| services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| services.authelia.instances.<name>.package | The authelia package to use.
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| services.authelia.instances.<name>.settings.theme | The theme to display.
|
| services.trickster.instance-id | Instance ID for when running multiple processes (default null).
|
| services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| services.uwsgi.instance | uWSGI configuration
|
| services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| services.lifecycled.instanceId | The instance ID to listen for events for.
|
| services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| services.kanidm.provision.instanceUrl | The instance url to which the provisioning tool should connect.
|
| services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| services.akkoma.config.":pleroma".":instance".email | Instance administrator email.
|
| services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| services.btrbk.instances | Set of btrbk instances
|
| services.errbot.instances | Errbot instance configs
|
| services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| services.vault-agent.instances | Attribute set of vault-agent instances
|
| services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| services.akkoma.config.":pleroma".":instance".description | Instance description.
|
| services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| services.easytier.instances.<name>.enable | Enable the instance.
|
| services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| services.frp.instances | Frp instances.
|
| services.consul-template.instances | Attribute set of consul-template instances
|
| services.consul-template.instances.<name>.user | User under which this instance runs.
|
| services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| services.easytier.instances.<name>.configFile | Path to easytier config file
|
| nix.package | This option specifies the Nix package instance to use throughout the system.
|
| services.ytdl-sub.instances | Configuration for ytdl-sub instances.
|
| services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| services.akkoma.config.":pleroma".":instance".upload_dir | Directory where Akkoma will put uploaded files.
|
| services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| services.v4l2-relayd.instances | v4l2-relayd instances to be created.
|
| services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| services.vmalert.instances | Define multiple instances of vmalert.
|
| services.frp.instances.<name>.enable | Whether to enable frp.
|
| services.kresd.instances | The number of instances to start
|
| services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| services.nexus.home | Home directory of the Nexus3 instance.
|
| services.anubis.instances | An attribute set of Anubis instances
|
| services.frp.instances.<name>.role | The frp consists of client and server
|
| services.easytier.instances | EasyTier instances.
|
| services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| services.clamsmtp.instances | Instances of clamsmtp to run.
|
| services.fcgiwrap.instances | Configuration for fcgiwrap instances.
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| services.grocy.hostName | FQDN for the grocy instance.
|
| services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| services.mailpit.instances | Configure mailpit instances
|
| services.errbot.instances.<name>.logLevel | Errbot log level
|
| services.pantalaimon-headless.instances | Declarative instance config
|
| services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| services.nylon.<name>.name | The name of this nylon instance.
|
| services.neo4j.readOnly | Only allow read operations from this Neo4j instance.
|
| services.anubis.instances.<name>.user | The user under which Anubis is run
|
| services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| services.ntopng.redis.createInstance | Local Redis instance name
|
| services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| services.anubis.instances.<name>.policy | Anubis policy configuration
|
| services.anubis.instances.<name>.group | The group under which Anubis is run
|
| services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| services.movim.enable | Whether to enable a Movim instance.
|
| services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| services.mobilizon.settings.":mobilizon".":instance".email_from | The email for the From: header in emails
|
| services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| services.errbot.instances.<name>.backend | Errbot backend name.
|
| services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| services.jitsi-meet.hostName | FQDN of the Jitsi Meet instance.
|
| services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| services.hydra.hydraURL | The base URL for the Hydra webserver instance
|
| services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| services.gitea-actions-runner.instances | Gitea Actions Runner instances.
|
| services.jboss.serverDir | Location of the server instance files
|
| services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| services.uhub.<name>.enable | Whether to enable hub instance.
|
| services.vault-agent.instances.<name>.package | The vault package to use.
|
| services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| services.mysql.replication.serverId | Id of the MySQL server instance
|
| services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| services.errbot.instances.<name>.identity | Errbot identity configuration
|
| services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| services.clamsmtp.instances.*.listen | Address to wait for incoming SMTP connections on
|
| services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| services.clamsmtp.instances.*.timeout | Time-out for network connections.
|
| services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.clamsmtp.instances.*.header | A header to add to scanned messages
|
| services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| services.clamsmtp.instances.*.action | Action to take when a virus is detected
|
| services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| services.clamsmtp.instances.*.xClient | Send the XCLIENT command to the receiving server, for forwarding
client addresses and connection information if the receiving
server supports this feature.
|
| services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| services.clamsmtp.instances.*.outAddress | Address of the SMTP server to send email to once it has been
scanned.
|
| services.sogo.timezone | Timezone of your SOGo instance
|
| services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| services.sympa.domains | Email domains handled by this instance
|
| services.clamsmtp.instances.*.keepAlives | Number of seconds to wait between each NOOP sent to the sending
server. 0 to disable
|
| services.nitter.server.title | Title of the instance.
