| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.maddy.secrets | A list of files containing the various secrets
|
| services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.traccar.settings | config.xml configuration as a Nix attribute set
|
| services.frp.instances.<name>.environmentFiles | List of paths files that follows systemd environmentfile structure
|
| boot.initrd.secrets | Secrets to append to the initrd
|
| services.peertube.secrets.secretsFile | Secrets to run PeerTube
|
| services.eintopf.secrets | A list of files containing the various secrets
|
| services.mautrix-meta.instances.<name>.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-meta.dataDir
|
| services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| services.ddclient.secretsFile | A file containing the secrets for the dynamic DNS provider
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.firefox-syncserver.secrets | A file containing the various secrets
|
| services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| programs.nncp.secrets | A list of paths to NNCP configuration files that should not be
in the Nix store
|
| services.immich.secretsFile | Path of a file with extra environment variables to be loaded from disk
|
| services.pomerium.secretsFile | Path to file containing secrets for Pomerium, in systemd
EnvironmentFile format
|
| services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| services.nextcloud.secrets | Secret files to read into entries in config.php
|
| services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| services.kubernetes.secretsPath | Default location for kubernetes secrets
|
| services.authelia.instances.<name>.package | The authelia package to use.
|
| services.librespeed.secrets | Attribute set of filesystem paths
|
| services.strongswan.secrets | A list of paths to IPSec secret files
|
| services.draupnir.secrets.accessToken | File containing the access token for Draupnir's Matrix account
to be used in place of services.draupnir.settings.accessToken.
|
| services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| services.pfix-srsd.secretsFile | The secret data used to encode the SRS address.
to generate, use a command like:
for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/ -$//' | sed 's/^/ /'; done
|
| networking.wireless.secretsFile | File consisting of lines of the form varname=value
to define variables for the wireless configuration
|
| services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| services.authelia.instances.<name>.settings.theme | The theme to display.
|
| services.postsrsd.secretsFile | Secret keys used for signing and verification.
The secret will be generated, if it does not exist at the given path.
|
| services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| services.nextcloud-whiteboard-server.secrets | A list of files containing the various secrets
|
| services.postsrsd.settings.secrets-file | Path to the file containing the secret keys.
Secrets are passed using LoadCredential= on the systemd unit,
so this options is read-only
|
| services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| services.uwsgi.instance | uWSGI configuration
|
| services.trickster.instance-id | Instance ID for when running multiple processes (default null).
|
| services.trilium-server.instanceName | Instance name used to distinguish between different instances
|
| services.hercules-ci-agent.settings.secretsJsonPath | Path to a JSON file containing secrets for effects
|
| services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| services.strongswan-swanctl.swanctl.secrets.rsa | Private key decryption passphrase for a key in the rsa
folder.
|
| services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| services.strongswan-swanctl.swanctl.secrets.ppk | Postquantum Preshared Key (PPK) section for a specific secret
|
| services.strongswan-swanctl.swanctl.secrets.ike | IKE preshared secret section for a specific secret
|
| services.lifecycled.instanceId | The instance ID to listen for events for.
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa | Private key decryption passphrase for a key in the
ecdsa folder.
|
| services.strongswan-swanctl.swanctl.secrets.token | Definition for a private key that's stored on a token/smartcard/TPM.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8 | Private key decryption passphrase for a key in the
pkcs8 folder.
|
| services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file | File name in the rsa folder for which this passphrase
should be used.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs12 | PKCS#12 decryption passphrase for a container in the
pkcs12 folder.
|
| services.akkoma.config.":pleroma".":instance".name | Instance name.
|
| services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id | PPK identity the PPK belongs to
|
| services.kanidm.provision.instanceUrl | The instance url to which the provisioning tool should connect.
|
| services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| services.strongswan-swanctl.swanctl.secrets.ike.<name>.id | IKE identity the IKE preshared secret belongs to
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.slot | Optional slot number to access the token.
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| services.strongswan-swanctl.swanctl.secrets.private | Private key decryption passphrase for a key in the
private folder.
|
| services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret | Value of decryption passphrase for RSA key.
|
| services.akkoma.config.":pleroma".":instance".email | Instance administrator email.
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.pin | Optional PIN required to access the key on the token
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file | File name in the pkcs12 folder for which this
passphrase should be used.
|
| services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret | Value of decryption passphrase for ECDSA key.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret | Value of decryption passphrase for PKCS#8 key.
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.module | Optional PKCS#11 module name to access the token.
|
| services.bitwarden-directory-connector-cli.secrets.ldap | Path to file that contains LDAP password for user in {option}`ldap.username
|
| services.strongswan-swanctl.swanctl.secrets.token.<name>.handle | Hex-encoded CKA_ID or handle of the private key on the token or TPM,
respectively.
|
| services.strongswan-swanctl.swanctl.secrets.private.<name>.file | File name in the private folder for which this passphrase should be used.
|
| services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret | Value of the EAP/XAuth secret
|
| services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret | Value of the IKE preshared secret
|
| services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret | Value of decryption passphrase for PKCS#12 container.
|
| services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| services.btrbk.instances | Set of btrbk instances
|
| services.strongswan-swanctl.swanctl.secrets.private.<name>.secret | Value of decryption passphrase for private key.
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| services.draupnir.secrets.pantalaimon.password | File containing the password for Draupnir's Matrix account when used in
conjunction with Pantalaimon to be used in place of
services.draupnir.settings.pantalaimon.password.
|
| services.errbot.instances | Errbot instance configs
|
| services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| services.printing.cups-pdf.instances | Permits to raise one or more cups-pdf instances
|
| services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret | Value of the NTLM secret, which is the NT Hash of the actual secret,
that is, MD4(UTF-16LE(secret))
|
| services.btrbk.instances.<name>.onCalendar | How often this btrbk instance is started
|
| services.gitea-actions-runner.instances.<name>.name | The name identifying the runner instance towards the Gitea/Forgejo instance.
|
| services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| services.vault-agent.instances | Attribute set of vault-agent instances
|
| networking.networkmanager.ensureProfiles.secrets.entries | A list of secrets to provide to NetworkManager by reading their values from configured files
|
| services.errbot.instances.<name>.dataDir | Data directory for errbot instance.
|
| services.vault-agent.instances.<name>.user | User under which this instance runs.
|
| services.printing.cups-pdf.instances.<name>.installPrinter | Whether to enable a CUPS printer queue for this instance
|
| services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| services.ytdl-sub.instances.<name>.enable | Whether to enable ytdl-sub instance.
|
| services.vault-agent.instances.<name>.group | Group under which this instance runs.
