-hyprland package to use
|
| services.prometheus.exporters.exportarr-readarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-readarr.openFirewall
is true
|
| services.redsocks.redsocks | Local port to proxy associations to be performed
|
| services.prometheus.exporters.exportarr-sonarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-lidarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-bazarr.environment | See the configuration guide for available options.
|
| services.tailscale.derper.stunPort | STUN port to listen on
|
| services.prometheus.exporters.mailman3.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.graphite.graphitePort | Port to use for the graphite server.
|
| services.firefly-iii-data-importer.enable | Whether to enable Firefly III Data Importer.
|
| services.prometheus.exporters.unpoller.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.collectd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginxlog.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mikrotik.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.influxdb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.graphite.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smartctl.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postgres.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.blackbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.opnsense.openFirewall | Open port in firewall for incoming connections.
|
| services.ympd.webPort | The port where ympd's web interface will be available.
|
| services.syncthing.relay.statusPort | Port to listen on for serving the relay status API
|
| services.firefly-iii-data-importer.group | Group under which firefly-iii-data-importer runs
|
| services.buildbot-master.extraImports | Extra python imports to prepend to master.cfg
|
| services.prometheus.exporters.exportarr-readarr.environment | See the configuration guide for available options.
|
| services.qbittorrent.webuiPort | the port passed to qbittorrent via --webui-port
|
| services.prometheus.exporters.exportarr-prowlarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-prowlarr.openFirewall
is true
|
| services.warpgate.settings.ssh.external_port | The SSH listener is reachable via this port externally.
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| programs.gnupg.agent.enableSSHSupport | Enable SSH agent support in GnuPG agent
|
| services.earlyoom.reportInterval | Interval (in seconds) at which a memory report is printed (set to 0 to disable).
|
| services.autossh.sessions.*.extraArguments | Arguments to be passed to AutoSSH and retransmitted to SSH
process
|
| services.prometheus.exporters.imap-mailstat.openFirewall | Open port in firewall for incoming connections.
|
| services.pipewire.alsa.support32Bit | Whether to enable 32-bit ALSA support on 64-bit systems.
|
| services.warpgate.settings.http.external_port | The HTTP listener is reachable via this port externally.
|
| services.portunus.dex.oidcClients.*.callbackURL | URL where the OIDC client should redirect
|
| services.deluge.openFirewall | Whether to open the firewall for the ports in
services.deluge.config.listen_ports
|
| services.shairport-sync.openFirewall | Whether to automatically open ports in the firewall.
|
| services.nextcloud.settings.mail_smtpport | This depends on mail_smtpmode
|
| services.prometheus.exporters.chrony.chronyServerAddress | ChronyServerAddress of the chrony server side command port. (Not enabled by default.)
Defaults to the local unix socket.
|
| services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| services.prometheus.exporters.exportarr-prowlarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.rasdaemon.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.wireguard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nextcloud.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.borgmatic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smokeping.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.junos-czerwonk.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.surfboard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tailscale.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pgbouncer.openFirewall | Open port in firewall for incoming connections.
|
| services.grafana.settings.security.strict_transport_security_subdomains | Set to true to enable HSTS includeSubDomains option
|
| services.warpgate.settings.mysql.external_port | The MySQL listener is reachable via this port externally.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| services.firewalld.services.<name>.ports | Ports of the service.
|
| services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| services.deconz.wsPort | TCP port for the WebSocket.
|
| services.nifi.proxyPort | Allow requests from a specific port.
|
| services.rqbit.httpPort | The listen port for the HTTP API.
|
| nix.buildMachines.*.supportedFeatures | A list of features supported by this builder
|
| services.shairport-sync.settings | Configuration options for Shairport-Sync
|
| services.fediwall.nginx.reuseport | Create an individual listening socket
|
| services.kanboard.nginx.reuseport | Create an individual listening socket
|
| services.dolibarr.nginx.reuseport | Create an individual listening socket
|
| services.librenms.nginx.reuseport | Create an individual listening socket
|
| services.agorakit.nginx.reuseport | Create an individual listening socket
|
| services.mainsail.nginx.reuseport | Create an individual listening socket
|
| services.pixelfed.nginx.reuseport | Create an individual listening socket
|
| services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| services.prometheus.exporters | Prometheus exporter configuration
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.package | PHP package to use for php-fpm
|
| services.prometheus.exporters.nginxlog.settings | All settings of nginxlog expressed as an Nix attrset
|
| services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| services.prometheus.exporters.pgbouncer.webSystemdSocket | Use systemd socket activation listeners instead of port listeners (Linux only).
|
| services.mattermost.socket.export | Whether to enable Export socket control to system environment variables.
|
| services.consul.webUi | Enables the web interface on the consul http port.
|
| services.caddy.httpPort | The default port to listen on for HTTP traffic.
|
| networking.nat.forwardPorts.*.sourcePort | Source port of the external interface; to specify a port range, use a string with a colon (e.g. "60000:61000")
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.prometheus.exporters.buildkite-agent.openFirewall | Open port in firewall for incoming connections.
|
| services.nezha-agent.settings.report_delay | The interval between system status reportings
|
| services.paperless.exporter.enable | Whether to enable regular automatic document exports.
|
| services.grafana.settings.security.strict_transport_security_max_age_seconds | Sets how long a browser should cache HSTS in seconds
|
| services.shairport-sync.arguments | Arguments to pass to the daemon
|
| services.prometheus.exporters.storagebox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.scaphandre.openFirewall | Open port in firewall for incoming connections.
|
| services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| hardware.amdgpu.amdvlk.support32Bit.enable | Whether to enable 32-bit driver support.
|
| services.cloudflare-warp.udpPort | The UDP port to open in the firewall
|
| services.pgbouncer.settings.pgbouncer.listen_port | Which port to listen on
|
| services.radicle.httpd.nginx.reuseport | Create an individual listening socket
|
| services.hound.listen | Listen on this [IP]:port
|
| services.memcached.enableUnixSocket | Whether to enable Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port
|
| services.firefly-iii-data-importer.poolConfig | Options for the Firefly III Data Importer PHP pool
|
| services.broadcast-box.web.openFirewall | Whether to enable opening the HTTP server port and, if enabled, the HTTPS redirect server
port in the firewall.
.
|
| hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| services.galene.httpPort | HTTP listen port.
|
| services.bind.listenOnPort | Port to listen on.
|
| hardware.amdgpu.amdvlk.support32Bit.package | The amdvlk package to use.
|
| services.anuko-time-tracker.nginx.reuseport | Create an individual listening socket
|
| hardware.amdgpu.legacySupport.enable | Whether to enable using amdgpu kernel driver instead of radeon for Southern Islands
(Radeon HD 7000) series and Sea Islands (Radeon HD 8000)
series cards
|
| boot.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| hardware.facter.detected.uefi.supported | Whether to enable the facter uefi module.
|
| services.firewalld.zones.<name>.ports.*.protocol | |
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port | The port to scrape metrics from
|
| services.deconz.httpPort | TCP port for the web server.
|
| services.rqbit.peerPort | The port to listen for incoming BitTorrent peer connections (TCP and uTP).
|
| services.squid.proxyPort | TCP port on which squid will listen.
|
| services.warpgate.settings.postgres.external_port | The PostgreSQL listener is reachable via this port externally.
|
| services.bookstack.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.artifactory.openFirewall | Open port in firewall for incoming connections.
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.settings | PHP FPM configuration
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| services.ax25.axports.<name>.description | Free format description of this interface.
|
| services.firefly-iii-data-importer.virtualHost | The hostname at which you wish firefly-iii-data-importer to be served
|
| services.pulseaudio.support32Bit | Whether to include the 32-bit pulseaudio libraries in the system or not
|
| services.nexus.listenPort | Port to listen on.
|
| services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| services.prometheus.exporters.flow.asn | The ASN being monitored.
|
| services.matrix-synapse.settings.report_stats | Whether or not to report anonymized homeserver usage statistics.
|
| services.prometheus.exporters.nats.url | NATS monitor endpoint to query.
|
| services.ntopng.httpPort | Sets the HTTP port of the embedded web server.
|
| services.nifi.listenPort | Bind to a port for Apache NiFi web-ui.
|
| services.ncps.server.addr | The address and port the server listens on.
|
| services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| services.anuko-time-tracker.settings.reportFooter | Defines whether to use a footer on reports.
|
| services.jirafeau.nginxConfig.reuseport | Create an individual listening socket
|
| services.firefly-iii-data-importer.package | The firefly-iii-data-importer package served by php-fpm and the webserver of choice
|
| services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| services.grafana.settings.analytics.reporting_enabled | When enabled Grafana will send anonymous usage statistics to stats.grafana.org
|
| services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| services.unpoller.prometheus.report_errors | Whether to report errors.
|
| services.paperless.exporter.settings | Settings to pass to the document exporter as CLI arguments.
|
| services.teamspeak3.defaultVoicePort | Default UDP port for clients to connect to virtual servers - used for first virtual server, subsequent ones will open on incrementing port numbers by default.
|
| services.bind.listenOnIpv6Port | Ipv6 port to listen on.
|
| services.bosun.influxHost | Host and port of the influxdb database.
|
| services.athens.pprofPort | Port number for pprof endpoints.
|
| services.mailhog.uiPort | Port on which the HTTP UI will listen.
|
| services.zabbixWeb.nginx.virtualHost.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.modemmanager.openFirewall | Open port in firewall for incoming connections.
|
| services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| services.ncps.analytics.reporting.enable | Enable reporting anonymous usage statistics (DB type, Lock type, Total Size) to the project maintainers.
|
| services.tlsrpt.reportd.settings.fetchers | Comma-separated list of fetcher programs that retrieve collectd data.
|
| services.firefly-iii-data-importer.enableNginx | Whether to enable nginx or not
|
| services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| services.prometheus.exporters.sql.group | Group under which the sql exporter shall be run.
|
| services.prometheus.exporters.nut.group | Group under which the nut exporter shall be run.
|
| services.prometheus.exporters.kea.group | Group under which the kea exporter shall be run.
|
| services.prometheus.exporters.pve.group | Group under which the pve exporter shall be run.
|
| services.prometheus.exporters.zfs.group | Group under which the zfs exporter shall be run.
|
| services.prometheus.exporters.lnd.group | Group under which the lnd exporter shall be run.
|
| services.prometheus.exporters.lnd.lndTlsPath | Path to lnd TLS certificate.
|
| services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| services.tor.settings.ServerTransportPlugin | See torrc manual.
|
| services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| services.polipo.proxyPort | TCP port on which Polipo will listen.
|
| services.go-neb.bindAddress | Port (and optionally address) to listen on.
|
| services.mailhog.apiPort | Port on which the API endpoint will listen.
|
| <imports = [ pkgs.ghostunnel.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.radicle.ci.broker.settings.report_dir | Directory where HTML and JSON report pages are written.
|
| services.prometheus.exporters.flow.topic | The Kafka topic to consume from.
|
| services.quickwit.settings.grpc_listen_port | The port to listen on for gRPC traffic.
|
| services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| services.prometheus.exporters.node-cert.user | User owning the certs.
|
| services.prometheus.exporters.bind.bindURI | HTTP XML API address of an Bind server.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| services.prometheus.exporters.mqtt.logLevel | Logging level
|
| services.prometheus.exporters.flow.group | Group under which the flow exporter shall be run.
|
| services.prometheus.exporters.mail.group | Group under which the mail exporter shall be run.
|
| services.prometheus.exporters.snmp.group | Group under which the snmp exporter shall be run.
|
| services.prometheus.exporters.bind.group | Group under which the bind exporter shall be run.
|
| services.prometheus.exporters.bird.group | Group under which the bird exporter shall be run.
|
| services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.ebpf.group | Group under which the ebpf exporter shall be run.
|
| services.prometheus.exporters.ipmi.group | Group under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.knot.group | Group under which the knot exporter shall be run.
|
| services.prometheus.exporters.nats.group | Group under which the nats exporter shall be run.
|
| services.prometheus.exporters.node.group | Group under which the node exporter shall be run.
|
| services.prometheus.exporters.ping.group | Group under which the ping exporter shall be run.
|
| services.prometheus.exporters.json.group | Group under which the json exporter shall be run.
|
| services.caddy.httpsPort | The default port to listen on for HTTPS traffic
|
| services.samba-wsdd.listen | Listen on path or localhost port in discovery mode.
|
| services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| services.prometheus.exporters.php-fpm.group | Group under which the php-fpm exporter shall be run.
|
| services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| services.ncps.analytics.reporting.samples | Whether to enable Enable printing the analytics samples to stdout
|
| services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| services.prometheus.exporters.snmp.logLevel | Only log messages with the given severity or above.
|
| services.paperless.exporter.directory | Directory to store export.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| services.tlsrpt.reportd.settings.log_level | Level of log messages to emit.
|
| boot.initrd.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| services.prometheus.exporters.sql.enable | Whether to enable the prometheus sql exporter.
|
| services.prometheus.exporters.frr.enable | Whether to enable the prometheus frr exporter.
|
| services.prometheus.exporters.nut.enable | Whether to enable the prometheus nut exporter.
|
| services.prometheus.exporters.lnd.enable | Whether to enable the prometheus lnd exporter.
|
| services.prometheus.exporters.pve.enable | Whether to enable the prometheus pve exporter.
|
| services.prometheus.exporters.zfs.enable | Whether to enable the prometheus zfs exporter.
|
| services.prometheus.exporters.kea.enable | Whether to enable the prometheus kea exporter.
|
| services.prometheus.exporters.dmarc.debug | Whether to declare enable --debug.
|
| services.amule.openPeerPorts | Whether to enable open the peer port(s) in the firewall.
|
| services.gocd-server.sslPort | Specifies port number on which the Go
|
| services.mailhog.smtpPort | Port on which the SMTP endpoint will listen.
|
| services.prometheus.exporters.mqtt.mqttTopic | Topic path to subscribe to.
|
| services.nitter.preferences.bidiSupport | Support bidirectional text (makes clicking on tweets harder).
|
| services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| services.firefly-iii-data-importer.settings | Options for firefly-iii data importer configuration
|
| services.prometheus.exporters.idrac.group | Group under which the idrac exporter shall be run.
|
| services.prometheus.exporters.dmarc.group | Group under which the dmarc exporter shall be run.
|
| services.prometheus.exporters.redis.group | Group under which the redis exporter shall be run.
|
| services.prometheus.exporters.fritz.group | Group under which the fritz exporter shall be run.
|
| services.prometheus.exporters.v2ray.group | Group under which the v2ray exporter shall be run.
|
| services.prometheus.exporters.kafka.group | Group under which the kafka exporter shall be run.
|
| services.prometheus.exporters.jitsi.group | Group under which the jitsi exporter shall be run.
|
| services.prometheus.exporters.nginx.group | Group under which the nginx exporter shall be run.
|
| services.prometheus.exporters.nut.nutServer | Hostname or address of the NUT server
|
| services.paperless.exporter.onCalendar | When to run the exporter
|
| services.tor.settings.ServerTransportPlugin.exec | Command of pluggable transport.
|
| services.prometheus.exporters.ipmi.enable | Whether to enable the prometheus ipmi exporter.
|
| services.prometheus.exporters.mqtt.enable | Whether to enable the prometheus mqtt exporter.
|
| services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| services.prometheus.exporters.ping.enable | Whether to enable the prometheus ping exporter.
|
| services.prometheus.exporters.snmp.enable | Whether to enable the prometheus snmp exporter.
|
| services.prometheus.exporters.mail.enable | Whether to enable the prometheus mail exporter.
|
| services.prometheus.exporters.knot.enable | Whether to enable the prometheus knot exporter.
|
| services.prometheus.exporters.ebpf.enable | Whether to enable the prometheus ebpf exporter.
|
| services.prometheus.exporters.nats.enable | Whether to enable the prometheus nats exporter.
|
| services.prometheus.exporters.bird.enable | Whether to enable the prometheus bird exporter.
|
| services.prometheus.exporters.node.enable | Whether to enable the prometheus node exporter.
|
| services.prometheus.exporters.bind.enable | Whether to enable the prometheus bind exporter.
|
| services.prometheus.exporters.json.enable | Whether to enable the prometheus json exporter.
|
| services.prometheus.exporters.flow.enable | Whether to enable the prometheus flow exporter.
|
| services.prometheus.exporters.frr.group | Group under which the frr exporter shall be run
|
| services.i2pd.inTunnels | Serve something on I2P network at port and delegate requests to address inPort.
|
| services.ircdHybrid.extraPort | Extra port to avoid filtering.
|
| services.convos.listenPort | Port the web interface should listen on
|
| services.zwave-js.serialPort | Serial port device path for Z-Wave controller.
|
| services.prometheus.exporters.sql.configFile | Path to configuration file.
|
| services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| services.prometheus.exporters.php-fpm.enable | Whether to enable the prometheus php-fpm exporter.
|
| services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| services.prometheus.exporters.node-cert.group | Group under which the node-cert exporter shall be run.
|
| services.firewalld.services.<name>.ports.*.protocol | |
| services.prometheus.exporters.dmarc.imap.host | Hostname of IMAP server to connect to.
