| services.transmission.settings.peer-port-random-on-start | Randomize the peer port.
|
| services.transmission.settings.peer-port-random-low | The minimal peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.transmission.settings.peer-port-random-high | The maximum peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|
| services.ttyd.port | Port to listen on (use 0 for random port)
|
| services.logstash.port | Port on which to start webserver.
|
| services.pulseaudio.tcp.port | TCP connection port
|
| services.openvscode-server.port | The port the server should listen to
|
| services.livekit.settings.rtc.port_range_start | Start of UDP port range for WebRTC
|
| services.transmission.settings.peer-port | The peer port to listen for incoming connections.
|
| services.journald.audit | If enabled systemd-journald will turn on auditing on start-up
|
| services.livekit.ingress.settings.rtc_config.port_range_start | Start of UDP port range for WebRTC
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.starttls | set to true for using STARTTLS to start a TLS connection
|
| programs.gnupg.agent.enableSSHSupport | Enable SSH agent support in GnuPG agent
|
| services.kubo.startWhenNeeded | Whether to use socket activation to start Kubo when needed.
|
| services.mpd.startWhenNeeded | If set, mpd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start it on the first incoming connection.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| services.foundationdb.listenPortStart | Starting port number for database listening sockets
|
| systemd.mounts.*.startLimitBurst | Configure unit start rate limiting
|
| systemd.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.services.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.paths.<name>.startLimitBurst | Configure unit start rate limiting
|
| users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| systemd.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| programs.ssh.startAgent | Whether to start the OpenSSH agent when you log in
|
| systemd.user.timers.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.slices.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.services.<name>.startAt | Automatically start this unit at the given date/time, which
must be in the format described in
systemd.time(7)
|
| services.openssh.startWhenNeeded | If set, sshd is socket-activated; that
is, instead of having it permanently running as a daemon,
systemd will start an instance for each incoming connection.
|
| services.matrix-synapse.settings.server_name | The domain name of the server, with optional explicit port
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql | A list of SQL statements to execute once after making a connection.
|
| systemd.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| services.transmission.settings.rpc-port | The RPC port to listen to.
|
| systemd.user.sockets.<name>.startLimitBurst | Configure unit start rate limiting
|
| systemd.user.targets.<name>.startLimitBurst | Configure unit start rate limiting
|
| security.agnos.startAt | How often or when to run agnos
|
| users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| services.printing.startWhenNeeded | If set, CUPS is socket-activated; that is,
instead of having it permanently running as a daemon,
systemd will start it on the first incoming connection.
|
| services.peertube.redis.port | Redis port.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.from | The start of the port range, inclusive.
|
| services.self-deploy.startAt | The schedule on which to run the self-deploy service
|
| services.grafana.settings.smtp.startTLS_policy | StartTLS policy when connecting to server.
|
| systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.gitlab.backup.startAt | The time(s) to run automatic backup of GitLab
state
|
| services.emacs.startWithGraphical | Start emacs with the graphical session instead of any session
|
| systemd.mounts.*.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.paths.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.pppd.peers.<name>.autostart | Whether the PPP session is automatically started at boot time.
|
| services.pgbackrest.commands.start | Options for the 'start' command
|
| services.peering-manager.port | Port the server will listen on.
|
| systemd.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.slices.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.timers.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.automounts.*.startLimitBurst | Configure unit start rate limiting
|
| services.thanos.compact.startAt | When this option is set to a systemd.time
specification the Thanos compactor will run at the specified period
|
| systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.qui.settings.port | The port qui listens on.
|
| services.nsd.port | Port the service should bind do.
|
| services.ente.api.settings.db.port | The database port
|
| services.mpd.settings.port | This setting is the TCP port that is desired for the daemon to get assigned
to.
|
| services.borgbackup.jobs.<name>.startAt | When or how often the backup should run
|
| services.ifm.port | Port on which to serve the IFM service
|
| services.peertube.database.port | Database host port.
|
| services.wiki-js.settings.port | TCP port the process should listen to.
|
| services.nats.port | Port on which to listen.
|
| services.sslh.port | Listening port.
|
| swapDevices.*.randomEncryption.source | Define the source of randomness to obtain a random key for encryption.
|
| power.ups.ups.<name>.port | The serial port to which your UPS is connected. /dev/ttyS0 is
usually the first port on Linux boxes, for example.
|
| services.honk.port | The port the server should listen to.
|
| services.ocis.port | Web interface port.
|
| services.yarr.port | Port to run server on.
|
| services.acme-dns.settings.api.port | Listen port for the HTTP API.
|
| services.stash.settings.port | The port that Stash should listen on.
|
| services.slskd.settings.web.port | The HTTP listen port.
|
| services.alps.port | TCP port the service should listen on.
|
| services.gpsd.port | The port where to listen for TCP connections.
|
| services.tika.port | The Apache Tike port to listen on
|
| services.ombi.port | The port for the Ombi web interface.
|
| services.send.port | Port the Send service listens on.
|
| services.tsidp.settings.port | Port to listen on (default: 443).
|
| services.bcg.mqtt.port | Port of MQTT server.
|
| services.ympd.mpd.port | The port where MPD is listening.
|
| services.gatus.settings.web.port | The TCP port to serve the Gatus service at.
|
| services.lemmy.settings.port | Port where lemmy should listen for incoming requests.
|
| services.pict-rs.port | The port which to bind the service to.
|
| services.mastodon.mediaAutoRemove.startAt | How often to remove remote media
|
| services.osrm.port | Port on which the web server will run.
|
| services.xrdp.port | Specifies on which port the xrdp daemon listens.
|
| services.node-red.port | Listening port.
|
| services.omnom.settings.smtp.port | SMTP server port address.
|
| services.nextcloud.autoUpdateApps.startAt | When to run the update
|
| services.db-rest.port | The port the db-rest server should listen on.
|
| services.morty.port | Listing port
|
| services.ebusd.port | The port on which to listen on
|
| services.cfssl.port | Port to bind.
|
| services.pykms.port | The port on which to listen.
|
| services.actual.settings.port | The port to listen on
|
| systemd.automounts.*.startLimitIntervalSec | Configure unit start rate limiting
|
| services.flood.port | Port to bind webserver.
|
| services.paisa.port | Port to serve Paisa on.
|
| services.omnom.port | The Omnom service port.
|
| services.movim.port | Movim daemon port.
|
| services.artalk.settings.port | Artalk server listen port
|
| services.cross-seed.settings.port | Port the cross-seed daemon listens on.
|
| services.mchprs.settings.port | Port for the server
|
| services.atuin.port | The port the atuin server should listen on.
|
| services.cook-cli.port | Which port cook-cli server will use.
|
| services.chhoto-url.settings.port | The port to listen on.
|
| services.i2pd.port | I2P listen port
|
| services.sftpgo.settings.smtp.port | Port of the SMTP Server.
|
| services.zwave-js.port | Port for the server to listen on.
|
| services.hydra.port | TCP port the web server should listen to.
|
| services.ncdns.port | The port the ncdns resolver will bind to.
|
| services.snmpd.port | The port to listen on for SNMP and AgentX messages.
|
| services.lemmy.ui.port | Port where lemmy-ui should listen for incoming requests.
|
| services.pretix.settings.mail.port | Port of the SMTP server to use for mail delivery.
|
| services.leaps.port | A port where leaps listens for incoming http requests
|
| services.misskey.settings.db.port | The PostgreSQL port.
|
| services.legit.settings.server.port | Legit port.
|
| services.postgresqlBackup.startAt | This option defines (see systemd.time for format) when the
databases should be dumped
|
| services.ebusd.mqtt.port | The port on which to connect to MQTT
|
| services.alps.smtps.port | The SMTPS server port.
|
| services.alps.imaps.port | The IMAPS server port.
|
| services.send.redis.port | Port of the redis server.
|
| services.karma.settings.listen.port | HTTP port to listen on.
|
| services.nipap.settings.nipapd.port | Port to bind nipapd to.
|
| services.komga.settings.server.port | The port that Komga will listen on.
|
| services.tabby.port | Specifies the bind port on which the tabby server HTTP interface listens.
|
| services.step-ca.port | The port the certificate authority should listen on
|
| services.movim.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.db-rest.redis.port | Redis port.
|
| services.freeciv.settings.port | Listen for clients on given port
|
| services.misskey.settings.port | The port your Misskey server should listen on.
|
| services.sharkey.settings.port | The port that Sharkey will listen on.
|
| services.xonotic.settings.port | The port Xonotic will listen on.
|
| services.toxvpn.port | udp port for toxcore, port-forward to help with connectivity if you run many nodes behind one NAT
|
| services.llama-cpp.port | Listen port for LLaMA C++ server.
|
| services.certspotter.startAtEnd | Whether to skip certificates issued before the first launch of Cert Spotter
|
| services.alerta.port | Port of Alerta
|
| services.redlib.port | The port to listen on
|
| services.snipe-it.mail.port | Mail host port.
|
| services.livekit.settings.port | Main TCP port for RoomService and RTC endpoint.
|
| services.nix-serve.port | Port number where nix-serve will listen on.
|
| services.nar-serve.port | Port number where nar-serve will listen on.
|
| services.i2pd.proto.sam.port | Bind port for sam endpoint.
|
| services.i2pd.proto.bob.port | Bind port for bob endpoint.
|
| services.i2pd.ssu2.port | Port to listen for incoming SSU2 connections (0=auto).
|
| security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| services.biboumi.settings.port | The TCP port to use to connect to the local XMPP component.
|
| services.nntp-proxy.port | Proxy listen port
|
| services.zammad.port | Web service port.
|
| services.whoami.port | The port whoami should listen on.
|
| services.sabnzbd.settings.misc.port | Port for the Web UI to listen on for incoming connections.
|
| services.paisa.settings | Paisa configuration
|
| services.lidarr.settings.server.port | Port Number
|
| services.maubot.settings.server.port | The port to listen on
|
| services.radarr.settings.server.port | Port Number
|
| services.sonarr.settings.server.port | Port Number
|
| services.hylafax.autostart | Autostart the HylaFAX queue manager at system start
|
| services.gerbil.port | Specifies the port to listen on for Gerbil.
|
| services.athens.port | Port number Athens listens on.
|
| services.immich.port | The port that immich will listen on.
|
| services.rustus.port | The port that rustus will connect to.
|
| services.shiori.port | The port of the Shiori web application
|
| services.mealie.port | Port on which to serve the Mealie service.
|
| services.pyload.port | Port to listen on for the web UI.
|
| services.ollama.port | Which port the ollama server listens to.
|
| services.tomcat.port | The TCP port Tomcat should listen on.
|
| services.llama-swap.port | Port that llama-swap listens on.
|
| hardware.logitech.lcd.startWhenNeeded | Only run the service when an actual supported device is plugged.
|
| services.portunus.dex.port | Port where dex should listen on.
|
| services.movim.h2o.http.port | Override the default HTTP port for this virtual host.
|
| services.glance.settings.server.port | Glance port to listen on
|
| services.beszel.hub.port | Port for this beszel hub to listen on.
|
| services.gnunet.tcp.port | The TCP port for use by GNUnet.
|
| services.gnunet.udp.port | The UDP port for use by GNUnet.
|
| services.deluge.web.port | Deluge web UI port.
|
| services.tremor-rs.port | the port tremor should be listening on
|
| services.misskey.settings.redis.port | The Redis port.
|
| services.quorum.port | Override the default port on which to listen for connections.
|
| services.gollum.port | Port on which the web server will run.
|
| services.hoogle.port | Port number Hoogle will be listening to.
|
| services.statsd.port | Port that stats listens for messages on over UDP
|
| services.porn-vault.port | Which port Porn-Vault will use.
|
| services.open-webui.port | Which port the Open-WebUI server listens to.
|
| services.rsyncd.port | TCP port the daemon will listen on.
|
| services.monero.rpc.port | Port the RPC server will bind to.
|
| services.openafsClient.startDisconnected | Start up in disconnected mode
|
| services.gitDaemon.port | Port to listen on.
|
| services.quorum.ws.port | Override the default port on which to listen for WS-RPC connections.
|
| services.i2pd.proto.i2cp.port | Bind port for i2cp endpoint.
|
| services.i2pd.proto.http.port | Bind port for http endpoint.
|
| services.synapse-auto-compressor.startAt | How often to run this service in systemd calendar syntax (see systemd.time(7))
|
| virtualisation.libvirtd.startDelay | Number of seconds to wait between each guest start
|
| services.quorum.rpc.port | Override the default port on which to listen for RPC connections.
|
| services.hedgedoc.settings.port | Port to listen on.
|
| services.teleport.diag.port | Metrics and diagnostics port.
|
| services.monica.mail.port | Mail host port.
|
| services.netbox.port | Port the server will listen on
|
| services.meme-bingo-web.port | Port to be used for the web server.
|
| services.mtr-exporter.port | Listen port for MTR exporter.
|
| services.nipap.nipap-www.port | Port to bind to.
|
| services.dgraph.zero.port | The port which to run dgraph zero on.
|
| services.gitlab.smtp.port | Port of the SMTP server for GitLab.
|
| services.ergo.listen.port | Listen port for the Ergo node.
|
| services.i2pd.ntcp2.port | Port to listen for incoming NTCP2 connections (0=auto).
|
| services.immich-kiosk.settings.kiosk.port | Port on which immich-kiosk will listen.
|
| services.readarr.settings.server.port | Port Number
|
| services.nostr-rs-relay.port | Listen on this port.
|
| services.minidlna.settings.port | Port number for HTTP traffic (descriptions, SOAP, media transfer).
|
| services.geth.<name>.port | Port number Go Ethereum will be listening on, both TCP and UDP.
|
| services.bacula-sd.port | Specifies port number on which the Storage daemon listens for
Director connections.
|
| services.geth.<name>.http.port | Port number of Go Ethereum HTTP API.
|
| services.sunshine.settings.port | Base port -- others used are offset from this one, see https://docs.lizardbyte.dev/projects/sunshine/en/latest/about/advanced_usage.html#port for details.
|
| services.code-server.port | The port the server should listen to.
|
| services.molly-brown.port | TCP port for molly-brown to bind to.
|
| services.gitlab.port | GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're
service over https.
|
| services.parsoid.port | Port to listen on.
|
| services.esphome.port | esphome port
|
| services.https-dns-proxy.port | The port on which to listen
|
| services.monetdb.port | Port to listen on.
|
| services.outline.port | Listening port.
|
| services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| services.kismet.httpd.port | The port to listen on.
|
| services.ergo.api.listen.port | Listen port for the API endpoint if api.keyHash is defined.
|
| services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| services.cntlm.port | Specifies on which ports the cntlm daemon listens.
|
| services.corteza.port | Port for the HTTP server.
|
| services.prefect.port | Prefect server port
|
| services.redmine.port | Port on which Redmine is ran.
|
| services.pdfding.port | Port on which PdfDing listens
|
| services.pgadmin.port | Port for pgadmin4 to run on
|
| services.webhook.port | The port webhook should be reachable from.
|
| services.zammad.redis.port | Port of the redis server.
|
| services.iperf3.port | Server port to listen on for iperf3 client requests.
|
| services.rqbit.peerPort | The port to listen for incoming BitTorrent peer connections (TCP and uTP).
|
| services.crabfit.api.port | The internal listening port of the API.
|
| services.dgraph.alpha.port | The port which to run dgraph alpha on.
|
| services.portunus.port | Port where the Portunus webserver should listen on
|
| services.jackett.port | Port serving the web interface
|
| services.cockpit.port | Port where cockpit will listen.
|
| services.glances.port | Port the server will isten on.
|
| services.couchdb.port | Defined the port number to listen.
|
| services.kthxbye.port | The port to listen on for HTTP requests.
|
| services.marytts.port | Port to bind the MaryTTS server to.
|
| services.litellm.port | Which port the LiteLLM server listens to.
|
| services.uptermd.port | Port the server will listen on.
|
| services.vikunja.port | The TCP port exposed by the API.
|
| swapDevices.*.randomEncryption.enable | Encrypt swap device with a random key
|
| services.nylon.<name>.port | What port to listen for client requests, default is 1080.
|
| services.jupyter.port | Port number Jupyter will be listening on.
|
| services.distccd.port | The TCP port which distccd will listen on.
|
| services.zeronet.port | Optional zeronet web UI port.
|
| services.sftpgo.settings.ftpd.bindings.*.port | The port for serving FTP requests
|
| services.tahoe.nodes.<name>.tub.port | The port on which the tub will listen
|
| services.tahoe.nodes.<name>.web.port | The port on which the Web server will listen
|
| services.varnish.listen.*.port | The port to use for IP sockets
|
| services.hledger-web.port | Port to listen on.
|
| power.ups.upsd.listen.*.port | TCP port for upsd to listen on
|
| services.h2o.hosts.<name>.http.port | Override the default HTTP port for this virtual host.
|
| services.owncast.port | TCP port where owncast web-gui listens.
|
| services.hadoop.hbase.rest.port | RPC port
|
| services.prowlarr.settings.server.port | Port Number
|
| services.whisparr.settings.server.port | Port Number
|
| services.gocd-server.port | Specifies port number on which the Go
|
| services.scrutiny.settings.web.listen.port | Port for web application to listen on.
|
| services.etesync-dav.port | The server host port.
|
| swapDevices.*.randomEncryption.cipher | Use specified cipher for randomEncryption
|
| services.mpd.network.port | This setting is the TCP port that is desired for the daemon to get assigned
to.
|
| swapDevices.*.randomEncryption.keySize | Set the encryption key size for the plain device
|
| services.podgrab.port | The port on which Podgrab will listen for incoming HTTP traffic.
|
| services.misskey.settings.redisForJobQueue.port | The Redis port.
|
| services.guix.publish.port | Port of the substitute server to listen on.
|
| services.outline.smtp.port | TCP port of the SMTP server.
|
| services.immich.redis.port | The port that redis will listen on
|
| services.sftpgo.settings.sftpd.bindings.*.port | The port for serving SFTP requests
|
| services.i2pd.proto.httpProxy.port | Bind port for httpproxy endpoint.
|
| services.sftpgo.settings.httpd.bindings.*.port | The port for serving HTTP(S) requests
|
| services.bacula-fd.port | This specifies the port number on which the Client listens for
Director connections
|
| services.go-csp-collector.settings.port | The port to listen on.
|
| services.devpi-server.port | The port on which Devpi Server will listen.
|
| services.nitter.server.port | The port to listen on.
|
| services.jenkins.port | Specifies port number on which the jenkins HTTP interface listens
|
| services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| services.misskey.settings.redisForPubsub.port | The Redis port.
|
| services.automx2.port | Port used by automx2.
|
| services.znc.confOptions.port | Specifies the port on which to listen.
|
| services.murmur.port | Ports to bind to (UDP and TCP).
|
| services.sympa.database.port | Database port
|
| services.lk-jwt-service.port | Port that lk-jwt-service should listen on.
|
| security.pam.services.<name>.gnupg.noAutostart | Don't start gpg-agent if it is not running
|
| services.bacula-dir.port | Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections
|
| services.tmate-ssh-server.port | Listen port for the ssh server
|
| services.anki-sync-server.port | Port number anki-sync-server listens to.
|
| services.athens.index.mysql.port | Port for the MySQL database.
|
| services.greetd.restart | Whether to restart greetd when it terminates (e.g. on failure)
|
| services.docuseal.port | DocuSeal port.
|
| services.rtorrent.port | The rtorrent port.
|
| services.pairdrop.port | The port to listen on.
|
| services.ostinato.port | Port to listen on.
|
| services.pinnwand.port | The port to listen on.
|
| services.i2pd.proto.socksProxy.port | Bind port for socksproxy endpoint.
|
| services.polaris.port | The port which the Polaris REST api and web UI should listen to
|
| services.snapserver.settings.tcp.port | Port to listen on for snapclient connections.
|
| services.mirakurun.port | Port to listen on
|
| services.tahoe.nodes.<name>.sftpd.port | The port on which the SFTP server will listen
|
| services.livekit.redis.port | Port to bind local redis instance to.
|
| services.coturn.cli-port | CLI server port.
|
| services.cadvisor.port | Cadvisor listening port
|
| services.c2fmzq-server.port | The local port to use.
|
| services.firebird.port | Port Firebird uses.
|
| services.factorio.port | The port to which the service should bind.
|
| services.terraria.port | Specifies the port to listen on.
|
| services.opentsdb.port | Which port OpenTSDB listens on.
|
| services.syncplay.port | TCP port to bind to.
|
| services.sabnzbd.settings.servers.<name>.port | Port of the server
|
| services.scanservjs.settings.port | The port to listen on.
|
| services.pihole-web.ports | Port(s) for the webserver to serve on
|
| services.graphite.web.port | Graphite web frontend port.
|
| services.zabbixWeb.server.port | The port of the Zabbix server to connect to.
|
| services.reposilite.settings.port | The TCP port to bind to.
|
| services.postgresql.settings.port | The port on which PostgreSQL listens.
|
| services.duckling.port | Port on which duckling will run.
|
| services.bitbox-bridge.port | Listening port for the bitbox-bridge.
|
| services.chromadb.port | Defined the port number to listen.
|
| services.documize.port | The http/https port number.
|
| services.lavalink.port | The port that Lavalink will use.
|
| services.netatalk.port | TCP port to be used for AFP.
|
| services.quake3-server.port | UDP Port the server should listen on.
|
| services.tautulli.port | TCP port where Tautulli listens.
|
| services.xandikos.port | The port of the Xandikos web application
|
| services.parsedmarc.settings.imap.port | The IMAP server port.
|
| services.parsedmarc.settings.smtp.port | The SMTP server port.