|
| services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| services.anubis.instances.<name>.enable | Whether to enable this instance of Anubis.
|
| services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| services.akkoma.config.":pleroma".":instance".description | Instance description.
|
| services.vault-agent.instances.<name>.enable | Whether to enable this vault-agent instance.
|
| services.mobilizon.settings.":mobilizon".":instance".name | The fallback instance name if not configured into the admin UI
|
| services.v4l2-relayd.instances.<name>.enable | Whether to enable this v4l2-relayd instance.
|
| services.bookstack.settings | Options for Bookstack configuration
|
| services.easytier.instances.<name>.configServer | Configure the instance from config server
|
| services.frp.instances | Frp instances.
|
| services.easytier.instances.<name>.enable | Enable the instance.
|
| services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| services.consul-template.instances | Attribute set of consul-template instances
|
| services.cross-seed.settings | Configuration options for cross-seed
|
| services.transfer-sh.secretFile | Path to file containing environment variables
|
| services.wiki-js.settings | Settings to configure wiki-js
|
| services.consul-template.instances.<name>.user | User under which this instance runs.
|
| services.gitea-actions-runner.instances.<name>.url | Base URL of your Gitea/Forgejo instance.
|
| services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchSetting | name of the setting section for which secrets are requested
|
| services.consul-template.instances.<name>.group | Group under which this instance runs.
|
| services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| services.ytdl-sub.instances | Configuration for ytdl-sub instances.
|
| services.caddy.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.easytier.instances.<name>.configFile | Path to easytier config file
|
| services.gitea-actions-runner.instances.<name>.token | Plain token to register at the configured Gitea/Forgejo instance.
|
| services.consul-template.instances.<name>.enable | Whether to enable this consul-template instance.
|
| services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| services.fcgiwrap.instances.<name>.process.group | Group as which this instance of fcgiwrap will be run.
|
| services.v4l2-relayd.instances.<name>.extraPackages | Extra packages to add to GST_PLUGIN_PATH for the instance.
|
| services.gitea-actions-runner.instances.<name>.enable | Whether to enable Gitea Actions Runner instance.
|
| services.akkoma.config.":pleroma".":instance".upload_dir | Directory where Akkoma will put uploaded files.
|
| services.fcgiwrap.instances.<name>.process.user | User as which this instance of fcgiwrap will be run
|
| services.printing.cups-pdf.instances.<name>.confFileText | This will contain the contents of cups-pdf.conf for this instance, derived from settings
|
| services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_id | Path to file that contains Client ID.
|
| services.microbin.passwordFile | Path to file containing environment variables
|
| services.gitea-actions-runner.instances.<name>.tokenFile | Path to an environment file, containing the TOKEN environment
variable, that holds a token to register at the configured
Gitea/Forgejo instance.
|
| networking.networkmanager.ensureProfiles.secrets.package | The nm-file-secret-agent package to use.
|
| nix.package | This option specifies the Nix package instance to use throughout the system.
|
| services.v4l2-relayd.instances | v4l2-relayd instances to be created.
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.key | key in the setting section for which this entry provides a value
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.file | file from which the secret value is read
|
| services.vmalert.instances | Define multiple instances of vmalert.
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.trim | whether leading and trailing whitespace should be stripped from the files content before being passed to NetworkManager
|
| services.kresd.instances | The number of instances to start
|
| services.anubis.instances.<name>.settings.BIND | The address that Anubis listens to
|
| services.peertube-runner.instancesToRegister.<name>.url | URL of the PeerTube instance.
|
| services.frp.instances.<name>.enable | Whether to enable frp.
|
| services.akkoma.config.":pleroma".":instance".static_dir | Directory of static files
|
| services.anubis.instances | An attribute set of Anubis instances
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchIface | interface name of the NetworkManager connection
|
| services.frp.instances.<name>.role | The frp consists of client and server
|
| services.radicle.ci.adapters.native.instances.<name>.enable | Whether to enable this radicle-native-ci instance.
|
| services.easytier.instances | EasyTier instances.
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| services.clamsmtp.instances | Instances of clamsmtp to run.
|
| services.fcgiwrap.instances | Configuration for fcgiwrap instances.
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchType | NetworkManager connection type
The NetworkManager configuration settings reference roughly corresponds to connection types
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchId | connection id used by NetworkManager
|
| services.printing.cups-pdf.instances.<name>.settings | Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package
|
| services.ytdl-sub.instances.<name>.config | Configuration for ytdl-sub
|
| services.mailpit.instances | Configure mailpit instances
|
| services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| services.n8n.environment | Environment variables to pass to the n8n service
|
| services.errbot.instances.<name>.logLevel | Errbot log level
|
| services.stalwart.credentials | Credentials envs used to configure Stalwart secrets
|
| services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| services.nexus.home | Home directory of the Nexus3 instance.
|
| services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| services.anubis.instances.<name>.user | The user under which Anubis is run
|
| services.cfssl.configFile | Path to configuration file
|
| services.errbot.instances.<name>.admins | List of identifiers of errbot admins.
|
| services.pantalaimon-headless.instances | Declarative instance config
|
| services.mautrix-meta.instances | Configuration of multiple mautrix-meta instances.
services.mautrix-meta.instances.facebook and services.mautrix-meta.instances.instagram
come preconfigured with network.mode, appservice.id, bot username, display name and avatar.
|
| services.stalwart-mail.credentials | Credentials envs used to configure Stalwart-Mail secrets
|
| services.bitwarden-directory-connector-cli.secrets.bitwarden.client_path_secret | Path to file that contains Client Secret.
|
| services.hydra.logo | Path to a file containing the logo of your Hydra instance.
|
| services.anubis.instances.<name>.policy | Anubis policy configuration
|
| services.anubis.instances.<name>.group | The group under which Anubis is run
|
| services.mailpit.instances.<name>.max | Maximum number of emails to keep
|
| services.easytier.instances.<name>.environmentFiles | Environment files for this instance
|
| services.ytdl-sub.instances.<name>.readWritePaths | List of paths that ytdl-sub can write to.
|
| services.anubis.instances.<name>.extraFlags | A list of extra flags to be passed to Anubis.
|
| services.v4l2-relayd.instances.<name>.cardLabel | The name the camera will show up as.
|
| services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| services.grocy.hostName | FQDN for the grocy instance.
|
| services.pdfding.backup.enable | Automatic backup of important data to a AWS S3 (or compatible) instance
|
| services.errbot.instances.<name>.backend | Errbot backend name.