|
| services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| virtualisation.lxd.zfsSupport | Enables lxd to use zfs as a storage for containers
|
| services.prometheus.exporters.snmp.logFormat | Output format of log messages.
|
| services.prometheus.exporters.rtl_433.ids | List of ID matchers to export.
|
| services.zapret.udpPorts | List of UDP ports to route
|
| services.prometheus.exporters.mongodb.uri | MongoDB URI to connect to.
|
| services.prometheus.exporters.frr.extraFlags | Extra commandline options to pass to the frr exporter.
|
| services.prometheus.exporters.lnd.extraFlags | Extra commandline options to pass to the lnd exporter.
|
| services.prometheus.exporters.zfs.extraFlags | Extra commandline options to pass to the zfs exporter.
|
| services.prometheus.exporters.pve.extraFlags | Extra commandline options to pass to the pve exporter.
|
| services.prometheus.exporters.sql.extraFlags | Extra commandline options to pass to the sql exporter.
|
| services.prometheus.exporters.nut.extraFlags | Extra commandline options to pass to the nut exporter.
|
| services.prometheus.exporters.kea.extraFlags | Extra commandline options to pass to the kea exporter.
|
| services.dae.openFirewall | Open the firewall port.
|
| services.bazarr.listenPort | Port on which the bazarr web interface should listen
|
| services.patroni.restApiPort | The port on Patroni's REST api listens.
|
| services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| services.prometheus.exporters.rtl_433.ids.*.id | ID to match.
|
| services.prometheus.exporters.mqtt.topicLabel | Define the Prometheus label for the topic.
|
| services.prometheus.exporters.json.configFile | Path to configuration file.
|
| services.prometheus.exporters.ipmi.configFile | Path to configuration file.
|
| services.prometheus.exporters.nginx.enable | Whether to enable the prometheus nginx exporter.
|
| services.prometheus.exporters.idrac.enable | Whether to enable the prometheus idrac exporter.
|
| services.prometheus.exporters.dnssec.group | Group under which the dnssec exporter shall be run.
|
| services.prometheus.exporters.kafka.enable | Whether to enable the prometheus kafka exporter.
|
| services.prometheus.exporters.kea.targets | Paths or URLs to the Kea control socket.
|
| services.prometheus.exporters.mysqld.group | Group under which the mysqld exporter shall be run.
|
| services.prometheus.exporters.dmarc.enable | Whether to enable the prometheus dmarc exporter.
|
| services.prometheus.exporters.redis.enable | Whether to enable the prometheus redis exporter.
|
| services.prometheus.exporters.script.group | Group under which the script exporter shall be run.
|
| services.prometheus.exporters.v2ray.enable | Whether to enable the prometheus v2ray exporter.
|
| services.prometheus.exporters.pve.package | The prometheus-pve-exporter package to use.
|
| services.prometheus.exporters.fritz.enable | Whether to enable the prometheus fritz exporter.
|
| services.prometheus.exporters.fastly.group | Group under which the fastly exporter shall be run.
|
| services.prometheus.exporters.deluge.group | Group under which the deluge exporter shall be run.
|
| services.prometheus.exporters.shelly.group | Group under which the shelly exporter shall be run.
|
| services.prometheus.exporters.rspamd.group | Group under which the rspamd exporter shall be run.
|
| services.prometheus.exporters.tibber.group | Group under which the tibber exporter shall be run.
|
| services.prometheus.exporters.restic.group | Group under which the restic exporter shall be run.
|
| services.prometheus.exporters.statsd.group | Group under which the statsd exporter shall be run.
|
| services.prometheus.exporters.jitsi.enable | Whether to enable the prometheus jitsi exporter.
|
| services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| services.prometheus.exporters.pihole.group | Group under which the pihole exporter shall be run.
|
| networking.firewall.rejectPackets | If set, refused packets are rejected rather than dropped
(ignored)
|
| services.qbittorrent.torrentingPort | the port passed to qbittorrent via --torrenting-port
|
| services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| services.prometheus.exporters.mail.extraFlags | Extra commandline options to pass to the mail exporter.
|
| services.prometheus.exporters.nats.extraFlags | Extra commandline options to pass to the nats exporter.
|
| services.prometheus.exporters.snmp.extraFlags | Extra commandline options to pass to the snmp exporter.
|
| services.prometheus.exporters.varnish.raw | Enable raw stdout logging without timestamps.
|
| services.prometheus.exporters.ping.extraFlags | Extra commandline options to pass to the ping exporter.
|
| services.prometheus.exporters.bind.extraFlags | Extra commandline options to pass to the bind exporter.
|
| services.prometheus.exporters.node.extraFlags | Extra commandline options to pass to the node exporter.
|
| services.prometheus.exporters.mqtt.extraFlags | Extra commandline options to pass to the mqtt exporter.
|
| services.prometheus.exporters.ipmi.extraFlags | Extra commandline options to pass to the ipmi exporter.
|
| services.prometheus.exporters.knot.extraFlags | Extra commandline options to pass to the knot exporter.
|
| services.prometheus.exporters.ebpf.extraFlags | Extra commandline options to pass to the ebpf exporter.
|
| services.prometheus.exporters.flow.extraFlags | Extra commandline options to pass to the flow exporter.
|
| services.prometheus.exporters.json.extraFlags | Extra commandline options to pass to the json exporter.
|
| services.prometheus.exporters.bird.extraFlags | Extra commandline options to pass to the bird exporter.
|
| services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| services.neo4j.directories.imports | The root directory for file URLs used with the Cypher
LOAD CSV clause
|
| services.prometheus.exporters.bird.birdSocket | Path to BIRD2 (or BIRD1 v4) socket.
|
| services.prometheus.exporters.mail.configFile | Specify the mailexporter configuration file to use.
|
| services.routinator.settings.http-listen | An array of string values each providing an address and port on which the HTTP server should listen
|
| services.routinator.settings.rtr-listen | An array of string values each providing an address and port on which the RTR server should listen in TCP mode
|
| services.siproxd.rtpPortLow | Bottom of UDP port range for incoming and outgoing RTP traffic
|
| services.postfix.relayPort | SMTP port for relay mail relay.
|
| services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| services.windmill.lspPort | Port the windmill lsp listens on.
|
| services.prometheus.exporters.flow.brokers | List of Kafka brokers to connect to.
|
| services.prometheus.exporters.php-fpm.extraFlags | Extra commandline options to pass to the php-fpm exporter.
|
| services.fail2ban.banaction-allports | Default banning action (e.g. iptables, iptables-new, iptables-multiport,
shorewall, etc) for "allports" jails
|
| services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| services.prometheus.exporters.node-cert.enable | Whether to enable the prometheus node-cert exporter.
|
| services.prometheus.exporters.bitcoin.rpcHost | RPC host.
|
| services.prometheus.exporters.nginx.sslVerify | Whether to perform certificate verification for https.
|
| services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| services.prometheus.exporters.mqtt.mqttKeepAlive | Keep alive interval to maintain connection with MQTT broker.
|
| services.prometheus.exporters.bind.bindGroups | List of statistics to collect
|
| services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| services.prometheus.exporters.php-fpm.package | The prometheus-php-fpm-exporter package to use.
|
| services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| services.prometheus.exporters.mqtt.mqttClientId | Set client ID manually for MQTT connection
|
| services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| services.prometheus.exporters.nvidia-gpu.group | Group under which the nvidia-gpu exporter shall be run.
|
| services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| services.prometheus.exporters.varnish.noExit | Do not exit server on Varnish scrape errors.
|
| services.dnsdist.listenPort | Listen port
|
| services.nitter.cache.redisPort | Redis port.
|
| services.grafana.settings.security.strict_transport_security_preload | Set to true to enable HSTS preloading option
|
| services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| services.prometheus.exporters.kafka.package | The kminion package to use.
|
| services.prometheus.exporters.kafka.extraFlags | Extra commandline options to pass to the kafka exporter.
|
| services.prometheus.exporters.jitsi.extraFlags | Extra commandline options to pass to the jitsi exporter.
|
| services.prometheus.exporters.nginx.extraFlags | Extra commandline options to pass to the nginx exporter.
|
| services.prometheus.exporters.fritz.extraFlags | Extra commandline options to pass to the fritz exporter.
|
| services.prometheus.exporters.dmarc.extraFlags | Extra commandline options to pass to the dmarc exporter.
|
| services.prometheus.exporters.redis.extraFlags | Extra commandline options to pass to the redis exporter.
|
| services.prometheus.exporters.v2ray.extraFlags | Extra commandline options to pass to the v2ray exporter.
|
| services.prometheus.exporters.idrac.extraFlags | Extra commandline options to pass to the idrac exporter.
|
| services.prometheus.exporters.chrony.enable | Whether to enable the prometheus chrony exporter.
|
| services.prometheus.exporters.mysqld.enable | Whether to enable the prometheus mysqld exporter.
|
| services.prometheus.exporters.restic.enable | Whether to enable the prometheus restic exporter.
|
| services.prometheus.exporters.script.enable | Whether to enable the prometheus script exporter.
|
| services.prometheus.exporters.dnssec.enable | Whether to enable the prometheus dnssec exporter.
|
| services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| services.prometheus.exporters.tibber.enable | Whether to enable the prometheus tibber exporter.
|
| services.prometheus.exporters.pihole.enable | Whether to enable the prometheus pihole exporter.
|
| services.prometheus.exporters.rspamd.enable | Whether to enable the prometheus rspamd exporter.
|
| services.prometheus.exporters.shelly.enable | Whether to enable the prometheus shelly exporter.
|
| services.prometheus.exporters.statsd.enable | Whether to enable the prometheus statsd exporter.
|
| services.prometheus.exporters.deluge.enable | Whether to enable the prometheus deluge exporter.
|
| services.prometheus.exporters.domain.enable | Whether to enable the prometheus domain exporter.
|
| services.prometheus.exporters.fastly.enable | Whether to enable the prometheus fastly exporter.
|
| services.prometheus.exporters.pihole.apiToken | Pi-Hole API token which can be used instead of a password
|
| services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| services.prometheus.exporters.nginx.scrapeUri | Address to access the nginx status page
|
| services.prometheus.exporters.libvirt.group | Group under which the libvirt exporter shall be run.
|
| services.prometheus.exporters.bitcoin.group | Group under which the bitcoin exporter shall be run.
|
| services.prometheus.exporters.dovecot.group | Group under which the dovecot exporter shall be run.
|
| services.prometheus.exporters.sabnzbd.group | Group under which the sabnzbd exporter shall be run.
|
| services.prometheus.exporters.varnish.group | Group under which the varnish exporter shall be run.
|
| services.prometheus.exporters.klipper.group | Group under which the klipper exporter shall be run.
|
| services.prometheus.exporters.unbound.group | Group under which the unbound exporter shall be run.
|
| services.prometheus.exporters.mongodb.group | Group under which the mongodb exporter shall be run.
|
| services.prometheus.exporters.dnsmasq.group | Group under which the dnsmasq exporter shall be run.
|
| services.prometheus.exporters.ecoflow.group | Group under which the ecoflow exporter shall be run.
|
| services.prometheus.exporters.apcupsd.group | Group under which the apcupsd exporter shall be run.
|
| services.prometheus.exporters.process.group | Group under which the process exporter shall be run.
|
| services.prometheus.exporters.systemd.group | Group under which the systemd exporter shall be run.
|
| services.prometheus.exporters.knot.knotSocketPath | Socket path of knotd(8).
|
| services.siproxd.rtpPortHigh | Top of UDP port range for incoming and outgoing RTP traffic
|
| services.amule.openWebServerPort | Whether to enable open the web server port.
|
| services.dendrite.httpPort | The port to listen for HTTP requests on.
|
| services.kasmweb.listenPort | The port on which kasmweb should listen.
|
| services.dawarich.webPort | TCP port used by the dawarich web service.
|
| services.mastodon.webPort | TCP port used by the mastodon-web service.
|
| services.smartdns.bindPort | DNS listening port number.
|
| services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.zerobin.listenPort | The port zerobin should listen on
|
| services.prometheus.exporters.mqtt.mqttAddress | IP or hostname of MQTT broker.
|
| services.prometheus.exporters.node-cert.extraFlags | Extra commandline options to pass to the node-cert exporter.
|
| services.prometheus.exporters.mqtt.keepFullTopic | Whether to enable Keep entire topic instead of the first two elements only
|
| services.prometheus.exporters.bind.bindTimeout | Timeout for trying to get stats from Bind.
|
| services.prometheus.exporters.bird.birdVersion | Specifies whether BIRD1 or BIRD2 is in use.
|
| networking.nat.forwardPorts.*.destination | Forward connection to destination ip:port (or [ipv6]:port); to specify a port range, use ip:start-end
|
| services.prometheus.exporters.bitcoin.extraEnv | Extra environment variables for the exporter.
|
| services.netdata.enableAnalyticsReporting | Enable reporting of anonymous usage statistics to Netdata Inc. via either
Google Analytics (in versions prior to 1.29.4), or Netdata Inc.'s
self-hosted PostHog (in versions 1.29.4 and later)
|
| services.prometheus.exporters.bind.bindVersion | BIND statistics version
|
| services.prometheus.exporters.nvidia-gpu.enable | Whether to enable the prometheus nvidia-gpu exporter.
|
| services.prometheus.exporters.dnssec.extraFlags | Extra commandline options when launching Prometheus.
|
| services.pds.settings.PDS_PORT | Port to listen on
|
| services.step-ca.address | The address (without port) the certificate authority should listen at
|
| services.tor.openFirewall | Whether to enable opening of the relay port(s) in the firewall.
|
| services.netbox.unixSocket | Enable Unix Socket for the server to listen on.
listenAddress and port will be ignored.
|
| services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| services.prometheus.exporters.deluge.delugeHost | Hostname where deluge server is running.
|
| services.prometheus.exporters.deluge.delugeUser | User to connect to deluge server.
|
| services.prometheus.exporters.dovecot.scopes | Stats scopes to query.
|
| services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| services.prometheus.exporters.chrony.extraFlags | Extra commandline options to pass to the chrony exporter.
|
| services.prometheus.exporters.tibber.extraFlags | Extra commandline options to pass to the tibber exporter.
|
| services.prometheus.exporters.statsd.extraFlags | Extra commandline options to pass to the statsd exporter.
|
| services.prometheus.exporters.shelly.extraFlags | Extra commandline options to pass to the shelly exporter.
|
| services.prometheus.exporters.fastly.extraFlags | Extra commandline options to pass to the fastly exporter.
|
| services.prometheus.exporters.deluge.extraFlags | Extra commandline options to pass to the deluge exporter.
|
| services.prometheus.exporters.script.extraFlags | Extra commandline options to pass to the script exporter.
|
| services.prometheus.exporters.rspamd.extraFlags | Extra commandline options to pass to the rspamd exporter.
|
| services.prometheus.exporters.domain.extraFlags | Extra commandline options to pass to the domain exporter.
|
| services.prometheus.exporters.pihole.extraFlags | Extra commandline options to pass to the pihole exporter.
|
| services.prometheus.exporters.mysqld.extraFlags | Extra commandline options to pass to the mysqld exporter.
|
| services.prometheus.exporters.restic.extraFlags | Extra commandline options to pass to the restic exporter.
|
| services.prometheus.exporters.ecoflow.debug | Enable debug log messages
|
| services.prometheus.exporters.rtl_433.enable | Whether to enable the prometheus rtl_433 exporter.
|
| services.prometheus.exporters.dnssec.timeout | DNS request timeout duration.
|
| services.prometheus.exporters.nginx.constLabels | A list of constant labels that will be used in every metric.
|
| services.prometheus.exporters.lnd.lndMacaroonDir | Path to lnd macaroons.
|
| services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| services.prometheus.exporters.ping.settings | Configuration for ping_exporter, see
https://github.com/czerwonk/ping_exporter
for supported values.
|
| services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| services.prometheus.exporters.pve.listenAddress | Address to listen on.
|
| services.prometheus.exporters.sql.listenAddress | Address to listen on.
|
| services.prometheus.exporters.zfs.listenAddress | Address to listen on.
|
| services.prometheus.exporters.lnd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nut.listenAddress | Address to listen on.
|
| services.prometheus.exporters.frr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.kea.listenAddress | Address to listen on.
|
| services.nfs.server.statdPort | Use a fixed port for rpc.statd
|
| services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.lasuite-meet.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.lasuite-docs.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.xrdp.openFirewall | Whether to open the firewall for the specified RDP port.
|
| services.prometheus.exporters.apcupsd.enable | Whether to enable the prometheus apcupsd exporter.
|
| services.prometheus.exporters.bitcoin.enable | Whether to enable the prometheus bitcoin exporter.
|
| services.prometheus.exporters.sabnzbd.enable | Whether to enable the prometheus sabnzbd exporter.
|
| services.prometheus.exporters.process.enable | Whether to enable the prometheus process exporter.
|
| services.prometheus.exporters.ecoflow.enable | Whether to enable the prometheus ecoflow exporter.
|
| services.prometheus.exporters.libvirt.enable | Whether to enable the prometheus libvirt exporter.
|
| services.prometheus.exporters.klipper.enable | Whether to enable the prometheus klipper exporter.
|
| services.prometheus.exporters.varnish.enable | Whether to enable the prometheus varnish exporter.
|
| services.prometheus.exporters.dnsmasq.enable | Whether to enable the prometheus dnsmasq exporter.
|
| services.prometheus.exporters.postfix.showqPath | Path where Postfix places its showq socket.
|
| services.prometheus.exporters.postfix.enable | Whether to enable the prometheus postfix exporter.
|
| services.prometheus.exporters.systemd.enable | Whether to enable the prometheus systemd exporter.
|
| services.prometheus.exporters.dovecot.enable | Whether to enable the prometheus dovecot exporter.
|
| services.prometheus.exporters.mongodb.enable | Whether to enable the prometheus mongodb exporter.
|
| services.prometheus.exporters.unbound.enable | Whether to enable the prometheus unbound exporter.
|
| programs.coolercontrol.nvidiaSupport | Enable support for Nvidia GPUs.
|
| services.prometheus.exporters.knot.knotLibraryPath | Path to the library of knot-dns.
|
| services.prometheus.exporters.py-air-control.group | Group under which the py-air-control exporter shall be run.
|
| services.prometheus.exporters.mongodb.collStats | List of comma separared databases.collections to get $collStats
|
| services.prometheus.exporters.pihole.timeout | Controls the timeout to connect to a Pi-Hole instance
|
| services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| services.prometheus.exporters.bird.newMetricFormat | Enable the new more-generic metric format.
|
| services.foundationdb.listenPortStart | Starting port number for database listening sockets
|
| services.prometheus.exporters.rspamd.extraLabels | Set of labels added to each metric.
|
| services.prometheus.exporters.fritz.settings | Configuration settings for fritz-exporter.
|
| services.prometheus.exporters.jitsi.interval | How often to scrape new data
|
| services.prometheus.exporters.unpoller.loki.url | URL of the Loki host.
|
| services.prometheus.exporters.nvidia-gpu.extraFlags | Extra commandline options to pass to the nvidia-gpu exporter.