|
| services.clamsmtp.instances.*.virusAction | Command to run when a virus is found
|
| services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| services.livekit.redis.port | Port to bind local redis instance to.
|
| services.livekit.redis.host | Address to bind local redis instance to.
|
| services.radicle.ci.adapters.native.instances | radicle-native-ci adapter instances.
|
| services.graylog.isMaster | Whether this is the master instance of your Graylog cluster
|
| services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| services.jirafeau.hostName | URL of instance
|
| services.lasuite-docs.domain | Domain name of the docs instance.
|
| services.lasuite-meet.domain | Domain name of the meet instance.
|
| services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| services.mobilizon.settings.":mobilizon".":instance".email_reply_to | The email for the Reply-To: header in emails
|
| services.consul-template.instances.<name>.package | The consul-template package to use.
|
| services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| services.taler.runtimeDir | Runtime directory shared between the taler services
|
| services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| services.kanboard.domain | FQDN for the Kanboard instance.
|
| services.pixelfed.domain | FQDN for the Pixelfed instance.
|
| services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| services.peertube-runner.instancesToRegister | PeerTube instances to register this runner with.
|
| services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| services.pixelfed.enable | Whether to enable a Pixelfed instance.
|
| services.ocis.package | Which package to use for the ownCloud Infinite Scale instance.
|
| services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| services.clamsmtp.instances.*.tempDirectory | Temporary directory that needs to be accessible to both clamd
and clamsmtpd.
|
| services.h2o.hosts | The hosts config to be merged with the settings
|
| services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| services.weblate.localDomain | The domain name serving your Weblate instance.
|
| services.froide-govplan.hostName | FQDN for the froide-govplan instance.
|
| services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| networking.jool.siit | Definitions of SIIT instances of Jool
|
| services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| services.nextcloud.occ | The nextcloud-occ program preconfigured to target this Nextcloud instance.
|
| services.uptime.usesRemoteMongo | Whether the configuration file specifies a remote mongo instance
|
| services.vlagent.remoteWrite.url | Endpoint for the victorialogs instance
|
| services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| services.smokeping.owner | Real name of the owner of the instance
|
| services.nextcloud.hostName | FQDN for the nextcloud instance.
|
| services.rutorrent.hostName | FQDN for the ruTorrent instance.
|
| services.clamsmtp.instances.*.quarantine | Whether to quarantine files that contain viruses by leaving them
in the temporary directory.
|
| services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| services.alerta.databaseName | Name of the database instance to connect to
|
| services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| services.plantuml-server.home | Home directory of the PlantUML server instance.
|
| services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| services.jitsi-meet.jibri.enable | Whether to enable a Jibri instance and configure it to connect to Prosody
|
| services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| services.castopod.localDomain | The domain serving your CastoPod instance.
|
| services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| services.peertube.localDomain | The domain serving your PeerTube instance.
|
| services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| services.cfssl.mutualTlsClientCert | Mutual TLS - client certificate to call remote instance requiring client certs.
|
| services.jitsi-meet.jicofo.enable | Whether to enable JiCoFo instance and configure it to connect to Prosody
|
| services.librenms.distributedPoller.enable | Configure this LibreNMS instance as a distributed poller
|
| services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| services.clamsmtp.instances.*.maxConnections | Maximum number of connections to accept at once.
|
| services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| services.immich-public-proxy.immichUrl | URL of the Immich instance
|
| services.jitsi-meet.jigasi.enable | Whether to enable jigasi instance and configure it to connect to Prosody
|
| services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| services.mattermost.host | Host or address that this Mattermost instance listens on.
|
| services.nitter.server.hostname | Hostname of the instance.
|
| services.hologram-agent.enable | Whether to enable the Hologram agent for AWS instance credentials
|
| services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| services.clamsmtp.instances.*.transparentProxy | Enable clamsmtp's transparent proxy support.
|
| services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| services.rethinkdb.dbpath | Location where RethinkDB stores its data, 1 data directory per instance.
|
| services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| services.syncplay.salt | Salt to allow room operator passwords generated by this server
instance to still work when the server is restarted
|
| services.pretix.settings.pretix.instance_name | The name of this installation.
|
| services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| services.mattermost.siteUrl | URL this Mattermost instance is reachable under, without trailing slash.
|
| services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| services.pretalx.settings.site.url | The base URI below which your pretalx instance will be reachable.
|
| services.hologram-server.enable | Whether to enable the Hologram server for AWS instance credentials
|
| services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| services.akkoma.installWrapper | Whether to install a wrapper around pleroma_ctl to simplify administration of the
Akkoma instance.
|
| services.openssh.startWhenNeeded | If set, sshd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start an instance for each incoming connection.