|
| services.mobilizon.settings.":mobilizon".":instance".email_from | The email for the From: header in emails
|
| services.errbot.instances.<name>.plugins | List of errbot plugin derivations.
|
| services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| services.frp.instances.<name>.settings | Frp configuration, for configuration options
see the example of client
or server on github.
|
| services.v4l2-relayd.instances.<name>.input.width | The width to read from input-stream.
|
| services.easytier.instances.<name>.settings.instance_name | Identify different instances on same host
|
| services.nylon.<name>.name | The name of this nylon instance.
|
| services.gitea-actions-runner.instances | Gitea Actions Runner instances.
|
| services.errbot.instances.<name>.extraConfig | String to be appended to the config verbatim
|
| services.vault-agent.instances.<name>.package | The vault package to use.
|
| services.neo4j.readOnly | Only allow read operations from this Neo4j instance.
|
| services.anubis.instances.<name>.settings.METRICS_BIND | The address Anubis' metrics server listens to
|
| services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| services.pds.settings | Environment variables to set for the service
|
| services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| services.vmalert.instances.<name>.rules | A list of the given alerting or recording rules against configured "datasource.url" compatible with
Prometheus HTTP API for vmalert to execute
|
| services.ntopng.redis.createInstance | Local Redis instance name
|
| services.v4l2-relayd.instances.<name>.input.height | The height to read from input-stream.
|
| services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| services.errbot.instances.<name>.identity | Errbot identity configuration
|
| services.clamsmtp.instances.*.listen | Address to wait for incoming SMTP connections on
|
| services.v4l2-relayd.instances.<name>.input.format | The video-format to read from input-stream.
|
| services.vmalert.instances.<name>.enable | Wether to enable VictoriaMetrics's vmalert.
vmalert evaluates alerting and recording rules against a data source, sends notifications via Alertmanager.
|
| services.clamsmtp.instances.*.timeout | Time-out for network connections.
|
| services.movim.enable | Whether to enable a Movim instance.
|
| services.clamsmtp.instances.*.header | A header to add to scanned messages
|
| services.easytier.instances.<name>.extraArgs | Extra args append to the easytier command-line.
|
| services.clamsmtp.instances.*.action | Action to take when a virus is detected
|
| services.jitsi-meet.hostName | FQDN of the Jitsi Meet instance.
|
| services.go-neb.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.mautrix-meta.instances.<name>.enable | Whether to enable Mautrix-Meta, a Matrix <-> Facebook and Matrix <-> Instagram hybrid puppeting/relaybot bridge.
|
| services.movim.settings | .env settings for Movim
|
| services.clamsmtp.instances.*.xClient | Send the XCLIENT command to the receiving server, for forwarding
client addresses and connection information if the receiving
server supports this feature.
|
| services.hydra.hydraURL | The base URL for the Hydra webserver instance
|
| services.fcgiwrap.instances.<name>.socket.user | User to be set as owner of the UNIX socket.
|
| services.fcgiwrap.instances.<name>.socket.type | Socket type: 'unix', 'tcp' or 'tcp6'.
|
| services.v4l2-relayd.instances.<name>.output.format | The video-format to write to output-stream.
|
| services.anubis.instances.<name>.botPolicy | Anubis policy configuration in Nix syntax
|
| services.clamsmtp.instances.*.outAddress | Address of the SMTP server to send email to once it has been
scanned.
|
| services.jboss.serverDir | Location of the server instance files
|
| services.evcc.settings | evcc configuration as a Nix attribute set
|
| services.uhub.<name>.enable | Whether to enable hub instance.
|
| services.fcgiwrap.instances.<name>.socket.mode | Mode to be set on the UNIX socket
|
| services.turn-rs.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT or
${VARIABLE}
|
| services.movim.domain | Fully-qualified domain name (FQDN) for the Movim instance.
|
| services.anubis.instances.<name>.settings | Freeform configuration via environment variables for Anubis
|
| services.anubis.instances.<name>.policy.extraBots | Additional bot rules appended to the policy
|
| services.fcgiwrap.instances.<name>.socket.group | Group to be set as owner of the UNIX socket.
|
| services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| services.mysql.replication.serverId | Id of the MySQL server instance
|
| services.maubot.settings | YAML settings for maubot
|
| services.clamsmtp.instances.*.keepAlives | Number of seconds to wait between each NOOP sent to the sending
server. 0 to disable
|
| services.clamsmtp.instances.*.virusAction | Command to run when a virus is found
|
| services.vmalert.instances.<name>.settings | vmalert configuration, passed via command line flags
|
| services.radicle.ci.adapters.native.instances | radicle-native-ci adapter instances.
|
| services.v4l2-relayd.instances.<name>.input.pipeline | The gstreamer-pipeline to use for the input-stream.
|
| services.forgejo.customDir | Base directory for custom templates and other options
|
| services.listmonk.secretFile | A file containing secrets as environment variables
|
| services.easytier.instances.<name>.settings | Settings to generate easytier-‹name›.toml
|
| services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| services.dawarich.extraEnvFiles | Extra environment files to pass to all Dawarich services
|
| services.mastodon.extraEnvFiles | Extra environment files to pass to all mastodon services
|
| services.peertube-runner.instancesToRegister.<name>.runnerDescription | Runner description declared to the PeerTube instance.
|
| services.sogo.timezone | Timezone of your SOGo instance
|
| services.vault-agent.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| services.sourcehut.hg.group | Group for hg.sr.ht
|
| services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| services.docuseal.extraEnvFiles | Extra environment files to pass to DocuSeal services
|
| services.consul-template.instances.<name>.package | The consul-template package to use.
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.sourcehut.man.group | Group for man.sr.ht
|
| services.sourcehut.git.group | Group for git.sr.ht
|
| services.sourcehut.hub.group | Group for hub.sr.ht
|
| services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| services.mobilizon.settings.":mobilizon".":instance".email_reply_to | The email for the Reply-To: header in emails
|
| services.fcgiwrap.instances.<name>.socket.address | Socket address
|
| services.easytier.instances.<name>.settings.dhcp | Automatically determine the IPv4 address of this peer based on
existing peers on network.
|
| services.v4l2-relayd.instances.<name>.input.framerate | The framerate to read from input-stream.
|
| services.mautrix-meta.instances.<name>.serviceUnit | The systemd unit (a service or a target) for other services to depend on if they
need to be started after matrix-synapse
|
| services.vmalert.instances.<name>.settings.rule | Path to the files with alerting and/or recording rules.
|
| services.patroni.settings | The primary patroni configuration
|
| services.mailpit.instances.<name>.database | Specify the local database filename to store persistent data
|
| services.peertube-runner.instancesToRegister | PeerTube instances to register this runner with.