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.settings.log_level | Error log level.
|
| services.prometheus.exporters.mailman3.logLevel | Detail level to log.
|
| services.prometheus.exporters.mqtt.logMqttMessage | Whether to enable Log MQTT original message, only if LOG_LEVEL is set to DEBUG..
|
| services.prometheus.exporters.php-fpm.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nats.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ebpf.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bird.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ipmi.listenAddress | Address to listen on.
|
| services.prometheus.exporters.flow.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mail.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mqtt.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bind.listenAddress | Address to listen on.
|
| services.prometheus.exporters.node.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.snmp.listenAddress | Address to listen on.
|
| services.prometheus.exporters.knot.listenAddress | Address to listen on.
|
| services.prometheus.exporters.json.listenAddress | Address to listen on.
|
| services.kubernetes.apiserver.bindAddress | The IP address on which to listen for the --secure-port port
|
| services.polipo.parentProxy | Hostname and port number of an HTTP parent proxy;
it should have the form ‘host:port’.
|
| services.croc.openFirewall | Whether to enable opening of the peer port(s) in the firewall.
|
| services.davis.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.dendrite.httpsPort | The port to listen for HTTPS requests on.
|
| services.hadoop.hbase.rest.infoPort | web UI port
|
| services.slskd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.rimgo.settings.PORT | The port to use.
|
| services.umami.settings.PORT | The port to listen on.
|
| services.movim.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.snmpd.openFirewall | Open port in firewall for snmpd.
|
| services.zwave-js-ui.serialPort | Serial port for the Z-Wave controller
|
| services.prometheus.exporters.mikrotik.group | Group under which the mikrotik exporter shall be run.
|
| services.prometheus.exporters.opnsense.group | Group under which the opnsense exporter shall be run.
|
| services.prometheus.exporters.postgres.group | Group under which the postgres exporter shall be run.
|
| services.prometheus.exporters.nginxlog.group | Group under which the nginxlog exporter shall be run.
|
| services.prometheus.exporters.unpoller.group | Group under which the unpoller exporter shall be run.
|
| services.prometheus.exporters.bitcoin.rpcScheme | Whether to connect to bitcoind over http or https.
|
| services.prometheus.exporters.graphite.group | Group under which the graphite exporter shall be run.
|
| services.prometheus.exporters.fritzbox.group | Group under which the fritzbox exporter shall be run.
|
| services.prometheus.exporters.smartctl.group | Group under which the smartctl exporter shall be run.
|
| services.prometheus.exporters.blackbox.group | Group under which the blackbox exporter shall be run.
|
| services.prometheus.exporters.influxdb.group | Group under which the influxdb exporter shall be run.
|
| services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| services.prometheus.exporters.collectd.group | Group under which the collectd exporter shall be run.
|
| services.prometheus.exporters.mqtt.zwaveTopicPrefix | MQTT topic used for Zwavejs2Mqtt messages.
|
| services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| services.prometheus.exporters.opnsense.apiKeyFile | File containing the api key.
|
| services.prometheus.exporters.dmarc.folders.done | IMAP mailbox that successfully processed reports are moved to.
|
| services.prometheus.exporters.dnsmasq.leasesPath | Path to the dnsmasq.leases file.
|
| services.prometheus.exporters.unpoller.loki.user | Username for Loki.
|
| services.prometheus.exporters.rtl_433.extraFlags | Extra commandline options to pass to the rtl_433 exporter.
|
| virtualisation.forwardPorts.*.from | Controls the direction in which the ports are mapped:
"host" means traffic from the host ports
is forwarded to the given guest port.
"guest" means traffic from the guest ports
is forwarded to the given host port.
|
| services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| services.prometheus.exporters.collectd.logLevel | Only log messages with the given severity or above.
|
| services.prometheus.exporters.varnish.verbose | Enable verbose logging.
|
| services.prometheus.exporters.libvirt.extraFlags | Extra commandline options to pass to the libvirt exporter.
|
| services.prometheus.exporters.unbound.extraFlags | Extra commandline options to pass to the unbound exporter.
|
| services.prometheus.exporters.process.extraFlags | Extra commandline options to pass to the process exporter.
|
| services.prometheus.exporters.varnish.extraFlags | Extra commandline options to pass to the varnish exporter.
|
| services.prometheus.exporters.postfix.extraFlags | Extra commandline options to pass to the postfix exporter.
|
| services.prometheus.exporters.mongodb.extraFlags | Extra commandline options to pass to the mongodb exporter.
|
| services.prometheus.exporters.apcupsd.extraFlags | Extra commandline options to pass to the apcupsd exporter.
|
| services.prometheus.exporters.systemd.extraFlags | Extra commandline options to pass to the systemd exporter.
|
| services.prometheus.exporters.sabnzbd.extraFlags | Extra commandline options to pass to the sabnzbd exporter.
|
| services.prometheus.exporters.dnsmasq.extraFlags | Extra commandline options to pass to the dnsmasq exporter.
|
| services.prometheus.exporters.mongodb.indexStats | List of comma separared databases.collections to get $indexStats
|
| services.prometheus.exporters.ecoflow.extraFlags | Extra commandline options to pass to the ecoflow exporter.
|
| services.prometheus.exporters.klipper.extraFlags | Extra commandline options to pass to the klipper exporter.
|
| services.prometheus.exporters.bitcoin.extraFlags | Extra commandline options to pass to the bitcoin exporter.
|
| services.prometheus.exporters.dovecot.extraFlags | Extra commandline options to pass to the dovecot exporter.
|
| services.xserver.exportConfiguration | Whether to symlink the X server configuration under
/etc/X11/xorg.conf.
|
| services.siproxd.sipListenPort | Port to listen for incoming SIP messages.
|
| services.minio.listenAddress | IP address and port of the server.
|
| services.step-ca.openFirewall | Whether to enable opening the certificate authority server port.
|
| services.resilio.httpListenPort | HTTP port to bind on.
|
| services.nfs.server.mountdPort | Use fixed port for rpc.mountd, useful if server is behind firewall.
|
| services.snipe-it.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.shelly.metrics-file | Path to the JSON file with the metric definitions
|
| services.prometheus.exporters.sabnzbd.servers | List of sabnzbd servers to connect to.
|
| services.prometheus.exporters.py-air-control.enable | Whether to enable the prometheus py-air-control exporter.
|
| services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| services.prometheus.exporters.nut.passwordPath | A run-time path to the nutUser password file, which should be
provisioned outside of Nix store.
|
| services.prometheus.exporters.dmarc.folders.error | IMAP mailbox that emails are moved to that could not be processed.
|
| services.prometheus.exporters.node-cert.excludePaths | List of paths to exclute from searching for SSL certificates.
|
| services.prometheus.exporters.varnish.healthPath | Path under which to expose healthcheck
|
| services.tigerbeetle.addresses | The addresses of all replicas in the cluster
|
| services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| services.prometheus.exporters.jitsi.listenAddress | Address to listen on.
|
| services.prometheus.exporters.v2ray.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nginx.listenAddress | Address to listen on.
|
| services.prometheus.exporters.kafka.listenAddress | Address to listen on.
|
| services.prometheus.exporters.fritz.listenAddress | Address to listen on.
|
| services.prometheus.exporters.redis.listenAddress | Address to listen on.
|
| services.prometheus.exporters.idrac.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dmarc.listenAddress | Address to listen on.
|
| services.prometheus.exporters.klipper.package | The prometheus-klipper-exporter package to use.
|
| services.prometheus.exporters.mailman3.enable | Whether to enable the prometheus mailman3 exporter.
|
| services.prometheus.exporters.postfix.package | The prometheus-postfix-exporter package to use.
|
| services.prometheus.exporters.mysqld.runAsLocalSuperUser | Whether to run the exporter as services.mysql.user.
|
| services.prometheus.exporters.bitcoin.package | The prometheus-bitcoin-exporter package to use.
|
| services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| services.limesurvey.nginx.virtualHost.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.unpoller.log.quiet | Whether to enable startup and error logs only.
|
| services.flood.openFirewall | Whether to open the firewall for the port in services.flood.port.
|
| services.komga.openFirewall | Whether to open the firewall for the port in services.komga.settings.server.port.
|
| services.galene.turnAddress | Built-in TURN server listen address and port
|
| services.cook-cli.openFirewall | Whether to open the cook-cli server port in the firewall.
|
| services.privoxy.enableTor | Whether to configure Privoxy to use Tor's faster SOCKS port,
suitable for HTTP.
|
| services.prometheus.exporters.knot.knotSocketTimeout | Timeout in seconds.
|
| services.prometheus.exporters.node-cert.listenAddress | Address to listen on.
|
| services.prometheus.exporters.collectd.enable | Whether to enable the prometheus collectd exporter.
|
| services.prometheus.exporters.smartctl.enable | Whether to enable the prometheus smartctl exporter.
|
| services.prometheus.exporters.mikrotik.enable | Whether to enable the prometheus mikrotik exporter.
|
| services.prometheus.exporters.blackbox.enable | Whether to enable the prometheus blackbox exporter.
|
| services.prometheus.exporters.graphite.enable | Whether to enable the prometheus graphite exporter.
|
| services.prometheus.exporters.postgres.enable | Whether to enable the prometheus postgres exporter.
|
| services.prometheus.exporters.unpoller.enable | Whether to enable the prometheus unpoller exporter.
|
| services.prometheus.exporters.opnsense.enable | Whether to enable the prometheus opnsense exporter.
|
| services.prometheus.exporters.pihole.protocol | The protocol which is used to connect to Pi-Hole
|
| services.prometheus.exporters.influxdb.enable | Whether to enable the prometheus influxdb exporter.
|
| services.prometheus.exporters.keylight.enable | Whether to enable the prometheus keylight exporter.
|
| services.prometheus.exporters.fritzbox.enable | Whether to enable the prometheus fritzbox exporter.
|
| services.prometheus.exporters.nginxlog.enable | Whether to enable the prometheus nginxlog exporter.
|
| services.prometheus.exporters.dmarc.folders.inbox | IMAP mailbox that is checked for incoming DMARC aggregate reports
|
| services.prometheus.exporters.mqtt.mqttExposeClientId | Whether to enable Expose the client ID as a label in Prometheus metrics..
|
| services.prometheus.exporters.libvirt.libvirtUri | Libvirt URI from which to extract metrics
|
| services.tlsrpt.reportd.settings.http_script | Call to an HTTPS client, that accepts the URL on the commandline and the request body from stdin.
|
| services.prometheus.exporters.collectd.logFormat | Set the log format.
|
| services.prometheus.exporters.zfs.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| services.prometheus.exporters.imap-mailstat.group | Group under which the imap-mailstat exporter shall be run.
|
| services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| services.prometheus.exporters.nut.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nut.openFirewall is true.
|
| services.prometheus.exporters.node-cert.excludeGlobs | List files matching a pattern to include
|
| services.prometheus.exporters.lnd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.lnd.openFirewall is true.
|
| services.prometheus.exporters.sql.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sql.openFirewall is true.
|
| services.prometheus.exporters.frr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.frr.openFirewall is true.
|
| services.prometheus.exporters.pve.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pve.openFirewall is true.
|
| services.prometheus.exporters.node-cert.includeGlobs | List files matching a pattern to include
|
| services.prometheus.exporters.zfs.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.zfs.openFirewall is true.
|
| services.prometheus.exporters.kea.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kea.openFirewall is true.
|
| services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| services.prometheus.exporters.py-air-control.stateDir | Directory below /var/lib to store runtime data
|
| services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| services.prometheus.exporters.smokeping.hosts | List of endpoints to probe.
|
| services.prometheus.exporters.unbound.unbound.ca | Path to the Unbound server certificate authority
|
| services.certmgr.metricsPort | The port for the Prometheus HTTP endpoint.
|
| services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.nntp-proxy.upstreamPort | Upstream server port
|
| services.quicktun.<name>.localPort | Local UDP port.
|
| services.prometheus.exporters.mqtt.mqttV5Protocol | Whether to enable Force to use MQTT protocol v5 instead of 3.1.1..
|
| services.prometheus.exporters.mqtt.mqttIgnoredTopics | Lists of topics to ignore
|
| services.prometheus.exporters.py-air-control.extraFlags | Extra commandline options to pass to the py-air-control exporter.
|
| services.prometheus.exporters.v2ray.v2rayEndpoint | v2ray grpc api endpoint
|
| services.prometheus.exporters.ping.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.blackbox.configFile | Path to configuration file.
|
| services.prometheus.exporters.mail.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.php-fpm.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.unbound.unbound.key | Path to the Unbound control socket key.
|
| services.prometheus.exporters.mailman3.extraFlags | Extra commandline options to pass to the mailman3 exporter.
|
| services.prometheus.exporters.nats.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nats.openFirewall is true.
|
| services.prometheus.exporters.bind.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bind.openFirewall is true.
|
| services.prometheus.exporters.ping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ping.openFirewall is true.
|
| services.prometheus.exporters.flow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.flow.openFirewall is true.
|
| services.prometheus.exporters.json.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.json.openFirewall is true.
|
| services.prometheus.exporters.ipmi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ipmi.openFirewall is true.
|
| services.prometheus.exporters.bird.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bird.openFirewall is true.
|
| services.prometheus.exporters.pihole.password | The password to login into Pi-Hole
|
| services.prometheus.exporters.mail.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mail.openFirewall is true.
|
| services.prometheus.exporters.ebpf.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ebpf.openFirewall is true.
|
| services.prometheus.exporters.knot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.knot.openFirewall is true.
|
| services.prometheus.exporters.node.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node.openFirewall is true.
|
| services.prometheus.exporters.snmp.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.snmp.openFirewall is true.
|
| services.prometheus.exporters.mqtt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mqtt.openFirewall is true.
|
| services.prometheus.exporters.unpoller.loki.pass | Path of a file containing the password for Loki
|
| services.prometheus.exporters.nextcloud.url | URL to the Nextcloud serverinfo page
|
| services.prometheus.exporters.script.listenAddress | Address to listen on.
|
| services.prometheus.exporters.rspamd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.restic.listenAddress | Address to listen on.
|
| services.prometheus.exporters.domain.listenAddress | Address to listen on.
|
| services.prometheus.exporters.statsd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mysqld.listenAddress | Address to listen on.
|
| services.prometheus.exporters.chrony.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pihole.listenAddress | Address to listen on.
|
| services.prometheus.exporters.tibber.listenAddress | Address to listen on.
|
| services.prometheus.exporters.deluge.listenAddress | Address to listen on.
|
| services.prometheus.exporters.fastly.listenAddress | Address to listen on.
|
| services.prometheus.exporters.shelly.listenAddress | Address to listen on.
|
| services.prometheus.exporters.borgmatic.group | Group under which the borgmatic exporter shall be run.
|
| services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| services.prometheus.exporters.rasdaemon.group | Group under which the rasdaemon exporter shall be run.
|
| services.prometheus.exporters.nextcloud.group | Group under which the nextcloud exporter shall be run.
|
| services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| services.prometheus.exporters.tailscale.group | Group under which the tailscale exporter shall be run.
|
| services.prometheus.exporters.pgbouncer.group | Group under which the pgbouncer exporter shall be run.
|
| services.prometheus.exporters.wireguard.group | Group under which the wireguard exporter shall be run.