|
| services.aria2.settings.listen-port | Set UDP listening port range used by DHT(IPv4, IPv6) and UDP tracker.
|
| services.epgstation.settings.port | HTTP port for EPGStation to listen on.
|
| services.metabase.ssl.port | Listen port over SSL (https) for Metabase.
|
| services.xtreemfs.mrc.port | The port to listen on for incoming connections (TCP).
|
| services.xtreemfs.dir.port | The port to listen on for incoming connections (TCP).
|
| services.xserver.desktopManager.runXdgAutostartIfNone | Whether to run XDG autostart files for sessions without a desktop manager
(with only a window manager), these sessions usually don't handle XDG
autostart files by default
|
| services.snapserver.settings.http.port | Port to listen on for snapclient connections.
|
| services.chisel-server.port | Port to listen on, falls back to 8080
|
| services.lighttpd.port | TCP port number for lighttpd to bind to.
|
| services.matter-server.port | Port to expose the matter-server service on.
|
| services.xtreemfs.osd.port | The port to listen on for incoming connections (TCP and UDP).
|
| services.dolibarr.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.distccd.stats.port | The TCP port which the distccd statistics HTTP server will listen
on.
|
| services.sftpgo.settings.webdavd.bindings.*.port | The port for serving WebDAV requests
|
| services.zammad.database.port | Database port
|
| swapDevices.*.randomEncryption.sectorSize | Set the sector size for the plain encrypted device type
|
| services.agorakit.mail.port | Mail host port.
|
| services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| services.scrutiny.settings.web.influxdb.port | The port of the InfluxDB instance.
|
| services.keycloak.settings.http-port | On which port Keycloak should listen for new HTTP connections.
|
| services.pgmanage.port | This tells pgmanage what port to listen on for browser requests.
|
| services.rabbitmq.port | Port on which RabbitMQ will listen for AMQP connections.
|
| services.tts.servers.<name>.port | Port to bind the TTS server to.
|
| services.spoolman.port | TCP port where spoolman web-gui listens.
|
| services.darkhttpd.port | Port to listen on
|
| boot.initrd.network.ssh.port | Port on which SSH initrd service should listen.
|
| services.hadoop.hbase.thrift.port | RPC port
|
| services.docling-serve.port | Which port the Docling Serve server listens to.
|
| services.domoticz.port | Port to bind to for HTTP, set to 0 to disable HTTP.
|
| xdg.autostart.enable | Whether to install files to support the
XDG Autostart specification.
|
| services.redis.servers.<name>.port | The TCP port to accept connections
|
| services.suwayomi-server.settings.server.port | The port that Suwayomi will listen to.
|
| services.aria2.settings.rpc-listen-port | Specify a port number for JSON-RPC/XML-RPC server to listen to
|
| services.i2pd.proto.i2pControl.port | Bind port for i2pcontrol endpoint.
|
| services.dolibarr.h2o.http.port | Override the default HTTP port for this virtual host.
|
| services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| services.keycloak.settings.https-port | On which port Keycloak should listen for new HTTPS connections.
|
| services.mastodon.redis.port | Redis port.
|
| services.bitwarden-directory-connector-cli.ldap.startTls | Whether to use STARTTLS.
|
| services.airsonic.port | The port on which Airsonic will listen for
incoming HTTP traffic
|
| services.subsonic.port | The port on which Subsonic will listen for
incoming HTTP traffic
|
| services.nextjs-ollama-llm-ui.port | The port under which the Ollama UI interface should be accessible.
|
| services.akkoma.dist.portMax | Upper bound for Erlang distribution protocol TCP port.
|
| services.akkoma.dist.portMin | Lower bound for Erlang distribution protocol TCP port.
|
| services.syncthing.relay.port | Port to listen on for relay traffic
|
| services.docuseal.redis.port | Port of the redis server.
|
| services.gitea.database.port | Database host port.
|
| services.zabbixProxy.listen.port | Listen port for trapper.
|
| services.etebase-server.port | Port to listen on.
|
| services.whoogle-search.port | Port to listen on.
|
| services.icecast.listen.port | TCP port that will be used to accept client connections.
|
| services.homebridge.settings.bridge.port | The port homebridge listens on
|
| services.i2pd.inTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| services.geth.<name>.metrics.port | Port number of Go Ethereum metrics service.
|
| services.firezone.relay.port | The port to listen on for STUN messages
|
| services.calibre-web.listen.port | Listen port for Calibre-Web.
|
| services.snapserver.settings.stream.port | Port to listen on for snapclient connections.
|
| services.szurubooru.server.settings.smtp.port | Port of the SMTP server.
|
| services.trilium-server.port | The port number to bind to.
|
| services.listmonk.database.settings.smtp.*.port | Port for the SMTP server
|
| services.davis.nginx.listen.*.port | Port number to listen on
|
| services.tt-rss.database.port | The database's port
|
| services.movim.nginx.listen.*.port | Port number to listen on
|
| services.slskd.nginx.listen.*.port | Port number to listen on
|
| services.snipe-it.database.port | Database host port.
|
| services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| services.dae.openFirewall.port | Port to be opened
|
| services.pdns-recursor.dns.port | Port number Recursor DNS server will bind to.
|
| services.filebrowser.settings.port | The port to listen on.
|
| services.endlessh.port | Specifies on which port the endlessh daemon listens for SSH
connections
|
| services.i2pd.outTunnels.<name>.port | Bind port for ‹name› endpoint.
|
| services.sourcehut.hg.port | Port on which the "hg" backend should listen.
|
| services.sourcehut.settings.mail.smtp-port | Outgoing SMTP port.
|
| services.zabbixAgent.listen.port | Agent will listen on this port for connections from the server.
|
| services.pdns-recursor.api.port | Port number Recursor REST API server will bind to.
|
| services.mollysocket.settings.port | Listening port of the web server
|
| services.snipe-it.nginx.listen.*.port | Port number to listen on
|
| services.suricata.settings.vars.port-groups | The port group variables for suricata.
|
| services.ethercalc.port | Port to bind to.
|
| services.glitchtip.port | The port to listen on.
|
| services.infinoted.port | Port to listen on
|
| services.kapacitor.port | Port of Kapacitor
|
| services.memcached.port | The port to bind to.
|
| services.sickbeard.port | Port to bind to.
|
| services.moonraker.port | The port to listen on.
|
| services.sourcehut.git.port | Port on which the "git" backend should listen.
|
| services.sourcehut.hub.port | Port on which the "hub" backend should listen.
|
| services.sourcehut.man.port | Port on which the "man" backend should listen.
|
| swapDevices.*.randomEncryption.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| services.nsd.remoteControl.port | Port number for remote control operations (uses TLS over TCP).
|
| services.headscale.port | Listening port of headscale.
|
| services.gotenberg.port | Port on which the API should listen.
|
| services.octoprint.port | Port to bind OctoPrint to.
|
| services.mediatomb.port | The network port to listen on.
|
| services.paperless.port | Web interface port.
|
| services.pixiecore.port | Port to listen on for HTTP
|
| services.opencloud.port | Web server port.
|
| services.zookeeper.port | Zookeeper Client port.
|
| services.endlessh-go.port | Specifies on which port the endlessh-go daemon listens for SSH
connections
|
| services.namecoind.rpc.port | Port the RPC server will bind to.
|
| services.magnetico.web.port | Port the web interface will listen to.
|
| services.public-inbox.imap.port | Listening port
|
| services.public-inbox.http.port | Listening port or systemd's ListenStream= entry
to be used as a reverse proxy, eg. in nginx:
locations."/inbox".proxyPass = "http://unix:${config.services.public-inbox.http.port}:/inbox";
Set to null and use systemd.sockets.public-inbox-httpd.listenStreams
if you need a more advanced listening.
|
| services.public-inbox.nntp.port | Listening port
|
| services.sourcehut.settings."hg.sr.ht".debug-port | Port to bind the debug server to.
|
| services.immich-public-proxy.port | The port that IPP will listen on.
|
| services.duplicati.port | Port serving the web interface
|
| services.lanraragi.port | Port for LANraragi's web interface.
|
| services.teeworlds.port | Port the server will listen on.
|
| services.surrealdb.port | The port that surrealdb will connect to.
|
| services.gocd-agent.startupOptions | Specifies startup command line arguments to pass to Go
|
| services.misskey.settings.redisForTimelines.port | The Redis port.
|
| services.sourcehut.settings."hub.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."git.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."man.sr.ht".debug-port | Port to bind the debug server to.
|
| services.bookstack.mail.port | Mail host port.
|
| services.immich.database.port | Port of the postgresql server.
|
| services.graphite.seyren.port | Seyren listening port.
|
| services.moodle.database.port | Database host port.
|
| services.monica.database.port | Database host port.
|
| services.metabase.listen.port | Listen port for Metabase.
|
| services.zabbixServer.listen.port | Listen port for trapper.
|
| services.openvpn.restartAfterSleep | Whether OpenVPN client should be restarted after sleep.
|
| services.imaginary.port | Bind port
|
| services.pinchflat.port | Port on which the Pinchflat web interface is available.
|
| services.thelounge.port | TCP port to listen on for http connections.
|
| services.overseerr.port | The port which the Overseerr web UI should listen on.
|
| services.calibre-server.port | The port on which to listen for connections
|
| services.tailscale.derper.port | The port the derper process will listen on
|
| services.local-content-share.port | Port on which the service will be available
|
| services.sourcehut.meta.port | Port on which the "meta" backend should listen.
|
| services.sourcehut.todo.port | Port on which the "todo" backend should listen.
|
| services.gitlab.registry.port | GitLab container registry port.
|
| services.i2pd.websocket.port | Bind port for websockets endpoint.
|
| services.broadcast-box.web.port | Port the HTTP server listens on.
|
| services.xinetd.services.*.port | Port number of the service.
|
| services.tailscale.port | The port to listen on for tunnel traffic (0=autoselect).
|
| services.firezone.server.api.port | The port under which the api will be served locally
|
| services.snapserver.settings.tcp-control.port | Port to listen on for snapclient connections.
|
| services.gancio.nginx.listen.*.port | Port number to listen on
|
| services.fluidd.nginx.listen.*.port | Port number to listen on
|
| services.akkoma.nginx.listen.*.port | Port number to listen on
|
| services.matomo.nginx.listen.*.port | Port number to listen on
|
| services.monica.nginx.listen.*.port | Port number to listen on
|
| services.firezone.server.web.port | The port under which the web interface will be served locally
|
| services.sourcehut.settings."meta.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."todo.sr.ht".debug-port | Port to bind the debug server to.
|
| services.bitcoind.<name>.rpc.port | Override the default port on which to listen for JSON-RPC connections.
|
| services.zfs.trim.randomizedDelaySec | Add a randomized delay before each ZFS trim
|
| services.firezone.server.smtp.port | Outbound SMTP port
|
| services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| services.typesense.settings.server.api-port | Port on which the Typesense API service listens.
|
| services.firefox-syncserver.settings.port | Port to bind to.
|
| services.writefreely.settings.server.port | The port WriteFreely should listen on.
|
| nix.gc.randomizedDelaySec | Add a randomized delay before each garbage collection
|
| services.dawarich.redis.port | The port of the redis server Dawarich will connect to
|
| services.zabbixWeb.database.port | Database host port.
|
| services.tandoor-recipes.port | Web interface port.
|
| services.workout-tracker.port | Web interface port.
|
| services.botamusique.settings.server.port | Port of the mumble server to connect to.
|
| services.pgadmin.emailServer.port | SMTP server port for email delivery
|
| services.owncast.rtmp-port | TCP port where owncast rtmp service listens.
|
| services.hadoop.hbase.rest.restartIfChanged | Restart rest con config change.
|
| services.bitcoind.<name>.port | Override the default port on which to listen for connections.
|
| services.keycloak.database.port | Port of the database to connect to.
|
| services.netbird.server.signal.port | Internal port of the signal server.
|
| services.redis.servers.<name>.slaveOf.port | port of the Redis master
|
| services.postgrest.settings.server-port | The TCP port to bind the web server.
|
| services.gocd-server.startupOptions | Specifies startup command line arguments to pass to Go
|
| services.sourcehut.settings."paste.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."pages.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.settings."lists.sr.ht".debug-port | Port to bind the debug server to.
|
| services.sourcehut.lists.port | Port on which the "lists" backend should listen.
|
| services.sourcehut.paste.port | Port on which the "paste" backend should listen.
|
| services.sourcehut.pages.port | Port on which the "pages" backend should listen.
|
| services.lanraragi.redis.port | Port for LANraragi's Redis server.
|
| services.deconz.allowRestartService | Whether to enable killing/restarting processes.
|
| services.opensearch.settings."http.port" | The port to listen on for HTTP traffic.
|
| services.dockerRegistry.port | Docker registry port to bind to.
|
| services.journald.remote.port | The port to listen to
|
| services.journald.gateway.port | The port to listen to.
|
| services.pdfding.database.port | PostgreSQL port
|
| services.athens.index.postgres.port | Port for the Postgres database.
|
| services.misskey.settings.meilisearch.port | The Meilisearch port.
|
| services.matrix-continuwuity.settings.global.port | The port(s) continuwuity will be running on
|
| services.magnetico.crawler.port | Port to be used for indexing DHT nodes
|
| services.nginx.defaultListen.*.port | Port number.
|
| services.grafana-image-renderer.settings.service.port | The TCP port to use for the rendering server.
|
| services.eternal-terminal.port | The port the server should listen on
|
| services.forgejo.database.port | Database host port.
|
| services.karakeep.browser.port | The port the browser should run on.
|
| services.redmine.database.port | Database host port.
|
| services.matrix-synapse.settings.listeners.*.port | The port to listen for HTTP(S) requests on.
|
| services.crabfit.frontend.port | The internal listening port of the frontend.
|
| services.trezord.emulator.port | Listening port for the Trezor emulator.
|
| services.buildbot-master.port | Specifies port number on which the buildbot HTTP interface listens.
|
| services.opensearch.settings."transport.port" | The port to listen on for transport traffic.
|
| services.invidious.port | The port Invidious should listen on
|
| services.sourcehut.settings."builds.sr.ht".debug-port | Port to bind the debug server to.
|
| services.fedimintd.<name>.ui.port | TCP Port to bind on for UI connections
|
| services.headphones.port | Port to bind to.
|
| services.prometheus.port | Port to listen on.
|
| services.zoneminder.port | The port on which to listen.
|
| services.minetest-server.port | Port number to bind to
|
| services.zfs.autoScrub.randomizedDelaySec | Add a randomized delay before each ZFS autoscrub
|
| services.plausible.server.port | Port where the service should be available.
|
| services.zabbixProxy.database.port | Database host port.
|
| image.repart.seed | A UUID to use as a seed
|
| services.snapserver.tcp.port | The port where the TCP JSON-RPC listens on.
|
| services.mympd.settings.http_port | The HTTP port where mympd's web interface will be available
|
| services.bitmagnet.settings.dht_server.port | DHT listen port
|
| services.hockeypuck.port | HKP port to listen on.
|
| services.photoprism.port | Web interface port.
|
| services.microsocks.port | Port on which microsocks should listen.
|
| services.phylactery.port | Listen port for Phylactery
|
| services.sourcehut.builds.port | Port on which the "builds" backend should listen.
|
| services.coturn.max-port | Upper bound of UDP relay endpoints
|
| services.coturn.min-port | Lower bound of UDP relay endpoints
|
| services.snapserver.port | The port that snapclients can connect to.
|
| services.mattermost.port | Port for Mattermost server to listen on.
|
| services.linkwarden.port | The port that Linkwarden will listen on.
|
| services.hadoop.hbase.master.restartIfChanged | Restart master con config change.
|
| services.hadoop.hbase.thrift.restartIfChanged | Restart thrift con config change.
|
| services.kimai.sites.<name>.database.port | Database host port.
|
| services.netbird.tunnels.<name>.port | Port the NetBird client listens on.
|
| services.netbird.clients.<name>.port | Port the NetBird client listens on.
|
| services.pingvin-share.backend.port | The port that the backend service of Pingvin Share will listen to.
|
| services.esdm.enableLinuxCompatServices | Enable /dev/random, /dev/urandom and /proc/sys/kernel/random/* userspace wrapper.
|
| services.jellyseerr.port | The port which the Jellyseerr web UI should listen to.
|
| services.jupyterhub.port | Port number Jupyterhub will be listening on
|
| services.lubelogger.port | The TCP port LubeLogger will listen on.
|
| services.onlyoffice.port | Port the OnlyOffice document server should listen on.
|
| services.snapserver.settings.tcp-streaming.port | Port to listen on for snapclient connections.
|
| services.headscale.settings.database.postgres.port | Database host port.
|
| services.fedimintd.<name>.p2p.port | Port to bind on for p2p connections from peers (both TCP and UDP)
|
| services.snapserver.http.port | The port where the HTTP JSON-RPC listens on.
|
| services.postgrest.settings.admin-server-port | Specifies the port for the admin server, which can be used for healthchecks.
https://docs.postgrest.org/en/stable/references/admin_server.html#admin-server
|
| services.kresd.instances | The number of instances to start
|
| services.invidious.database.port | The port of the database Invidious should use
|
| services.toxBootstrapd.port | Listening port (UDP).
|
| services.moodle.virtualHost.listen.*.port | Port to listen on
|
| services.nagios.virtualHost.listen.*.port | Port to listen on
|
| services.hadoop.hdfs.zkfc.restartIfChanged | Automatically restart the service on config change
|
| services.collabora-online.port | Listening port
|
| services.invidious-router.port | Port to bind to.
|
| services.radicle.httpd.nginx.listen.*.port | Port number to listen on
|
| services.seafile.gc.randomizedDelaySec | Add a randomized delay before each garbage collection
|
| services.mackerel-agent.settings.host_status.on_start | Host status after agent startup.
|
| virtualisation.lxd.startTimeout | Time to wait (in seconds) for LXD to become ready to process requests
|
| services.fedimintd.<name>.api.port | Port to bind on for API connections relied by the reverse proxy/tls terminator.
|
| services.wstunnel.servers.<name>.settings.restrict-to.*.port | The port.
|
| services.bitlbee.portNumber | Number of the port BitlBee will be listening to.
|
| services.geth.<name>.websocket.port | Port number of Go Ethereum WebSocket API.
|
| services.dolibarr.database.port | Database host port.
|
| services.agorakit.database.port | Database host port.
|
| services.dawarich.database.port | Port of the postgresql server.
|
| services.freshrss.database.port | Database port for FreshRSS.
|
| services.mastodon.database.port | Database host port.
|
| services.zabbixServer.database.port | Database host port.
|
| services.quassel.portNumber | The port number the Quassel daemon will be listening to.
|
| services.guacamole-server.port | The port the guacd server should listen to.
|
| services.komodo-periphery.port | Port for the Periphery agent to listen on.
|
| services.selfoss.database.port | The database's port
|
| services.hardware.lcd.client.restartForever | Try restarting the client forever.
|
| services.agorakit.nginx.listen.*.port | Port number to listen on
|
| services.dolibarr.nginx.listen.*.port | Port number to listen on
|
| services.fediwall.nginx.listen.*.port | Port number to listen on
|
| services.librenms.nginx.listen.*.port | Port number to listen on
|
| services.kanboard.nginx.listen.*.port | Port number to listen on
|
| services.mainsail.nginx.listen.*.port | Port number to listen on
|
| services.pixelfed.nginx.listen.*.port | Port number to listen on
|
| services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| services.drupal.sites.<name>.database.port | Database host port.
|
| systemd.user.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.spark.worker.restartIfChanged | Automatically restart worker service on config change
|
| services.spark.master.restartIfChanged | Automatically restart master service on config change
|
| services.firewalld.zones.<name>.ports.*.port | |
| services.prometheus.exporters.frr.port | Port to listen on.
|
| services.prometheus.exporters.nut.port | Port to listen on.
|
| services.prometheus.exporters.pve.port | Port to listen on.
|
| services.prometheus.exporters.kea.port | Port to listen on.
|
| services.prometheus.exporters.sql.port | Port to listen on.
|
| services.prometheus.exporters.lnd.port | Port to listen on.
|
| services.prometheus.exporters.zfs.port | Port to listen on.
|
| services.vsmartcard-vpcd.port | Port number vpcd will be listening on.
|
| services.bitmagnet.settings.http_server.port | HTTP server listen port
|
| services.polaris.settings | Contents for the TOML Polaris config, applied each start
|
| virtualisation.incus.startTimeout | Time to wait (in seconds) for incusd to become ready to process requests
|
| services.librenms.database.port | Port of the MySQL/MariaDB server
|
| services.ostinato.portList.include | For a port to pass the filter and appear on the port list managed
by drone, it be allowed by this include list.
|
| services.hardware.openrgb.server.port | Set server port of openrgb.
|
| systemd.services.<name>.restartIfChanged | Whether the service should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.gerrit.jvmOpts | A list of JVM options to start gerrit with.
|
| services.pingvin-share.frontend.port | The port that the frontend service of Pingvin Share will listen to.
|
| services.prometheus.exporters.ping.port | Port to listen on.
|
| services.prometheus.exporters.bind.port | Port to listen on.
|
| services.prometheus.exporters.bird.port | Port to listen on.
|
| services.prometheus.exporters.ebpf.port | Port to listen on.
|
| services.prometheus.exporters.php-fpm.port | Port to listen on.
|
| services.prometheus.exporters.knot.port | Port to listen on.
|
| services.prometheus.exporters.flow.port | Port to listen on.
|
| services.prometheus.exporters.ipmi.port | Port to listen on.
|
| services.prometheus.exporters.mqtt.port | Port to listen on.