|
| services.btrbk.instances.<name>.snapshotOnly | Whether to run in snapshot only mode
|
| services.mautrix-meta.instances.<name>.settings | config.yaml configuration as a Nix attribute set
|
| services.sympa.domains | Email domains handled by this instance
|
| services.sourcehut.todo.group | Group for todo.sr.ht
|
| services.sourcehut.meta.group | Group for meta.sr.ht
|
| services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| services.fcgiwrap.instances.<name>.process.prefork | Number of processes to prefork.
|
| services.clamsmtp.instances.*.tempDirectory | Temporary directory that needs to be accessible to both clamd
and clamsmtpd.
|
| services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| services.pixelfed.settings | .env settings for Pixelfed
|
| services.nitter.server.title | Title of the instance.
|
| services.anubis.instances.<name>.policy.settings | Additional policy settings merged into the policy file
|
| services.easytier.instances.<name>.extraSettings | Extra settings to add to easytier-‹name›.toml.
|
| services.lidarr.settings | Attribute set of arbitrary config options
|
| services.sonarr.settings | Attribute set of arbitrary config options
|
| services.radarr.settings | Attribute set of arbitrary config options
|
| services.easytier.instances.<name>.settings.ipv4 | IPv4 cidr address of this peer in the virtual network
|
| services.livekit.redis.port | Port to bind local redis instance to.
|
| services.livekit.redis.host | Address to bind local redis instance to.
|
| services.printing.cups-pdf.instances.<name>.settings.Spool | spool directory
|
| services.bluesky-pds.settings | Environment variables to set for the service
|
| services.graylog.isMaster | Whether this is the master instance of your Graylog cluster
|
| services.radicle.ci.adapters.native.instances.<name>.name | Adapter name that is used in the radicle-ci-broker configuration
|
| services.printing.cups-pdf.instances.<name>.settings.Out | output directory;
${HOME} will be expanded to the user's home directory,
${USER} will be expanded to the user name.
|
| services.anubis.instances.<name>.settings.POLICY_FNAME | The policy file to use
|
| services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| services.zitadel.extraStepsPaths | A list of paths to extra steps files
|
| services.peertube-runner.instancesToRegister.<name>.registrationTokenFile | Path to a file containing a registration token for the PeerTube instance
|
| services.sourcehut.paste.group | Group for paste.sr.ht
|
| services.sourcehut.lists.group | Group for lists.sr.ht
|
| services.sourcehut.pages.group | Group for pages.sr.ht
|
| services.vault-agent.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| services.clamsmtp.instances.*.quarantine | Whether to quarantine files that contain viruses by leaving them
in the temporary directory.
|
| services.gokapi.settingsFile | Path to config file to parse and append to settings
|
| services.lasuite-docs.secretKeyPath | Path to the Django secret key
|
| services.lasuite-meet.secretKeyPath | Path to the Django secret key
|
| services.microbin.settings | Additional configuration for MicroBin, see
https://microbin.eu/docs/installation-and-configuration/configuration/
for supported values
|
| services.wastebin.settings | Additional configuration for wastebin, see
https://github.com/matze/wastebin#usage for supported values
|
| services.gitea-actions-runner.instances.<name>.labels | Labels used to map jobs to their runtime environment
|
| services.gitea-actions-runner.instances.<name>.settings | Configuration for act_runner daemon
|
| services.anubis.instances.<name>.policy.useDefaultBotRules | Whether to include Anubis's default bot detection rules via the
(data)/meta/default-config.yaml import
|
| services.printing.cups-pdf.instances.<name>.settings.AnonDirName | path for anonymously created PDF files
|
| services.anubis.instances.<name>.settings.SERVE_ROBOTS_TXT | Whether to serve a default robots.txt that denies access to common AI bots by name and all other
bots by wildcard.
|
| services.anubis.instances.<name>.settings.BIND_NETWORK | The network family that Anubis should bind to
|
| services.jirafeau.hostName | URL of instance
|
| services.lasuite-docs.domain | Domain name of the docs instance.
|
| services.lasuite-meet.domain | Domain name of the meet instance.
|
| services.vault-agent.instances.<name>.settings.template | Template section of vault-agent
|
| services.maubot.extraConfigFile | A file for storing secrets
|
| services.pleroma.secretConfigFile | Path to the file containing your secret pleroma configuration.
DO NOT POINT THIS OPTION TO THE NIX
STORE, the store being world-readable, it'll
compromise all your secrets.
|
| services.readarr.settings | Attribute set of arbitrary config options
|
| services.transfer-sh.settings | Additional configuration for transfer-sh, see
https://github.com/dutchcoders/transfer.sh#usage-1
for supported values
|
| services.taler.runtimeDir | Runtime directory shared between the taler services
|
| services.windmill.database.url | Database url
|
| services.godns.loadCredential | This can be used to pass secrets to the systemd service without adding
them to the nix store.
|
| services.kanboard.domain | FQDN for the Kanboard instance.
|
| services.pixelfed.domain | FQDN for the Pixelfed instance.
|
| services.renovate.settings | Renovate's global configuration
|
| services.h2o.hosts | The hosts config to be merged with the settings
|
| services.ocis.package | Which package to use for the ownCloud Infinite Scale instance.
|
| services.sourcehut.builds.group | Group for builds.sr.ht
|
| services.pgbackrest.stanzas.<name>.instances.<name>.host | PostgreSQL host for operating remotely.
|
| services.mongodb.replSetName | If this instance is part of a replica set, set its name here
|
| services.pixelfed.enable | Whether to enable a Pixelfed instance.
|
| services.maddy.config | Server configuration, see
https://maddy.email for
more information
|
| services.nomad.credentials | Credentials envs used to configure nomad secrets.
|
| services.gitea-actions-runner.instances.<name>.hostPackages | List of packages, that are available to actions, when the runner is configured
with a host execution label.
|
| services.mautrix-meta.instances.<name>.registerToSynapse | Whether to add registration file to services.matrix-synapse.settings.app_service_config_files and
make Synapse wait for registration service.
|
| services.radicle.ci.adapters.native.instances.<name>.package | The radicle-native-ci package to use.
|
| services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| services.powerdns.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| services.printing.cups-pdf.instances.<name>.settings.GhostScript | location of GhostScript binary
|
| services.duplicity.secretFile | Path of a file containing secrets (gpg passphrase, access key...) in
the format of EnvironmentFile as described by
systemd.exec(5)
|
| services.vmalert.instances.<name>.settings."notifier.url" | Prometheus Alertmanager URL
|
| services.easytier.instances.<name>.settings.hostname | Hostname shown in peer list and web console.