|
| services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| services.prometheus.exporters.rtl_433.channels | List of channel matchers to export.
|
| services.prometheus.exporters.restic.passwordFile | File containing the password to the repository.
|
| services.prometheus.exporters.php-fpm.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.php-fpm.openFirewall is true.
|
| services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| services.prometheus.exporters.fritzbox.extraFlags | Extra commandline options to pass to the fritzbox exporter.
|
| services.prometheus.exporters.postgres.extraFlags | Extra commandline options to pass to the postgres exporter.
|
| services.prometheus.exporters.collectd.extraFlags | Extra commandline options to pass to the collectd exporter.
|
| services.prometheus.exporters.mikrotik.extraFlags | Extra commandline options to pass to the mikrotik exporter.
|
| services.prometheus.exporters.influxdb.extraFlags | Extra commandline options to pass to the influxdb exporter.
|
| services.prometheus.exporters.graphite.extraFlags | Extra commandline options to pass to the graphite exporter.
|
| services.prometheus.exporters.smartctl.extraFlags | Extra commandline options to pass to the smartctl exporter.
|
| services.prometheus.exporters.keylight.extraFlags | Extra commandline options to pass to the keylight exporter.
|
| services.prometheus.exporters.blackbox.extraFlags | Extra commandline options to pass to the blackbox exporter.
|
| services.prometheus.exporters.opnsense.extraFlags | Extra commandline options to pass to the opnsense exporter.
|
| services.prometheus.exporters.unpoller.extraFlags | Extra commandline options to pass to the unpoller exporter.
|
| services.prometheus.exporters.nginxlog.extraFlags | Extra commandline options to pass to the nginxlog exporter.
|
| services.prometheus.exporters.junos-czerwonk.group | Group under which the junos-czerwonk exporter shall be run.
|
| services.fluidd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.hologram-agent.httpPort | Port for metadata service to listen on.
|
| services.echoip.enablePortLookup | Whether to enable port lookup.
|
| services.gancio.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.akkoma.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.kavita.settings.Port | Port to bind to.
|
| services.matomo.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.neo4j.http.enable | Enable the HTTP connector for Neo4j
|
| services.radicle.node.listenPort | The port on which radicle-node listens.
|
| services.nfs.server.lockdPort | Use a fixed port for the NFS lock manager kernel module
(lockd/nlockmgr)
|
| services.monica.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.mympd.settings.ssl | Whether to enable listening on the SSL port
|
| services.opencloud.url | Web interface root public URL, including scheme and port (if non-default).
|
| services.neo4j.bolt.enable | Enable the BOLT connector for Neo4j
|
| services.windmill.serverPort | Port the windmill server listens on.
|
| services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| services.prometheus.exporters.pgbouncer.logLevel | Only log messages with the given severity or above.
|
| services.mjolnir.pantalaimon.options.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.prometheus.exporters.varnish.withGoMetrics | Export go runtime and http handler metrics.
|
| services.prometheus.exporters.imap-mailstat.enable | Whether to enable the prometheus imap-mailstat exporter.
|
| services.prometheus.exporters.nvidia-gpu.listenAddress | Address to listen on.
|
| services.prometheus.exporters.varnish.varnishStatPath | Path to varnishstat.
|
| services.prometheus.exporters.unpoller.log.debug | Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs.
|
| services.prometheus.exporters.rtl_433.ids.*.location | Location to match.
|
| services.prometheus.exporters.opnsense.apiSecretFile | File containing the api secret.
|
| services.prometheus.exporters.rtl_433.rtl433Flags | Flags passed verbatim to rtl_433 binary
|
| services.prometheus.exporters.nginx.telemetryPath | Path under which to expose metrics.
|
| services.actual.openFirewall | Whether to open the firewall for the specified port.
|
| services.immich.openFirewall | Whether to open the immich port in the firewall
|
| services.akkoma.dist.address | Listen address for Erlang distribution protocol and Port Mapper Daemon (epmd).
|
| nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| services.bosun.listenAddress | The host address and port that bosun's web interface will listen on.
|
| services.h2o.hosts | The hosts config to be merged with the settings
|
| networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| services.pykms.openFirewallPort | Whether the listening port should be opened automatically.
|
| services.znc.confOptions.useSSL | Indicates whether the ZNC server should use SSL when listening on
the specified port
|
| services.xtreemfs.mrc.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.xtreemfs.dir.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.xtreemfs.osd.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.prometheus.exporters.sabnzbd.servers.*.baseUrl | Base URL of the sabnzbd server.
|
| services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| services.prometheus.exporters.dmarc.imap.passwordFile | File containing the login password for the IMAP connection.
|
| services.prometheus.exporters.tibber.apiTokenPath | Add here the path to your personal Tibber API Token ('Bearer Token') File
|
| services.prometheus.exporters.rtl_433.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smokeping.enable | Whether to enable the prometheus smokeping exporter.
|
| services.prometheus.exporters.pgbouncer.enable | Whether to enable the prometheus pgbouncer exporter.
|
| services.prometheus.exporters.nextcloud.enable | Whether to enable the prometheus nextcloud exporter.
|
| services.prometheus.exporters.dnssec.resolvers | DNSSEC capable resolver to be used for the check.
|
| services.prometheus.exporters.rasdaemon.enable | Whether to enable the prometheus rasdaemon exporter.
|
| services.prometheus.exporters.borgmatic.enable | Whether to enable the prometheus borgmatic exporter.
|
| services.prometheus.exporters.tailscale.enable | Whether to enable the prometheus tailscale exporter.
|
| services.prometheus.exporters.surfboard.enable | Whether to enable the prometheus surfboard exporter.
|
| services.prometheus.exporters.wireguard.enable | Whether to enable the prometheus wireguard exporter.
|
| services.tlsrpt.reportd.settings.contact_info | Contact information embedded into the reports.
|
| services.anuko-time-tracker.settings.exportDecimalDuration | Defines whether time duration values are decimal in CSV and XML data
exports (1.25 vs 1:15).
|
| services.grafana_reporter.addr | Listening address.
|
| services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| services.prometheus.exporters.ecoflow.prefix | The prefix that will be added to all metrics
|
| services.gotenberg.bindIP | Port the API listener should bind to
|
| services.chisel-server.reverse | Allow clients reverse port forwarding
|
| power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| services.porn-vault.openFirewall | Whether to open the Porn-Vault port in the firewall.
|
| services.statsd.graphitePort | Port of Graphite server (i.e. carbon-cache).
|
| services.stargazer.listen | Address and port to listen on.
|
| services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| services.subsonic.httpsPort | The port on which Subsonic will listen for
incoming HTTPS traffic
|
| services.prometheus.exporters.junos-czerwonk.enable | Whether to enable the prometheus junos-czerwonk exporter.
|
| services.prometheus.exporters.smartctl.devices | Paths to the disks that will be monitored
|
| services.prometheus.exporters.apcupsd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.systemd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.klipper.listenAddress | Address to listen on.
|
| services.prometheus.exporters.postfix.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dnsmasq.listenAddress | Address to listen on.
|
| services.prometheus.exporters.libvirt.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ecoflow.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mongodb.listenAddress | Address to listen on.
|
| services.prometheus.exporters.unbound.listenAddress | Address to listen on.
|
| services.prometheus.exporters.varnish.listenAddress | Address to listen on.
|
| services.prometheus.exporters.sabnzbd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bitcoin.listenAddress | Address to listen on.
|
| services.prometheus.exporters.process.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dovecot.listenAddress | Address to listen on.
|
| services.prometheus.exporters.flow.partitions | The number of the partitions to consume, none means all.
|
| services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| services.prometheus.exporters.nut.nutVariables | List of NUT variable names to monitor
|
| services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| services.prometheus.exporters.imap-mailstat.extraFlags | Extra commandline options to pass to the imap-mailstat exporter.
|
| services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| services.prometheus.exporters.unbound.unbound.host | Path to the unbound control socket
|
| services.prometheus.exporters.snmp.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| services.polipo.socksParentProxy | Hostname and port number of an SOCKS parent proxy;
it should have the form ‘host:port’.
|
| services.hardware.lcd.serverPort | Port on which LCDd is listening.
|
| services.hadoop.hbase.thrift.infoPort | web UI port
|
| services.epmd.listenStream | the listenStream used by the systemd socket.
see https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream= for more information.
use this to change the port epmd will run on.
if not defined, epmd will use "[::]:4369"
|
| programs.sharing.enable | Whether to enable sharing, a CLI tool for sharing files
|
| services.peertube.listenHttp | The port that the local PeerTube web server will listen on.
|
| services.ntopng.redis.address | Redis address - may be a Unix socket or a network host and port.
|
| services.quicktun.<name>.remotePort | Remote UDP port
|
| services.radicle.httpd.listenPort | The port on which radicle-httpd listens.
|
| services.neo4j.https.enable | Enable the HTTPS connector for Neo4j
|
| services.prometheus.exporters.sql.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sql.openFirewall
is true
|
| services.prometheus.exporters.lnd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.lnd.openFirewall
is true
|
| services.prometheus.exporters.frr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.frr.openFirewall
is true
|
| services.prometheus.exporters.zfs.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.zfs.openFirewall
is true
|
| services.prometheus.exporters.nut.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nut.openFirewall
is true
|
| services.prometheus.exporters.kea.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.kea.openFirewall
is true
|
| services.prometheus.exporters.pve.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pve.openFirewall
is true
|
| services.prometheus.exporters.mysqld.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.influxdb.sampleExpiry | How long a sample is valid for
|
| services.prometheus.exporters.mailman3.mailman.addr | Mailman3 Core REST API address.
|
| services.prometheus.exporters.mailman3.mailman.user | Mailman3 Core REST API username.
|
| hardware.amdgpu.amdvlk.supportExperimental.enable | Whether to enable Experimental features support.
|
| services.prometheus.exporters.fastly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fastly.openFirewall is true.
|
| services.prometheus.exporters.shelly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.shelly.openFirewall is true.
|
| services.prometheus.exporters.statsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.statsd.openFirewall is true.
|
| services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| services.prometheus.exporters.tibber.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tibber.openFirewall is true.
|
| services.prometheus.exporters.rspamd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rspamd.openFirewall is true.
|
| services.prometheus.exporters.deluge.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.deluge.openFirewall is true.
|
| services.prometheus.exporters.chrony.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.chrony.openFirewall is true.
|
| services.prometheus.exporters.pihole.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pihole.openFirewall is true.
|
| services.prometheus.exporters.script.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.script.openFirewall is true.
|
| services.prometheus.exporters.dnssec.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnssec.openFirewall is true.
|
| services.prometheus.exporters.restic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.restic.openFirewall is true.
|
| services.prometheus.exporters.mysqld.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mysqld.openFirewall is true.
|
| services.prometheus.exporters.mongodb.collector | Enabled collectors
|
| services.prometheus.exporters.pgbouncer.extraFlags | Extra commandline options when launching Prometheus.
|
| services.prometheus.exporters.unpoller.loki.timeout | Should be increased in case of timeout errors.
|
| services.prometheus.exporters.postgres.dataSourceName | Accepts PostgreSQL URI form and key=value form arguments.
|
| services.prometheus.exporters.influxdb.udpBindAddress | Address on which to listen for udp packets
|
| services.prometheus.exporters.bitcoin.rpcPasswordFile | File containing RPC password.
|
| services.prometheus.exporters.borgmatic.configFile | The path to the borgmatic config file
|
| services.prometheus.exporters.pgbouncer.logFormat | Output format of log messages
|
| services.prometheus.exporters.borgmatic.extraFlags | Extra commandline options to pass to the borgmatic exporter.
|
| services.prometheus.exporters.wireguard.extraFlags | Extra commandline options to pass to the wireguard exporter.
|
| services.prometheus.exporters.smokeping.extraFlags | Extra commandline options to pass to the smokeping exporter.
|
| services.prometheus.exporters.tailscale.extraFlags | Extra commandline options to pass to the tailscale exporter.
|
| services.prometheus.exporters.nextcloud.extraFlags | Extra commandline options to pass to the nextcloud exporter.
|
| services.prometheus.exporters.rasdaemon.extraFlags | Extra commandline options to pass to the rasdaemon exporter.
|
| services.prometheus.exporters.surfboard.extraFlags | Extra commandline options to pass to the surfboard exporter.
|
| services.prometheus.exporters.buildkite-agent.group | Group under which the buildkite-agent exporter shall be run.
|
| services.prometheus.exporters.py-air-control.listenAddress | Address to listen on.
|
| services.listmonk.database.settings."privacy.exportable" | List of fields which can be exported through an automatic export request
|
| services.prometheus.exporters.storagebox.group | Group under which the storagebox exporter shall be run.
|
| services.prometheus.exporters.pve.collectors.node | Collect PVE node info
|
| services.prometheus.exporters.scaphandre.group | Group under which the scaphandre exporter shall be run.
|
| services.prometheus.exporters.nextcloud.tokenFile | File containing the token for connecting to Nextcloud
|
| services.prometheus.exporters.postgres.runAsLocalSuperUser | Whether to run the exporter as the local 'postgres' super user.
|
| services.prometheus.exporters.junos-czerwonk.extraFlags | Extra commandline options to pass to the junos-czerwonk exporter.
|
| services.prometheus.exporters.py-air-control.protocol | The protocol to use when communicating with the air purification device
|
| services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| services.ipfs-cluster.openSwarmPort | Open swarm port, secured by the cluster secret
|
| services.cockpit.openFirewall | Open port for cockpit.
|
| services.bird-lg.frontend.proxyPort | Port bird-lg-proxy is running on.
|
| services.dovecot2.quotaPort | The Port the dovecot quota service binds to
|
| services.minio.consoleAddress | IP address and port of the web UI (console).
|
| services.meme-bingo-web.openFirewall | Whether to enable Opens the specified port in the firewall.
.
|
| services.netbird.enable | Enables backward-compatible NetBird client service
|
| services.prefect.databasePort | database port for postgres only
|
| services.tsidp.settings.localPort | Listen on localhost:.
|
| services.prometheus.exporters.mqtt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mqtt.openFirewall
is true
|
| services.prometheus.exporters.json.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.json.openFirewall
is true
|
| services.prometheus.exporters.flow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.flow.openFirewall
is true
|
| services.prometheus.exporters.mail.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mail.openFirewall
is true
|
| services.prometheus.exporters.ebpf.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ebpf.openFirewall
is true
|
| services.prometheus.exporters.nats.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nats.openFirewall
is true
|
| services.prometheus.exporters.knot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.knot.openFirewall
is true
|
| services.prometheus.exporters.bind.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bind.openFirewall
is true
|
| services.prometheus.exporters.bird.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bird.openFirewall
is true
|
| services.prometheus.exporters.node.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node.openFirewall
is true
|
| services.prometheus.exporters.ipmi.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ipmi.openFirewall
is true
|
| services.prometheus.exporters.ping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ping.openFirewall
is true
|
| services.prometheus.exporters.snmp.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.snmp.openFirewall
is true
|
| services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| services.prometheus.exporters.nextcloud.timeout | Timeout for getting server info document.
|
| services.prometheus.exporters.tailscale.package | The prometheus-tailscale-exporter package to use.
|
| services.prometheus.exporters.pgbouncer.package | The prometheus-pgbouncer-exporter package to use.
|
| services.prometheus.exporters.php-fpm.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.php-fpm.openFirewall
is true
|
| services.prometheus.exporters.nvidia-gpu.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nvidia-gpu.openFirewall is true.
|
| services.misskey.reverseProxy.webserver.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.buildkite-agent.queues | Which specific queues to process.
|
| services.prometheus.exporters.smokeping.buckets | List of buckets to use for the response duration histogram.
|
| services.prometheus.exporters.mailman3.listenAddress | Address to listen on.
|
| services.prometheus.exporters.imap-mailstat.accounts | Accounts to monitor
|
| services.librechat.env.PORT | The value that will be passed to the PORT environment variable, telling LibreChat what to listen on.
|
| services.dockerRegistry.redisUrl | Set redis host and port.
|
| services.avahi.openFirewall | Whether to open the firewall for UDP port 5353
|
| services.glances.openFirewall | Open port in the firewall for glances.
|
| services.bosun.opentsdbHost | Host and port of the OpenTSDB database that stores bosun data
|
| services.polaris.openFirewall | Open the configured port in the firewall.
|
| services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.tor.torsocks.server | IP/Port of the Tor SOCKS server
|
| services.pixiecore.dhcpNoBind | Handle DHCP traffic without binding to the DHCP server port
|
| services.screego.openFirewall | Open the firewall port(s).
|
| services.prometheus.exporters.smartctl.maxInterval | Interval that limits how often a disk can be queried.
|
| services.prometheus.exporters.fritz.settings.devices | Fritz!-devices to monitor using the exporter.
|
| services.prometheus.exporters.mailman3.mailman.passFile | Mailman3 Core REST API password.
|
| services.prometheus.exporters.postfix.systemd.enable | Whether to enable reading metrics from the systemd journal instead of from a logfile
|
| services.prometheus.exporters.fritzbox.listenAddress | Address to listen on.
|
| services.prometheus.exporters.blackbox.listenAddress | Address to listen on.