|
| services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| services.roundcube.extraConfig | Extra configuration for roundcube webmail instance
|
| services.syncplay.saltFile | Path to the file that contains the server salt
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.librechat.enableLocalDB | Whether to enable a local mongodb instance.
|
| services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.peertube.enableWebHttps | Whether clients will access your PeerTube instance with HTTPS
|
| services.livekit.redis.createLocally | Whether to set up a local redis instance.
|
| services.teamspeak3.queryIP | IP on which the server instance will listen for incoming ServerQuery connections
|
| services.teamspeak3.voiceIP | IP on which the server instance will listen for incoming voice connections
|
| services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| services.send.redis.passwordFile | The path to the file containing the Redis password
|
| services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| services.cryptpad.settings | Cryptpad configuration settings
|
| services.misskey.redis.createLocally | Create and use a local Redis instance
|
| security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| services.anubis.defaultOptions.enable | Whether to enable this instance of Anubis.
|
| services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.filesender.localDomain | The domain serving your FileSender instance.
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| services.ncps.cache.redis.addresses | A list of host:port for the Redis servers that are part of a cluster
|
| services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.kanidm.serverSettings.origin | The origin of your Kanidm instance
|
| services.lemmy.database.createLocally | Whether to enable creation of database on the instance.
|
| services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| services.mysql.replication.role | Role of the MySQL server instance.
|
| services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| services.kanidm.server.settings.origin | The origin of your Kanidm instance
|
| services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| services.pfix-srsd.configurePostfix | Whether to configure the required settings to use pfix-srsd in the local Postfix instance.
|
| services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| services.nextcloud.datadir | Nextcloud's data storage path
|
| services.karakeep.browser.enable | Enable the karakeep-browser service that runs a chromium instance in
the background with debugging ports exposed
|
| services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| services.nitter.sessionsFile | Path to the session tokens file
|
| services.nitter.preferences.theme | Instance theme.
|
| services.nextcloud.package | Which package to use for the Nextcloud instance.
|
| services.thelounge.public | Make your The Lounge instance public
|
| services.paperless.enable | Whether to enable Paperless-ngx
|
| services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| services.ente.api.settings.apps.public-albums | If you're running a self hosted instance and wish to serve public links,
set this to the URL where your albums web app is running.
|
| services.glitchtip.redis.createLocally | Whether to enable and configure a local Redis instance.
|
| services.movim.podConfig.description | General description of the instance
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.pretix.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| programs.captive-browser.enable | Whether to enable captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
|
| services.tandoor-recipes.enable | Enable Tandoor Recipes
|
| nixpkgs.buildPlatform | Specifies the platform on which NixOS should be built
|
| services.ncps.cache.lock.backend | Lock backend to use: 'local' (single instance), 'redis'
(distributed), 'postgres' (distributed, requires PostgreSQL)
|
| services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.hatsu.settings.HATSU_PRIMARY_ACCOUNT | The primary account of your instance (eg 'example.com').
|
| services.postsrsd.configurePostfix | Whether to configure the required settings to use postsrsd in the local Postfix instance.
|
| services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| services.teamspeak3.fileTransferIP | IP on which the server instance will listen for incoming file transfer connections
|
| services.librenms.enableLocalBilling | Enable billing Cron-Jobs on the local instance
|
| services.pretalx.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.scrutiny.settings.web.influxdb.host | IP or hostname of the InfluxDB instance.
|
| services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| services.reposilite.settings.basePath | Custom base path for this Reposilite instance
|
| services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| services.cryptpad.configureNginx | Configure Nginx as a reverse proxy for Cryptpad
|
| services.jitsi-meet.videobridge.enable | Jitsi Videobridge instance and configure it to connect to Prosody
|
| services.your_spotify.enableLocalDB | Whether to enable a local mongodb instance.
|
| services.immich-kiosk.settings.immich_url | URL of the immich instance.
|
| services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| services.postfix-tlspol.configurePostfix | Whether to configure the required settings to use postfix-tlspol in the local Postfix instance.
|
| services.oncall.settings.oncall_host | FQDN for the Oncall instance.
|
| services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| services.postfixadmin.extraConfig | Extra configuration for the postfixadmin instance, see postfixadmin's config.inc.php for available options.
|
| services.invidious.serviceScale | How many invidious instances to run
|
| services.plausible.database.postgres.setup | Whether to enable creating a postgresql instance.
|
| services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| services.tuned.settings.default_instance_priority | Default instance (unit) priority.
|
| services.nitter.preferences.replaceYouTube | Replace YouTube links with links to this instance (blank to disable).
|
| services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| services.nitter.preferences.replaceReddit | Replace Reddit links with links to this instance (blank to disable).