|
| services.wiki-js.environmentFile | Environment file to inject e.g. secrets into the configuration.
|
| services.clamsmtp.instances.*.maxConnections | Maximum number of connections to accept at once.
|
| services.weblate.localDomain | The domain name serving your Weblate instance.
|
| services.froide-govplan.hostName | FQDN for the froide-govplan instance.
|
| services.consul-template.instances.<name>.settings | Free-form settings written directly to the config.json file
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.olivetin.extraConfigFiles | Config files to merge into the settings defined in services.olivetin.settings
|
| services.nextcloud.occ | The nextcloud-occ program preconfigured to target this Nextcloud instance.
|
| services.vlagent.remoteWrite.url | Endpoint for the victorialogs instance
|
| services.matrix-synapse.settings | The primary synapse configuration
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| services.uptime.usesRemoteMongo | Whether the configuration file specifies a remote mongo instance
|
| services.smokeping.owner | Real name of the owner of the instance
|
| programs.nncp.settings | NNCP configuration, see
http://www.nncpgo.org/Configuration.html
|
| services.nextcloud.hostName | FQDN for the nextcloud instance.
|
| services.rutorrent.hostName | FQDN for the ruTorrent instance.
|
| services.prowlarr.settings | Attribute set of arbitrary config options
|
| services.whisparr.settings | Attribute set of arbitrary config options
|
| services.sympa.mta.type | Mail transfer agent (MTA) integration
|
| services.radicle.ci.adapters.native.instances.<name>.settings | Configuration of radicle-native-ci
|
| services.alerta.databaseName | Name of the database instance to connect to
|
| services.yarr.environmentFile | Environment file for specifying additional settings such as secrets
|
| networking.jool.siit | Definitions of SIIT instances of Jool
|
| services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| services.printing.cups-pdf.instances.<name>.settings.Anonuser | User for anonymous PDF creation
|
| services.clamsmtp.instances.*.transparentProxy | Enable clamsmtp's transparent proxy support.
|
| services.pantalaimon-headless.instances.<name>.ssl | Whether or not SSL verification should be enabled for outgoing
connections to the homeserver.
|
| services.plantuml-server.home | Home directory of the PlantUML server instance.
|
| services.k3s.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| services.pghero.environment | Environment variables to set for the service
|
| services.pretix.settings.pretix.instance_name | The name of this installation.
|
| services.anubis.instances.<name>.settings.DIFFICULTY | The difficulty required for clients to solve the challenge
|
| services.fider.environment | Environment variables to set for the service
|
| services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| services.matrix-conduit.secretFile | Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5)
|
| services.ytdl-sub.instances.<name>.subscriptions | Subscriptions for ytdl-sub
|
| networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| services.evcc.environmentFile | File with environment variables to pass into the runtime environment
|
| services.jitsi-meet.jibri.enable | Whether to enable a Jibri instance and configure it to connect to Prosody
|
| services.radicle.ci.adapters.native.instances.<name>.settings.state | Directory where per-run directories are stored.
|
| services.consul-template.instances.<name>.settings.pid_file | Path to use for the pid file.
|
| services.zwave-js.settings | Configuration settings for the generated config file
|
| services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.openvpn.servers.<name>.up | Shell commands executed when the instance is starting.
|
| services.anubis.instances.<name>.settings.METRICS_BIND_NETWORK | The network family that the metrics server should bind to
|
| services.vmalert.instances.<name>.settings."datasource.url" | Datasource compatible with Prometheus HTTP API.
|
| services.jitsi-meet.jicofo.enable | Whether to enable JiCoFo instance and configure it to connect to Prosody
|
| services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| services.castopod.localDomain | The domain serving your CastoPod instance.
|
| services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| services.peertube.localDomain | The domain serving your PeerTube instance.
|
| services.cfssl.mutualTlsClientCert | Mutual TLS - client certificate to call remote instance requiring client certs.
|
| services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| services.pantalaimon-headless.instances.<name>.dataPath | The directory where pantalaimon should store its state such as the database file.
|
| services.matrix-conduit.settings | Generates the conduit.toml configuration file
|
| services.consul-template.instances.<name>.settings.template | Template section of consul-template
|
| services.cfssl.mutualTlsClientKey | Mutual TLS - client key to call remote instance requiring client certs
|
| services.jitsi-meet.jigasi.enable | Whether to enable jigasi instance and configure it to connect to Prosody
|
| services.rke2.autoDeployCharts.<name>.values | Override default chart values via Nix expressions
|
| services.zitadel.extraSettingsPaths | A list of paths to extra settings files
|
| services.librenms.distributedPoller.enable | Configure this LibreNMS instance as a distributed poller
|
| services.immich-public-proxy.immichUrl | URL of the Immich instance
|
| services.shiori.environmentFile | Path to file containing environment variables
|
| services.home-assistant.config | Your configuration.yaml as a Nix attribute set
|
| services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| services.mattermost.host | Host or address that this Mattermost instance listens on.
|
| services.mautrix-meta.instances.<name>.registrationFile | Path to the yaml registration file of the appservice.
|
| services.nitter.server.hostname | Hostname of the instance.
|
| services.hologram-agent.enable | Whether to enable the Hologram agent for AWS instance credentials
|
| services.openvpn.servers.<name>.down | Shell commands executed when the instance is shutting down.
|
| services.mtprotoproxy.users | Allowed users and their secrets
|
| services.schleuder.extraSettingsFile | YAML file to merge into the schleuder config at runtime
|
| services.radicle.ci.adapters.native.instances.<name>.runtimePackages | Packages added to the adapter's PATH.
|
| services.dashy.settings | Settings serialized into user-data/conf.yml before build
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| services.rethinkdb.dbpath | Location where RethinkDB stores its data, 1 data directory per instance.
|
| services.open-webui.environmentFile | Environment file to be passed to the systemd service
|
| services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| services.syncplay.salt | Salt to allow room operator passwords generated by this server
instance to still work when the server is restarted
|
| services.gatus.environmentFile | File to load as environment file
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.anubis.instances.<name>.settings.OG_PASSTHROUGH | Whether to enable Open Graph tag passthrough
|
| services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| services.bcg.environmentFiles | File to load as environment file
|
| services.mattermost.siteUrl | URL this Mattermost instance is reachable under, without trailing slash.