|
| services.prometheus.exporters.opnsense.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nginxlog.listenAddress | Address to listen on.
|
| services.prometheus.exporters.collectd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.graphite.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smartctl.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mikrotik.listenAddress | Address to listen on.
|
| services.prometheus.exporters.postgres.listenAddress | Address to listen on.
|
| services.prometheus.exporters.unpoller.listenAddress | Address to listen on.
|
| services.prometheus.exporters.keylight.listenAddress | Address to listen on.
|
| services.prometheus.exporters.influxdb.listenAddress | Address to listen on.
|
| services.prometheus.exporters.wireguard.verbose | Whether to enable verbose logging mode for prometheus-wireguard-exporter.
|
| services.prometheus.exporters.wireguard.withRemoteIp | Whether or not the remote IP of a WireGuard peer should be exposed via prometheus.
|
| services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| services.prometheus.exporters.restic.repository | URI pointing to the repository to monitor.
|
| services.prometheus.exporters.bitcoin.refreshSeconds | How often to ask bitcoind for metrics.
|
| services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.exporters.rtl_433.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rtl_433.openFirewall is true.
|
| services.prometheus.exporters.dovecot.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.postfix.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.varnish.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.mongodb.telemetryPath | Metrics expose path
|
| services.prometheus.exporters.unbound.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.jitsi.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.jitsi.openFirewall
is true
|
| services.prometheus.exporters.redis.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.redis.openFirewall
is true
|
| services.prometheus.exporters.nginx.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginx.openFirewall
is true
|
| services.prometheus.exporters.idrac.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.idrac.openFirewall
is true
|
| services.prometheus.exporters.kafka.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.kafka.openFirewall
is true
|
| services.prometheus.exporters.v2ray.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.v2ray.openFirewall
is true
|
| services.prometheus.exporters.fritz.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fritz.openFirewall
is true
|
| services.prometheus.exporters.dmarc.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dmarc.openFirewall
is true
|
| services.prometheus.exporters.buildkite-agent.enable | Whether to enable the prometheus buildkite-agent exporter.
|
| services.prometheus.exporters.bitcoin.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bitcoin.openFirewall is true.
|
| services.prometheus.exporters.dnsmasq.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnsmasq.openFirewall is true.
|
| services.prometheus.exporters.unbound.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unbound.openFirewall is true.
|
| services.prometheus.exporters.apcupsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.apcupsd.openFirewall is true.
|
| services.prometheus.exporters.libvirt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.libvirt.openFirewall is true.
|
| services.prometheus.exporters.varnish.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.varnish.openFirewall is true.
|
| services.prometheus.exporters.postfix.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postfix.openFirewall is true.
|
| services.prometheus.exporters.sabnzbd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sabnzbd.openFirewall is true.
|
| services.prometheus.exporters.ecoflow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ecoflow.openFirewall is true.
|
| services.prometheus.exporters.klipper.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.klipper.openFirewall is true.
|
| services.prometheus.exporters.systemd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.systemd.openFirewall is true.
|
| services.prometheus.exporters.dovecot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dovecot.openFirewall is true.
|
| services.prometheus.exporters.mongodb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mongodb.openFirewall is true.
|
| services.prometheus.exporters.process.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.process.openFirewall is true.
|
| services.prometheus.exporters.storagebox.enable | Whether to enable the prometheus storagebox exporter.
|
| services.prometheus.exporters.scaphandre.enable | Whether to enable the prometheus scaphandre exporter.
|
| services.grafana_reporter.enable | Whether to enable grafana_reporter.
|
| services.go-httpbin.settings.PORT | The port to listen on.
|
| services.distccd.openFirewall | Opens the specified TCP port for distcc.
|
| services.dae.openFirewall.enable | Whether to enable opening port in the firewall.
|
| services.esphome.openFirewall | Whether to open the firewall for the specified port.
|
| services.livekit.openFirewall | Opens port range for LiveKit on the firewall.
|
| services.llama-swap.openFirewall | Whether to open the firewall for llama-swap
|
| services.marytts.openFirewall | Whether to open the port in the firewall for MaryTTS.
|
| services.zammad.websocketPort | Websocket service port.
|
| services.zitadel.settings.Port | The port that ZITADEL listens on.
|
| services.prometheus.exporters.apcupsd.apcupsdAddress | Address of the apcupsd Network Information Server (NIS).
|
| services.prometheus.exporters.deluge.delugePasswordFile | File containing the password to connect to deluge server.
|
| services.prometheus.exporters.storagebox.tokenFile | File that contains the Hetzner API token to use.
|
| services.prometheus.exporters.wireguard.prependSudo | Whether or no to prepend sudo to wg commands.
|
| services.prometheus.exporters.mqtt.hubitatTopicPrefixes | MQTT topic used for Hubitat messages.
|
| services.prometheus.exporters.dmarc.pollIntervalSeconds | How often to poll the IMAP server in seconds.
|
| services.prometheus.exporters.mqtt.esphomeTopicPrefixes | MQTT topic used for ESPHome messages.
|
| services.prometheus.exporters.node-cert.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node-cert.openFirewall
is true
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.prometheus.exporters.unpoller.loki.interval | How often the events are polled and pushed to Loki.
|
| services.prometheus.exporters.pgbouncer.pidFile | Path to PgBouncer pid file
|
| services.biboumi.openFirewall | Whether to enable opening of the identd port in the firewall.
|
| services.mastodon.sidekiqPort | TCP port used by the mastodon-sidekiq service.
|
| services.zitadel.openFirewall | Whether to open the port specified in listenPort in the firewall.
|
| services.xonotic.openFirewall | Open the firewall for TCP and UDP on the specified port.
|
| services.uptermd.openFirewall | Whether to open the firewall for the port in services.uptermd.port.
|
| services.prometheus.exporters.restic.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| services.prometheus.exporters.imap-mailstat.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pve.collectors.config | Collect PVE onboot status
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| services.prometheus.exporters.buildkite-agent.extraFlags | Extra commandline options to pass to the buildkite-agent exporter.
|
| services.prometheus.exporters.apcupsd.apcupsdNetwork | Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
|
| services.prometheus.exporters.domain.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.domain.openFirewall
is true
|
| services.prometheus.exporters.chrony.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.chrony.openFirewall
is true
|
| services.prometheus.exporters.statsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.statsd.openFirewall
is true
|
| services.prometheus.exporters.tibber.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tibber.openFirewall
is true
|
| services.prometheus.exporters.mysqld.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mysqld.openFirewall
is true
|
| services.prometheus.exporters.rspamd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rspamd.openFirewall
is true
|
| services.prometheus.exporters.pihole.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pihole.openFirewall
is true
|
| services.prometheus.exporters.deluge.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.deluge.openFirewall
is true
|
| services.prometheus.exporters.dnssec.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnssec.openFirewall
is true
|
| services.prometheus.exporters.deluge.delugePassword | Password to connect to deluge server
|
| services.prometheus.exporters.restic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.restic.openFirewall
is true
|
| services.prometheus.exporters.script.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.script.openFirewall
is true
|
| services.prometheus.exporters.fastly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fastly.openFirewall
is true
|
| services.prometheus.exporters.shelly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.shelly.openFirewall
is true
|
| services.prometheus.exporters.restic.rcloneOptions | Options to pass to rclone to control its behavior
|
| services.prometheus.exporters.pve.collectors.status | Collect Node/VM/CT status
|
| services.prometheus.exporters.scaphandre.extraFlags | Extra commandline options to pass to the scaphandre exporter.
|
| services.prometheus.exporters.storagebox.extraFlags | Extra commandline options to pass to the storagebox exporter.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| services.freeciv.openFirewall | Whether to enable opening the firewall for the port listening for clients.
|
| services.cjdns.UDPInterface.bind | Address and port to bind UDP tunnels to.
|
| services.etesync-dav.openFirewall | Whether to open the firewall for the specified port.
|
| services.prometheus.exporters.rtl_433.channels.*.channel | Channel to match.
|
| services.prometheus.exporters.postfix.systemd.journalPath | Path to the systemd journal.
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| services.prometheus.exporters.imap-mailstat.oldestUnseenDate | Enable metric with timestamp of oldest unseen mail
|
| services.prometheus.exporters.smokeping.pingInterval | Interval between pings.
|
| services.prometheus.exporters.storagebox.package | The prometheus-storagebox-exporter package to use.
|
| services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| services.prometheus.exporters.fritzbox.gatewayAddress | The hostname or IP of the FRITZ!Box.
|
| services.prometheus.exporters.mailman3.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mailman3.openFirewall is true.
|
| services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.script.settings | Free-form configuration for script_exporter, expressed as a Nix attrset and rendered to YAML.
Migration note:
The previous format using script = "sleep 5" is no longer supported
|
| services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| services.prometheus.exporters.restic.refreshInterval | Refresh interval for the metrics in seconds
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| services.prometheus.exporters.surfboard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.borgmatic.listenAddress | Address to listen on.
|
| services.prometheus.exporters.junos-czerwonk.listenAddress | Address to listen on.
|
| services.prometheus.exporters.wireguard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smokeping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nextcloud.listenAddress | Address to listen on.
|
| services.prometheus.exporters.tailscale.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pgbouncer.listenAddress | Address to listen on.
|
| services.prometheus.exporters.rasdaemon.listenAddress | Address to listen on.
|
| services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| services.immich-kiosk.openFirewall | Whether to open the firewall for the immich-kiosk port.
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| services.anki-sync-server.openFirewall | Whether to open the firewall for the specified port.
|
| services.smokeping.imgUrl | Base url for images generated in the cgi
|
| services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| services.plantuml-server.listenPort | Port to listen on.
|
| services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| services.prometheus.exporters.nvidia-gpu.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nvidia-gpu.openFirewall
is true
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.exporters.unpoller.loki.tenant_id | Tenant ID to use in Loki.
|
| services.prometheus.exporters.pve.collectors.cluster | Collect PVE cluster info
|
| services.prometheus.exporters.pve.collectors.version | Collect PVE version info
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| services.firezone.relay.lowestPort | The lowest port to use in TURN allocation
|
| services.dolibarr.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.bluesky-pds.settings.PDS_PORT | Port to listen on
|
| services.esphome.enableUnixSocket | Listen on a unix socket /run/esphome/esphome.sock instead of the TCP port.
|
| services.public-inbox.openFirewall | Whether to enable opening the firewall when using a port option.
|
| services.zipline.settings.CORE_PORT | The port to listen on.
|
| services.prometheus.exporters.script.settings.scripts | All settings expressed as an Nix attrset
|
| services.prometheus.exporters.rtl_433.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rtl_433.openFirewall
is true
|
| services.prometheus.exporters.rasdaemon.databasePath | Path to the RAS daemon machine check event database.
|
| services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| services.prometheus.exporters.buildkite-agent.interval | How often to update metrics.
|
| services.prometheus.exporters.apcupsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.apcupsd.openFirewall
is true
|
| services.prometheus.exporters.unbound.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unbound.openFirewall
is true
|
| services.prometheus.exporters.varnish.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.varnish.openFirewall
is true
|
| services.prometheus.exporters.ecoflow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ecoflow.openFirewall
is true
|
| services.prometheus.exporters.bitcoin.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bitcoin.openFirewall
is true
|
| services.prometheus.exporters.dnsmasq.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnsmasq.openFirewall
is true
|
| services.prometheus.exporters.dovecot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dovecot.openFirewall
is true
|
| services.prometheus.exporters.libvirt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.libvirt.openFirewall
is true
|
| services.prometheus.exporters.sabnzbd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sabnzbd.openFirewall
is true
|
| services.prometheus.exporters.process.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.process.openFirewall
is true
|
| services.prometheus.exporters.systemd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.systemd.openFirewall
is true
|
| services.prometheus.exporters.mongodb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mongodb.openFirewall
is true
|
| services.prometheus.exporters.klipper.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.klipper.openFirewall
is true
|
| services.prometheus.exporters.postfix.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postfix.openFirewall
is true
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| services.prometheus.exporters.artifactory.enable | Whether to enable the prometheus artifactory exporter.
|
| services.prometheus.exporters.frr.enabledCollectors | Collectors to enable
|
| services.prometheus.exporters.buildkite-agent.endpoint | The Buildkite Agent API endpoint.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| services.prometheus.exporters.dnsmasq.dnsmasqListenAddress | Address on which dnsmasq listens.
|
| services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| services.dolibarr.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.amule.settings.eMule.Port | TCP port for eD2k connections
|
| services.hologram-agent.dialAddress | Hologram server and port.
|
| services.agorakit.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services._3proxy.services.*.bindPort | Override default port used for service.
|
| services.fediwall.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.lavalink.openFirewall | Whether to expose the port to the network.
|
| services.doh-server.settings.listen | HTTP listen address and port
|
| services.kanboard.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.librenms.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.beszel.agent.openFirewall | Whether to open the firewall port (default 45876).
|
| services.mainsail.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.plausible.mail.smtp.hostPort | The port of your smtp server.
|
| services.static-web-server.listen | The systemd.socket(5) "ListenStream" used in static-web-server.socket
|
| services.matter-server.openFirewall | Whether to open the port in the firewall.
|
| services.pixelfed.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.grafana_reporter.grafana.addr | Grafana address.
|
| services.prometheus.exporters.rtl_433.channels.*.location | Location to match.
|
| services.prometheus.exporters.artifactory.scrapeUri | URI on which to scrape JFrog Artifactory.
|
| services.prometheus.exporters.imap-mailstat.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.imap-mailstat.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.metricsEndpoint | Path under which to expose metrics.
|
| services.prometheus.exporters.ecoflow.ecoflowAccessKeyFile | Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| services.prometheus.exporters.ecoflow.ecoflowSecretKeyFile | Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| services.unifi.openFirewall | Whether or not to open the minimum required ports on the firewall
|
| services.prometheus.exporters.fritz.settings.log_level | Log level to use for the exporter.
|
| services.prometheus.exporters.node.enabledCollectors | Collectors to enable
|
| services.prometheus.exporters.nextcloud.passwordFile | File containing the password for connecting to Nextcloud
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| services.amule.settings.WebServer.Port | Web server port
|
| hardware.infiniband.guids | A list of infiniband port guids on the system
|
| services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| services.neo4j.http.listenAddress | Neo4j listen address for HTTP traffic
|
| services.neo4j.bolt.listenAddress | Neo4j listen address for BOLT traffic
|
| services.prometheus.exporters.nginxlog.settings.consul | Consul integration options
|
| services.prometheus.exporters.frr.disabledCollectors | Collectors to disable which are enabled by default.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.package | Package to use for ghostunnel
|
| services.caddy.openFirewall | Whether to enable opening the specified http(s) ports in the firewall
|
| services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.prometheus.exporters.smokeping.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.pgbouncer.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.junos-czerwonk.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| services.prometheus.exporters.artifactory.extraFlags | Extra commandline options to pass to the artifactory exporter.
|
| services.prometheus.exporters.pgbouncer.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pgbouncer.openFirewall is true.
|
| services.prometheus.exporters.nextcloud.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nextcloud.openFirewall is true.
|
| services.prometheus.exporters.surfboard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.surfboard.openFirewall is true.
|
| services.prometheus.exporters.smokeping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smokeping.openFirewall is true.
|
| services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| services.prometheus.exporters.borgmatic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.borgmatic.openFirewall is true.
|
| services.prometheus.exporters.tailscale.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tailscale.openFirewall is true.
|
| services.prometheus.exporters.buildkite-agent.listenAddress | Address to listen on.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| services.prometheus.exporters.py-air-control.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.py-air-control.openFirewall
is true
|
| services.prometheus.exporters.graphite.mappingSettings | Mapping configuration for the exporter, see
https://github.com/prometheus/graphite_exporter#yaml-config for
available options.
|
| services.prometheus.exporters.junos-czerwonk.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.junos-czerwonk.openFirewall is true.
|
| services.icingaweb2.modules.monitoring.transports | Command transports to define
|
| services.prometheus.exporters.scaphandre.listenAddress | Address to listen on.
|
| services.prometheus.exporters.storagebox.listenAddress | Address to listen on.
|
| services.gemstash.openFirewall | Whether to open the firewall for the port in services.gemstash.bind.
|
| services.endlessh.openFirewall | Whether to open a firewall port for the SSH listener.
|
| services.rtorrent.openFirewall | Whether to open the firewall for the port in services.rtorrent.port.
|
| services.nagios.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| services.moodle.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.node.disabledCollectors | Collectors to disable which are enabled by default.
|
| services.prometheus.exporters.mailman3.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mailman3.openFirewall
is true
|
| services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| services.prometheus.exporters.fritzbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fritzbox.openFirewall
is true
|
| services.prometheus.exporters.opnsense.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.opnsense.openFirewall
is true
|
| services.prometheus.exporters.smartctl.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smartctl.openFirewall
is true
|
| services.prometheus.exporters.mikrotik.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mikrotik.openFirewall
is true
|
| services.prometheus.exporters.influxdb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.influxdb.openFirewall
is true
|
| services.prometheus.exporters.postgres.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postgres.openFirewall
is true
|
| services.prometheus.exporters.nginxlog.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginxlog.openFirewall
is true
|
| services.prometheus.exporters.unpoller.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unpoller.openFirewall
is true
|
| services.prometheus.exporters.blackbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.blackbox.openFirewall
is true
|
| services.prometheus.exporters.collectd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.collectd.openFirewall
is true
|
| services.prometheus.exporters.graphite.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.graphite.openFirewall
is true
|
| services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| services.prometheus.exporters.script.settings.scripts.*.script | Shell script to execute when metrics are requested.
|
| services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| services.tlsrpt.reportd.settings.sender_address | Sender address used for reports.
|
| services.chromadb.openFirewall | Whether to automatically open the specified TCP port in the firewall.
|
| services.davis.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.factorio.openFirewall | Whether to automatically open the specified UDP port in the firewall.
|
| services.firefly-iii.settings.DB_PORT | The port your database is listening at. sqlite does not require
this value to be filled.
|
| services.gemstash.settings.bind | Host and port combination for the server to listen on.
|
| services.endlessh-go.openFirewall | Whether to open a firewall port for the SSH listener.
|
| services.slskd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.taskserver.listenPort | Port number of the Taskserver.
|
| services.movim.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.radicle.httpd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| services.grafana_reporter.templateDir | Optional template directory to use custom tex templates
|
| services.prometheus.exporters.chrony.enabledCollectors | Collectors to enable
|
| services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.pingvin-share.openFirewall | Whether to open the firewall for the port in services.pingvin-share.frontend.port.
|
| services.firezone.relay.highestPort | The highest port to use in TURN allocation
|
| services.neo4j.https.listenAddress | Neo4j listen address for HTTPS traffic
|
| services.scollector.bosunHost | Host and port of the bosun server that will store the collected
data.
|
| services.teamspeak3.queryPort | TCP port opened for ServerQuery connections using the raw telnet protocol.
|
| services.snipe-it.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| services.prometheus.exporters.modemmanager.enable | Whether to enable the prometheus modemmanager exporter.
|
| services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| services.prometheus.exporters.imap-mailstat.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.imap-mailstat.openFirewall
is true
|
| services.prometheus.exporters.script.settings.scripts.*.timeout | Optional timeout for the script in seconds.