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| services.hddfancontrol.settings | Parameter-sets for each instance of hddfancontrol.
|
| services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| services.lifecycled.cloudwatchStream | Write logs to a specific Cloudwatch Logs stream
|
| services.pretix.settings.memcached.location | The host:port combination or the path to the UNIX socket of a memcached instance
|
| services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| services.nitter.preferences.replaceTwitter | Replace Twitter links with links to this instance (blank to disable).
|
| services.matrix-synapse.package | Reference to the matrix-synapse wrapper with all extras
(e.g. for oidc or saml2) added to the PYTHONPATH of all executables
|
| services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| services.prometheus.exporters.pihole.timeout | Controls the timeout to connect to a Pi-Hole instance
|
| boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| services.plausible.database.clickhouse.setup | Whether to enable creating a clickhouse instance.
|
| services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| services.victorialogs.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaLogs instance by authorization
|
| services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| services.homebridge.settings.description | Description of the homebridge instance.
|
| services.mastodon.configureNginx | Configure nginx as a reverse proxy for mastodon
|
| services.librenms.useDistributedPollers | Enables distributed pollers
for this LibreNMS instance
|
| services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| services.prometheus.exporters.ecoflow.prefix | The prefix that will be added to all metrics
|
| networking.wireless.interfaces | The interfaces wpa_supplicant will use
|
| services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| security.apparmor.enable | Whether to enable the AppArmor Mandatory Access Control system
|
| services.parsedmarc.provision.grafana.dashboard | Whether the official parsedmarc grafana dashboard should
be provisioned to the local grafana instance.
|
| services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| boot.loader.generic-extlinux-compatible.enable | Whether to generate an extlinux-compatible configuration file
under /boot/extlinux.conf
|
| services.matrix-continuwuity.settings.global.port | The port(s) continuwuity will be running on
|
| services.victoriatraces.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaTraces instance by authorization
|
| services.public-inbox.settings.publicinbox.nntpserver | NNTP URLs to this public-inbox instance
|
| services.public-inbox.settings.publicinbox.pop3server | POP3 URLs to this public-inbox instance
|
| services.public-inbox.settings.publicinbox.imapserver | IMAP URLs to this public-inbox instance
|
| services.biboumi.settings.xmpp_server_ip | The IP address to connect to the XMPP server on
|
| programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| services.parsedmarc.provision.grafana.datasource | Whether the automatically provisioned Elasticsearch
instance should be added as a grafana datasource
|
| services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| services.gitea.settings.service.DISABLE_REGISTRATION | By default any user can create an account on this gitea instance
|
| services.parsedmarc.provision.elasticsearch | Whether to set up and use a local instance of Elasticsearch.
|
| services.reposilite.settings.compressionStrategy | Compression algorithm used by this instance of Reposilite.
none reduces usage of CPU & memory, but requires transfering more data.
|
| services.victoriametrics.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaMetrics instance by authorization
|
| services.prometheus.alertmanager-ntfy.settings.ntfy.baseurl | The base URL of the ntfy.sh instance.
|
| services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Web.Endpoint".url.host | Your instance's hostname for generating URLs throughout the app
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| services.maubot.settings.server.plugin_base_path | The base path for plugin endpoints
|
| virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| networking.usePredictableInterfaceNames | Whether to assign predictable names to network interfaces
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region | The AWS Region
|
| services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| services.transmission.performanceNetParameters | Whether to enable tweaking of kernel parameters
to open many more connections at the same time
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters | Filters can be used optionally to filter the instance list by other criteria.
|
| virtualisation.tpm.provisioning | Script to provision the TPM before control is handed off to the VM.
TPM2TOOLS_TCTI will be provided to configure tpm2-tools to use the
swtpm instance transparently.
TCTI is also provided as a generic value, consumer is expected to
re-export it however it may need (TPM2OPENSSL_TCTI, TPM2_PKCS11_TCTI,
...).
|
| services.matrix-conduit.settings.global.database_backend | The database backend for the service
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter | Filter can be used optionally to filter the instance list by other
criteria Syntax of this filter string is described here in the filter
query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
|
| services.prometheus.scrapeConfigs.*.honor_labels | Controls how Prometheus handles conflicts between labels
that are already present in scraped data and labels that
Prometheus would attach server-side ("job" and "instance"
labels, manually configured target labels, and labels
generated by service discovery implementations)
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role | Role of the targets to retrieve
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region | The AWS region
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval | Refresh interval to re-read the cloud instance list
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator | The string by which Linode Instance tags are joined into the tag label
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.maubot.settings.plugin_databases.postgres_max_conns_per_plugin | Maximum number of connections per plugin instance.
|