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| services.pretalx.settings.site.url | The base URI below which your pretalx instance will be reachable.
|
| services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| services.hologram-server.enable | Whether to enable the Hologram server for AWS instance credentials
|
| services.homer.settings | Settings serialized into config.yml before build
|
| services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| services.tsidp.environmentFile | Path to an environment file loaded for the tsidp service
|
| services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.openvpn.servers | Each attribute of this option defines a systemd service that
runs an OpenVPN instance
|
| services.akkoma.installWrapper | Whether to install a wrapper around pleroma_ctl to simplify administration of the
Akkoma instance.
|
| services.openssh.startWhenNeeded | If set, sshd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start an instance for each incoming connection.
|
| services.radicle.ci.adapters.native.instances.<name>.settings.base_url | Base URL for build logs (mandatory for access from CI broker page).
|
| services.syncplay.saltFile | Path to the file that contains the server salt
|
| services.roundcube.extraConfig | Extra configuration for roundcube webmail instance
|
| services.litellm.environmentFile | Environment file to be passed to the systemd service
|
| services.orthanc.environmentFile | Environment file to be passed to the systemd service
|
| services.beszel.hub.environmentFile | Environment file to be passed to the systemd service
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.patroni.environmentFiles | Environment variables made available to Patroni as files content, useful for providing secrets from files.
|
| services.invidious.extraSettingsFile | A file including Invidious settings
|
| services.librechat.enableLocalDB | Whether to enable a local mongodb instance.
|
| services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| services.mautrix-meta.instances.<name>.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| services.netbird.tunnels.<name>.user.group | A system group name for this client instance.
|
| services.netbird.clients.<name>.user.group | A system group name for this client instance.
|
| services.openvpn.servers.<name>.autoStart | Whether this OpenVPN instance should be started automatically.
|
| services.redis.servers.<name>.user | User account under which this instance of redis-server runs.
If left as the default value this user will automatically be
created on system activation, otherwise you are responsible for
ensuring the user exists before the redis service starts.
|
| services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.lasuite-docs.environmentFile | Path to environment file
|
| services.lasuite-meet.environmentFile | Path to environment file
|
| services.pantalaimon-headless.instances.<name>.listenAddress | The address where the daemon will listen to client connections
for this homeserver.
|
| services.peertube.enableWebHttps | Whether clients will access your PeerTube instance with HTTPS
|
| services.easytier.instances.<name>.settings.network_name | EasyTier network name.
|
| services.livekit.redis.createLocally | Whether to set up a local redis instance.
|
| services.chhoto-url.environmentFiles | Files to load environment variables from in addition to services.chhoto-url.settings
|
| services.screego.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.netbird.clients.<name>.bin.suffix | A system group name for this client instance.
|
| services.netbird.tunnels.<name>.bin.suffix | A system group name for this client instance.
|
| services.teamspeak3.queryIP | IP on which the server instance will listen for incoming ServerQuery connections
|
| services.teamspeak3.voiceIP | IP on which the server instance will listen for incoming voice connections
|
| services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| services.zipline.environmentFiles | Files to load environment variables from (in addition to services.zipline.settings)
|
| services.dendrite.loadCredential | This can be used to pass secrets to the systemd service without adding them to
the nix store
|
| services.send.redis.passwordFile | The path to the file containing the Redis password
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| services.misskey.redis.createLocally | Create and use a local Redis instance
|
| services.cryptpad.settings | Cryptpad configuration settings
|
| services.redis.servers.<name>.group | Group account under which this instance of redis-server runs.
If left as the default value this group will automatically be
created on system activation, otherwise you are responsible for
ensuring the group exists before the redis service starts.
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| services.docling-serve.environmentFile | Environment file to be passed to the systemd service
|
| services.linkwarden.secretFiles | Attribute set containing paths to files to add to the environment of linkwarden
|
| services.anubis.defaultOptions.enable | Whether to enable this instance of Anubis.
|
| services.dawarich.secretKeyBaseFile | Path to file containing the secret key base
|
| services.pocket-id.credentials | Environment variables which are loaded from the contents of the specified file paths
|
| services.castopod.environmentFile | Environment file to inject e.g. secrets into the configuration
|
| services.trilium-server.environmentFile | File to load as the environment file
|
| services.wstunnel.clients.<name>.enable | Whether to enable this wstunnel instance.
|
| services.wstunnel.servers.<name>.enable | Whether to enable this wstunnel instance.
|
| services.monero.environmentFile | Path to an EnvironmentFile for the monero service as defined in systemd.exec(5)
|
| services.filesender.localDomain | The domain serving your FileSender instance.
|
| security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| services.sharkey.environmentFiles | List of paths to files containing environment variables for Sharkey to use at runtime
|
| services.ncps.cache.redis.addresses | A list of host:port for the Redis servers that are part of a cluster
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.rmfakecloud.extraSettings | Extra settings in the form of a set of key-value pairs
|
| services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| services.wstunnel.clients.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.wstunnel.servers.<name>.autoStart | Whether to enable starting this wstunnel instance automatically.
|
| services.kanidm.serverSettings.origin | The origin of your Kanidm instance
|
| services.kanidm.server.settings.origin | The origin of your Kanidm instance
|
| services.lemmy.database.createLocally | Whether to enable creation of database on the instance.
|
| services.mysql.replication.role | Role of the MySQL server instance.
|
| services.fedimintd.<name>.bitcoin.rpc.secretFile | If set the URL specified in bitcoin.rpc.url will get the content of this file added
as an URL password, so http://user@example.com will turn into http://user:SOMESECRET@example.com
|
| services.hercules-ci-agent.settings.baseDirectory | State directory (secrets, work directory, etc) for agent
|
| services.mautrix-meta.instances.<name>.registrationServiceUnit | The registration service that generates the registration file
|
| services.snips-sh.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.pantalaimon-headless.instances.<name>.homeserver | The URI of the homeserver that the pantalaimon proxy should
forward requests to, without the matrix API path but including
the http(s) schema.
|
| services.onlyoffice.hostname | FQDN for the OnlyOffice instance.
|
| services.pfix-srsd.configurePostfix | Whether to configure the required settings to use pfix-srsd in the local Postfix instance.
|
| services.homebridge.environmentFile | Path to an environment-file which may contain secrets.
|
| services.nextcloud.datadir | Nextcloud's data storage path
|
| services.pocket-id.environmentFile | Path to an environment file to be loaded
|
| services.karakeep.browser.enable | Enable the karakeep-browser service that runs a chromium instance in
the background with debugging ports exposed
|
| services.telegraf.environmentFiles | File to load as environment file
|
| services.gitlab-runner.services.<name>.cloneUrl | Overwrite the URL for the GitLab instance
|
| services.librechat.credentials | Environment variables which are loaded from the contents of files at a file paths, mainly used for secrets
|
| services.pds.environmentFiles | File to load environment variables from
|
| services.maubot.settings.homeservers | Known homeservers
|
| services.nitter.sessionsFile | Path to the session tokens file
|
| services.openvpn.servers.<name>.config | Configuration of this OpenVPN instance
|
| services.glitchtip.environmentFiles | Files to load environment variables from in addition to services.glitchtip.settings
|
| services.nitter.preferences.theme | Instance theme.