|
| services.prometheus.exporters.snmp.port | Port to listen on.
|
| services.prometheus.exporters.node.port | Port to listen on.
|
| services.prometheus.exporters.nats.port | Port to listen on.
|
| services.prometheus.exporters.json.port | Port to listen on.
|
| services.prometheus.exporters.mail.port | Port to listen on.
|
| services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.peertube.listenWeb | The public-facing port that PeerTube will be accessible at (likely 80 or 443 if running behind a reverse proxy)
|
| services.cook-cli.autoStart | Whether to start cook-cli server automatically.
|
| services.adguardhome.settings | AdGuard Home configuration
|
| services.actual.settings.dataDir | Directory under which Actual runs and saves its data
|
| services.zabbixWeb.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.hadoop.hdfs.httpfs.restartIfChanged | Automatically restart the service on config change
|
| services.szurubooru.server.port | Port to expose HTTP service.
|
| services.prometheus.sachet.port | The port Sachet will listen to.
|
| services.redsocks.redsocks.*.port | Port on which redsocks should listen.
|
| services.jitsi-meet.excalidraw.port | The port which the Excalidraw backend for Jitsi should listen to.
|
| services.nebula.networks.<name>.listen.port | Port number to listen on.
|
| services.znc.confOptions.networks.<name>.port | IRC server port.
|
| services.meshtasticd.port | Port to listen on
|
| services.whitebophir.port | Port to bind to.
|
| services.lighthouse.beacon.port | Port number the Beacon node will be listening on.
|
| services.prometheus.exporters.redis.port | Port to listen on.
|
| services.prometheus.exporters.dmarc.port | Port to listen on.
|
| services.prometheus.exporters.kafka.port | Port to listen on.
|
| services.prometheus.exporters.v2ray.port | Port to listen on.
|
| services.prometheus.exporters.jitsi.port | Port to listen on.
|
| services.prometheus.exporters.nginx.port | Port to listen on.
|
| services.prometheus.exporters.idrac.port | Port to listen on.
|
| services.prometheus.exporters.fritz.port | Port to listen on.
|
| services.hadoop.hbase.regionServer.restartIfChanged | Restart regionServer con config change.
|
| services.goatcounter.port | Web interface port.
|
| services.rmfakecloud.port | Listening port number.
|
| services.shadowsocks.port | Port which the server uses.
|
| services.anuko-time-tracker.nginx.listen.*.port | Port number to listen on
|
| services.gitea.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.lldap.settings.ldap_port | The port on which to have the LDAP server.
|
| services.beanstalkd.listen.port | TCP port that will be used to accept client connections.
|
| services.dependency-track.port | On which port dependency-track should listen for new HTTP connections.
|
| services.znapzend.zetup.<name>.mbuffer.port | Port to use for mbuffer
|
| services.lighthouse.beacon.http.port | Port number of Beacon node RPC service.
|
| services.prometheus.exporters.node-cert.port | Port to listen on.
|
| services.firefly-iii.settings.APP_KEY_FILE | The path to your appkey
|
| services.mailcatcher.http.port | The port address of the http server.
|
| services.mailcatcher.smtp.port | The port address of the smtp server.
|
| services.adguardhome.port | Port to serve HTTP pages on.
|
| services.dragonflydb.port | The TCP port to accept connections.
|
| services.immichframe.port | The port that ImmichFrame will listen on.
|
| services.spacecookie.port | Port the gopher service should be exposed on.
|
| services.sillytavern.port | Port on which SillyTavern will listen.
|
| services.zerotierone.port | Network port used by ZeroTier.
|
| services.nvme-rs.settings.email.smtp_port | SMTP server port
|
| services.httpd.virtualHosts.<name>.listen.*.port | Port to listen on
|
| services.bookstack.database.port | Database host port.
|
| services.mediawiki.database.port | Database host port.
|
| services.nominatim.database.port | Port of the postgresql database.
|
| systemd.user.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.prometheus.exporters.dmarc.imap.port | Port of the IMAP server to connect to.
|
| services.lldap.settings.http_port | The port on which to have the HTTP server, for user login and administration.
|
| services.hardware.openrgb.startupProfile | The profile file to load from "/var/lib/OpenRGB" at startup.
|
| services.cockroachdb.http.port | Port to bind to for http-based Admin UI
|
| services.mpdscribble.port | Port for the mpdscribble daemon to search for a mpd daemon on.
|
| services.bookstack.nginx.listen.*.port | Port number to listen on
|
| services.netbird.clients.<name>.autoStart | Start the service with the system
|
| services.netbird.tunnels.<name>.autoStart | Start the service with the system
|
| services.temporal.restartIfChanged | Automatically restart the service on config change
|
| services.quickwit.restartIfChanged | Automatically restart the service on config change
|
| services.kanata.keyboards.<name>.port | Port to run the TCP server on. null will not run the server.
|
| services.umurmur.settings.bindport | Port to bind to (UDP and TCP).
|
| services.zabbixWeb.nginx.virtualHost.listen.*.port | Port number to listen on
|
| services.ceph.global.fsid | Filesystem ID, a generated uuid, its must be generated and set before
attempting to start a cluster
|
| services.icecream.scheduler.port | Server port to listen for icecream daemon requests.
|
| services.akkoma.dist.cookie | Erlang release cookie
|
| services.prometheus.exporters.domain.port | Port to listen on.
|
| services.prometheus.exporters.chrony.port | Port to listen on.
|
| services.prometheus.exporters.restic.port | Port to listen on.
|
| services.prometheus.exporters.tibber.port | Port to listen on.
|
| services.prometheus.exporters.dnssec.port | Port to listen on.
|
| services.prometheus.exporters.pihole.port | Port to listen on.
|
| services.prometheus.exporters.statsd.port | Port to listen on.
|
| services.prometheus.exporters.script.port | Port to listen on.
|
| services.prometheus.exporters.mysqld.port | Port to listen on.
|
| services.prometheus.exporters.deluge.port | Port to listen on.
|
| services.prometheus.exporters.shelly.port | Port to listen on.
|
| services.prometheus.exporters.rspamd.port | Port to listen on.
|
| services.prometheus.exporters.fastly.port | Port to listen on.
|
| swapDevices.*.randomEncryption | Encrypt swap device with a random key
|
| services.wstunnel.servers.<name>.listen.port | The port.
|
| services.headscale.settings.prefixes.allocation | Strategy used for allocation of IPs to nodes, available options:
- sequential (default): assigns the next free IP from the previous given IP.
- random: assigns the next free IP from a pseudo-random IP generator (crypto/rand).
|
| services.coturn.listening-port | TURN listener port for UDP and TCP
|
| systemd.services.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.fedimintd.<name>.api_ws.port | TCP Port to bind on for API connections relayed by the reverse proxy/tls terminator.
|
| services.matrix-appservice-irc.port | The port to listen on
|
| services.mediagoblin.paste.port | Port under which paste will listen.
|
| services.discourse.mail.outgoing.port | The port of the SMTP server Discourse should use to
send email.
|
| services.umami.settings.DATABASE_URL | Connection string for the database
|
| services.sks.enable | Whether to enable SKS (synchronizing key server for OpenPGP) and start the database
server
|
| services.prometheus.exporters.nvidia-gpu.port | Port to listen on.
|
| services.druid.overlord.restartIfChanged | Automatically restart the service on config change
|
| xdg.portal.wlr.settings | Configuration for xdg-desktop-portal-wlr
|
| services.drupal.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| services.kubernetes.kubelet.port | Kubernetes kubelet info server listening port.
|
| services.trickster.proxy-port | Port that the Proxy server will listen on.
|
| services.porn-vault.autoStart | Whether to start porn-vault automatically.
|
| services.homebridge.uiSettings.restart | Command to restart the homebridge UI service
|
| services.nginx.virtualHosts.<name>.listen.*.port | Port number to listen on
|
| services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| services.cjdns.enable | Whether to enable the cjdns network encryption
and routing engine
|
| virtualisation.libvirtd.onBoot | Specifies the action to be done to / on the guests when the host boots
|
| services.jirafeau.nginxConfig.listen.*.port | Port number to listen on
|
| services.firewalld.services.<name>.ports.*.port | |
| services.prometheus.exporters.varnish.port | Port to listen on.
|
| services.prometheus.exporters.postfix.port | Port to listen on.
|
| services.prometheus.exporters.bitcoin.port | Port to listen on.
|
| services.prometheus.exporters.klipper.port | Port to listen on.
|
| services.prometheus.exporters.dnsmasq.port | Port to listen on.
|
| services.prometheus.exporters.libvirt.port | Port to listen on.
|
| services.prometheus.exporters.dovecot.port | Port to listen on.
|
| services.prometheus.exporters.unbound.port | Port to listen on.
|
| services.prometheus.exporters.mongodb.port | Port to listen on.
|
| services.prometheus.exporters.systemd.port | Port to listen on.
|
| services.prometheus.exporters.sabnzbd.port | Port to listen on.
|
| services.prometheus.exporters.process.port | Port to listen on.
|
| services.prometheus.exporters.ecoflow.port | Port to listen on.
|
| services.prometheus.exporters.apcupsd.port | Port to listen on.
|
| services.gotenberg.chromium.autoStart | Automatically start Chromium when Gotenberg starts
|
| services.documize.salt | The salt string used to encode JWT tokens, if not set a random value will be generated.
|
| services.hadoop.hdfs.namenode.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.hdfs.datanode.restartIfChanged | Automatically restart the service on config change
|
| nix.optimise.randomizedDelaySec | Add a randomized delay before the optimizer will run
|
| services.cockroachdb.listen.port | Port to bind to for intra-cluster communication
|
| programs.nixbit.forceAutostart | Force creation of autostart desktop entry when application starts
|
| services.filesender.database.port | Database port.
|
| services.ostinato.portList.exclude | A list of ports does not appear on the port list managed by drone.
|
| networking.fooOverUDP.<name>.port | Local port of the encapsulation UDP socket.
|
| services.druid.middleManager.restartIfChanged | Automatically restart the service on config change
|
| services.forgejo.settings.server.SSH_PORT | SSH port displayed in clone URL
|
| services.i2pd.limits.ntcpSoft | Threshold to start probabalistic backoff with ntcp sessions (default: use system limit).
|
| services.paperless.exporter.onCalendar | When to run the exporter
|
| services.limesurvey.database.port | Database host port.
|
| services.mattermost.database.port | Port to use for the database.
|
| services.szurubooru.database.port | The port under which PostgreSQL listens to.
|
| services.reposilite.database.port | Database TCP port.
|
| services.linkwarden.database.port | Port of the postgresql server.
|
| services.prometheus.exporters.py-air-control.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-sonarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-bazarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-radarr.port | Port to listen on.
|
| services.prometheus.exporters.exportarr-lidarr.port | Port to listen on.
|
| services.vwifi.server.ports.spy | The spy interface port
|
| services.vwifi.server.ports.tcp | The TCP server port
|
| services.heisenbridge.port | The port to listen on
|
| services.easytier.instances.<name>.settings.peers | Peers to connect initially
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action | Action to perform after loading the configuration.
- The default of
none loads the connection only, which
then can be manually initiated or used as a responder configuration.
- The value
trap installs a trap policy, which triggers
the tunnel as soon as matching traffic has been detected.
- The value
start initiates the connection actively.
- Since version 5.9.6 two modes above can be combined with
trap|start,
to immediately initiate a connection for which trap policies have been installed
|
| services.transmission.openRPCPort | Whether to enable opening of the RPC port in the firewall.
|
| services.prometheus.exporters.rtl_433.port | Port to listen on.
|
| services.languagetool.port | Port on which LanguageTool listens.
|
| services.netbird.server.management.port | Internal port of the management server.
|
| services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| services.tt-rss.feedCryptKey | Key used for encryption of passwords for password-protected feeds
in the database
|
| services.bookstack.settings.APP_KEY_FILE | The path to your appkey
|
| services.homebridge.uiSettings.port | The port the UI web service should listen on
|
| services.healthchecks.port | Port the server will listen on.
|
| services.openssh.listenAddresses.*.port | Port to listen to.
|
| services.prometheus.exporters.blackbox.port | Port to listen on.
|
| services.prometheus.exporters.fritzbox.port | Port to listen on.
|
| services.prometheus.exporters.keylight.port | Port to listen on.
|
| services.prometheus.exporters.graphite.port | Port to listen on.
|
| services.prometheus.exporters.influxdb.port | Port to listen on.
|
| services.prometheus.exporters.smartctl.port | Port to listen on.
|
| services.prometheus.exporters.unpoller.port | Port to listen on.
|
| services.prometheus.exporters.nginxlog.port | Port to listen on.
|
| services.prometheus.exporters.mikrotik.port | Port to listen on.
|
| services.prometheus.exporters.opnsense.port | Port to listen on.
|
| services.prometheus.exporters.postgres.port | Port to listen on.
|
| services.prometheus.exporters.collectd.port | Port to listen on.
|
| services.certmgr.validMin | The interval before a certificate expires to start attempting to renew it.
|
| services.lighthouse.beacon.metrics.port | Port number of Beacon node metrics service.
|
| services.mtprotoproxy.port | TCP port to accept mtproto connections on.
|
| services.haveged.enable | Whether to enable haveged entropy daemon, which refills /dev/random when low
|
| services.keybase.enable | Whether to start the Keybase service.
|
| services.rspamd.workers | Attribute set of workers to start.
|
| services.prometheus.exporters.exportarr-readarr.port | Port to listen on.
|
| systemd.user.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.foundationdb.restartDelay | Number of seconds to wait before restarting servers.
|
| services.chatgpt-retrieval-plugin.port | Port the chatgpt-retrieval-plugin service listens on.
|
| services.gmediarender.port | Port that will be used to accept client connections.
|
| services.xserver.displayManager.startx.extraCommands | Shell commands to be added to the system-wide xinitrc script.
|
| services.endlessh-go.prometheus.port | Specifies on which port the endlessh-go daemon listens for Prometheus
queries.
|
| services.wordpress.sites.<name>.database.port | Database host port.
|
| services.flaresolverr.port | The port on which FlareSolverr will listen for incoming HTTP traffic.
|
| services.fedimintd.<name>.api_iroh.port | UDP Port to bind Iroh endpoint for API connections
|
| systemd.paths.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.mounts.*.restartTriggers | An arbitrary list of items such as derivations
|
| services.netbird.tunnels.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| services.netbird.clients.<name>.dns-resolver.port | A port to serve DNS entries on when dns-resolver.address is enabled.
|
| services.mediawiki.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.blockbook-frontend.<name>.rpc.port | Port for JSON-RPC connections.
|
| services.nghttpx.backends.*.params.dns | Name resolution of a backends host name is done at start up,
or configuration reload
|
| services.grafana.settings.server.http_port | Listening port.
|
| services.prometheus.exporters.imap-mailstat.port | Port to listen on.
|
| system.autoUpgrade.randomizedDelaySec | Add a randomized delay before each automatic upgrade
|
| systemd.paths.<name>.wants | Start the specified units when this unit is started.
|
| systemd.mounts.*.wants | Start the specified units when this unit is started.
|
| services.keter.globalKeterConfig.listeners.*.port | port
|
| services.prometheus.exporters.mailman3.port | Port to listen on.
|
| services.kubernetes.kubelet.healthz.port | Kubernetes kubelet healthz port.
|
| services.opensearch.restartIfChanged | Automatically restart the service on config change
|
| services.coturn.alt-tls-listening-port | Alternative listening port for TLS and DTLS protocols.
|
| services.transmission.openPeerPorts | Whether to enable opening of the peer port(s) in the firewall.
|
| services.tlsrpt.reportd.settings | Flags from tlsrpt-reportd(1) as key-value pairs.
|
| services.prometheus.exporters.exportarr-prowlarr.port | Port to listen on.
|
| services.trickster.metrics-port | Port that the /metrics endpoint will listen on.
|
| services.vwifi.server.ports.vhost | The vhost port
|
| services.kubernetes.scheduler.port | Kubernetes scheduler listening port.
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Web.Endpoint".http.port | The port to run the server
|
| services.prometheus.exporters.pgbouncer.port | Port to listen on.
|
| services.prometheus.exporters.tailscale.port | Port to listen on.
|
| services.prometheus.exporters.surfboard.port | Port to listen on.
|
| services.prometheus.exporters.rasdaemon.port | Port to listen on.
|
| services.prometheus.exporters.nextcloud.port | Port to listen on.
|
| services.prometheus.exporters.smokeping.port | Port to listen on.
|
| services.prometheus.exporters.borgmatic.port | Port to listen on.
|
| services.prometheus.exporters.wireguard.port | Port to listen on.
|
| services.prometheus.exporters.junos-czerwonk.port | Port to listen on.
|
| services.heisenbridge.identd.port | identd listen port
|
| systemd.user.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.user.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.druid.historical.restartIfChanged | Automatically restart the service on config change
|
| services.doh-server.settings.upstream | Upstream DNS resolver
|
| services.mosquitto.listeners.*.port | Port to listen on
|
| services.fedimintd.<name>.nginx.config.listen.*.port | Port number to listen on
|
| services.croc.ports | Ports of the relay.
|
| systemd.slices.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.timers.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.limesurvey.virtualHost.listen.*.port | Port to listen on
|
| services.umami.settings.DATABASE_URL_FILE | A file containing a connection string for the database
|
| systemd.user.paths.<name>.wants | Start the specified units when this unit is started.
|
| services.bloop.install | Whether to install a user service for the Bloop server
|
| services.teleport.settings | Contents of the teleport.yaml config file
|
| services.writefreely.database.port | The port used when connecting to the database host.
|
| services.livekit.ingress.settings.rtmp_port | TCP port for RTMP connections
|
| services.livekit.ingress.settings.whip_port | TCP port for WHIP connections
|
| services.tsmBackup.command | The actual command passed to the
dsmc executable to start the backup.
|
| services.wasabibackend.rpc.port | Port for RPC connection to bitcoind.
|
| services.coturn.alt-listening-port | Alternative listening port for UDP and TCP listeners;
default (or zero) value means "listening port plus one"
|
| services.rabbitmq.managementPlugin.port | On which port to run the management plugin
|
| services.ocserv.config | Configuration content to start an OCServ server
|
| services.mqtt2influxdb.mqtt.port | MQTT server port.
|
| services.peertube.listenHttp | The port that the local PeerTube web server will listen on.
|
| services.limesurvey.httpd.virtualHost.listen.*.port | Port to listen on
|
| services.wstunnel.servers.<name>.restrictTo.*.port | The port.
|
| programs.dms-shell.systemd.restartIfChanged | Whether to restart the dms.service when the DankMaterialShell package or
configuration changes
|
| services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port | The port where the host can be reached
|
| services.torrentstream.port | TorrentStream port.
|
| services.tlsrpt.reportd.settings.dbname | Path to the sqlite database.
|
| services.xserver.autorun | Whether to start the X server automatically.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.port | External port number.
|
| services.prometheus.exporters.buildkite-agent.port | Port to listen on.
|
| services.matrix-appservice-discord.port | Port number on which the bridge should listen for internal communication with the Matrix homeserver.
|
| services.syncplay.enable | If enabled, start the Syncplay server.
|
| services.wordpress.sites.<name>.virtualHost.listen.*.port | Port to listen on
|
| systemd.user.services.<name>.wants | Start the specified units when this unit is started.
|
| services.kismet.httpd.address | The address to listen on
|
| services.apache-kafka.clusterId | KRaft mode ClusterId used for formatting log directories
|
| services.matrix-alertmanager.port | Port that matrix-alertmanager listens on.
|
| systemd.services.<name>.wants | Start the specified units when this unit is started.
|
| services.prometheus.exporters.scaphandre.port | Port to listen on.
|
| services.prometheus.exporters.storagebox.port | Port to listen on.
|
| systemd.user.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.flannel.subnetMax | The end of IP range which the subnet allocation should start with
|
| services.flannel.subnetMin | The beginning of IP range which the subnet allocation should start with
|
| services.gotosocial.settings | Contents of the GoToSocial YAML config
|
| services.elasticsearch.port | Elasticsearch port to listen for HTTP traffic.
|
| systemd.timers.<name>.wants | Start the specified units when this unit is started.
|
| systemd.slices.<name>.wants | Start the specified units when this unit is started.
|
| services.nebula.networks.<name>.lighthouse.dns.port | UDP port number for lighthouse DNS server.
|
| services.resilio.enable | If enabled, start the Resilio Sync daemon
|
| services.trickster.profiler-port | Port that the /debug/pprof endpoint will listen on.
|
| systemd.targets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| systemd.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.druid.coordinator.restartIfChanged | Automatically restart the service on config change
|
| services.lighthouse.beacon.execution.port | Port number the Beacon node will be listening on for the execution layer.
|
| services.gotenberg.libreoffice.restartAfter | Restart LibreOffice after this many conversions
|
| services.limesurvey.nginx.virtualHost.listen.*.port | Port number to listen on
|
| services.taskchampion-sync-server.port | Port on which to serve
|
| services.biboumi.settings.identd_port | The TCP port on which to listen for identd queries.
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".http.port | Listener port number
|
| services.xserver.displayManager.startx.generateScript | Whether to generate the system-wide xinitrc script (/etc/X11/xinit/xinitrc)
|
| services.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.coturn.tls-listening-port | TURN listener port for TLS
|
| systemd.user.timers.<name>.wants | Start the specified units when this unit is started.
|
| systemd.user.slices.<name>.wants | Start the specified units when this unit is started.
|
| services.hadoop.hdfs.journalnode.restartIfChanged | Automatically restart the service on config change
|
| services.hadoop.yarn.nodemanager.restartIfChanged | Automatically restart the service on config change
|
| services.riemann-dash.dataDir | Location of the riemann-base dir
|
| services.hickory-dns.settings.listen_port | Port to listen on (applies to all listen addresses).