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.anuko-time-tracker.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.teamspeak3.querySshPort | TCP port opened for ServerQuery connections using the SSH protocol.
|
| services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.webhook.openFirewall | Open the configured port in the firewall for external ingress traffic
|
| services.prometheus.exporters.collectd.collectdBinary.enable | Whether to enable collectd binary protocol receiver.
|
| services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| services.prometheus.exporters.scaphandre.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| services.prometheus.exporters.pve.collectors.resources | Collect PVE resources info
|
| services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| services.prometheus.exporters.unpoller.controllers | List of Unifi controllers to poll
|
| services.changedetection-io.webDriverSupport | Enable support for fetching web pages using WebDriver and Chromium
|
| services.prometheus.exporters.smokeping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smokeping.openFirewall
is true
|
| services.prometheus.exporters.wireguard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.wireguard.openFirewall
is true
|
| services.prometheus.exporters.nextcloud.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nextcloud.openFirewall
is true
|
| services.prometheus.exporters.borgmatic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.borgmatic.openFirewall
is true
|
| services.prometheus.exporters.surfboard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.surfboard.openFirewall
is true
|
| services.prometheus.exporters.rasdaemon.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rasdaemon.openFirewall
is true
|
| services.prometheus.exporters.pgbouncer.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pgbouncer.openFirewall
is true
|
| services.prometheus.exporters.tailscale.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tailscale.openFirewall
is true
|
| services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| services.dnsdist.dnscrypt.listenPort | Listen port of the endpoint
|
| services.cryptpad.settings.httpPort | Port on which the Node.js server should listen
|
| services.restic.server.listenAddress | Listen on a specific IP address and port or unix socket.
|
| services.prometheus.exporters.unpoller.controllers.*.url | URL of the Unifi controller.
|
| services.prometheus.exporters.junos-czerwonk.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.junos-czerwonk.openFirewall
is true
|
| services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| services.prometheus.exporters.modemmanager.extraFlags | Extra commandline options to pass to the modemmanager exporter.
|
| services.prometheus.exporters.artifactory.listenAddress | Address to listen on.
|
| services.prometheus.exporters.wireguard.interfaces | Specifies the interface(s) passed to the wg show dump parameter
|
| services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| services.librechat.openFirewall | Whether to open the port in the firewall.
|
| services.akkoma.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.bookstack.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.gancio.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.gitea.settings.server.HTTP_PORT | Listen port
|
| services.i2pd.proto.socksProxy.outproxyPort | Upstream outproxy bind port.
|
| services.amule.openExternalConnectPort | Whether to enable open the external connect port.
|
| services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| services.monica.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.matomo.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.teamspeak3.queryHttpPort | TCP port opened for ServerQuery connections using the HTTP protocol.
|
| services.prometheus.exporters.sql.configuration | Exporter configuration as nix attribute set
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| services.prometheus.exporters.opnsense.opnsenseServerAddress | Opnsense IP address of the opnsense appliance
|
| services.prometheus.exporters.ecoflow.scrapingInterval | Scrapping interval in seconds
|
| services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| services.prometheus.exporters.artifactory.artiAccessToken | Access token for authentication against JFrog Artifactory API
|
| services.hatsu.settings.HATSU_LISTEN_PORT | Port where hatsu should listen for incoming requests.
|
| services.immich-public-proxy.openFirewall | Whether to open the IPP port in the firewall
|
| services.patroni.postgresqlPort | The port on which PostgreSQL listens.
|
| services.tailscale.openFirewall | Whether to open the firewall for the specified port.
|
| services.navidrome.settings.Port | Port to run Navidrome on.
|
| services.tinyproxy.settings.Port | Specify which port to listen to.
|
| services.navidrome.openFirewall | Whether to open the TCP port in the firewall
|
| services.zeronet.fileserverPort | Zeronet fileserver port.
|
| services.prometheus.exporters.unpoller.log.prometheusErrors | Whether to enable emitting errors to prometheus.
|
| services.prometheus.exporters.snmp.configuration | Snmp exporter configuration as nix attribute set
|
| services.prometheus.exporters.sql.configuration.jobs | An attrset of metrics scraping jobs to run.
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| services.prometheus.exporters.chrony.disabledCollectors | Collectors to disable which are enabled by default
|
| services.amule.settings.eMule.UDPPort | UDP port for eD2k traffic (searches, source exchange) and all Kad network communication
|
| services.orangefs.server.servers | URLs for storage server including port
|
| services.overseerr.openFirewall | Open a port in the firewall for the Overseerr web interface.
|
| services.prometheus.exporters.artifactory.artiPassword | Password for authentication against JFrog Artifactory API
|
| services.pangolin.openFirewall | Whether to enable opening TCP ports 80 and 443, and UDP port 51820 in the firewall for the Pangolin service(s).
|
| services.grafana_reporter.grafana.protocol | Grafana protocol.
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| services.prometheus.exporters.buildkite-agent.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.buildkite-agent.openFirewall
is true
|
| services.peroxide.settings.UserPortImap | The port on which to listen for IMAP connections.
|
| services.peroxide.settings.UserPortSmtp | The port on which to listen for SMTP connections.
|
| services.blendfarm.serverConfig.Port | Default port blendfarm server listens on.
|
| services.bookstack.settings.DB_PORT | The port your database is listening at.
|
| services.onlyoffice.examplePort | Port the OnlyOffice example server should listen on.
|
| services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| services.local-content-share.openFirewall | Whether to automatically open the specified port in the firewall
|
| services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| services.n8n.environment.N8N_PORT | The HTTP port n8n runs on.
|
| services.pgbouncer.openFirewall | Whether to automatically open the specified TCP port in the firewall.
|
| services.tor.torsocks.fasterServer | IP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP
|
| services.prometheus.exporters.storagebox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.storagebox.openFirewall
is true
|
| services.prometheus.exporters.scaphandre.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.scaphandre.openFirewall
is true
|
| services.prometheus.exporters.snmp.configurationPath | Path to a snmp exporter configuration file
|
| services.prometheus.exporters.artifactory.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.artifactory.openFirewall is true.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| services.prometheus.exporters.opnsense.opnsenseServerProtocol | Opnsense metrics scraper protocol to use
|
| services.prometheus.exporters.unpoller.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| services.prometheus.exporters.wireguard.latestHandshakeDelay | Adds the wireguard_latest_handshake_delay_seconds metric that automatically calculates the seconds passed since the last handshake.
|
| services.dockerRegistry.openFirewall | Opens the port used by the firewall.
|
| services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| programs.localsend.openFirewall | Whether to enable opening the firewall port 53317 for receiving files.
|
| services.hologram-server.listenAddress | Address and port to listen on
|
| services.jirafeau.nginxConfig.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.idrac.configuration | Configuration for iDRAC exporter, as a nix attribute set
|
| services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.exporters.unpoller.controllers.*.sites | List of site names for which statistics should be exported
|
| services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| services.prometheus.exporters.modemmanager.listenAddress | Address to listen on.
|
| services.prometheus.exporters.fritz.settings.devices.*.host_info | Enable extended host info for this device. Warning: This will heavily increase scrape time.
|
| services.firezone.relay.openFirewall | Opens up the main STUN port and the TURN allocation range.
|
| services.home-assistant.openFirewall | Whether to open the firewall for the specified port.
|
| services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| services.prometheus.exporters.tailscale.environmentFile | Environment file containg at least the TAILSCALE_TAILNET,
TAILSCALE_OAUTH_CLIENT_ID, and TAILSCALE_OAUTH_CLIENT_SECRET
environment variables.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.extraArguments | Extra arguments to pass to ghostunnel server
|
| services.icingaweb2.modules.monitoring.mutableTransports | Make commandtransports.ini of the monitoring module mutable (e.g. via the web interface).
|
| services.prometheus.exporters.rasdaemon.enabledCollectors | List of error types to collect from the event database.
|
| services.prometheus.exporters.dnssec.configuration | dnssec exporter configuration as nix attribute set
|
| services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| services.meilisearch.listenPort | The port that Meilisearch will listen on.
|
| services.tmate-ssh-server.advertisedPort | External port advertised to clients
|
| services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| services.zabbixWeb.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| services.zabbixWeb.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| services.prometheus.exporters.collectd.collectdBinary.listenAddress | Address to listen on for binary network packets.
|
| services.pixiecore.openFirewall | Open ports (67, 69, 4011 UDP and 'port', 'statusPort' TCP) in the firewall for Pixiecore.
|
| services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| services.prometheus.exporters.modemmanager.refreshRate | How frequently ModemManager will refresh the extended signal quality
information for each modem
|
| services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| services.acme-dns.settings.general.listen | IP+port combination to bind and serve the DNS server on.
|
| services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| services.suwayomi-server.openFirewall | Whether to open the firewall for the port in services.suwayomi-server.settings.server.port.
|
| services.netbird.server.signal.metricsPort | Internal port of the metrics server.
|
| services.prometheus.exporters.pve.collectors.replication | Collect PVE replication info
|
| services.prometheus.exporters.collectd.collectdBinary.securityLevel | Minimum required security level for accepted packets.
|
| services.prometheus.exporters.artifactory.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.artifactory.openFirewall
is true
|
| services.gitlab.registry.externalPort | External port used to access registry from the internet
|
| services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.icecream.daemon.openFirewall | Whether to automatically open receive port in the firewall.
|
| services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| services.zoneminder.openFirewall | Open the firewall port(s).
|
| services.xinetd.services.*.unlisted | Whether this server is listed in
/etc/services
|
| services.jellyfin.openFirewall | Open the default ports in the firewall for the media server
|
| services.prometheus.exporters.modemmanager.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.modemmanager.openFirewall is true.
|
| services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| services.forgejo.settings.server.HTTP_PORT | Listen port
|
| nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| services.linkwarden.openFirewall | Whether to open the Linkwarden port in the firewall
|
| services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| services.prometheus.exporters.mail.configuration.servers.*.to | Content of 'To' Header for probing mails.
|
| services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| services.eris-server.listenCoap | Server CoAP listen address
|
| services.homepage-dashboard.listenPort | Port for Homepage to bind to.
|
| services.jellyseerr.openFirewall | Open port in the firewall for the Jellyseerr web interface.
|
| services.szurubooru.openFirewall | Whether to open the firewall for the port in services.szurubooru.server.port.
|
| services.taskserver.openFirewall | Whether to open the firewall for the specified Taskserver port.
|
| services.wgautomesh.openFirewall | Automatically open gossip port in firewall (recommended).
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| services.anuko-time-tracker.settings.email.smtpPort | MTA port.
|
| services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.livekit.ingress.openFirewall.rtmp | Open RTMP port in the firewall.
|
| services.pgpkeyserver-lite.hkpPort | Which port the sks-keyserver is listening on.
|
| services.livekit.ingress.openFirewall.whip | Open WHIP port in the firewall.
|
| services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| services.prometheus.exporters.mail.configuration.servers.*.from | Content of 'From' Header for probing mails.
|
| services.prometheus.exporters.unpoller.controllers.*.save_ids | Collect and save data from the intrusion detection system to influxdb and Loki.
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.changedetection-io.playwrightSupport | Enable support for fetching web pages using playwright and Chromium
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| services.SystemdJournal2Gelf.graylogServer | Host and port of your graylog2 input
|
| services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| services.teamspeak3.fileTransferPort | TCP port opened for file transfers.
|
| services.nextcloud.config.dbhost | Database host (+port) or socket path
|
| services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| services.prometheus.exporters.imap-mailstat.configurationFile | File containing the configuration
|
| services.prometheus.exporters.unpoller.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| services.prometheus.exporters.modemmanager.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.modemmanager.openFirewall
is true
|
| services.prometheus.exporters.dmarc.deduplicationMaxSeconds | How long individual report IDs will be remembered to avoid
counting double delivered reports twice.
|
| services.prometheus.exporters.unpoller.controllers.*.save_dpi | Collect and save data from deep packet inspection
|
| services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| programs.kdeconnect.enable | Whether to enable kdeconnect
|
| services.transmission.openRPCPort | Whether to enable opening of the RPC port in the firewall.
|
| services.prometheus.exporters.mikrotik.configuration | Mikrotik exporter configuration as nix attribute set
|
| services.reposilite.openFirewall | Whether to open the firewall ports for Reposilite
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| services.gotosocial.openFirewall | Open the configured port in the firewall
|
| boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| services.radicle.httpd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.silverbullet.listenPort | Port to listen on.
|
| services.pulseaudio.tcp.openFirewall | Whether to enable Open firewall for the specified port.
|
| services.prometheus.exporters.mail.configuration.mailCheckTimeout | Timeout until mails are considered "didn't make it".
|
| services.prometheus.exporters.junos-czerwonk.configuration | JunOS exporter configuration as nix attribute set
|
| services.prometheus.exporters.mail.configuration.servers.*.server | Hostname of the server that should be probed.