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.thelounge.public | Make your The Lounge instance public
|
| services.paperless.enable | Whether to enable Paperless-ngx
|
| services.nextcloud.package | Which package to use for the Nextcloud instance.
|
| services.ente.api.settings.apps.public-albums | If you're running a self hosted instance and wish to serve public links,
set this to the URL where your albums web app is running.
|
| services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| services.resilio.sharedFolders | Shared folder list
|
| services.traccar.environmentFile | File containing environment variables to substitute in the configuration before starting Traccar
|
| services.workout-tracker.environmentFile | An environment file as defined in systemd.exec(5)
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| services.btrbk.instances.<name>.settings.stream_compress | Compress the btrfs send stream before transferring it from/to remote locations using a
compression command.
|
| services.glitchtip.redis.createLocally | Whether to enable and configure a local Redis instance.
|
| services.easytier.instances.<name>.settings.network_secret | EasyTier network credential used for verification and
encryption
|
| services.murmur.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.movim.podConfig.description | General description of the instance
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.pretix.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.grafana-to-ntfy.settings.ntfyBAuthPass | The path to the password for the specified ntfy-sh user
|
| services.ncps.cache.lock.backend | Lock backend to use: 'local' (single instance), 'redis'
(distributed), 'postgres' (distributed, requires PostgreSQL)
|
| services.tandoor-recipes.enable | Enable Tandoor Recipes
|
| services.restic.backups.<name>.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.scrutiny.influxdb.enable | Enables InfluxDB on the host system using the services.influxdb2 NixOS module
with default options
|
| services.mjolnir.pantalaimon | pantalaimon options (enables E2E Encryption support)
|
| programs.captive-browser.enable | Whether to enable captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS settings.
|
| services.hatsu.settings.HATSU_PRIMARY_ACCOUNT | The primary account of your instance (eg 'example.com').
|
| services.paperless.environmentFile | Path to a file containing extra paperless config options in the systemd EnvironmentFile
format
|
| nixpkgs.buildPlatform | Specifies the platform on which NixOS should be built
|
| services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| services.postsrsd.configurePostfix | Whether to configure the required settings to use postsrsd in the local Postfix instance.
|
| services.pretalx.database.createLocally | Whether to automatically set up the database on the local DBMS instance
|
| services.scrutiny.settings.web.influxdb.host | IP or hostname of the InfluxDB instance.
|
| services.librenms.enableLocalBilling | Enable billing Cron-Jobs on the local instance
|
| services.teamspeak3.fileTransferIP | IP on which the server instance will listen for incoming file transfer connections
|
| services.public-inbox.settings.coderepo.<name>.cgitUrl | URL of a cgit instance
|
| services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| services.reposilite.settings.basePath | Custom base path for this Reposilite instance
|
| services.mollysocket.environmentFile | Environment file (see systemd.exec(5) "EnvironmentFile="
section for the syntax) passed to the service
|
| services.bluesky-pds.environmentFiles | File to load environment variables from
|
| services.woodpecker-server.environmentFile | File to load environment variables
from
|
| services.tuned.settings.default_instance_priority | Default instance (unit) priority.
|
| services.jitsi-meet.videobridge.enable | Jitsi Videobridge instance and configure it to connect to Prosody
|
| services.cryptpad.configureNginx | Configure Nginx as a reverse proxy for Cryptpad
|
| services.kanidm.server.settings.domain | The domain that Kanidm manages
|
| services.nextcloud-whiteboard-server.settings | Settings to configure backend server
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.kanidm.serverSettings.domain | The domain that Kanidm manages
|
| services.immich-kiosk.settings.immich_url | URL of the immich instance.
|
| services.your_spotify.enableLocalDB | Whether to enable a local mongodb instance.
|
| services.mautrix-discord.environmentFile | File containing environment variables to substitute when copying the configuration
out of Nix store to the services.mautrix-discord.dataDir
|
| services.ncdns.identity.hostname | The hostname of this ncdns instance, which defaults to the machine
hostname
|
| services.postfix-tlspol.configurePostfix | Whether to configure the required settings to use postfix-tlspol in the local Postfix instance.
|
| services.linkwarden.environmentFile | Path of a file with extra environment variables to be loaded from disk
|
| services.homepage-dashboard.environmentFile | The path to an environment file that contains environment variables to pass
to the homepage-dashboard service, for the purpose of passing secrets to
the service
|
| services.oncall.settings.oncall_host | FQDN for the Oncall instance.
|
| services.lubelogger.environmentFile | Path to a file containing extra LubeLogger config options in the systemd EnvironmentFile format
|
| services.teeworlds.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.postfixadmin.extraConfig | Extra configuration for the postfixadmin instance, see postfixadmin's config.inc.php for available options.
|
| services.invidious.serviceScale | How many invidious instances to run
|
| services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.rmfakecloud.environmentFile | Path to an environment file loaded for the rmfakecloud service
|
| services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| services.plausible.database.postgres.setup | Whether to enable creating a postgresql instance.
|
| services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| services.nitter.preferences.replaceYouTube | Replace YouTube links with links to this instance (blank to disable).
|
| services.hercules-ci-agent.settings.staticSecretsDirectory | This is the default directory to look for statically configured secrets like cluster-join-token.key
|
| networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| services.chhoto-url.settings.hash_algorithm | The hash algorithm to use for passwords and API keys
|
| services.peering-manager.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| services.woodpecker-agents.agents.<name>.environmentFile | File to load environment variables
from
|
| services.nitter.preferences.replaceReddit | Replace Reddit links with links to this instance (blank to disable).
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.gitlab-runner.services.<name>.environmentVariables | Custom environment variables injected to build environment
|
| boot.initrd.network.openvpn.configuration | The configuration file for OpenVPN.