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.settings | PHP FPM configuration
|
| services.gotenberg.libreoffice.autoStart | Automatically start LibreOffice when Gotenberg starts
|
| services.lighthouse.validator.metrics.port | Port number of Validator node metrics service.
|
| services.emacs.install | Whether to install a user service for the Emacs daemon
|
| services.quickwit.settings.rest.listen_port | The port to listen on for HTTP REST traffic.
|
| services.prometheus.exporters.artifactory.port | Port to listen on.
|
| services.goxlr-utility.autoStart.xdg | Start the daemon automatically using XDG autostart
|
| services.displayManager.execCmd | Command to start the display manager.
|
| services.vwifi.server.ports.control | The control interface port
|
| services.misskey.reverseProxy.webserver.nginx.listen.*.port | Port number to listen on
|
| services.slskd.settings.soulseek.listen_port | The port on which to listen for incoming connections.
|
| services.firewalld.zones.<name>.sourcePorts.*.port | |
| services.tor.settings.ServerTransportPlugin.transports | List of pluggable transports.
|
| services.ax25.axports.<name>.baud | The serial port speed of this interface.
|
| security.isolate.firstUid | Start of block of UIDs reserved for sandboxes.
|
| security.isolate.firstGid | Start of block of GIDs reserved for sandboxes.
|
| services.armagetronad.servers.<name>.port | Port to listen on
|
| services.infnoise.fillDevRandom | Whether to run the infnoise driver as a daemon to refill /dev/random
|
| services.nsd.zonefilesCheck | Whether to check mtime of all zone files on start and sighup.
|
| systemd.targets.<name>.wants | Start the specified units when this unit is started.
|
| systemd.sockets.<name>.wants | Start the specified units when this unit is started.
|
| services.yggdrasil.settings | Configuration for yggdrasil, as a structured Nix attribute set
|
| services.grafana_reporter.port | Listening port.
|
| services.shairport-sync.settings | Configuration options for Shairport-Sync
|
| services.zapret.httpSupport | Whether to route http traffic on port 80
|
| services.audiobookshelf.port | The TCP port Audiobookshelf will listen on.
|
| boot.loader.grub.extraPerEntryConfig | Additional GRUB commands inserted in the configuration file
at the start of each NixOS menu entry.
|
| services.jupyter.kernels.<name>.argv | Command and arguments to start the kernel.
|
| services.nginx.typesHashMaxSize | Sets the maximum size of the types hash tables (types_hash_max_size)
|
| services.tlsrpt.reportd.settings.fetchers | Comma-separated list of fetcher programs that retrieve collectd data.
|
| services.seafile.seafileSettings.fileserver.port | The tcp port used by seafile fileserver.
|
| services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| services.mosquitto.bridges.<name>.addresses.*.port | Port of the remote MQTT broker.
|
| systemd.user.sockets.<name>.wants | Start the specified units when this unit is started.
|
| systemd.user.targets.<name>.wants | Start the specified units when this unit is started.
|
| services.prometheus.exporters.modemmanager.port | Port to listen on.
|
| services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| services.autossh.sessions | List of AutoSSH sessions to start as systemd services
|
| services.mastodon.elasticsearch.port | Elasticsearch port.
|
| services.firewalld.zones.<name>.forwardPorts.*.port | |
| services.mqtt2influxdb.influxdb.port | InfluxDB server port
|
| services.elasticsearch-curator.port | the port that elasticsearch is listening on
|
| services.vsftpd.portPromiscuous | Set to YES if you want to disable the PORT security check that ensures that
outgoing data connections can only connect to the client
|
| services.wasabibackend.endpoint.port | Port for P2P connection to bitcoind.
|
| security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| services.invoiceplane.sites.<name>.database.port | Database host port.
|
| services.xonotic.prependConfig | Literal text to insert at the start of server.cfg.
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.nsd.reuseport | Whether to enable SO_REUSEPORT on all used sockets
|
| services.redsocks.log_info | Log start and end of client sessions.
|
| programs.proxychains.chain.type | dynamic - Each connection will be done via chained proxies
all proxies chained in the order as they appear in the list
at least one proxy must be online to play in chain
(dead proxies are skipped)
otherwise EINTR is returned to the app.
strict - Each connection will be done via chained proxies
all proxies chained in the order as they appear in the list
all proxies must be online to play in chain
otherwise EINTR is returned to the app.
random - Each connection will be done via random proxy
(or proxy chain, see programs.proxychains.chain.length) from the list.
|
| services.corosync.extraOptions | Additional options with which to start corosync.
|
| services.statsd.mgmt_port | Port to run the management TCP interface on
|
| users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| services.grafana_reporter.grafana.port | Grafana port.
|
| xdg.portal.enable | Whether to enable xdg desktop integration.
|
| services.elasticsearch.restartIfChanged | Automatically restart the service on config change
|
| services.bitwarden-directory-connector-cli.ldap.port | Port LDAP is accessible on.
|
| services.anuko-time-tracker.settings.reportFooter | Defines whether to use a footer on reports.
|
| services.yubikey-agent.enable | Whether to start yubikey-agent when you log in
|
| services.tlsrpt.reportd.settings.log_level | Level of log messages to emit.
|
| services.pds.settings.PDS_PORT | Port to listen on
|
| services.thanos.store.min-time | Start of time range limit to serve
|
| services.firewalld.services.<name>.sourcePorts.*.port | |
| services.prometheus.alertmanager.port | Port to listen on for the web interface and API.
|
| services.tor.settings.ServerTransportPlugin.exec | Command of pluggable transport.
|
| services.paperless.exporter.settings | Settings to pass to the document exporter as CLI arguments.
|
| systemd.automounts.*.restartTriggers | An arbitrary list of items such as derivations
|
| services.code-server.hashedPassword | Create the password with: echo -n 'thisismypassword' | nix run nixpkgs#libargon2 -- "$(head -c 20 /dev/random | base64)" -e
|
| services.cjdns.admin.bind | Bind the administration port to this address and port.
|
| services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds | When the dynamic endpoint refresh that is configured via
dynamicEndpointRefreshSeconds exits (likely due to a failure),
restart that service after this many seconds
|
| services.warpgate.settings.ssh.external_port | The SSH listener is reachable via this port externally.
|
| services.logstash.listenAddress | Address on which to start webserver.
|
| services.tor.settings.ServerTransportPlugin | See torrc manual.
|
| services.wgautomesh.settings.gossip_port | wgautomesh gossip port, this MUST be the same number on all nodes in
the wgautomesh network.
|
| services.radicle.ci.broker.settings.report_dir | Directory where HTML and JSON report pages are written.
|
| services.rimgo.settings.PORT | The port to use.
|
| services.umami.settings.PORT | The port to listen on.
|
| power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| services.mympd.settings.ssl | Whether to enable listening on the SSL port
|
| services.tt-rss.enableGZipOutput | Selectively gzip output to improve wire performance
|
| services.lasuite-docs.collaborationServer.port | Port used by the collaboration server to listen.
|
| services.warpgate.settings.http.external_port | The HTTP listener is reachable via this port externally.
|
| services.lasuite-meet.livekit.keyFile | LiveKit key file holding one or multiple application secrets
|
| services.thinkfan.fans.*.indices | A list of fans to pick in case multiple fans match the query.
|
| services.zeronsd.servedNetworks | ZeroTier Networks to start zeronsd instances for.
|
| services._3proxy.services.*.type | Service type
|
| services.displayManager.generic.execCmd | Command to start the display manager.
|
| services.caddy.adapter | Name of the config adapter to use
|
| services.changedetection-io.port | Port the server will listen on.
|
| services.physlock.allowAnyUser | Whether to allow any user to lock the screen
|
| security.acme.defaults.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| services.stash.settings.preview_exclude_start | Duration of end of video to exclude when generating previews
|
| services.prometheus.exporters.collectd.collectdBinary.port | Network address on which to accept collectd binary network packets.
|
| services.prometheus.exporters.nginxlog.settings | All settings of nginxlog expressed as an Nix attrset
|
| services.warpgate.settings.mysql.external_port | The MySQL listener is reachable via this port externally.
|
| services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| services.livekit.settings.rtc.port_range_end | End of UDP port range for WebRTC
|
| services.icingaweb2.modules.monitoring.transports.<name>.port | Port to connect to for the api or remote transport
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.settings.log_level | Error log level.
|
| services.ustreamer.autoStart | Wether to start µStreamer on boot
|
| services.openssh.ports | Specifies on which ports the SSH daemon listens.
|
| xdg.portal.lxqt.styles | Extra Qt styles that will be available to the
lxqt.xdg-desktop-portal-lxqt.
|
| services.akkoma.initSecrets | Whether to initialise non‐existent secrets with random values
|
| services.invidious.hmacKeyFile | A path to a file containing the hmac_key
|
| services.nextcloud.config.objectstore.s3.port | Required for some non-Amazon implementations.
|
| programs.proxychains.proxies.<name>.port | Proxy port
|
| services.prometheus.alertmanagerGotify.port | The local port the bridge is listening on.
|
| systemd.user.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.firewalld.settings.IndividualCalls | Whether to use individual -restore calls to apply changes to the firewall
|
| services.wastebin.secretFile | Path to file containing sensitive environment variables
|
| boot.initrd.network.ssh.enable | Start SSH service during initrd boot
|
| services.sshguard.blocktime | Block attackers for initially blocktime seconds after exceeding threshold
|
| services.firefly-iii-data-importer.settings | Options for firefly-iii data importer configuration
|
| services.amule.settings.eMule.Port | TCP port for eD2k connections
|
| services.kavita.settings.Port | Port to bind to.
|
| boot.loader.limine.style.wallpapers | A list of wallpapers
|
| virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| services.cyrus-imap.cyrusSettings.START | This section lists the processes to run before any SERVICES are spawned
|
| services.physlock.enable | Whether to enable the physlock screen locking mechanism
|
| services.libretranslate.port | The the application should listen on.
|
| systemd.user.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.teleport.diag.addr | Metrics and diagnostics address.
|
| services.prometheus.exporters.mail.configuration.servers.*.port | Port to use for SMTP.
|
| services.nbd.server.exports | Files or block devices to make available over the network.
|
| services.stash.settings.parallel_tasks | Number of parallel tasks to start during scan/generate
|
| systemd.services.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| programs.waybar.systemd.target | The systemd target that will automatically start the Waybar service.
|
| power.ups.mode | The MODE determines which part of the NUT is to be started, and
which configuration files must be modified
|
| systemd.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.mounts.*.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.pgbouncer.settings.pgbouncer.listen_port | Which port to listen on
|
| boot.systemdExecutable | The program to execute to start systemd.
|
| systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.nextcloud.settings.mail_smtpport | This depends on mail_smtpmode
|
| networking.ucarp.neutral | Do not run downscript at start if the host is the backup.
|
| services.nginx.uwsgiResolveWhileRunning | Resolves domains of uwsgi targets at runtime
and not only at start, you have to set
services.nginx.resolver, too.
|
| services.portunus.ldap.user | User account under which Portunus runs its LDAP server.
|
| services.prometheus.exporters.ping.settings | Configuration for ping_exporter, see
https://github.com/czerwonk/ping_exporter
for supported values.
|
| services.nfs.server.exports | Contents of the /etc/exports file
|
| services.portunus.user | User account under which Portunus runs its webserver.
|
| services.liquidsoap.streams | Set of Liquidsoap streams to start,
one systemd service per stream.
|
| services.minecraft-server.enable | If enabled, start a Minecraft Server
|
| networking.wg-quick.interfaces.<name>.autostart | Whether to bring up this interface automatically during boot.
|
| xdg.portal.wlr.enable | Whether to enable desktop portal for wlroots-based desktops
|
| services.akkoma.dist.epmdPort | TCP port to bind Erlang Port Mapper Daemon to.
|
| systemd.services.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.hqplayerd.auth.password | Password used for HQPlayer's WebUI
|
| services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| services.tuned.ppdSupport | Whether to enable translation of power-profiles-daemon API calls to TuneD.
|
| services.ax25.axports | Specification of one or more AX.25 ports.
|
| services.prometheus.exporters.fritz.settings | Configuration settings for fritz-exporter.
|
| services.tsidp.settings.localPort | Listen on localhost:.
|
| services.hadoop.yarn.resourcemanager.restartIfChanged | Automatically restart the service on config change
|
| services.teeworlds.game.enableReadyMode | Whether to enable "ready mode"; where players can pause/unpause the game
and start the game in warmup, using their ready state.
|
| virtualisation.incus.softDaemonRestart | Allow for incus.service to be stopped without affecting running instances.
|
| hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| services.dovecot2.protocols | Additional listeners to start when Dovecot is enabled.
|
| services.gitlab.secrets.activeRecordSaltFile | A file containing the salt for active record encryption in the DB
|
| services.amule.settings.eMule.UDPPort | UDP port for eD2k traffic (searches, source exchange) and all Kad network communication
|
| services.tlsrpt.reportd.settings.http_script | Call to an HTTPS client, that accepts the URL on the commandline and the request body from stdin.
|
| services.warpgate.settings.postgres.external_port | The PostgreSQL listener is reachable via this port externally.
|
| services.szurubooru.server.threads | Number of waitress threads to start.
|
| systemd.user.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.user.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.amule.settings.WebServer.Port | Web server port
|
| programs.mouse-actions.autorun | Whether to start a user service to run mouse-actions on startup.
|
| services.hostapd.radios.<name>.channel | The channel to operate on
|
| services.portunus.ldap.group | Group account under which Portunus runs its LDAP server.
|
| systemd.user.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.user.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| boot.loader.systemd-boot.edk2-uefi-shell.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| systemd.slices.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.timers.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.paths.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.mounts.*.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.zitadel.settings.Port | The port that ZITADEL listens on.
|
| services.xserver.displayManager.xpra.desktop | Start a desktop environment instead of seamless mode
|
| services.hadoop.hdfs.namenode.formatOnInit | Format HDFS namenode on first start
|
| services.portunus.group | Group account under which Portunus runs its webserver.
|
| services.go-httpbin.settings.PORT | The port to listen on.
|
| services.thinkfan.sensors.*.indices | A list of sensors to pick in case multiple sensors match the query.
|
| xdg.portal.lxqt.enable | Whether to enable the desktop portal for the LXQt desktop environment
|
| services.mtr-exporter.jobs | List of MTR jobs
|
| services.librespeed.secrets | Attribute set of filesystem paths
|
| services.haven.importRelays | List of relay configurations for importing historical events
|
| services.nextcloud-spreed-signaling.settings.sessions.hashkeyFile | The path to the file containing the value for sessions.hashkey
|
| services.cloudflare-ddns.updateOnStart | Whether to perform an update check immediately on service start.
|
| services.cyrus-imap.cyrusSettings.DAEMON | This section lists long running daemons to start before any SERVICES are spawned. master(8) will ensure that these processes are running, restarting any process which dies or forks
|
| boot.loader.systemd-boot.graceful | Invoke bootctl install with the --graceful option,
which ignores errors when EFI variables cannot be written or when the EFI System Partition
cannot be found
|
| services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| services.jupyterhub.kernels.<name>.argv | Command and arguments to start the kernel.
|
| services.nezha-agent.settings.report_delay | The interval between system status reportings
|
| systemd.automounts.*.wants | Start the specified units when this unit is started.
|
| services.firewalld.zones.<name>.forwardPorts.*.to-port | |
| services.cockroachdb.extraArgs | Extra CLI arguments passed to cockroach start
|
| programs.dms-shell.systemd.target | The systemd target that will automatically start the DankMaterialShell service
|
| services.portunus.stateDir | Path where Portunus stores its state.
|
| services.nbd.server.listenPort | Port to listen on
|
| services.github-runners.<name>.workDir | Working directory, available as $GITHUB_WORKSPACE during workflow runs
and used as a default for repository checkouts
|
| services.prometheus.exporters.fritz.settings.devices | Fritz!-devices to monitor using the exporter.
|
| services.strongswan-swanctl.swanctl.connections.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey/reauth times
|
| systemd.user.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.user.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.zapret.udpSupport | Enable UDP routing
|
| services.gitea.settings.server.HTTP_PORT | Listen port
|
| services.tlsrpt.reportd.settings.contact_info | Contact information embedded into the reports.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local_port | Local UDP port for IKE communication
|
| services.hitch.backend | The host and port Hitch connects to when receiving
a connection in the form [HOST]:PORT
|
| services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| services.nginx.proxyResolveWhileRunning | Resolves domains of proxyPass targets at runtime and not only at startup
|
| services.sourcehut.settings."builds.sr.ht::worker".name | Listening address and listening port
of the build runner (with HTTP port if not 80).
|
| services.tt-rss.registration.enable | Allow users to register themselves
|
| systemd.nspawn.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.timers.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.slices.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.nbd.server.exports.<name>.path | File or block device to export.
|
| services.doh-server.settings.listen | HTTP listen address and port
|
| services.portunus.seedPath | Path to a portunus seed file in json format
|
| boot.loader.grub.zfsSupport | Whether GRUB should be built against libzfs.
|
| systemd.user.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.user.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.bluesky-pds.settings.PDS_PORT | Port to listen on
|
| services.zipline.settings.CORE_PORT | The port to listen on.
|
| services.teleport.diag.enable | Whether to enable endpoints for monitoring purposes
|
| services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| services.teleport.enable | Whether to enable the Teleport service.
|
| services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| services.prometheus.exporters.script.settings | Free-form configuration for script_exporter, expressed as a Nix attrset and rendered to YAML.
Migration note:
The previous format using script = "sleep 5" is no longer supported
|
| systemd.sockets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.targets.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.user.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| services.networking.websockify.portMap | Ports to map by default.
|
| boot.loader.grub.efiSupport | Whether GRUB should be built with EFI support.
|
| services.prometheus.alertmanagerGotify.gotifyEndpoint.port | The port your gotify endpoint is running.
|
| virtualisation.forwardPorts.*.host.port | The host port to be mapped.
|
| services.firefly-iii.settings.DB_PORT | The port your database is listening at. sqlite does not require
this value to be filled.
|
| programs.proxychains.chain.length | Chain length for random chain.
|
| virtualisation.docker.autoPrune.randomizedDelaySec | Add a randomized delay before each auto prune
|
| services.anuko-time-tracker.settings.exportDecimalDuration | Defines whether time duration values are decimal in CSV and XML data
exports (1.25 vs 1:15).
|
| services.portunus.domain | Subdomain which gets reverse proxied to Portunus webserver.
|
| boot.initrd.luks.gpgSupport | Enables support for authenticating with a GPG encrypted password.
|
| services.prometheus.exporters.script.settings.scripts | All settings expressed as an Nix attrset
|
| services.nullidentdmod.userid | User ID to return
|
| services.mautrix-meta.instances.<name>.dataDir | Path to the directory with database, registration, and other data for the bridge service
|
| <imports = [ pkgs.php.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.routinator.settings.rtr-listen | An array of string values each providing an address and port on which the RTR server should listen in TCP mode
|
| services.gemstash.settings.bind | Host and port combination for the server to listen on.
|
| services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| services.teeworlds.game.voteKickMinimumPlayers | The minimum amount of players required to start a kick vote.
|
| virtualisation.forwardPorts.*.guest.port | The guest port to be mapped.
|
| services.routinator.settings.http-listen | An array of string values each providing an address and port on which the HTTP server should listen
|
| services.ax25.axports.<name>.tty | Location of hardware kiss tnc for this interface.
|
| services.aria2.openPorts | Open listen and RPC ports found in settings.listen-port and
settings.rpc-listen-port options in the firewall.
|
| services.portunus.ldap.suffix | The DN of the topmost entry in your LDAP directory
|
| systemd.user.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.user.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.mtr-exporter.enable | Whether to enable a Prometheus exporter for MTR.
|
| boot.loader.systemd-boot.windows.<name>.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| boot.zfs.forceImportAll | Forcibly import all ZFS pool(s)
|
| services.jack.alsa.support32Bit | Whether to support sound for 32-bit ALSA applications on 64-bit system.
|
| services.sks.hkpPort | HKP port to listen on.
|
| services.portunus.ldap.package | The openldap package to use.
|
| services.prometheus.exporters.mqtt.mqttPort | TCP port of MQTT broker.
|
| services.mtr-exporter.jobs.*.flags | Additional flags to pass to MTR.
|
| services.gitlab.secrets.activeRecordPrimaryKeyFile | A file containing the secret used to encrypt some rails data
in the DB
|
| xdg.portal.config | Sets which portal backend should be used to provide the implementation
for the requested interface
|
| systemd.services.<name>.stopIfChanged | If set, a changed unit is restarted by calling
systemctl stop in the old configuration,
then systemctl start in the new one
|
| services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| services.matrix-synapse.settings.report_stats | Whether or not to report anonymized homeserver usage statistics.
|
| services.prometheus.exporters.nginxlog.settings.consul | Consul integration options
|
| virtualisation.podman.networkSocket.port | TCP port number for receiving TLS connections.
|
| services.acme-dns.settings.general.listen | IP+port combination to bind and serve the DNS server on.
|
| systemd.sockets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| systemd.targets.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.vwifi.client.serverPort | The server port port
|
| services.prometheus.exporters.fritz.settings.log_level | Log level to use for the exporter.