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| services.prometheus.exporters.ecoflow.mqttDeviceOfflineThreshold | The threshold in seconds which indicates how long we should wait for a metric message from MQTT broker
|
| services.prometheus.exporters.junos-czerwonk.configurationFile | Specify the JunOS exporter configuration file to use.
|
| services.firezone.server.smtp.implicitTls | Whether to use implicit TLS instead of STARTTLS (usually port 465)
|
| networking.rxe.interfaces | Enable RDMA on the listed interfaces
|
| services.icecream.scheduler.openTelnet | Whether to open the telnet TCP port on 8766.
|
| services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| services.multipath.devices.*.fast_io_fail_tmo | Specify the number of seconds the SCSI layer will wait after a problem has been
detected on a FC remote port before failing I/O to devices on that remote port
|
| services.anuko-time-tracker.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| services.mysql.replication.masterPort | Port number on which the MySQL master server runs.
|
| containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| services.varnish.http_address | HTTP listen address and port.
|
| services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| services.prometheus.exporters.unpoller.controllers.*.save_sites | Collect and save site data.
|
| services.prometheus.exporters.unpoller.controllers.*.verify_ssl | Verify the Unifi controller's certificate.
|
| services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| services.bookstack.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.reposilite.settings.sslPort | SSL port to bind to
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| services.invidious.sig-helper.listenAddress | The IP address/port where inv-sig-helper should listen.
|
| services.gokapi.environment.GOKAPI_PORT | Sets the port of the service.
|
| services.transmission.openPeerPorts | Whether to enable opening of the peer port(s) in the firewall.
|
| services.spacecookie.openFirewall | Whether to open the necessary port in the firewall for spacecookie.
|
| services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| services.moosefs.cgiserver.settings.PORT | Port for CGI server to listen on.
|
| services.lighthouse.beacon.openFirewall | Open the port in the firewall
|
| services.libeufin.nexus.settings.nexus-httpd.PORT | The port on which libeufin-bank should listen.
|
| services.cassandra.allowClients | Enables or disables the native transport server (CQL binary protocol)
|
| services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| services.moosefs.cgiserver.openFirewall | Whether to automatically open the web interface port.
|
| services.neo4j.http.advertisedAddress | Neo4j advertised address for HTTP traffic
|
| services.neo4j.bolt.advertisedAddress | Neo4j advertised address for BOLT traffic
|
| containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| services.limesurvey.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.dragonflydb.memcachePort | To enable memcached compatible API on this port.
null means disabled.
|
| services.netbird.server.management.turnPort | The port of the TURN server to use.
|
| services.tailscale.derper.openFirewall | Whether to open the firewall for the specified port
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| services.mediawiki.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.jirafeau.nginxConfig.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.mail.configuration.disableFileDeletion | Disables the exporter's function to delete probing mails.
|
| services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| services.neo4j.https.advertisedAddress | Neo4j advertised address for HTTPS traffic
|
| services.prometheus.exporters.unpoller.controllers.*.save_events | Collect and save data from UniFi events to influxdb and Loki.
|
| services.prometheus.exporters.unpoller.controllers.*.save_alarms | Collect and save data from UniFi alarms to influxdb and Loki.
|
| services.cryptpad.settings.websocketPort | Port for the websocket that needs to be separate
|
| services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| services.zabbixWeb.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| services.opensearch.settings."network.host" | Which port this service should listen on.
|
| services.adguardhome.openFirewall | Open ports in the firewall for the AdGuard Home web interface
|
| services.icecream.scheduler.openFirewall | Whether to automatically open the daemon port in the firewall.
|
| services.silverbullet.openFirewall | Open port in the firewall.
|
| services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.amule.settings.ExternalConnect.ECPort | TCP port for external connections, like remote control via amule-gui
|
| services.flaresolverr.openFirewall | Open the port in the firewall for FlareSolverr.
|
| services.prometheus.exporters.mail.configuration.servers.*.detectionDir | Directory in which new mails for the exporter user are placed
|
| services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| services.taler.merchant.settings.merchant.PORT | Port on which the HTTP server listens.
|
| services.taler.exchange.settings.exchange.PORT | Port on which the HTTP server listens.
|
| services.your_spotify.settings.PORT | The port of the api server
|
| services.kubernetes.apiserver.securePort | Kubernetes apiserver secure port.
|
| services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| services.libeufin.bank.settings.libeufin-bank.PORT | The port on which libeufin-bank should listen.
|
| services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| services.livekit.ingress.settings.redis.address | Address or hostname and port for redis connection
|
| networking.jool.siit | Definitions of SIIT instances of Jool
|
| services.limesurvey.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.limesurvey.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.mail.configuration.monitoringInterval | Time interval between two probe attempts.
|
| services.grafana.settings.security.strict_transport_security | Set to true if you want to enable HTTP Strict-Transport-Security (HSTS) response header
|
| services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| services.blendfarm.serverConfig.BroadcastPort | Default port blendfarm server advertises itself on.
|
| services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| services.cassandra.rpcAddress | The address or interface to bind the native transport server to
|
| services.kubernetes.apiserverAddress | Clusterwide accessible address for the kubernetes apiserver,
including protocol and optional port.
|
| networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| services.foundationdb.publicAddress | Publicly visible IP address of the process
|
| security.agnos.temporarilyOpenFirewall | When true, will open the port specified in settings.dns_listen_addr
before running the agnos service, and close it when agnos finishes running.
|
| services.foundationdb.listenAddress | Publicly visible IP address of the process
|
| networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| services.netbird.server.management.metricsPort | Internal port of the metrics server.
|
| services.wastebin.settings.WASTEBIN_ADDRESS_PORT | Address and port to bind to
|
| services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| services.wgautomesh.settings.upnp_forward_external_port | Public port number to try to redirect to this machine's Wireguard
daemon using UPnP IGD.
|
| services.epgstation.settings.socketioPort | Socket.io port for EPGStation to listen on
|
| services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| services.firezone.server.openClusterFirewall | Opens up the erlang distribution port of all enabled components to
allow reaching the server cluster from the internet
|
| services.postfix.enableSubmissions | Whether to enable the submissions service configured in master.cf
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| services.kanidm.serverSettings.bindaddress | Address/port combination the webserver binds to.
|
| services.prosody.modules.admin_telnet | Opens telnet console interface on localhost port 5582
|
| services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| services.shibboleth-sp.fastcgi.shibResponderPort | Port for shibauthorizer FastCGI process to bind to
|
| services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|
| services.autossh.sessions.*.monitoringPort | Port to be used by AutoSSH for peer monitoring
|
| services.kanidm.server.settings.bindaddress | Address/port combination the webserver binds to.
|
| services.prometheus.exporters.unpoller.controllers.*.save_anomalies | Collect and save data from UniFi anomalies to influxdb and Loki.
|
| services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| services.misskey.reverseProxy.webserver.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.postfix.enableSubmission | Whether to enable the `submission` service configured in master.cf
|
| services.hadoop.yarn.nodemanager.openFirewall | Open firewall ports for nodemanager
|
| services.taskchampion-sync-server.openFirewall | Whether to enable Open firewall port for taskchampion-sync-server.
|
| services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| services.shibboleth-sp.fastcgi.shibAuthorizerPort | Port for shibauthorizer FastCGI process to bind to
|
| services.nextcloud.notify_push.dbhost | Database host (+port) or socket path
|
| services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|
| services.limesurvey.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.moosefs.cgiserver.settings.GUISERV_LISTEN_PORT | Port for GUI server to listen on.
|
| services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.syncthing.settings.options.localAnnouncePort | The port on which to listen and send IPv4 broadcast announcements to.
|
| services.static-web-server.configuration | Configuration for Static Web Server
|
| services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| services.epgstation.settings.clientSocketioPort | Socket.io port that the web client is going to connect to
|
| services.kubernetes.controllerManager.securePort | Kubernetes controller manager secure listening port.
|
| services.changedetection-io.chromePort | A free port on which webDriverSupport or playwrightSupport listen on localhost.
|
| services.librenms.distributedPoller.rrdcachedPort | Port of the memcached server.
|
| networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| services.librenms.distributedPoller.memcachedPort | Port of the memcached server.
|
| services.nextcloud-spreed-signaling.settings.grpc.listen | IP and port to listen on for GRPC requests
|
| networking.resolvconf.dnsSingleRequest | Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)
address queries at the same time, from the same port
|
| services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| services.matrix-appservice-irc.settings.ircService.mediaProxy.bindPort | Port that the media proxy binds to.
|
| services.nextcloud-spreed-signaling.settings.http.listen | IP and port to listen on for HTTP requests, in the format of ip:port
|
| services.prometheus.alertmanager.openFirewall | Open port in firewall for incoming connections.
|
| virtualisation.podman.networkSocket.openFirewall | Whether to open the port in the firewall.
|
| services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| services.thanos.rule.alertmanagers.urls | Alertmanager replica URLs to push firing alerts
|
| services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| services.lasuite-docs.collaborationServer.settings.PORT | Port used by collaboration server to listen to
|
| services.prometheus.alertmanagerGotify.openFirewall | Opens the bridge port in the firewall.
|
| services.nextcloud-spreed-signaling.settings.https.listen | IP and port to listen on for HTTPS requests, in the format of ip:port
|
| security.agnos.settings.dns_listen_addr | Address for agnos to listen on
|
| services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| services.nextcloud.settings.mail_smtphost | This depends on mail_smtpmode
|
| services.matrix-synapse.workers | Options for configuring workers
|
| services.kanidm.serverSettings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| services.kanidm.server.settings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| services.multipath.devices.*.dev_loss_tmo | Specify the number of seconds the SCSI layer will wait after a problem has
been detected on a FC remote port before removing it from the system
|
| services.borgmatic.settings.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| services.filebeat.settings.output.elasticsearch.hosts | The list of Elasticsearch nodes to connect to
|
| networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| services.tor.relay.role | Your role in Tor network
|
| services.grafana.settings.security.content_security_policy_report_only | Set to true to add the Content-Security-Policy-Report-Only header to your requests
|
| services.headscale.settings.tls_letsencrypt_listen | When HTTP-01 challenge is chosen, letsencrypt must set up a
verification endpoint, and it will be listening on:
:http = port 80.
|
| services.rpcbind.enable | Whether to enable rpcbind, an ONC RPC directory service
notably used by NFS and NIS, and which can be queried
using the rpcinfo(1) command. rpcbind is a replacement for
portmap.
|
| programs.captive-browser.enable | Whether to enable captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
|
| boot.iscsi-initiator.loginAll | Do not log into a specific target on the portal, but to all that we discover
|
| programs.niri.useNautilus | Whether to enable Nautilus as file-chooser for xdg-desktop-portal-gnome.
|
| services.tcsd.enable | Whether to enable tcsd, a Trusted Computing management service
that provides TCG Software Stack (TSS)
|
| programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| services.xserver.windowManager.i3.updateSessionEnvironment | Whether to run dbus-update-activation-environment and systemctl import-environment before session start
|
| boot.iscsi-initiator.discoverPortal | iSCSI portal to boot from.
|
| programs.captive-browser.dhcp-dns | The shell (/bin/sh) command executed to obtain the DHCP
DNS server address
|
| services.udp-over-tcp.tcp2udp | Mapping of TCP listening ports to UDP forwarding ports or configurations.
|
| services.udp-over-tcp.udp2tcp | Mapping of UDP listening ports to TCP forwarding ports or configurations.
|
| power.ups.ups | This is where you configure all the UPSes that this system will be
monitoring directly
|
| nix.firewall.allowedTCPPorts | TCP ports to which traffic is allowed
|
| nix.firewall.allowedUDPPorts | UDP ports to which traffic is allowed
|
| services.openiscsi.discoverPortal | Portal to discover targets on
|
| services.znc.openFirewall | Whether to open ports in the firewall for ZNC
|
| services.prometheus.alertmanager.webExternalUrl | The URL under which Alertmanager is externally reachable (for example, if Alertmanager is served via a reverse proxy)
|
| services.etcd.openFirewall | Open etcd ports in the firewall
|
| services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| services.davis.nginx.listen | Listen addresses and ports for this virtual host
|
| services.movim.nginx.listen | Listen addresses and ports for this virtual host
|
| services.slskd.nginx.listen | Listen addresses and ports for this virtual host
|
| services.snipe-it.nginx.listen | Listen addresses and ports for this virtual host
|
| services.akkoma.nginx.listen | Listen addresses and ports for this virtual host
|
| services.gancio.nginx.listen | Listen addresses and ports for this virtual host
|
| services.fluidd.nginx.listen | Listen addresses and ports for this virtual host
|
| services.monica.nginx.listen | Listen addresses and ports for this virtual host
|
| services.matomo.nginx.listen | Listen addresses and ports for this virtual host
|
| services.technitium-dns-server.openFirewall | Whether to open ports in the firewall
|
| services.nagios.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.moodle.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| power.ups.openFirewall | Open ports in the firewall for upsd.
|
| services.kanboard.nginx.listen | Listen addresses and ports for this virtual host
|
| services.httpd.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.dolibarr.nginx.listen | Listen addresses and ports for this virtual host
|
| services.librenms.nginx.listen | Listen addresses and ports for this virtual host
|
| services.fediwall.nginx.listen | Listen addresses and ports for this virtual host
|
| services.agorakit.nginx.listen | Listen addresses and ports for this virtual host
|
| services.mainsail.nginx.listen | Listen addresses and ports for this virtual host
|
| services.pixelfed.nginx.listen | Listen addresses and ports for this virtual host
|
| services.broadcast-box.openFirewall | Whether to enable opening WebRTC traffic ports in the firewall
|
| services.radicle.httpd.nginx.listen | Listen addresses and ports for this virtual host
|
| services.anuko-time-tracker.nginx.listen | Listen addresses and ports for this virtual host
|
| services.nginx.virtualHosts.<name>.listen | Listen addresses and ports for this virtual host
|
| services.bookstack.nginx.listen | Listen addresses and ports for this virtual host
|
| services.diod.listen | [ "IP:PORT" [,"IP:PORT",...] ]
List the interfaces and ports that diod should listen on.
|
| services.zabbixWeb.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.drupal.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.jirafeau.nginxConfig.listen | Listen addresses and ports for this virtual host
|
| services.zabbixWeb.nginx.virtualHost.listen | Listen addresses and ports for this virtual host
|
| services.irkerd.openPorts | Open ports in the firewall for irkerd
|
| services.zammad.openPorts | Whether to open firewall ports for Zammad
|
| services.limesurvey.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.microsocks.enable | Whether to enable Tiny, portable SOCKS5 server with very moderate resource usage.
|
| services.fedimintd.<name>.nginx.config.listen | Listen addresses and ports for this virtual host
|
| services.mediawiki.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| systemd.sysupdate.enable | Atomically update the host OS, container images, portable service
images or other sources
|
| services.wordpress.sites.<name>.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| hardware.pcmcia.config | Path to the configuration file which maps the memory, IRQs
and ports used by the PCMCIA hardware.
|
| services.prosody.httpPorts | Listening HTTP ports list for this service.
|
| services.qui.openFirewall | Whether or not to open ports in the firewall for qui.
|
| services.n8n.openFirewall | Open ports in the firewall for the n8n web interface.
|
| services.limesurvey.httpd.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.technitium-dns-server.firewallTCPPorts | List of TCP ports to open in firewall
|
| services.prosody.httpsPorts | Listening HTTPS ports list for this service.
|
| services.send.openFirewall | Whether to open firewall ports for send
|
| services.plex.openFirewall | Open ports in the firewall for the media server.
|
| programs.mosh.openFirewall | Whether to automatically open the necessary ports in the firewall.
|
| services.kresd.listenPlain | What addresses and ports the server should listen on
|
| services.kresd.listenTLS | Addresses and ports on which kresd should provide DNS over TLS (see RFC 7858)
|
| services.node-red.openFirewall | Open ports in the firewall for the server.
|
| services.ombi.openFirewall | Open ports in the firewall for the Ombi web interface.
|
| services.limesurvey.nginx.virtualHost.listen | Listen addresses and ports for this virtual host
|
| services.code-server.proxyDomain | Domain used for proxying ports.
|
| services.davis.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| programs.alvr.openFirewall | Whether to open the default ports in the firewall for the ALVR server.
|
| services.kresd.listenDoH | Addresses and ports on which kresd should provide DNS over HTTPS/2 (see RFC 8484)
|
| services.ergo.openFirewall | Open ports in the firewall for the Ergo node as well as the API.
|
| services.slskd.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.plikd.openFirewall | Open ports in the firewall for the plikd.
|
| services.tang.listenStream | Addresses and/or ports on which tang should listen
|
| services.movim.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.omnom.openFirewall | Whether to open ports in the firewall.
|
| services.searx.uwsgiConfig | Additional configuration of the uWSGI vassal running searx
|
| services.atuin.openFirewall | Open ports in the firewall for the atuin server.
|
| services.memos.openFirewall | Whether to enable opening the ports in the firewall.
|
| services.mympd.openFirewall | Open ports needed for the functionality of the program.
|
| services.snipe-it.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.keter.enable | Whether to enable keter, a web app deployment manager
|
| services.paisa.openFirewall | Open ports in the firewall for the Paisa web server.
|
| services.stash.openFirewall | Open ports in the firewall for the Stash web interface.
|
| virtualisation.forwardPorts | When using the SLiRP user networking (default), this option allows to
forward ports to/from the host/guest.
If the NixOS firewall on the virtual machine is enabled, you also
have to open the guest ports to enable the traffic between host and
guest.