Unless your bootloader supports initrd secrets, this configuration
is stored insecurely in the global Nix store.
|
| services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| services.traefik.environmentFiles | Files to load as an environment file just before Traefik starts
|
| services.n8n.environment.GENERIC_TIMEZONE | The n8n instance timezone
|
| services.hddfancontrol.settings | Parameter-sets for each instance of hddfancontrol.
|
| services.lifecycled.cloudwatchStream | Write logs to a specific Cloudwatch Logs stream
|
| services.pretix.settings.memcached.location | The host:port combination or the path to the UNIX socket of a memcached instance
|
| services.matrix-synapse.package | Reference to the matrix-synapse wrapper with all extras
(e.g. for oidc or saml2) added to the PYTHONPATH of all executables
|
| services.nitter.preferences.replaceTwitter | Replace Twitter links with links to this instance (blank to disable).
|
| services.simplesamlphp.<name>.phpfpmPool | The PHP-FPM pool that serves SimpleSAMLphp instance.
|
| services.prometheus.alertmanager-ntfy.extraConfigFiles | Config files to merge into the settings defined in services.prometheus.alertmanager-ntfy.settings
|
| services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| services.prometheus.exporters.pihole.timeout | Controls the timeout to connect to a Pi-Hole instance
|
| services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| services.mqtt2influxdb.environmentFiles | File to load as environment file
|
| services.plausible.database.clickhouse.setup | Whether to enable creating a clickhouse instance.
|
| services.libretranslate.domain | The domain serving your LibreTranslate instance
|
| services.mpdscribble.passwordFile | File containing the password for the mpd daemon
|
| services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| services.victorialogs.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaLogs instance by authorization
|
| services.sharkey.setupMeilisearch | Whether to automatically set up a local Meilisearch instance and configure Sharkey to use it
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| services.uwsgi.capabilities | Grant capabilities to the uWSGI instance
|
| services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.nextcloud-spreed-signaling.backends.<name>.urls | List of URLs of the Nextcloud instance
|
| services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| services.homebridge.settings.description | Description of the homebridge instance.
|
| services.mastodon.configureNginx | Configure nginx as a reverse proxy for mastodon
|
| services.jibri.xmppEnvironments.<name>.control.login.domain | The domain part of the JID for this Jibri instance.
|
| services.matrix-synapse.log | Default configuration for the loggers used by matrix-synapse and its workers
|
| services.librenms.useDistributedPollers | Enables distributed pollers
for this LibreNMS instance
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.prometheus.exporters.ecoflow.prefix | The prefix that will be added to all metrics
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| services.parsedmarc.provision.grafana.dashboard | Whether the official parsedmarc grafana dashboard should
be provisioned to the local grafana instance.
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| networking.wireless.interfaces | The interfaces wpa_supplicant will use
|
| services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| services.pufferpanel.environment | Environment variables to set for the service
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| security.apparmor.enable | Whether to enable the AppArmor Mandatory Access Control system
|
| services.matrix-continuwuity.settings.global.port | The port(s) continuwuity will be running on
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.victoriatraces.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaTraces instance by authorization
|
| services.public-inbox.settings.publicinbox.nntpserver | NNTP URLs to this public-inbox instance
|
| services.public-inbox.settings.publicinbox.pop3server | POP3 URLs to this public-inbox instance
|
| services.public-inbox.settings.publicinbox.imapserver | IMAP URLs to this public-inbox instance
|
| services.biboumi.settings.xmpp_server_ip | The IP address to connect to the XMPP server on
|
| boot.loader.generic-extlinux-compatible.enable | Whether to generate an extlinux-compatible configuration file
under /boot/extlinux.conf
|
| services.parsedmarc.provision.grafana.datasource | Whether the automatically provisioned Elasticsearch
instance should be added as a grafana datasource
|
| services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| programs.captive-browser.browser | The shell (/bin/sh) command executed once the proxy starts
|
| services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| services.gitea.settings.service.DISABLE_REGISTRATION | By default any user can create an account on this gitea instance
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.parsedmarc.provision.elasticsearch | Whether to set up and use a local instance of Elasticsearch.
|
| services.reposilite.settings.compressionStrategy | Compression algorithm used by this instance of Reposilite.
none reduces usage of CPU & memory, but requires transfering more data.
|
| services.victoriametrics.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaMetrics instance by authorization
|
| services.matrix-synapse.settings.turn_shared_secret | The shared secret used to compute passwords for the TURN server
|
| services.prometheus.alertmanager-ntfy.settings.ntfy.baseurl | The base URL of the ntfy.sh instance.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".secret_key_base | Secret key used as a base to generate further secrets for encrypting and
signing data
|
| services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Web.Endpoint".url.host | Your instance's hostname for generating URLs throughout the app
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| services.pipewire.wireplumber.extraConfig | Additional configuration for the WirePlumber daemon when run in
single-instance mode (the default in nixpkgs and currently the only
supported way to run WirePlumber configured via extraConfig)
|
| services.maubot.settings.server.plugin_base_path | The base path for plugin endpoints
|
| services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region | The AWS Region
|
| virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| services.transmission.performanceNetParameters | Whether to enable tweaking of kernel parameters
to open many more connections at the same time
|
| networking.usePredictableInterfaceNames | Whether to assign predictable names to network interfaces
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters | Filters can be used optionally to filter the instance list by other criteria.
|
| services.matrix-conduit.settings.global.database_backend | The database backend for the service
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter | Filter can be used optionally to filter the instance list by other
criteria Syntax of this filter string is described here in the filter
query parameter section: https://cloud.google.com/compute/docs/reference/latest/instances/list.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| virtualisation.tpm.provisioning | Script to provision the TPM before control is handed off to the VM.
TPM2TOOLS_TCTI will be provided to configure tpm2-tools to use the
swtpm instance transparently.
TCTI is also provided as a generic value, consumer is expected to
re-export it however it may need (TPM2OPENSSL_TCTI, TPM2_PKCS11_TCTI,
...).
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| services.prometheus.scrapeConfigs.*.honor_labels | Controls how Prometheus handles conflicts between labels
that are already present in scraped data and labels that
Prometheus would attach server-side ("job" and "instance"
labels, manually configured target labels, and labels
generated by service discovery implementations)
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role | Role of the targets to retrieve
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server | The API server addresses
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region | The AWS region
|
| services.matrix-synapse.settings.registration_shared_secret | If set, allows registration by anyone who also has the shared
secret, even if registration is otherwise disabled
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval | Refresh interval to re-read the cloud instance list
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator | The string by which Linode Instance tags are joined into the tag label
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters | Whether to include the parameters as meta labels
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants | Whether the service discovery should list all instances for all projects
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval | Refresh interval to re-read the instance list
|
| services.maubot.settings.plugin_databases.postgres_max_conns_per_plugin | Maximum number of connections per plugin instance.
|