|
| services.tarsnap.archives | Tarsnap archive configurations
|
| services.fail2ban.bantime-increment.rndtime | "bantime.rndtime" is the max number of seconds using for mixing with random time
to prevent "clever" botnets calculate exact time IP can be unbanned again
|
| services.prometheus.exporters.jitsi.url | Jitsi Videobridge metrics URL to monitor
|
| services.portunus.dex.enable | Whether to enable Dex ldap connector
|
| services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| services.quickwit.settings.grpc_listen_port | The port to listen on for gRPC traffic.
|
| programs.dsearch.systemd.target | The systemd target that will automatically start the dsearch service
|
| programs.hyprland.enable | Whether to enable Hyprland, the dynamic tiling Wayland compositor that doesn't sacrifice on its looks
|
| networking.sits.<name>.encapsulation.port | Destination port when using UDP encapsulation.
|
| services.cryptpad.settings.httpPort | Port on which the Node.js server should listen
|
| services.livekit.ingress.settings.rtc_config.port_range_end | End of UDP port range for WebRTC
|
| services.moosefs.master.exports | Export definitions for MooseFS (see mfsexports.cfg).
|
| services.hitch.frontend | The port and interface of the listen endpoint in the
form [HOST]:PORT[+CERT].
|
| services.teleport.package | The teleport package to use.
|
| services.portunus.package | The portunus package to use.
|
| systemd.user.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.script.settings.scripts.*.script | Shell script to execute when metrics are requested.
|
| power.ups.upsmon.monitor.<name>.passwordFile | The full path to a file containing the password from
upsd.users for accessing this UPS
|
| networking.hostId | The 32-bit host ID of the machine, formatted as 8 hexadecimal characters
|
| services.gitDaemon.exportAll | Publish all directories that look like Git repositories (have the objects
and refs subdirectories), even if they do not have the git-daemon-export-ok file
|
| services.cassandra.maxHeapSize | Must be left blank or set together with heapNewSize
|
| services.saunafs.master.exports | Paths to exports file (see sfsexports.cfg(5)).
|
| services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID | See torrc manual.
|
| services.listmonk.database.settings."privacy.exportable" | List of fields which can be exported through an automatic export request
|
| services.forgejo.settings.server.HTTP_PORT | Listen port
|
| services.hatsu.settings.HATSU_LISTEN_PORT | Port where hatsu should listen for incoming requests.
|
| services.i2pd.inTunnels.<name>.inPort | Service port
|
| services.davis.nginx.reuseport | Create an individual listening socket
|
| services.slskd.nginx.reuseport | Create an individual listening socket
|
| services.movim.nginx.reuseport | Create an individual listening socket
|
| services.offlineimap.install | Whether to install a user service for Offlineimap
|
| services.diod.exports | List the file systems that clients will be allowed to mount
|
| services.tlsrpt.reportd.extraFlags | List of extra flags to pass to the tlsrpt-reportd executable
|
| services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| services.shairport-sync.user | User account name under which to run shairport-sync
|
| programs.obs-studio.enableVirtualCamera | Installs and sets up the v4l2loopback kernel module, necessary for OBS
to start a virtual camera.
|
| services.portunus.dex.oidcClients.*.id | ID of the OIDC client
|
| services.mtr-exporter.extraFlags | Extra command line options to pass to MTR exporter.
|
| services.navidrome.settings.Port | Port to run Navidrome on.
|
| services.tinyproxy.settings.Port | Specify which port to listen to.
|
| services.athens.traceExporter | Trace exporter to use.
|
| services.athens.statsExporter | Stats exporter to use.
|
| services.snipe-it.nginx.reuseport | Create an individual listening socket
|
| services.synergy.client.serverAddress | The server address is of the form: [hostname][:port]
|
| services.prometheus.exporters.script.settings.scripts.*.timeout | Optional timeout for the script in seconds.
|
| boot.initrd.luks.fido2Support | Enables support for authenticating with FIDO2 devices.
|
| services.mtr-exporter.address | Listen address for MTR exporter.
|
| services.mtr-exporter.package | The mtr-exporter package to use.
|
| services.peroxide.settings.UserPortSmtp | The port on which to listen for SMTP connections.
|
| services.peroxide.settings.UserPortImap | The port on which to listen for IMAP connections.
|
| services.livekit.settings.redis.address | Host and port used to connect to a redis instance.
|
| services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| services.prometheus.exporters.fritz.settings.devices.*.hostname | Hostname under which the target device is reachable.
|
| services.tabby.model | Specify the model that tabby will use to generate completions
|
| services.prometheus.exporters.exportarr-radarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-lidarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-bazarr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-sonarr.openFirewall | Open port in firewall for incoming connections.
|
| services.bookstack.settings.DB_PORT | The port your database is listening at.
|
| services.kubernetes.scheduler.leaderElect | Whether to start leader election before executing main loop.
|
| services.prometheus.exporters.bitcoin.rpcPort | RPC port number.
|
| services.mtr-exporter.mtrPackage | The mtr package to use.
|
| boot.loader.systemd-boot.memtest86.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| services.home-assistant.configWritable | Whether to make configuration.yaml writable
|
| systemd.services.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.anuko-time-tracker.settings.email.smtpPort | MTA port.
|
| services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| services.tlsrpt.reportd.settings.sender_address | Sender address used for reports.
|
| services.libeufin.nexus.settings.nexus-httpd.PORT | The port on which libeufin-bank should listen.
|
| services.shairport-sync.group | Group account name under which to run shairport-sync
|
| services.ympd.webPort | The port where ympd's web interface will be available.
|
| services.gancio.nginx.reuseport | Create an individual listening socket
|
| services.fluidd.nginx.reuseport | Create an individual listening socket
|
| services.akkoma.nginx.reuseport | Create an individual listening socket
|
| services.matomo.nginx.reuseport | Create an individual listening socket
|
| services.monica.nginx.reuseport | Create an individual listening socket
|
| services.portunus.ldap.searchUserName | The login name of the search user
|
| services.athens.traceExporterURL | URL endpoint that traces will be sent to.
|
| services.diod.exportall | Export all file systems listed in /proc/mounts
|
| boot.loader.limine.efiSupport | Whether or not to install the limine EFI files.
|
| services.prometheus.exporters.exportarr-readarr.openFirewall | Open port in firewall for incoming connections.
|
| services.slskd.openFirewall | Whether to open the firewall for the soulseek network listen port (not the web interface port).
|
| services.cassandra.heapNewSize | Must be left blank or set together with heapNewSize
|
| programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port | The port number used if the query type is not SRV.
|
| services.diod.exportopts | Establish a default set of export options
|
| services.prometheus.exporters.deluge.delugePort | Port where deluge server is listening.
|
| services.displayManager.ly.x11Support | Whether to enable support for X11
|
| boot.loader.systemd-boot.netbootxyz.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| services.prometheus.exporters.pihole.piholePort | The port Pi-Hole webinterface is reachable on
|
| services.prometheus.exporters.fritz.settings.devices.*.host_info | Enable extended host info for this device. Warning: This will heavily increase scrape time.
|
| boot.loader.limine.biosSupport | Whether or not to install limine for BIOS.
|
| services.home-assistant.config.http.server_port | The port on which to listen.
|
| services.hebbot.templates.report | A path to the Markdown file for the report template.
|
| services.mtr-exporter.jobs.*.address | Target address for MTR client.
|
| services.ax25.axports.<name>.window | Default window size for this interface.
|
| services.buildbot-master.pbPort | The buildmaster will listen on a TCP port of your choosing
for connections from workers
|
| services.prometheus.exporters.exportarr-lidarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-bazarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-radarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-sonarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.portunus.dex.oidcClients | List of OIDC clients
|
| services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| services.documize.forcesslport | Redirect given http port number to TLS.
|
| services.prometheus.exporters.sql.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.zfs.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pve.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.lnd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nut.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.frr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kea.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-prowlarr.openFirewall | Open port in firewall for incoming connections.
|
| services.pdns-recursor.exportHosts | Whether to export names and IP addresses defined in /etc/hosts.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.package | PHP package to use for php-fpm
|
| services.mattermost.mutableConfig | Whether the Mattermost config.json is writeable by Mattermost
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.prometheus.exporters.ipmi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.knot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bind.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mail.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bird.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.flow.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.php-fpm.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ebpf.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mqtt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nats.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.snmp.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ping.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.json.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.node.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| systemd.automounts.*.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.postfix.transport | Entries for the transport map, cf. man-page transport(5).
|
| services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| services.uptime-kuma.appriseSupport | Whether to enable apprise support for notifications.
|
| services.shairport-sync.enable | Enable the shairport-sync daemon
|
| programs.uwsm.enable | Whether to enable uwsm, which wraps standalone Wayland compositors with a set
of Systemd units on the fly
|
| services.moosefs.cgiserver.settings.PORT | Port for CGI server to listen on.
|
| services.radicle.httpd.nginx.reuseport | Create an individual listening socket
|
| services.thinkfan.smartSupport | Whether to build thinkfan with S
|
| services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| services.taler.merchant.settings.merchant.PORT | Port on which the HTTP server listens.
|
| services.taler.exchange.settings.exchange.PORT | Port on which the HTTP server listens.
|
| services.prometheus.exporters.exportarr-readarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.livekit.ingress.settings.redis.address | Address or hostname and port for redis connection
|
| services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| services.archisteamfarm.web-ui.enable | Whether to start the web-ui
|
| services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| services.youtrack.environmentalParameters.listen-port | The port YouTrack will listen on.
|
| services.prometheus.exporters.dmarc.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.v2ray.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.idrac.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kafka.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginx.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.jitsi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.redis.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritz.openFirewall | Open port in firewall for incoming connections.
|
| services.libeufin.bank.settings.libeufin-bank.PORT | The port on which libeufin-bank should listen.
|
| services.cassandra.jmxPort | Specifies the default port over which Cassandra will be available for
JMX connections
|
| services.nifi.proxyPort | Allow requests from a specific port.
|
| services.rqbit.httpPort | The listen port for the HTTP API.
|
| services.shairport-sync.package | The shairport-sync package to use.
|
| services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| services.ncps.server.addr | The address and port the server listens on.
|
| services.consul.webUi | Enables the web interface on the consul http port.
|
| services.firefly-iii-data-importer.user | User account under which firefly-iii-data-importer runs.
|
| boot.zfs.forceImportRoot | Forcibly import the ZFS root pool(s) during early boot
|
| services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| services.deconz.wsPort | TCP port for the WebSocket.
|
| services.mediatomb.ps3Support | Whether to enable ps3 specific tweaks
|
| systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.portunus.seedSettings | Seed settings for users and groups
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.caddy.httpPort | The default port to listen on for HTTP traffic.
|
| services.reposilite.settings.sslPort | SSL port to bind to
|
| programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| services.amule.settings.ExternalConnect.ECPort | TCP port for external connections, like remote control via amule-gui
|
| services.prometheus.exporters.exportarr-lidarr.enable | Whether to enable the prometheus exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-bazarr.enable | Whether to enable the prometheus exportarr-bazarr exporter.
|
| services.prometheus.exporters.exportarr-sonarr.enable | Whether to enable the prometheus exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.enable | Whether to enable the prometheus exportarr-radarr exporter.
|
| services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| services.outline.maximumImportSize | The maximum size of document imports
|
| services.mediatomb.dsmSupport | Whether to enable D-Link DSM 320 specific tweaks
|
| services.pgbouncer.settings.pgbouncer.ignore_startup_parameters | By default, PgBouncer allows only parameters it can keep track of in startup packets:
client_encoding, datestyle, timezone and standard_conforming_strings
|
| services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-readarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.fastly.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.statsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.rspamd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tibber.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.script.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnssec.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.deluge.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mysqld.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.restic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.chrony.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pihole.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.shelly.openFirewall | Open port in firewall for incoming connections.
|
| systemd.automounts.*.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.prometheus.exporters.exportarr-prowlarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| services.firefly-iii-data-importer.dataDir | The place where firefly-iii data importer stores its state.
|
| hardware.facter.report | Hardware report data generated by nixos-facter
|
| services.pipewire.alsa.support32Bit | Whether to enable 32-bit ALSA support on 64-bit systems.
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| services.prometheus.exporters.dnssec.listenAddress | Listen address as host IP and port definition.
|
| services.prometheus.exporters.ecoflow.exporterType | The type of exporter you'd like to use
|
| services.oauth2-proxy.httpAddress | HTTPS listening address
|
| services.pixiecore.statusPort | HTTP port for status information (can be the same as --port)
|
| services.prometheus.exporters.nvidia-gpu.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-bazarr.extraFlags | Extra commandline options to pass to the exportarr-bazarr exporter.
|
| services.prometheus.exporters.exportarr-sonarr.extraFlags | Extra commandline options to pass to the exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-lidarr.extraFlags | Extra commandline options to pass to the exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.extraFlags | Extra commandline options to pass to the exportarr-radarr exporter.
|
| services.prometheus.exporters.exportarr-bazarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-sonarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-lidarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-radarr.package | The exportarr package to use.
|
| services.fediwall.nginx.reuseport | Create an individual listening socket
|
| services.kanboard.nginx.reuseport | Create an individual listening socket
|
| services.dolibarr.nginx.reuseport | Create an individual listening socket
|
| services.librenms.nginx.reuseport | Create an individual listening socket
|
| services.agorakit.nginx.reuseport | Create an individual listening socket
|
| services.mainsail.nginx.reuseport | Create an individual listening socket
|
| services.pixelfed.nginx.reuseport | Create an individual listening socket
|
| services.mtr-exporter.jobs.*.schedule | Schedule of MTR checks
|
| services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| services.photoprism.importPath | Relative or absolute to the originalsPath from where the files should be imported.
|
| services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| services.elasticsearch.tcp_port | Elasticsearch port for the node to node communication.
|
| services.mediatomb.tg100Support | Whether to enable Telegent TG100 specific tweaks.
|
| services.prometheus.exporters.exportarr-readarr.enable | Whether to enable the prometheus exportarr-readarr exporter.
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| services.hound.listen | Listen on this [IP]:port
|
| services.mattermost.socket.export | Whether to enable Export socket control to system environment variables.
|
| systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.systemd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.gatewayPort | The port of the FRITZ!Box UPnP service.
|
| services.prometheus.exporters.klipper.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dovecot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postfix.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.varnish.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.libvirt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bitcoin.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.process.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.apcupsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mongodb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.sabnzbd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnsmasq.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.unbound.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ecoflow.openFirewall | Open port in firewall for incoming connections.
|
| services.tailscale.derper.stunPort | STUN port to listen on
|
| systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| services.stash.settings.preview_exclude_end | Duration of start of video to exclude when generating previews
|
| swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.galene.httpPort | HTTP listen port.
|
| services.prometheus.exporters.exportarr-readarr.extraFlags | Extra commandline options to pass to the exportarr-readarr exporter.
|
| services.prometheus.exporters.exportarr-readarr.package | The exportarr package to use.
|
| services.firefly-iii-data-importer.group | Group under which firefly-iii-data-importer runs
|
| services.firewalld.services.<name>.ports | Ports of the service.
|
| services.prometheus.exporters.opnsense.enabledExporter | Collectors to enable or disable
|
| services.paperless.exporter.enable | Whether to enable regular automatic document exports.
|
| services.squid.proxyPort | TCP port on which squid will listen.
|
| services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| virtualisation.bios | An alternate BIOS (such as qboot) with which to start the VM
|
| services.kubernetes.controllerManager.leaderElect | Whether to start leader election before executing main loop.
|
| services.bind.listenOnPort | Port to listen on.
|
| services.syncthing.relay.statusPort | Port to listen on for serving the relay status API
|
| services.prometheus.exporters.py-air-control.openFirewall | Open port in firewall for incoming connections.
|
| services.deconz.httpPort | TCP port for the web server.
|
| services.firefly-iii-data-importer.enable | Whether to enable Firefly III Data Importer.
|
| services.zabbixWeb.nginx.virtualHost.reuseport | Create an individual listening socket
|
| services.home-assistant.lovelaceConfigWritable | Whether to make ui-lovelace.yaml writable
|
| services.prometheus.exporters.exportarr-prowlarr.enable | Whether to enable the prometheus exportarr-prowlarr exporter.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| networking.nftables.extraDeletions | Extra deletion commands to be run on every firewall start, reload
and after stopping the firewall.
|
| boot.initrd.network.ifstate.cleanupSettings | Content of IfState's initrd cleanup configuration file
|
| services.prometheus.exporters.flow.asn | The ASN being monitored.
|
| services.buildbot-master.extraImports | Extra python imports to prepend to master.cfg
|
| services.anuko-time-tracker.nginx.reuseport | Create an individual listening socket
|
| services.earlyoom.reportInterval | Interval (in seconds) at which a memory report is printed (set to 0 to disable).
|
| services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| services.prometheus.exporters.graphite.graphitePort | Port to use for the graphite server.
|
| services.prometheus.exporters.nats.url | NATS monitor endpoint to query.
|
| services.prometheus.exporters.unpoller.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.collectd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginxlog.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mikrotik.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.influxdb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.graphite.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smartctl.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postgres.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.blackbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.opnsense.openFirewall | Open port in firewall for incoming connections.
|
| services.resilio.listeningPort | Listening port
|
| xdg.portal.extraPortals | List of additional portals to add to path
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| containers.<name>.timeoutStartSec | Time for the container to start
|
| services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| services.cryptpad.settings.websocketPort | Port for the websocket that needs to be separate
|
| services.prometheus.exporters.exportarr-radarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-lidarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-sonarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-bazarr.listenAddress | Address to listen on.
|
| systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| services.ntopng.httpPort | Sets the HTTP port of the embedded web server.
|
| services.nifi.listenPort | Bind to a port for Apache NiFi web-ui.
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.prometheus.exporters.exportarr-prowlarr.extraFlags | Extra commandline options to pass to the exportarr-prowlarr exporter.
|
| services.prometheus.exporters.exportarr-prowlarr.package | The exportarr package to use.
|
| boot.loader.systemd-boot.rebootForBitlocker | Enable EXPERIMENTAL BitLocker support
|
| services.prometheus.exporters.opnsense.disabledExporter | Collectors to enable or disable
|
| services.bookstack.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| services.nexus.listenPort | Port to listen on.
|
| services.opensearch.settings."network.host" | Which port this service should listen on.
|
| services.prometheus.exporters.rtl_433.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dmarc.imap.host | Hostname of IMAP server to connect to.
|
| services.hadoop.hbase.rest.infoPort | web UI port
|
| services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| services.shairport-sync.openFirewall | Whether to automatically open ports in the firewall.
|
| services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| services.davis.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.slskd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.movim.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.imap-mailstat.openFirewall | Open port in firewall for incoming connections.
|
| services.redsocks.redsocks | Local port to proxy associations to be performed
|
| services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.prometheus.exporters.sql.group | Group under which the sql exporter shall be run.
|
| services.prometheus.exporters.nut.group | Group under which the nut exporter shall be run.
|
| services.prometheus.exporters.kea.group | Group under which the kea exporter shall be run.
|
| services.prometheus.exporters.pve.group | Group under which the pve exporter shall be run.
|
| services.prometheus.exporters.zfs.group | Group under which the zfs exporter shall be run.
|
| services.prometheus.exporters.lnd.group | Group under which the lnd exporter shall be run.
|
| services.prometheus.exporters.chrony.chronyServerAddress | ChronyServerAddress of the chrony server side command port. (Not enabled by default.)