Currently QEMU supports only IPv4 forwarding.
|
| services.iperf3.openFirewall | Open ports in the firewall for iperf3.
|
| services.karma.openFirewall | Whether to open ports in the firewall needed for karma to function.
|
| services.nix-serve.openFirewall | Open ports in the firewall for nix-serve.
|
| services.rqbit.openFirewall | Whether to enable opening of the HTTP and Peer ports in the firewall.
|
| services.shoko.openFirewall | Open ports in the firewall for the ShokoAnime api and web interface.
|
| services.samba.openFirewall | Whether to enable opening the default ports in the firewall for Samba.
|
| services.maddy.openFirewall | Open the configured incoming and outgoing mail server ports.
|
| services.wivrn.openFirewall | Whether to enable the default ports in the firewall for the WiVRn server.
|
| nix.daemonIOSchedClass | Nix daemon process I/O scheduling class
|
| services.lidarr.openFirewall | Open ports in the firewall for Lidarr
|
| services.fluidd.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.akkoma.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.gancio.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.llama-cpp.openFirewall | Open ports in the firewall for LLaMA C++ server.
|
| services.matomo.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.monica.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| programs.weylus.openFirewall | Open ports needed for the functionality of the program.
|
| services.h2o.defaultTLSListenPort | If hosts do not specify listen.port, use these ports for SSL by default.
|
| systemd.network.wait-online.anyInterface | Whether to consider the network online when any interface is online, as opposed to all of them
|
| services.deconz.openFirewall | Whether to enable opening up the service ports in the firewall.
|
| hardware.sane.openFirewall | Open ports needed for discovery of scanners on the local network, e.g.
needed for Canon scanners (BJNP protocol).
|
| services.bazarr.openFirewall | Open ports in the firewall for the bazarr web interface.
|
| services.samba-wsdd.openFirewall | Whether to open the required firewall ports in the firewall.
|
| services.sonarr.openFirewall | Open ports in the firewall for the Sonarr web interface
|
| services.nitter.openFirewall | Open ports in the firewall for Nitter web interface.
|
| services.radarr.openFirewall | Open ports in the firewall for the Radarr web interface.
|
| services.redlib.openFirewall | Open ports in the firewall for the redlib web interface
|
| services.misskey.reverseProxy.webserver.nginx.listen | Listen addresses and ports for this virtual host
|
| services.h2o.defaultHTTPListenPort | If hosts do not specify listen.port, use these ports for HTTP by default.
|
| services.murmur.openFirewall | Whether to enable opening ports in the firewall for the Mumble server.
|
| services.openarena.openPorts | Whether to open firewall ports for OpenArena
|
| services.teeworlds.openPorts | Whether to open firewall ports for Teeworlds.
|
| services.roon-server.openFirewall | Open ports in the firewall for the server.
|
| services.roon-bridge.openFirewall | Open ports in the firewall for the bridge.
|
| services.veilid.openFirewall | Whether to open firewall on ports 5150/tcp, 5150/udp
|
| services.vwifi.server.extraArgs | Extra arguments to pass to vwifi-server
|
| services.corteza.openFirewall | Whether to open ports in the firewall.
|
| services.grafana.openFirewall | Open the ports in the firewall for the server.
|
| services.mchprs.openFirewall | Whether to open ports in the firewall for the server
|
| services.mpd.openFirewall | Open ports in the firewall for mpd
|
| services.readarr.openFirewall | Open ports in the firewall for Readarr
|
| services.firewalld.settings.StrictForwardPorts | If enabled, the generated destination NAT (DNAT) rules will NOT accept traffic that was DNAT'd by other entities, e.g. docker
|
| services.deluge.web.openFirewall | Open ports in the firewall for deluge web daemon
|
| services.nginx.defaultSSLListenPort | If vhosts do not specify listen.port, use these ports for SSL by default.
|
| services.owncast.openFirewall | Open the appropriate ports in the firewall for owncast.
|
| services.vmagent.openFirewall | Whether to open the firewall for the default ports.
|
| services.vlagent.openFirewall | Whether to open the firewall for the default ports.
|
| services.autobrr.openFirewall | Open ports in the firewall for the Autobrr web interface.
|
| programs.winbox.openFirewall | Whether to open ports for the MikroTik Neighbor Discovery protocol
|
| services.calibre-web.openFirewall | Open ports in the firewall for the server.
|
| services.jackett.openFirewall | Open ports in the firewall for the Jackett web interface.
|
| services.sharkey.openFirewall | Whether to open ports in the NixOS firewall for Sharkey.
|
| services.openssh.openFirewall | Whether to automatically open the specified ports in the firewall.
|
| services.pihole-ftl.openFirewallDNS | Open ports in the firewall for pihole-FTL's DNS server.
|
| services.umurmur.openFirewall | Open ports in the firewall for the uMurmur Mumble server.
|
| services.serviio.openFirewall | Open ports in the firewall for the Serviio Media Server.
|
| services.sabnzbd.openFirewall | Open ports in the firewall for the sabnzbd web interface
|
| services.pdfding.openFirewall | Open ports in the firewall for the PdfDing web interface.
|
| services.kthxbye.openFirewall | Whether to open ports in the firewall needed for the daemon to function.
|
| services.nginx.defaultHTTPListenPort | If vhosts do not specify listen.port, use these ports for HTTP by default.
|
| services.zabbixAgent.openFirewall | Open ports in the firewall for the Zabbix Agent.
|
| services.zabbixProxy.openFirewall | Open ports in the firewall for the Zabbix Proxy.
|
| services.pihole-ftl.openFirewallDHCP | Open ports in the firewall for pihole-FTL's DHCP server.
|
| services.druid.broker.openFirewall | Open firewall ports for Druid Broker.
|
| services.druid.router.openFirewall | Open firewall ports for Druid Router.
|
| services.kanboard.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.librenms.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.dolibarr.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.devpi-server.openFirewall | Whether to enable opening the default ports in the firewall for Devpi Server.
|
| services.agorakit.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.fediwall.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.tmate-ssh-server.openFirewall | Whether to automatically open the specified ports in the firewall.
|
| services.terraria.openFirewall | Whether to open ports in the firewall
|
| services.metabase.openFirewall | Open ports in the firewall for Metabase.
|
| services.mainsail.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.pixelfed.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.tautulli.openFirewall | Open ports in the firewall for Tautulli.
|
| services.hardware.lcd.server.openPorts | Open the ports in the firewall
|
| services.ersatztv.openFirewall | Open the default ports in the firewall for the server.
|
| services.spoolman.openFirewall | Open the appropriate ports in the firewall for spoolman.
|
| services.sunshine.openFirewall | Whether to automatically open ports in the firewall.
|
| services.vwifi.server.openFirewall | Whether to enable opening the firewall for the TCP and spy ports.
|
| services.zabbixServer.openFirewall | Open ports in the firewall for the Zabbix Server.
|
| services.crowdsec.openFirewall | Whether to automatically open firewall ports for crowdsec.
|
| services.nagios.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.moodle.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.prowlarr.openFirewall | Open ports in the firewall for the Prowlarr web interface.
|
| services.whisparr.openFirewall | Open ports in the firewall for the Whisparr web interface.
|
| networking.nat.forwardPorts | List of forwarded ports from the external interface to
internal destinations by using DNAT
|
| programs.envision.openFirewall | Whether to enable the default ports in the firewall for the WiVRn server.
|
| services.scrutiny.openFirewall | Whether to enable opening the default ports in the firewall for Scrutiny.
|
| services.radicle.httpd.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| boot.initrd.systemd.network.wait-online.anyInterface | Whether to consider the network online when any interface is online, as opposed to all of them
|
| programs.steam.remotePlay.openFirewall | Open ports in the firewall for Steam Remote Play.
|
| services.printing.openFirewall | Whether to open the firewall for TCP ports specified in
listenAddresses option.
|
| services.davis.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.httpd.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.kubo.localDiscovery | Whether to enable local discovery for the Kubo daemon
|
| services.anuko-time-tracker.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.hadoop.hbase.rest.openFirewall | Open firewall ports for HBase rest.
|
| services.minidlna.openFirewall | Whether to enable opening HTTP (TCP) and SSDP (UDP) ports in the firewall.
|
| services.stalwart.openFirewall | Whether to open TCP firewall ports, which are specified in
services.stalwart.settings.server.listener on all interfaces.
|
| services.slskd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.movim.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.nginx.virtualHosts.<name>.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.etebase-server.openFirewall | Whether to open ports in the firewall for the server.
|
| services.libeufin.bank.openFirewall | Whether to open ports in the firewall
|
| services.snipe-it.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.bookstack.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.bitmagnet.openFirewall | Open DHT ports in firewall
|
| services.octoprint.openFirewall | Open ports in the firewall for OctoPrint.
|
| nix.daemonCPUSchedPolicy | Nix daemon process CPU scheduling policy
|
| programs.fcast-receiver.openFirewall | Open ports needed for the functionality of the program.
|
| services.calibre-server.openFirewall | Open ports in the firewall for the Calibre Server web interface.
|
| services.netbird.server.coturn.openPorts | The list of ports used by coturn for listening to open in the firewall.
|
| services.nzbhydra2.openFirewall | Open ports in the firewall for the NZBHydra2 web interface.
|
| services.udp-over-tcp.tcp2udp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| services.udp-over-tcp.udp2tcp.<name>.openFirewall | Open the appropriate ports in the firewall.
|
| services.redis.servers.<name>.openFirewall | Whether to open ports in the firewall for the server.
|
| services.libeufin.nexus.openFirewall | Whether to open ports in the firewall
|
| services.lanraragi.openFirewall | Open ports in the firewall for LANraragi's web interface.
|
| services.hadoop.hdfs.httpfs.openFirewall | Open firewall ports for HDFS JournalNode.
|
| services.gancio.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.hqplayerd.openFirewall | Opens ports needed for the WebUI and controller API.
|
| services.fluidd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.akkoma.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.monica.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.saunafs.master.openFirewall | Whether to automatically open the necessary ports in the firewall.
|
| services.taler.exchange.openFirewall | Whether to open ports in the firewall
|
| services.pinchflat.openFirewall | Open ports in the firewall for the Pinchflat web interface
|
| services.taler.merchant.openFirewall | Whether to open ports in the firewall
|
| services.matomo.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.stalwart-mail.openFirewall | Whether to open TCP firewall ports, which are specified in
services.stalwart-mail.settings.server.listener on all interfaces.
|
| networking.firewall.enable | Whether to enable the firewall
|
| services.druid.overlord.openFirewall | Open firewall ports for Druid Overlord.
|
| services.cockroachdb.openPorts | Open firewall ports for cluster communication by default
|
| services.moosefs.master.openFirewall | Whether to automatically open required firewall ports for master service.
|
| services.jirafeau.nginxConfig.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| services.hadoop.hbase.thrift.openFirewall | Open firewall ports for HBase thrift.
|
| services.hadoop.hbase.master.openFirewall | Open firewall ports for HBase master.
|
| services.zabbixWeb.nginx.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.zabbixWeb.httpd.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| networking.firewall.allowedUDPPorts | List of open UDP ports.
|
| services.printing.listenAddresses | A list of addresses and ports on which to listen.
|
| services.druid.middleManager.openFirewall | Open firewall ports for Druid middleManager.
|
| services.drupal.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services._3proxy.services.*.acl.*.targetPorts | List of target ports, use empty list for any.
|
| services.karakeep.browser.enable | Enable the karakeep-browser service that runs a chromium instance in
the background with debugging ports exposed
|
| services.teamspeak3.openFirewall | Open ports in the firewall for the TeamSpeak3 server.
|
| services.beanstalkd.openFirewall | Whether to open ports in the firewall for the server.
|
| services.firewalld.zones.<name>.forwardPorts | Ports to forward in the zone.
|
| networking.firewall.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| services.livekit.ingress.openFirewall.rtc | Open WebRTC ports in the firewall.
|
| services.sftpgo.settings.ftpd.bindings | Configure listen addresses and ports for ftpd.
|
| services.lubelogger.openFirewall | Open ports in the firewall for the LubeLogger web interface.
|
| services.snapserver.openFirewall | Whether to automatically open the specified ports in the firewall.
|
| services.homebridge.openFirewall | Open ports in the firewall for the Homebridge web interface and service.
|
| services.rustdesk-server.openFirewall | Open the connection ports
|
| services.lasuite-meet.livekit.openFirewall | Whether to enable Open firewall ports for livekit.
|
| services.davis.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.crossfire-server.openFirewall | Whether to open ports in the firewall for the server.
|
| services.movim.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.sftpgo.settings.httpd.bindings | Configure listen addresses and ports for httpd.
|
| services.minecraft-server.openFirewall | Whether to open ports in the firewall for the server.
|
| services.sftpgo.settings.sftpd.bindings | Configure listen addresses and ports for sftpd.
|
| services.slskd.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.hadoop.hdfs.datanode.openFirewall | Open firewall ports for HDFS DataNode.
|
| services.dolibarr.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.hadoop.hdfs.namenode.openFirewall | Open firewall ports for HDFS NameNode.
|
| services.fediwall.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.librenms.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.kanboard.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.agorakit.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.moodle.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.pixelfed.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.mainsail.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.snipe-it.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.nagios.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.cloudflare-warp.openFirewall | Whether to enable opening UDP ports in the firewall.
|
| programs.ausweisapp.openFirewall | Whether to open the required firewall ports for the Smartphone as Card Reader (SaC) functionality of AusweisApp.
|
| networking.firewall.allowedUDPPortRanges | Range of open UDP ports.
|
| services.hadoop.hbase.regionServer.openFirewall | Open firewall ports for HBase regionServer.
|
| services.fluidd.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.httpd.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.akkoma.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.gancio.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.monica.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.matomo.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.radicle.httpd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| networking.firewall.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| services.fedimintd.<name>.nginx.config.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.openssh.settings.GatewayPorts | Specifies whether remote hosts are allowed to connect to
ports forwarded for the client
|
| services.pihole-ftl.openFirewallWebserver | Open ports in the firewall for pihole-FTL's webserver, as configured in settings.webserver.port.
|
| services.anuko-time-tracker.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.druid.historical.openFirewall | Open firewall ports for Druid Historical.
|
| services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| networking.firewall.interfaces | Interface-specific open ports.
|
| services.filebrowser.openFirewall | Whether to enable opening firewall ports for FileBrowser.
|
| services.firewalld.services.<name>.sourcePorts | Source ports for the service.
|
| services.mirakurun.openFirewall | Open ports in the firewall for Mirakurun.
Exposing Mirakurun to the open internet is generally advised
against
|
| services.bookstack.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.limesurvey.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.sftpgo.settings.webdavd.bindings | Configure listen addresses and ports for webdavd.
|
| programs.steam.dedicatedServer.openFirewall | Open ports in the firewall for Source Dedicated Server.
|
| services.homepage-dashboard.openFirewall | Open ports in the firewall for Homepage.
|
| services.mediawiki.httpd.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.matrix-appservice-irc.needBindingCap | Whether the daemon needs to bind to ports below 1024 (e.g. for the ident service)
|
| services.multipath.devices.*.all_tg_pt | Set the 'all targets ports' flag when registering keys with mpathpersist
|
| services.zabbixWeb.httpd.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.jirafeau.nginxConfig.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.jitsi-videobridge.openFirewall | Whether to open ports in the firewall for the videobridge.
|
| services.moodle.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.nagios.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.drupal.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.zabbixWeb.nginx.virtualHost.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.wordpress.sites.<name>.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.librenms.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.fediwall.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.kanboard.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.druid.coordinator.openFirewall | Open firewall ports for Druid Coordinator.
|
| services.agorakit.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.dolibarr.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.mainsail.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.pixelfed.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.technitium-dns-server.firewallUDPPorts | List of UDP ports to open in firewall.
|
| services.invidious.serviceScale | How many invidious instances to run
|
| services.httpd.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| services.photonvision.openFirewall | Whether to open the required ports in the firewall.
|
| services.epgstation.openFirewall | Open ports in the firewall for the EPGStation web interface.
Exposing EPGStation to the open internet is generally advised
against
|
| services.teamspeak3.openFirewallServerQuery | Open ports in the firewall for the TeamSpeak3 serverquery (administration) system
|
| services.limesurvey.nginx.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.limesurvey.httpd.virtualHost.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.radicle.httpd.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.sslh.settings.transparent | Whether the services behind sslh (Apache, sshd and so on) will see the
external IP and ports as if the external world connected directly to
them.
|
| services.anuko-time-tracker.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.nginx.virtualHosts.<name>.listenAddresses | Listen addresses for this virtual host
|
| services.foundationdb.openFirewall | Open the firewall ports corresponding to FoundationDB processes and coordinators
using config.networking.firewall.*.
|
| services.bookstack.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.netbird.tunnels.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| services.kubernetes.flannel.openFirewallPorts | Whether to open the Flannel UDP ports in the firewall on all interfaces.
|
| services.zabbixWeb.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.fedimintd.<name>.nginx.config.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.hadoop.hdfs.journalnode.openFirewall | Open firewall ports for HDFS JournalNode.
|
| services.saunafs.chunkserver.openFirewall | Whether to automatically open the necessary ports in the firewall.
|
| services.drupal.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.jirafeau.nginxConfig.listenAddresses | Listen addresses for this virtual host
|
| services.limesurvey.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.moosefs.chunkserver.openFirewall | Whether to automatically open required firewall ports for chunkserver service.
|
| services.torrentstream.openFirewall | Open ports in the firewall for TorrentStream daemon.
|
| programs.steam.localNetworkGameTransfers.openFirewall | Open ports in the firewall for Steam Local Network Game Transfers.
|
| services.mediawiki.httpd.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.zabbixWeb.nginx.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.misskey.reverseProxy.webserver.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.wordpress.sites.<name>.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.limesurvey.httpd.virtualHost.forceSSL | Whether to add a separate nginx server block that permanently redirects (301)
all plain HTTP traffic to HTTPS
|
| services.graylog.elasticsearchHosts | List of valid URIs of the http ports of your elastic nodes
|
| networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| services.limesurvey.nginx.virtualHost.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.limesurvey.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.fedimintd.<name>.nginx.config.listenAddresses | Listen addresses for this virtual host
|
| services.audiobookshelf.openFirewall | Open ports in the firewall for the Audiobookshelf web interface.
|
| networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| services.mediawiki.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.librenms.useDistributedPollers | Enables distributed pollers
for this LibreNMS instance
|
| services.wordpress.sites.<name>.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.yggdrasil-jumper.appendListenAddresses | Append Yggdrasil router configuration with listeners on loopback
addresses (127.0.0.1) and preselected ports to support peering
using client-server protocols like quic and tls
|
| networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| services.limesurvey.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.misskey.reverseProxy.webserver.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.limesurvey.nginx.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.misskey.reverseProxy.webserver.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.hadoop.yarn.resourcemanager.openFirewall | Open firewall ports for resourcemanager
|
| services.matrix-synapse.workers.<name>.worker_listeners | List of ports that this worker should listen on, their purpose and their configuration.
|
| services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|