Defaults to the local unix socket.
|
| services.caddy.httpsPort | The default port to listen on for HTTPS traffic
|
| services.deluge.openFirewall | Whether to open the firewall for the ports in
services.deluge.config.listen_ports
|
| services.mailhog.uiPort | Port on which the HTTP UI will listen.
|
| services.prometheus.exporters.exportarr-readarr.listenAddress | Address to listen on.
|
| services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| services.prometheus.exporters.lnd.lndTlsPath | Path to lnd TLS certificate.
|
| services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| services.portunus.dex.oidcClients.*.callbackURL | URL where the OIDC client should redirect
|
| services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| services.prometheus.exporters.exportarr-sonarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-sonarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-lidarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-lidarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-bazarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-bazarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-radarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-radarr.openFirewall is true.
|
| services.prometheus.exporters.flow.topic | The Kafka topic to consume from.
|
| services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| services.bosun.influxHost | Host and port of the influxdb database.
|
| services.athens.pprofPort | Port number for pprof endpoints.
|
| services.ncps.analytics.reporting.enable | Enable reporting anonymous usage statistics (DB type, Lock type, Total Size) to the project maintainers.
|
| services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.prometheus.exporters.bind.bindURI | HTTP XML API address of an Bind server.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| services.snipe-it.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| services.nixseparatedebuginfod.port | port to listen
|
| services.your_spotify.settings.PORT | The port of the api server
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| services.prometheus.exporters.rasdaemon.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.wireguard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nextcloud.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.borgmatic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smokeping.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.junos-czerwonk.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.surfboard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tailscale.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pgbouncer.openFirewall | Open port in firewall for incoming connections.
|
| services.matomo.periodicArchiveProcessing | Enable periodic archive processing, which generates aggregated reports from the visits
|
| services.prometheus.exporters.flow.group | Group under which the flow exporter shall be run.
|
| services.prometheus.exporters.mail.group | Group under which the mail exporter shall be run.
|
| services.prometheus.exporters.snmp.group | Group under which the snmp exporter shall be run.
|
| services.prometheus.exporters.bind.group | Group under which the bind exporter shall be run.
|
| services.prometheus.exporters.bird.group | Group under which the bird exporter shall be run.
|
| services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.ebpf.group | Group under which the ebpf exporter shall be run.
|
| services.prometheus.exporters.ipmi.group | Group under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.knot.group | Group under which the knot exporter shall be run.
|
| services.prometheus.exporters.nats.group | Group under which the nats exporter shall be run.
|
| services.prometheus.exporters.node.group | Group under which the node exporter shall be run.
|
| services.prometheus.exporters.ping.group | Group under which the ping exporter shall be run.
|
| services.prometheus.exporters.json.group | Group under which the json exporter shall be run.
|
| services.bind.listenOnIpv6Port | Ipv6 port to listen on.
|
| services.prometheus.exporters.node-cert.user | User owning the certs.
|
| services.elasticsearch.single_node | Start a single-node cluster
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| services.nfs.server.statdPort | Use a fixed port for rpc.statd
|
| services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| services.prometheus.exporters.php-fpm.group | Group under which the php-fpm exporter shall be run.
|
| services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| services.polipo.proxyPort | TCP port on which Polipo will listen.
|
| services.mailhog.apiPort | Port on which the API endpoint will listen.
|
| services.kanidm.server.settings.bindaddress | Address/port combination the webserver binds to.
|
| services.jirafeau.nginxConfig.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.mqtt.logLevel | Logging level
|
| services.go-neb.bindAddress | Port (and optionally address) to listen on.
|
| services.nitter.cache.redisPort | Redis port.
|
| services.prometheus.exporters.snmp.logLevel | Only log messages with the given severity or above.
|
| services.prometheus.exporters.mailman3.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.frr.group | Group under which the frr exporter shall be run
|
| services.samba-wsdd.listen | Listen on path or localhost port in discovery mode.
|
| services.prometheus.exporters.pve.server.keyFile | Path to a SSL private key file for the server
|
| services.h2o.hosts | The hosts config to be merged with the settings
|
| services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.gocd-server.sslPort | Specifies port number on which the Go
|
| services.prometheus.exporters.sql.enable | Whether to enable the prometheus sql exporter.
|
| services.prometheus.exporters.frr.enable | Whether to enable the prometheus frr exporter.
|
| services.prometheus.exporters.nut.enable | Whether to enable the prometheus nut exporter.
|
| services.prometheus.exporters.lnd.enable | Whether to enable the prometheus lnd exporter.
|
| services.prometheus.exporters.pve.enable | Whether to enable the prometheus pve exporter.
|
| services.prometheus.exporters.zfs.enable | Whether to enable the prometheus zfs exporter.
|
| services.prometheus.exporters.kea.enable | Whether to enable the prometheus kea exporter.
|
| services.shairport-sync.arguments | Arguments to pass to the daemon
|
| services.prometheus.exporters.exportarr-readarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-readarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-prowlarr.listenAddress | Address to listen on.
|
| services.gitlab.secrets.activeRecordDeterministicKeyFile | A file containing the secret used to encrypt some rails data in a deterministic way
in the DB
|
| services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| services.prometheus.exporters.dmarc.debug | Whether to declare enable --debug.
|
| xdg.portal.configPackages | List of packages that provide XDG desktop portal configuration, usually in
the form of share/xdg-desktop-portal/$desktop-portals.conf
|
| services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| services.amule.openPeerPorts | Whether to enable open the peer port(s) in the firewall.
|
| services.prometheus.exporters.idrac.group | Group under which the idrac exporter shall be run.
|
| services.prometheus.exporters.dmarc.group | Group under which the dmarc exporter shall be run.
|
| services.prometheus.exporters.redis.group | Group under which the redis exporter shall be run.
|
| services.prometheus.exporters.fritz.group | Group under which the fritz exporter shall be run.
|
| services.prometheus.exporters.v2ray.group | Group under which the v2ray exporter shall be run.
|
| services.prometheus.exporters.kafka.group | Group under which the kafka exporter shall be run.
|
| services.prometheus.exporters.jitsi.group | Group under which the jitsi exporter shall be run.
|
| services.prometheus.exporters.nginx.group | Group under which the nginx exporter shall be run.
|
| services.i2pd.inTunnels | Serve something on I2P network at port and delegate requests to address inPort.
|
| services.prometheus.exporters.mqtt.mqttTopic | Topic path to subscribe to.
|
| services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| services.firefly-iii-data-importer.poolConfig | Options for the Firefly III Data Importer PHP pool
|
| services.neo4j.http.enable | Enable the HTTP connector for Neo4j
|
| services.neo4j.bolt.enable | Enable the BOLT connector for Neo4j
|
| services.prometheus.exporters.pgbouncer.webSystemdSocket | Use systemd socket activation listeners instead of port listeners (Linux only).
|
| services.zapret.udpPorts | List of UDP ports to route
|
| services.ncps.analytics.reporting.samples | Whether to enable Enable printing the analytics samples to stdout
|
| services.prometheus.exporters.nut.nutServer | Hostname or address of the NUT server
|
| services.prometheus.exporters.exportarr-radarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-radarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-lidarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-lidarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-sonarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-sonarr.openFirewall
is true
|
| services.prometheus.exporters.exportarr-bazarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-bazarr.openFirewall
is true
|
| services.prometheus.exporters.ipmi.enable | Whether to enable the prometheus ipmi exporter.
|
| services.prometheus.exporters.mqtt.enable | Whether to enable the prometheus mqtt exporter.
|
| services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| services.prometheus.exporters.ping.enable | Whether to enable the prometheus ping exporter.
|
| services.prometheus.exporters.snmp.enable | Whether to enable the prometheus snmp exporter.
|
| services.prometheus.exporters.mail.enable | Whether to enable the prometheus mail exporter.
|
| services.prometheus.exporters.knot.enable | Whether to enable the prometheus knot exporter.
|
| services.prometheus.exporters.ebpf.enable | Whether to enable the prometheus ebpf exporter.
|
| services.prometheus.exporters.nats.enable | Whether to enable the prometheus nats exporter.
|
| services.prometheus.exporters.bird.enable | Whether to enable the prometheus bird exporter.
|
| services.prometheus.exporters.node.enable | Whether to enable the prometheus node exporter.
|
| services.prometheus.exporters.bind.enable | Whether to enable the prometheus bind exporter.
|
| services.prometheus.exporters.json.enable | Whether to enable the prometheus json exporter.
|
| services.prometheus.exporters.flow.enable | Whether to enable the prometheus flow exporter.
|
| services.xserver.windowManager.i3.updateSessionEnvironment | Whether to run dbus-update-activation-environment and systemctl import-environment before session start
|
| services.broadcast-box.web.openFirewall | Whether to enable opening the HTTP server port and, if enabled, the HTTPS redirect server
port in the firewall.
.
|
| services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| services.prometheus.exporters.dnssec.user | User name under which the dnssec exporter shall be run.
|
| services.prometheus.exporters.script.user | User name under which the script exporter shall be run.
|
| services.prometheus.exporters.mysqld.user | User name under which the mysqld exporter shall be run.
|
| services.prometheus.exporters.deluge.user | User name under which the deluge exporter shall be run.
|
| services.prometheus.exporters.domain.user | User name under which the domain exporter shall be run.
|
| services.prometheus.exporters.php-fpm.enable | Whether to enable the prometheus php-fpm exporter.
|
| services.prometheus.exporters.fastly.user | User name under which the fastly exporter shall be run.
|
| services.prometheus.exporters.restic.user | User name under which the restic exporter shall be run.
|
| services.prometheus.exporters.pihole.user | User name under which the pihole exporter shall be run.
|
| services.prometheus.exporters.shelly.user | User name under which the shelly exporter shall be run.
|
| services.prometheus.exporters.rspamd.user | User name under which the rspamd exporter shall be run.
|
| services.prometheus.exporters.tibber.user | User name under which the tibber exporter shall be run.
|
| services.prometheus.exporters.node-cert.group | Group under which the node-cert exporter shall be run.
|
| services.mailhog.smtpPort | Port on which the SMTP endpoint will listen.
|
| services.prometheus.exporters | Prometheus exporter configuration
|
| services.prometheus.exporters.buildkite-agent.openFirewall | Open port in firewall for incoming connections.
|
| services.nginx.virtualHosts.<name>.reuseport | Create an individual listening socket
|
| services.zwave-js.serialPort | Serial port device path for Z-Wave controller.
|
| <imports = [ pkgs.ghostunnel.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.qbittorrent.webuiPort | the port passed to qbittorrent via --webui-port
|
| services.epgstation.settings.socketioPort | Socket.io port for EPGStation to listen on
|
| services.prometheus.exporters.sql.configFile | Path to configuration file.
|
| services.fluidd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.gancio.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.akkoma.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.matomo.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.nfs.server.lockdPort | Use a fixed port for the NFS lock manager kernel module
(lockd/nlockmgr)
|
| services.monica.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|
| services.prometheus.exporters.frr.extraFlags | Extra commandline options to pass to the frr exporter.
|
| services.prometheus.exporters.lnd.extraFlags | Extra commandline options to pass to the lnd exporter.
|
| services.prometheus.exporters.zfs.extraFlags | Extra commandline options to pass to the zfs exporter.
|
| services.prometheus.exporters.pve.extraFlags | Extra commandline options to pass to the pve exporter.
|
| services.prometheus.exporters.sql.extraFlags | Extra commandline options to pass to the sql exporter.
|
| services.prometheus.exporters.nut.extraFlags | Extra commandline options to pass to the nut exporter.
|
| services.prometheus.exporters.kea.extraFlags | Extra commandline options to pass to the kea exporter.
|
| services.prometheus.exporters.storagebox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.scaphandre.openFirewall | Open port in firewall for incoming connections.
|
| services.wastebin.settings.WASTEBIN_ADDRESS_PORT | Address and port to bind to
|
| services.mediagoblin.settings.mediagoblin.email_debug_mode | Disable email debug mode to start sending outgoing mails
|
| services.prometheus.exporters.snmp.logFormat | Output format of log messages.
|
| services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.nfs.server.mountdPort | Use fixed port for rpc.mountd, useful if server is behind firewall.
|
| services.prometheus.exporters.exportarr-prowlarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-prowlarr.openFirewall is true.
|
| services.prometheus.exporters.mongodb.uri | MongoDB URI to connect to.
|
| services.github-runners.<name>.ephemeral | If enabled, causes the following behavior:
- Passes the
--ephemeral flag to the runner configuration script
- De-registers and stops the runner with GitHub after it has processed one job
- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)
- Restarts the service after its successful exit
- On start, wipes the state directory and configures a new runner
You should only enable this option if tokenFile points to a file which contains a
personal access token (PAT)
|
| services.prometheus.exporters.mqtt.topicLabel | Define the Prometheus label for the topic.
|
| services.prometheus.exporters.nvidia-gpu.user | User name under which the nvidia-gpu exporter shall be run.
|
| services.prometheus.exporters.exportarr-readarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-readarr.openFirewall
is true
|
| services.prometheus.exporters.nginx.enable | Whether to enable the prometheus nginx exporter.
|
| services.prometheus.exporters.idrac.enable | Whether to enable the prometheus idrac exporter.
|
| services.prometheus.exporters.dnssec.group | Group under which the dnssec exporter shall be run.
|
| services.prometheus.exporters.kafka.enable | Whether to enable the prometheus kafka exporter.
|
| services.prometheus.exporters.kea.targets | Paths or URLs to the Kea control socket.
|
| services.prometheus.exporters.mysqld.group | Group under which the mysqld exporter shall be run.
|
| services.prometheus.exporters.dmarc.enable | Whether to enable the prometheus dmarc exporter.
|
| services.prometheus.exporters.redis.enable | Whether to enable the prometheus redis exporter.
|
| services.prometheus.exporters.script.group | Group under which the script exporter shall be run.
|
| services.prometheus.exporters.v2ray.enable | Whether to enable the prometheus v2ray exporter.
|
| services.prometheus.exporters.pve.package | The prometheus-pve-exporter package to use.
|
| services.prometheus.exporters.fritz.enable | Whether to enable the prometheus fritz exporter.
|
| services.prometheus.exporters.fastly.group | Group under which the fastly exporter shall be run.
|
| services.prometheus.exporters.deluge.group | Group under which the deluge exporter shall be run.
|
| services.prometheus.exporters.shelly.group | Group under which the shelly exporter shall be run.
|
| services.prometheus.exporters.rspamd.group | Group under which the rspamd exporter shall be run.
|
| services.prometheus.exporters.tibber.group | Group under which the tibber exporter shall be run.
|
| services.prometheus.exporters.restic.group | Group under which the restic exporter shall be run.
|
| services.prometheus.exporters.statsd.group | Group under which the statsd exporter shall be run.
|
| services.prometheus.exporters.jitsi.enable | Whether to enable the prometheus jitsi exporter.
|
| services.prometheus.exporters.domain.group | Group under which the domain exporter shall be run.
|
| services.prometheus.exporters.pihole.group | Group under which the pihole exporter shall be run.
|
| hardware.facter.reportPath | Path to a hardware report generated by nixos-facter
|
| services.prometheus.exporters.json.configFile | Path to configuration file.
|
| services.prometheus.exporters.ipmi.configFile | Path to configuration file.
|
| services.spiped.config.<name>.source | Address on which spiped should listen for incoming
connections
|
| services.prometheus.exporters.mail.extraFlags | Extra commandline options to pass to the mail exporter.
|
| services.prometheus.exporters.nats.extraFlags | Extra commandline options to pass to the nats exporter.
|
| services.prometheus.exporters.snmp.extraFlags | Extra commandline options to pass to the snmp exporter.
|
| services.prometheus.exporters.varnish.raw | Enable raw stdout logging without timestamps.
|
| services.prometheus.exporters.ping.extraFlags | Extra commandline options to pass to the ping exporter.
|
| services.prometheus.exporters.bind.extraFlags | Extra commandline options to pass to the bind exporter.
|
| services.prometheus.exporters.node.extraFlags | Extra commandline options to pass to the node exporter.
|
| services.prometheus.exporters.mqtt.extraFlags | Extra commandline options to pass to the mqtt exporter.
|
| services.prometheus.exporters.ipmi.extraFlags | Extra commandline options to pass to the ipmi exporter.
|
| services.prometheus.exporters.knot.extraFlags | Extra commandline options to pass to the knot exporter.
|
| services.prometheus.exporters.ebpf.extraFlags | Extra commandline options to pass to the ebpf exporter.
|
| services.prometheus.exporters.flow.extraFlags | Extra commandline options to pass to the flow exporter.
|
| services.prometheus.exporters.json.extraFlags | Extra commandline options to pass to the json exporter.
|
| services.prometheus.exporters.bird.extraFlags | Extra commandline options to pass to the bird exporter.
|
| services.ircdHybrid.extraPort | Extra port to avoid filtering.
|
| services.convos.listenPort | Port the web interface should listen on
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port | The port to scrape metrics from
|
| services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.prometheus.exporters.php-fpm.extraFlags | Extra commandline options to pass to the php-fpm exporter.
|
| services.prometheus.exporters.bird.birdSocket | Path to BIRD2 (or BIRD1 v4) socket.
|
| services.prometheus.exporters.mail.configFile | Specify the mailexporter configuration file to use.
|
| services.znc.confOptions.useSSL | Indicates whether the ZNC server should use SSL when listening on
the specified port
|
| services.cloudflare-warp.udpPort | The UDP port to open in the firewall
|
| services.siproxd.rtpPortLow | Bottom of UDP port range for incoming and outgoing RTP traffic
|
| services.prometheus.exporters.node-cert.enable | Whether to enable the prometheus node-cert exporter.
|
| services.wstunnel.servers.<name>.listen | Address and port to listen on
|
| services.prometheus.exporters.flow.brokers | List of Kafka brokers to connect to.
|
| services.prometheus.exporters.exportarr-sonarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-lidarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.exportarr-bazarr.environment | See the configuration guide for available options.
|
| services.bazarr.listenPort | Port on which the bazarr web interface should listen
|
| services.patroni.restApiPort | The port on Patroni's REST api listens.
|
| services.prometheus.exporters.mqtt.mqttKeepAlive | Keep alive interval to maintain connection with MQTT broker.
|
| services.prometheus.exporters.bind.bindGroups | List of statistics to collect
|
| services.firewalld.zones.<name>.ports.*.protocol | |
| services.step-ca.address | The address (without port) the certificate authority should listen at
|
| services.nitter.preferences.bidiSupport | Support bidirectional text (makes clicking on tweets harder).
|
| services.neo4j.https.enable | Enable the HTTPS connector for Neo4j
|
| services.prometheus.exporters.unpoller.loki.url | URL of the Loki host.
|
| virtualisation.vswitch.resetOnStart | Whether to reset the Open vSwitch configuration database to a default
configuration on every start of the systemd ovsdb.service.
|
| services.prometheus.exporters.nginx.sslVerify | Whether to perform certificate verification for https.
|
| services.prometheus.exporters.dmarc.folders.done | IMAP mailbox that successfully processed reports are moved to.
|
| virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| services.firefly-iii-data-importer.virtualHost | The hostname at which you wish firefly-iii-data-importer to be served
|
| services.moosefs.cgiserver.settings.GUISERV_LISTEN_PORT | Port for GUI server to listen on.
|
| services.neo4j.directories.imports | The root directory for file URLs used with the Cypher
LOAD CSV clause
|
| services.hadoop.hbase.thrift.infoPort | web UI port
|
| services.prometheus.exporters.systemd.user | User name under which the systemd exporter shall be run.
|
| services.prometheus.exporters.php-fpm.package | The prometheus-php-fpm-exporter package to use.
|
| services.prometheus.exporters.bitcoin.user | User name under which the bitcoin exporter shall be run.
|
| services.prometheus.exporters.varnish.user | User name under which the varnish exporter shall be run.
|
| services.prometheus.exporters.apcupsd.user | User name under which the apcupsd exporter shall be run.
|
| services.prometheus.exporters.ecoflow.user | User name under which the ecoflow exporter shall be run.
|
| services.prometheus.exporters.dovecot.user | User name under which the dovecot exporter shall be run.
|
| services.prometheus.exporters.process.user | User name under which the process exporter shall be run.
|
| services.prometheus.exporters.dnsmasq.user | User name under which the dnsmasq exporter shall be run.
|
| services.prometheus.exporters.libvirt.user | User name under which the libvirt exporter shall be run.
|
| services.prometheus.exporters.sabnzbd.user | User name under which the sabnzbd exporter shall be run.
|
| services.prometheus.exporters.mongodb.user | User name under which the mongodb exporter shall be run.
|
| services.prometheus.exporters.mqtt.mqttClientId | Set client ID manually for MQTT connection
|
| services.prometheus.exporters.postfix.user | User name under which the postfix exporter shall be run.
|
| services.prometheus.exporters.klipper.user | User name under which the klipper exporter shall be run.
|
| services.prometheus.exporters.nvidia-gpu.group | Group under which the nvidia-gpu exporter shall be run.
|
| services.prometheus.exporters.unbound.user | User name under which the unbound exporter shall be run.
|
| services.dolibarr.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.prometheus.exporters.bitcoin.rpcHost | RPC host.
|
| services.firefly-iii-data-importer.package | The firefly-iii-data-importer package served by php-fpm and the webserver of choice
|
| services.prometheus.exporters.varnish.noExit | Do not exit server on Varnish scrape errors.
|
| services.syncthing.settings.options.localAnnouncePort | The port on which to listen and send IPv4 broadcast announcements to.
|
| services.prometheus.exporters.bitcoin.rpcUser | RPC user name.
|
| services.prometheus.exporters.pihole.apiToken | Pi-Hole API token which can be used instead of a password
|
| services.paperless.exporter.directory | Directory to store export.
|
| services.dae.openFirewall | Open the firewall port.
|
| services.prometheus.exporters.unpoller.loki.user | Username for Loki.
|
| services.prometheus.exporters.kafka.extraFlags | Extra commandline options to pass to the kafka exporter.
|
| services.prometheus.exporters.jitsi.extraFlags | Extra commandline options to pass to the jitsi exporter.
|
| services.prometheus.exporters.nginx.extraFlags | Extra commandline options to pass to the nginx exporter.
|
| services.prometheus.exporters.fritz.extraFlags | Extra commandline options to pass to the fritz exporter.
|
| services.prometheus.exporters.dmarc.extraFlags | Extra commandline options to pass to the dmarc exporter.
|
| services.prometheus.exporters.redis.extraFlags | Extra commandline options to pass to the redis exporter.
|
| services.prometheus.exporters.v2ray.extraFlags | Extra commandline options to pass to the v2ray exporter.
|
| services.prometheus.exporters.idrac.extraFlags | Extra commandline options to pass to the idrac exporter.
|
| networking.wireguard.interfaces.<name>.preSetup | Commands called at the start of the interface setup.
|
| services.prometheus.exporters.nginx.scrapeUri | Address to access the nginx status page
|
| services.prometheus.exporters.exportarr-prowlarr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.exportarr-prowlarr.openFirewall
is true
|
| services.postfix.relayPort | SMTP port for relay mail relay.
|
| services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.exporters.mqtt.keepFullTopic | Whether to enable Keep entire topic instead of the first two elements only
|
| services.prometheus.exporters.chrony.enable | Whether to enable the prometheus chrony exporter.
|
| services.prometheus.exporters.mysqld.enable | Whether to enable the prometheus mysqld exporter.
|
| services.prometheus.exporters.restic.enable | Whether to enable the prometheus restic exporter.
|
| services.prometheus.exporters.script.enable | Whether to enable the prometheus script exporter.
|
| services.prometheus.exporters.dnssec.enable | Whether to enable the prometheus dnssec exporter.
|
| services.prometheus.exporters.tibber.enable | Whether to enable the prometheus tibber exporter.
|
| services.prometheus.exporters.pihole.enable | Whether to enable the prometheus pihole exporter.
|
| services.prometheus.exporters.rspamd.enable | Whether to enable the prometheus rspamd exporter.
|
| services.prometheus.exporters.shelly.enable | Whether to enable the prometheus shelly exporter.
|
| services.prometheus.exporters.statsd.enable | Whether to enable the prometheus statsd exporter.
|
| services.prometheus.exporters.deluge.enable | Whether to enable the prometheus deluge exporter.
|
| services.prometheus.exporters.domain.enable | Whether to enable the prometheus domain exporter.
|
| services.prometheus.exporters.fastly.enable | Whether to enable the prometheus fastly exporter.
|
| services.prometheus.exporters.kafka.package | The kminion package to use.
|
| services.prometheus.exporters.dmarc.folders.error | IMAP mailbox that emails are moved to that could not be processed.
|
| services.windmill.lspPort | Port the windmill lsp listens on.
|
| services.prometheus.exporters.artifactory.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-readarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.node-cert.extraFlags | Extra commandline options to pass to the node-cert exporter.
|
| services.fedimintd.<name>.api.openFirewall | Opens port in firewall for fedimintd's api port
|
| services.memcached.enableUnixSocket | Whether to enable Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port
|
| services.cgit.<name>.gitHttpBackend.checkExportOkFiles | Whether git-http-backend should only export repositories that contain a git-daemon-export-ok file
|
| services.autossh.sessions.*.extraArguments | Arguments to be passed to AutoSSH and retransmitted to SSH
process
|
| services.prometheus.exporters.libvirt.group | Group under which the libvirt exporter shall be run.
|
| services.prometheus.exporters.bitcoin.group | Group under which the bitcoin exporter shall be run.
|
| services.prometheus.exporters.dovecot.group | Group under which the dovecot exporter shall be run.
|
| services.prometheus.exporters.sabnzbd.group | Group under which the sabnzbd exporter shall be run.
|
| services.prometheus.exporters.varnish.group | Group under which the varnish exporter shall be run.
|
| services.prometheus.exporters.klipper.group | Group under which the klipper exporter shall be run.
|
| services.prometheus.exporters.unbound.group | Group under which the unbound exporter shall be run.
|
| services.prometheus.exporters.mongodb.group | Group under which the mongodb exporter shall be run.
|
| services.prometheus.exporters.dnsmasq.group | Group under which the dnsmasq exporter shall be run.
|
| services.prometheus.exporters.ecoflow.group | Group under which the ecoflow exporter shall be run.
|
| services.prometheus.exporters.apcupsd.group | Group under which the apcupsd exporter shall be run.
|
| services.prometheus.exporters.process.group | Group under which the process exporter shall be run.
|
| services.prometheus.exporters.systemd.group | Group under which the systemd exporter shall be run.
|
| services.prometheus.exporters.knot.knotSocketPath | Socket path of knotd(8).
|
| services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| services.firefly-iii-data-importer.enableNginx | Whether to enable nginx or not
|
| services.prometheus.exporters.dmarc.folders.inbox | IMAP mailbox that is checked for incoming DMARC aggregate reports
|
| services.siproxd.rtpPortHigh | Top of UDP port range for incoming and outgoing RTP traffic
|
| services.grafana.settings.analytics.reporting_enabled | When enabled Grafana will send anonymous usage statistics to stats.grafana.org
|
| services.akkoma.dist.address | Listen address for Erlang distribution protocol and Port Mapper Daemon (epmd).
|
| services.prometheus.exporters.unpoller.log.quiet | Whether to enable startup and error logs only.
|
| services.prometheus.exporters.mqtt.mqttAddress | IP or hostname of MQTT broker.
|
| services.lasuite-meet.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.lasuite-docs.bind | The path, host/port or file descriptior to bind the gunicorn socket to
|
| services.matrix-appservice-irc.settings.ircService.mediaProxy.bindPort | Port that the media proxy binds to.
|
| services.prometheus.exporters.bind.bindTimeout | Timeout for trying to get stats from Bind.
|
| services.prometheus.exporters.bird.birdVersion | Specifies whether BIRD1 or BIRD2 is in use.
|
| systemd.automounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.py-air-control.user | User name under which the py-air-control exporter shall be run.
|
| services.xtreemfs.mrc.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.xtreemfs.dir.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.xtreemfs.osd.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.prometheus.exporters.bind.bindVersion | BIND statistics version
|
| services.prometheus.exporters.nvidia-gpu.enable | Whether to enable the prometheus nvidia-gpu exporter.
|
| services.netbox.unixSocket | Enable Unix Socket for the server to listen on.
listenAddress and port will be ignored.
|
| services.fedimintd.<name>.nginx.config.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.bitcoin.extraEnv | Extra environment variables for the exporter.
|
| services.pulseaudio.support32Bit | Whether to include the 32-bit pulseaudio libraries in the system or not
|
| networking.hostName | The name of the machine
|
| services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| services.prometheus.exporters.ecoflow.debug | Enable debug log messages
|
| services.prometheus.exporters.unpoller.loki.pass | Path of a file containing the password for Loki
|
| services.prometheus.exporters.dmarc.imap.username | Login username for the IMAP connection.
|
| services.prometheus.exporters.dnssec.extraFlags | Extra commandline options when launching Prometheus.
|
| services.zwave-js-ui.serialPort | Serial port for the Z-Wave controller
|
| services.amule.openWebServerPort | Whether to enable open the web server port.
|
| services.dawarich.webPort | TCP port used by the dawarich web service.
|
| services.mastodon.webPort | TCP port used by the mastodon-web service.
|
| services.dendrite.settings.global.server_name | The domain name of the server, with optional explicit port
|
| services.davis.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.slskd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.movim.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.unbound.unbound.ca | Path to the Unbound server certificate authority
|
| services.prometheus.exporters.chrony.extraFlags | Extra commandline options to pass to the chrony exporter.
|
| services.prometheus.exporters.tibber.extraFlags | Extra commandline options to pass to the tibber exporter.
|
| services.prometheus.exporters.statsd.extraFlags | Extra commandline options to pass to the statsd exporter.
|
| services.prometheus.exporters.shelly.extraFlags | Extra commandline options to pass to the shelly exporter.
|
| services.prometheus.exporters.fastly.extraFlags | Extra commandline options to pass to the fastly exporter.
|
| services.prometheus.exporters.deluge.extraFlags | Extra commandline options to pass to the deluge exporter.
|
| services.prometheus.exporters.script.extraFlags | Extra commandline options to pass to the script exporter.
|
| services.prometheus.exporters.rspamd.extraFlags | Extra commandline options to pass to the rspamd exporter.
|
| services.prometheus.exporters.domain.extraFlags | Extra commandline options to pass to the domain exporter.
|
| services.prometheus.exporters.pihole.extraFlags | Extra commandline options to pass to the pihole exporter.
|
| services.prometheus.exporters.mysqld.extraFlags | Extra commandline options to pass to the mysqld exporter.
|
| services.prometheus.exporters.restic.extraFlags | Extra commandline options to pass to the restic exporter.
|
| services.prometheus.exporters.deluge.delugeHost | Hostname where deluge server is running.
|
| services.prometheus.exporters.deluge.delugeUser | User to connect to deluge server.
|
| services.radicle.node.listenPort | The port on which radicle-node listens.
|
| services.prometheus.exporters.nginx.constLabels | A list of constant labels that will be used in every metric.
|
| services.prometheus.exporters.dovecot.scopes | Stats scopes to query.
|
| services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| services.dnsdist.listenPort | Listen port
|
| services.tor.openFirewall | Whether to enable opening of the relay port(s) in the firewall.
|
| services.prometheus.exporters.unbound.unbound.key | Path to the Unbound control socket key.
|
| services.prometheus.exporters.influxdb.user | User name under which the influxdb exporter shall be run.
|
| services.prometheus.exporters.opnsense.user | User name under which the opensense exporter shall be run.
|
| services.prometheus.exporters.smartctl.user | User name under which the smartctl exporter shall be run.
|
| services.prometheus.exporters.fritzbox.user | User name under which the fritzbox exporter shall be run.
|
| services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| services.prometheus.exporters.nginxlog.user | User name under which the nginxlog exporter shall be run.
|
| services.prometheus.exporters.postgres.user | User name under which the postgres exporter shall be run.
|
| services.prometheus.exporters.unpoller.user | User name under which the unpoller exporter shall be run.
|
| services.prometheus.exporters.graphite.user | User name under which the graphite exporter shall be run.
|
| services.prometheus.exporters.blackbox.user | User name under which the blackbox exporter shall be run.
|
| services.prometheus.exporters.keylight.user | User name under which the keylight exporter shall be run.
|
| services.prometheus.exporters.collectd.user | User name under which the collectd exporter shall be run.
|
| services.prometheus.exporters.unpoller.log.debug | Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs.
|
| services.prometheus.exporters.rtl_433.ids | List of ID matchers to export.
|
| services.prometheus.exporters.dnssec.timeout | DNS request timeout duration.
|
| services.prometheus.exporters.exportarr-prowlarr.environment | See the configuration guide for available options.
|
| services.dendrite.httpPort | The port to listen for HTTP requests on.
|
| services.smartdns.bindPort | DNS listening port number.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.exporters.py-air-control.group | Group under which the py-air-control exporter shall be run.
|
| security.ipa.chromiumSupport | Whether to whitelist the FreeIPA domain in Chromium.
|
| services.prometheus.exporters.apcupsd.enable | Whether to enable the prometheus apcupsd exporter.
|
| services.prometheus.exporters.bitcoin.enable | Whether to enable the prometheus bitcoin exporter.
|
| services.prometheus.exporters.sabnzbd.enable | Whether to enable the prometheus sabnzbd exporter.
|
| services.prometheus.exporters.process.enable | Whether to enable the prometheus process exporter.
|
| services.prometheus.exporters.ecoflow.enable | Whether to enable the prometheus ecoflow exporter.
|
| services.prometheus.exporters.libvirt.enable | Whether to enable the prometheus libvirt exporter.
|
| services.prometheus.exporters.klipper.enable | Whether to enable the prometheus klipper exporter.
|
| services.prometheus.exporters.varnish.enable | Whether to enable the prometheus varnish exporter.
|
| services.prometheus.exporters.dnsmasq.enable | Whether to enable the prometheus dnsmasq exporter.
|
| services.prometheus.exporters.postfix.showqPath | Path where Postfix places its showq socket.
|
| services.prometheus.exporters.postfix.enable | Whether to enable the prometheus postfix exporter.
|
| services.prometheus.exporters.systemd.enable | Whether to enable the prometheus systemd exporter.
|
| services.prometheus.exporters.dovecot.enable | Whether to enable the prometheus dovecot exporter.
|
| services.prometheus.exporters.mongodb.enable | Whether to enable the prometheus mongodb exporter.
|
| services.prometheus.exporters.unbound.enable | Whether to enable the prometheus unbound exporter.
|
| services.snipe-it.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.lnd.lndMacaroonDir | Path to lnd macaroons.
|
| virtualisation.libvirtd.hooks.daemon | Hooks that will be placed under /var/lib/libvirt/hooks/daemon.d/
and called for daemon start/shutdown/SIGHUP events
|
| services.prometheus.exporters.mongodb.collStats | List of comma separared databases.collections to get $collStats
|
| services.prometheus.exporters.pihole.timeout | Controls the timeout to connect to a Pi-Hole instance
|
| services.nextcloud-spreed-signaling.settings.grpc.listen | IP and port to listen on for GRPC requests
|
| services.firewalld.services.<name>.ports.*.protocol | |
| services.kasmweb.listenPort | The port on which kasmweb should listen.
|
| services.zerobin.listenPort | The port zerobin should listen on
|
| services.prometheus.exporters.knot.knotLibraryPath | Path to the library of knot-dns.
|
| services.prometheus.exporters.rtl_433.ids.*.id | ID to match.
|
| services.prometheus.exporters.mqtt.logMqttMessage | Whether to enable Log MQTT original message, only if LOG_LEVEL is set to DEBUG..
|
| services.prometheus.exporters.pve.listenAddress | Address to listen on.
|
| services.prometheus.exporters.sql.listenAddress | Address to listen on.
|
| services.prometheus.exporters.zfs.listenAddress | Address to listen on.
|
| services.prometheus.exporters.lnd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nut.listenAddress | Address to listen on.
|
| services.prometheus.exporters.frr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.kea.listenAddress | Address to listen on.
|
| services.prometheus.exporters.postfix.systemd.unit | Name of the postfix systemd unit.
|
| services.prometheus.exporters.nvidia-gpu.extraFlags | Extra commandline options to pass to the nvidia-gpu exporter.
|
| services.prometheus.exporters.bird.newMetricFormat | Enable the new more-generic metric format.
|
| services.ntopng.redis.address | Redis address - may be a Unix socket or a network host and port.
|
| services.limesurvey.nginx.virtualHost.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| services.prometheus.exporters.pve.configFile | Path to the service's config file
|
| services.prometheus.exporters.rspamd.extraLabels | Set of labels added to each metric.
|
| services.prometheus.exporters.jitsi.interval | How often to scrape new data
|
| services.nextcloud-spreed-signaling.settings.http.listen | IP and port to listen on for HTTP requests, in the format of ip:port
|
| services.prometheus.exporters.mikrotik.group | Group under which the mikrotik exporter shall be run.
|
| services.prometheus.exporters.opnsense.group | Group under which the opnsense exporter shall be run.
|
| services.prometheus.exporters.postgres.group | Group under which the postgres exporter shall be run.
|
| services.prometheus.exporters.nginxlog.group | Group under which the nginxlog exporter shall be run.
|
| services.prometheus.exporters.unpoller.group | Group under which the unpoller exporter shall be run.
|
| services.prometheus.exporters.bitcoin.rpcScheme | Whether to connect to bitcoind over http or https.
|
| services.prometheus.exporters.graphite.group | Group under which the graphite exporter shall be run.
|
| services.prometheus.exporters.fritzbox.group | Group under which the fritzbox exporter shall be run.
|
| services.prometheus.exporters.smartctl.group | Group under which the smartctl exporter shall be run.
|
| services.prometheus.exporters.blackbox.group | Group under which the blackbox exporter shall be run.
|
| services.prometheus.exporters.influxdb.group | Group under which the influxdb exporter shall be run.
|
| services.prometheus.exporters.keylight.group | Group under which the keylight exporter shall be run.
|
| services.prometheus.exporters.collectd.group | Group under which the collectd exporter shall be run.
|
| services.prometheus.exporters.mqtt.zwaveTopicPrefix | MQTT topic used for Zwavejs2Mqtt messages.
|
| services.epgstation.settings.clientSocketioPort | Socket.io port that the web client is going to connect to
|
| services.radicle.httpd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.xrdp.openFirewall | Whether to open the firewall for the specified RDP port.
|
| services.prometheus.exporters.dmarc.imap.passwordFile | File containing the login password for the IMAP connection.
|
| virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| services.prometheus.exporters.opnsense.apiKeyFile | File containing the api key.
|
| services.polipo.parentProxy | Hostname and port number of an HTTP parent proxy;
it should have the form ‘host:port’.
|
| services.prometheus.exporters.rtl_433.user | User name under which the rtl_433 exporter shall be run.
|
| services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| services.prometheus.exporters.php-fpm.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nats.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ebpf.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bird.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ipmi.listenAddress | Address to listen on.
|
| services.prometheus.exporters.flow.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mail.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mqtt.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bind.listenAddress | Address to listen on.
|
| services.prometheus.exporters.node.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.snmp.listenAddress | Address to listen on.
|
| services.prometheus.exporters.knot.listenAddress | Address to listen on.
|
| services.prometheus.exporters.json.listenAddress | Address to listen on.
|
| services.prometheus.exporters.modemmanager.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| services.prometheus.exporters.nut.passwordPath | A run-time path to the nutUser password file, which should be
provisioned outside of Nix store.
|
| services.prometheus.exporters.dnsmasq.leasesPath | Path to the dnsmasq.leases file.
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports.*.to | The end of the port range, inclusive.
|
| services.prometheus.exporters.unbound.unbound.host | Path to the unbound control socket
|
| services.prometheus.exporters.libvirt.extraFlags | Extra commandline options to pass to the libvirt exporter.
|
| services.prometheus.exporters.unbound.extraFlags | Extra commandline options to pass to the unbound exporter.
|
| services.prometheus.exporters.process.extraFlags | Extra commandline options to pass to the process exporter.
|
| services.prometheus.exporters.varnish.extraFlags | Extra commandline options to pass to the varnish exporter.
|
| services.prometheus.exporters.postfix.extraFlags | Extra commandline options to pass to the postfix exporter.
|
| services.prometheus.exporters.mongodb.extraFlags | Extra commandline options to pass to the mongodb exporter.
|
| services.prometheus.exporters.apcupsd.extraFlags | Extra commandline options to pass to the apcupsd exporter.
|
| services.prometheus.exporters.systemd.extraFlags | Extra commandline options to pass to the systemd exporter.
|
| services.prometheus.exporters.sabnzbd.extraFlags | Extra commandline options to pass to the sabnzbd exporter.
|
| services.prometheus.exporters.dnsmasq.extraFlags | Extra commandline options to pass to the dnsmasq exporter.
|
| services.prometheus.exporters.mongodb.indexStats | List of comma separared databases.collections to get $indexStats
|
| services.prometheus.exporters.ecoflow.extraFlags | Extra commandline options to pass to the ecoflow exporter.
|
| services.prometheus.exporters.klipper.extraFlags | Extra commandline options to pass to the klipper exporter.
|
| services.prometheus.exporters.bitcoin.extraFlags | Extra commandline options to pass to the bitcoin exporter.
|
| services.prometheus.exporters.dovecot.extraFlags | Extra commandline options to pass to the dovecot exporter.
|
| services.croc.openFirewall | Whether to enable opening of the peer port(s) in the firewall.
|
| services.prometheus.exporters.collectd.logLevel | Only log messages with the given severity or above.
|
| services.nixseparatedebuginfod2.port | port to listen
|
| services.prometheus.exporters.py-air-control.enable | Whether to enable the prometheus py-air-control exporter.
|
| services.prometheus.exporters.imap-mailstat.user | User name under which the imap-mailstat exporter shall be run.
|
| services.prometheus.exporters.rtl_433.ids.*.name | Name to match.
|
| services.librechat.env.PORT | The value that will be passed to the PORT environment variable, telling LibreChat what to listen on.
|
| services.tor.torsocks.server | IP/Port of the Tor SOCKS server
|
| services.prometheus.exporters.shelly.metrics-file | Path to the JSON file with the metric definitions
|
| services.prometheus.exporters.varnish.verbose | Enable verbose logging.
|
| services.misskey.reverseProxy.webserver.nginx.reuseport | Create an individual listening socket
|
| services.radicle.httpd.listenPort | The port on which radicle-httpd listens.
|
| services.prometheus.exporters.node-cert.excludePaths | List of paths to exclute from searching for SSL certificates.
|
| services.prometheus.exporters.varnish.healthPath | Path under which to expose healthcheck
|
| services.prometheus.exporters.sabnzbd.servers | List of sabnzbd servers to connect to.
|
| services.prometheus.exporters.py-air-control.stateDir | Directory below /var/lib to store runtime data
|
| services.prometheus.exporters.postfix.systemd.slice | Name of the postfix systemd slice
|
| services.privoxy.enableTor | Whether to configure Privoxy to use Tor's faster SOCKS port,
suitable for HTTP.
|
| virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| services.prometheus.exporters.klipper.package | The prometheus-klipper-exporter package to use.
|
| services.prometheus.exporters.postfix.package | The prometheus-postfix-exporter package to use.
|
| services.prometheus.exporters.mysqld.runAsLocalSuperUser | Whether to run the exporter as services.mysql.user.
|
| services.prometheus.exporters.bitcoin.package | The prometheus-bitcoin-exporter package to use.
|
| services.prometheus.exporters.mysqld.configFile | Path to the services config file
|
| services.hardware.lcd.serverPort | Port on which LCDd is listening.
|
| services.prometheus.alertmanagerGotify.extendedDetails | When enabled, alerts are presented in HTML format and include colorized status (FIR|RES), alert start time, and a link to the generator of the alert.
|
| services.prometheus.exporters.mqtt.mqttExposeClientId | Whether to enable Expose the client ID as a label in Prometheus metrics..
|
| services.bird-lg.frontend.proxyPort | Port bird-lg-proxy is running on.
|
| services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| services.step-ca.openFirewall | Whether to enable opening the certificate authority server port.
|
| services.prometheus.exporters.nut.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nut.openFirewall is true.
|
| services.prometheus.exporters.node-cert.excludeGlobs | List files matching a pattern to include
|
| services.prometheus.exporters.lnd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.lnd.openFirewall is true.
|
| services.prometheus.exporters.sql.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sql.openFirewall is true.
|
| services.prometheus.exporters.frr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.frr.openFirewall is true.
|
| services.prometheus.exporters.pve.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pve.openFirewall is true.
|
| services.prometheus.exporters.node-cert.includeGlobs | List files matching a pattern to include
|
| services.prometheus.exporters.zfs.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.zfs.openFirewall is true.
|
| services.prometheus.exporters.kea.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kea.openFirewall is true.
|
| services.prometheus.exporters.jitsi.listenAddress | Address to listen on.
|
| services.prometheus.exporters.v2ray.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nginx.listenAddress | Address to listen on.
|
| services.prometheus.exporters.kafka.listenAddress | Address to listen on.
|
| services.prometheus.exporters.fritz.listenAddress | Address to listen on.
|
| services.prometheus.exporters.redis.listenAddress | Address to listen on.
|
| services.prometheus.exporters.idrac.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dmarc.listenAddress | Address to listen on.
|
| services.mediatomb.openFirewall | If false (the default), this is up to the user to declare the firewall rules
|
| services.dendrite.httpsPort | The port to listen for HTTPS requests on.
|
| services.snmpd.openFirewall | Open port in firewall for snmpd.
|
| services.akkoma.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.gancio.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.monica.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.matomo.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.collectd.enable | Whether to enable the prometheus collectd exporter.
|
| services.prometheus.exporters.smartctl.enable | Whether to enable the prometheus smartctl exporter.
|
| services.prometheus.exporters.mikrotik.enable | Whether to enable the prometheus mikrotik exporter.
|
| services.prometheus.exporters.blackbox.enable | Whether to enable the prometheus blackbox exporter.
|
| services.prometheus.exporters.graphite.enable | Whether to enable the prometheus graphite exporter.
|
| services.prometheus.exporters.postgres.enable | Whether to enable the prometheus postgres exporter.
|
| services.prometheus.exporters.unpoller.enable | Whether to enable the prometheus unpoller exporter.
|
| services.prometheus.exporters.opnsense.enable | Whether to enable the prometheus opnsense exporter.
|
| services.prometheus.exporters.pihole.protocol | The protocol which is used to connect to Pi-Hole
|
| services.prometheus.exporters.influxdb.enable | Whether to enable the prometheus influxdb exporter.
|
| services.prometheus.exporters.keylight.enable | Whether to enable the prometheus keylight exporter.
|
| services.prometheus.exporters.fritzbox.enable | Whether to enable the prometheus fritzbox exporter.
|
| services.prometheus.exporters.nginxlog.enable | Whether to enable the prometheus nginxlog exporter.
|
| services.prometheus.exporters.tibber.apiTokenPath | Add here the path to your personal Tibber API Token ('Bearer Token') File
|
| services.prometheus.exporters.unpoller.loki.timeout | Should be increased in case of timeout errors.
|
| services.prometheus.exporters.surfboard.user | User name under which the surfboard exporter shall be run.
|
| services.prometheus.exporters.tailscale.user | User name under which the tailscale exporter shall be run.
|
| services.prometheus.exporters.wireguard.user | User name under which the wireguard exporter shall be run.
|
| services.prometheus.exporters.imap-mailstat.group | Group under which the imap-mailstat exporter shall be run.
|
| services.prometheus.exporters.rasdaemon.user | User name under which the rasdaemon exporter shall be run.
|
| services.prometheus.exporters.borgmatic.user | User name under which the borgmatic exporter shall be run.
|
| services.prometheus.exporters.smokeping.user | User name under which the smokeping exporter shall be run.
|
| services.prometheus.exporters.pgbouncer.user | User name under which the pgbouncer exporter shall be run.
|
| services.prometheus.exporters.nextcloud.user | User name under which the nextcloud exporter shall be run.
|
| services.prometheus.exporters.libvirt.libvirtUri | Libvirt URI from which to extract metrics
|
| services.prometheus.exporters.mqtt.mqttV5Protocol | Whether to enable Force to use MQTT protocol v5 instead of 3.1.1..
|
| services.prometheus.exporters.knot.knotSocketTimeout | Timeout in seconds.
|
| services.prometheus.exporters.node-cert.listenAddress | Address to listen on.
|
| services.galene.turnAddress | Built-in TURN server listen address and port
|
| services.prometheus.exporters.junos-czerwonk.user | User name under which the junos-czerwonk exporter shall be run.
|
| services.prometheus.exporters.nextcloud.url | URL to the Nextcloud serverinfo page
|
| services.plausible.mail.smtp.hostPort | The port of your smtp server.
|
| services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|
| services.prometheus.exporters.collectd.logFormat | Set the log format.
|
| services.prometheus.exporters.zfs.telemetryPath | Path under which to expose metrics.
|
| services.siproxd.sipListenPort | Port to listen for incoming SIP messages.
|
| services.prometheus.exporters.py-air-control.extraFlags | Extra commandline options to pass to the py-air-control exporter.
|
| services.prometheus.exporters.pve.collectors.node | Collect PVE node info
|
| services.cook-cli.openFirewall | Whether to open the cook-cli server port in the firewall.
|
| services.prometheus.exporters.nats.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nats.openFirewall is true.
|
| services.prometheus.exporters.bind.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bind.openFirewall is true.
|
| services.prometheus.exporters.ping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ping.openFirewall is true.
|
| services.prometheus.exporters.flow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.flow.openFirewall is true.
|
| services.prometheus.exporters.json.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.json.openFirewall is true.
|
| services.prometheus.exporters.ipmi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ipmi.openFirewall is true.
|
| services.prometheus.exporters.bird.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bird.openFirewall is true.
|
| services.prometheus.exporters.pihole.password | The password to login into Pi-Hole
|
| services.prometheus.exporters.mail.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mail.openFirewall is true.
|
| services.prometheus.exporters.ebpf.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ebpf.openFirewall is true.
|
| services.prometheus.exporters.knot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.knot.openFirewall is true.
|
| services.prometheus.exporters.node.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node.openFirewall is true.
|
| services.prometheus.exporters.snmp.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.snmp.openFirewall is true.
|
| services.prometheus.exporters.mqtt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mqtt.openFirewall is true.
|
| services.epmd.listenStream | the listenStream used by the systemd socket.
see https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream= for more information.
use this to change the port epmd will run on.
if not defined, epmd will use "[::]:4369"
|
| services.prometheus.exporters.ecoflow.prefix | The prefix that will be added to all metrics
|
| services.minio.listenAddress | IP address and port of the server.
|
| services.prometheus.exporters.mqtt.mqttIgnoredTopics | Lists of topics to ignore
|
| services.nextcloud-spreed-signaling.settings.https.listen | IP and port to listen on for HTTPS requests, in the format of ip:port
|
| services.prometheus.exporters.php-fpm.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.php-fpm.openFirewall is true.
|
| services.prometheus.exporters.smokeping.hosts | List of endpoints to probe.
|
| services.dae.openFirewall.enable | Whether to enable opening port in the firewall.
|
| services.flood.openFirewall | Whether to open the firewall for the port in services.flood.port.
|
| services.komga.openFirewall | Whether to open the firewall for the port in services.komga.settings.server.port.
|
| services.prometheus.exporters.v2ray.v2rayEndpoint | v2ray grpc api endpoint
|
| services.fail2ban.banaction-allports | Default banning action (e.g. iptables, iptables-new, iptables-multiport,
shorewall, etc) for "allports" jails
|
| services.resilio.httpListenPort | HTTP port to bind on.
|
| services.prometheus.exporters.postfix.systemd.enable | Whether to enable reading metrics from the systemd journal instead of from a logfile
|
| hardware.block.scheduler | Assign block I/O scheduler by device name pattern
|
| services.prometheus.exporters.borgmatic.group | Group under which the borgmatic exporter shall be run.
|
| services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| services.prometheus.exporters.rasdaemon.group | Group under which the rasdaemon exporter shall be run.
|
| services.prometheus.exporters.nextcloud.group | Group under which the nextcloud exporter shall be run.
|
| services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| services.prometheus.exporters.tailscale.group | Group under which the tailscale exporter shall be run.
|
| services.prometheus.exporters.pgbouncer.group | Group under which the pgbouncer exporter shall be run.
|
| services.prometheus.exporters.wireguard.group | Group under which the wireguard exporter shall be run.
|
| services.opencloud.url | Web interface root public URL, including scheme and port (if non-default).
|
| services.prometheus.exporters.ping.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.blackbox.configFile | Path to configuration file.
|
| services.prometheus.exporters.mail.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.php-fpm.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.mailman3.user | User name under which the mailman3 exporter shall be run.
|
| services.prometheus.exporters.fritzbox.extraFlags | Extra commandline options to pass to the fritzbox exporter.
|
| services.prometheus.exporters.postgres.extraFlags | Extra commandline options to pass to the postgres exporter.
|
| services.prometheus.exporters.collectd.extraFlags | Extra commandline options to pass to the collectd exporter.
|
| services.prometheus.exporters.mikrotik.extraFlags | Extra commandline options to pass to the mikrotik exporter.
|
| services.prometheus.exporters.influxdb.extraFlags | Extra commandline options to pass to the influxdb exporter.
|
| services.prometheus.exporters.graphite.extraFlags | Extra commandline options to pass to the graphite exporter.
|
| services.prometheus.exporters.smartctl.extraFlags | Extra commandline options to pass to the smartctl exporter.
|
| services.prometheus.exporters.keylight.extraFlags | Extra commandline options to pass to the keylight exporter.
|
| services.prometheus.exporters.blackbox.extraFlags | Extra commandline options to pass to the blackbox exporter.
|
| services.prometheus.exporters.opnsense.extraFlags | Extra commandline options to pass to the opnsense exporter.
|
| services.prometheus.exporters.unpoller.extraFlags | Extra commandline options to pass to the unpoller exporter.
|
| services.prometheus.exporters.nginxlog.extraFlags | Extra commandline options to pass to the nginxlog exporter.
|
| services.prometheus.exporters.junos-czerwonk.group | Group under which the junos-czerwonk exporter shall be run.
|
| services.prometheus.exporters.restic.passwordFile | File containing the password to the repository.
|
| services.prometheus.exporters.script.listenAddress | Address to listen on.
|
| services.prometheus.exporters.rspamd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.restic.listenAddress | Address to listen on.
|
| services.prometheus.exporters.domain.listenAddress | Address to listen on.
|
| services.prometheus.exporters.statsd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mysqld.listenAddress | Address to listen on.
|
| services.prometheus.exporters.chrony.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pihole.listenAddress | Address to listen on.
|
| services.prometheus.exporters.tibber.listenAddress | Address to listen on.
|
| services.prometheus.exporters.deluge.listenAddress | Address to listen on.
|
| services.prometheus.exporters.fastly.listenAddress | Address to listen on.
|
| services.prometheus.exporters.shelly.listenAddress | Address to listen on.
|
| virtualisation.oci-containers.containers.<name>.ports | Network ports to publish from the container to the outer host
|
| services.prometheus.exporters.rtl_433.enable | Whether to enable the prometheus rtl_433 exporter.
|
| services.dolibarr.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.agorakit.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.fediwall.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.kanboard.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.librenms.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.mainsail.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.pixelfed.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.netbird.enable | Enables backward-compatible NetBird client service
|
| services.prometheus.exporters.varnish.instance | varnishstat -n value.
|
| services.prometheus.exporters.varnish.withGoMetrics | Export go runtime and http handler metrics.
|
| services.prometheus.exporters.imap-mailstat.enable | Whether to enable the prometheus imap-mailstat exporter.
|
| services.prometheus.exporters.pgbouncer.logLevel | Only log messages with the given severity or above.
|
| services.prometheus.exporters.nginx.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginx.openFirewall is true.
|
| services.prometheus.exporters.redis.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.redis.openFirewall is true.
|
| services.prometheus.exporters.kafka.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.kafka.openFirewall is true.
|
| services.prometheus.exporters.idrac.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.idrac.openFirewall is true.
|
| services.prometheus.exporters.v2ray.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.v2ray.openFirewall is true.
|
| services.prometheus.exporters.jitsi.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.jitsi.openFirewall is true.
|
| services.prometheus.exporters.fritz.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritz.openFirewall is true.
|
| services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| services.prometheus.exporters.postfix.logfilePath | Path where Postfix writes log entries
|
| services.prometheus.exporters.nut.nutVariables | List of NUT variable names to monitor
|
| services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.exporters.snmp.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.prometheus.exporters.sabnzbd.servers.*.baseUrl | Base URL of the sabnzbd server.
|
| services.prometheus.exporters.opnsense.apiSecretFile | File containing the api secret.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time | Time range from which to choose a random value to subtract from
rekey_time
|
| services.prometheus.exporters.nvidia-gpu.listenAddress | Address to listen on.
|
| services.prometheus.exporters.varnish.varnishStatPath | Path to varnishstat.
|
| services.prometheus.exporters.mailman3.group | Group under which the mailman3 exporter shall be run.
|
| i18n.inputMethod.fcitx5.plasma6Support | Use qt6 versions of fcitx5 packages
|
| networking.wg-quick.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer.
|
| services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.configFile | Path to a mikrotik exporter configuration file
|
| services.certmgr.metricsPort | The port for the Prometheus HTTP endpoint.
|
| services.prometheus.exporters.nginx.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.unpoller.loki.interval | How often the events are polled and pushed to Loki.
|
| services.ax25.axports.<name>.description | Free format description of this interface.
|
| services.prometheus.exporters.sql.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sql.openFirewall
is true
|
| services.prometheus.exporters.lnd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.lnd.openFirewall
is true
|
| services.prometheus.exporters.frr.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.frr.openFirewall
is true
|
| services.prometheus.exporters.zfs.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.zfs.openFirewall
is true
|
| services.prometheus.exporters.nut.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nut.openFirewall
is true
|
| services.prometheus.exporters.kea.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.kea.openFirewall
is true
|
| services.prometheus.exporters.pve.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pve.openFirewall
is true
|
| services.prometheus.exporters.smartctl.devices | Paths to the disks that will be monitored
|
| services.couchdb.uriFile | This file contains the full URI that can be used to access this
instance of CouchDB
|
| services.cjdns.UDPInterface.bind | Address and port to bind UDP tunnels to.
|
| services.nntp-proxy.upstreamPort | Upstream server port
|
| services.bosun.listenAddress | The host address and port that bosun's web interface will listen on.
|
| services.prometheus.exporters.smokeping.enable | Whether to enable the prometheus smokeping exporter.
|
| services.prometheus.exporters.pgbouncer.enable | Whether to enable the prometheus pgbouncer exporter.
|
| services.prometheus.exporters.nextcloud.enable | Whether to enable the prometheus nextcloud exporter.
|
| services.prometheus.exporters.dnssec.resolvers | DNSSEC capable resolver to be used for the check.
|
| services.prometheus.exporters.rasdaemon.enable | Whether to enable the prometheus rasdaemon exporter.
|
| services.prometheus.exporters.borgmatic.enable | Whether to enable the prometheus borgmatic exporter.
|
| services.prometheus.exporters.tailscale.enable | Whether to enable the prometheus tailscale exporter.
|
| services.prometheus.exporters.surfboard.enable | Whether to enable the prometheus surfboard exporter.
|
| services.prometheus.exporters.wireguard.enable | Whether to enable the prometheus wireguard exporter.
|
| services.prometheus.exporters.mailman3.logLevel | Detail level to log.
|
| services.subsonic.httpsPort | The port on which Subsonic will listen for
incoming HTTPS traffic
|
| services.prometheus.exporters.junos-czerwonk.enable | Whether to enable the prometheus junos-czerwonk exporter.
|
| services.prometheus.exporters.rtl_433.extraFlags | Extra commandline options to pass to the rtl_433 exporter.
|
| services.neo4j.http.listenAddress | Neo4j listen address for HTTP traffic
|
| services.neo4j.bolt.listenAddress | Neo4j listen address for BOLT traffic
|
| services.nagios.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.moodle.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| networking.supplicant | Interfaces for which to start wpa_supplicant
|
| services.easytier.instances.<name>.settings.listeners | Listener addresses to accept connections from other peers
|
| services.prometheus.exporters.pve.collectors.config | Collect PVE onboot status
|
| services.prometheus.exporters.buildkite-agent.user | User name under which the buildkite-agent exporter shall be run.
|
| services.prometheus.exporters.imap-mailstat.extraFlags | Extra commandline options to pass to the imap-mailstat exporter.
|
| services.prometheus.exporters.flow.partitions | The number of the partitions to consume, none means all.
|
| services.gotenberg.bindIP | Port the API listener should bind to
|
| services.hologram-agent.httpPort | Port for metadata service to listen on.
|
| services.echoip.enablePortLookup | Whether to enable port lookup.
|
| services.windmill.serverPort | Port the windmill server listens on.
|
| services.prometheus.exporters.pve.collectors.status | Collect Node/VM/CT status
|
| services.prometheus.exporters.scaphandre.user | User name under which the scaphandre exporter shall be run.
|
| services.prometheus.exporters.storagebox.user | User name under which the storagebox exporter shall be run.
|
| services.prometheus.exporters.mqtt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mqtt.openFirewall
is true
|
| services.prometheus.exporters.json.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.json.openFirewall
is true
|
| services.prometheus.exporters.flow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.flow.openFirewall
is true
|
| services.prometheus.exporters.mail.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mail.openFirewall
is true
|
| services.prometheus.exporters.ebpf.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ebpf.openFirewall
is true
|
| services.prometheus.exporters.nats.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nats.openFirewall
is true
|
| services.prometheus.exporters.knot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.knot.openFirewall
is true
|
| services.prometheus.exporters.bind.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bind.openFirewall
is true
|
| services.prometheus.exporters.bird.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bird.openFirewall
is true
|
| services.prometheus.exporters.node.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node.openFirewall
is true
|
| services.prometheus.exporters.ipmi.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ipmi.openFirewall
is true
|
| services.prometheus.exporters.ping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ping.openFirewall
is true
|
| services.prometheus.exporters.snmp.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.snmp.openFirewall
is true
|
| services.prometheus.exporters.fastly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fastly.openFirewall is true.
|
| services.prometheus.exporters.shelly.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.shelly.openFirewall is true.
|
| services.prometheus.exporters.statsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.statsd.openFirewall is true.
|
| services.prometheus.exporters.domain.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.domain.openFirewall is true.
|
| services.prometheus.exporters.tibber.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tibber.openFirewall is true.
|
| services.prometheus.exporters.rspamd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rspamd.openFirewall is true.
|
| services.prometheus.exporters.deluge.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.deluge.openFirewall is true.
|
| services.prometheus.exporters.chrony.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.chrony.openFirewall is true.
|
| services.prometheus.exporters.pihole.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pihole.openFirewall is true.
|
| services.prometheus.exporters.script.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.script.openFirewall is true.
|
| services.prometheus.exporters.dnssec.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnssec.openFirewall is true.
|
| services.prometheus.exporters.restic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.restic.openFirewall is true.
|
| services.prometheus.exporters.mysqld.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mysqld.openFirewall is true.
|
| services.prometheus.exporters.apcupsd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.systemd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.klipper.listenAddress | Address to listen on.
|
| services.prometheus.exporters.postfix.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dnsmasq.listenAddress | Address to listen on.
|
| services.prometheus.exporters.libvirt.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ecoflow.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mongodb.listenAddress | Address to listen on.
|
| services.prometheus.exporters.unbound.listenAddress | Address to listen on.
|
| services.prometheus.exporters.varnish.listenAddress | Address to listen on.
|
| services.prometheus.exporters.sabnzbd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.bitcoin.listenAddress | Address to listen on.
|
| services.prometheus.exporters.process.listenAddress | Address to listen on.
|
| services.prometheus.exporters.dovecot.listenAddress | Address to listen on.
|
| services.prometheus.exporters.php-fpm.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.php-fpm.openFirewall
is true
|
| services.miredo.bindAddress | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.redis.servers.<name>.slaveOf | IP and port to which this redis instance acts as a slave.
|
| services.prometheus.exporters.postgres.dataSourceName | Accepts PostgreSQL URI form and key=value form arguments.
|
| services.lasuite-docs.collaborationServer.settings.PORT | Port used by collaboration server to listen to
|
| services.prometheus.exporters.postfix.systemd.journalPath | Path to the systemd journal.
|
| services.prometheus.exporters.mailman3.mailman.addr | Mailman3 Core REST API address.
|
| services.prometheus.exporters.mailman3.mailman.user | Mailman3 Core REST API username.
|
| services.actual.openFirewall | Whether to open the firewall for the specified port.
|
| services.immich.openFirewall | Whether to open the immich port in the firewall
|
| services.pykms.openFirewallPort | Whether the listening port should be opened automatically.
|
| services.prometheus.exporters.nextcloud.tokenFile | File containing the token for connecting to Nextcloud
|
| networking.networkmanager.wifi.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
"stable-ssid": Generate a stable MAC addressed based on Wi-Fi network
|
| services.prometheus.exporters.pgbouncer.logFormat | Output format of log messages
|
| services.prometheus.exporters.pgbouncer.extraFlags | Extra commandline options when launching Prometheus.
|
| services.prometheus.exporters.py-air-control.protocol | The protocol to use when communicating with the air purification device
|
| services.prometheus.exporters.mysqld.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.influxdb.sampleExpiry | How long a sample is valid for
|
| services.prometheus.exporters.mailman3.enable | Whether to enable the prometheus mailman3 exporter.
|
| services.prometheus.exporters.borgmatic.extraFlags | Extra commandline options to pass to the borgmatic exporter.
|
| services.prometheus.exporters.wireguard.extraFlags | Extra commandline options to pass to the wireguard exporter.
|
| services.prometheus.exporters.smokeping.extraFlags | Extra commandline options to pass to the smokeping exporter.
|
| services.prometheus.exporters.tailscale.extraFlags | Extra commandline options to pass to the tailscale exporter.
|
| services.prometheus.exporters.nextcloud.extraFlags | Extra commandline options to pass to the nextcloud exporter.
|
| services.prometheus.exporters.rasdaemon.extraFlags | Extra commandline options to pass to the rasdaemon exporter.
|
| services.prometheus.exporters.surfboard.extraFlags | Extra commandline options to pass to the surfboard exporter.
|
| services.prometheus.exporters.buildkite-agent.group | Group under which the buildkite-agent exporter shall be run.
|
| services.firezone.relay.lowestPort | The lowest port to use in TURN allocation
|
| services.prometheus.exporters.influxdb.udpBindAddress | Address on which to listen for udp packets
|
| services.prometheus.exporters.bitcoin.rpcPasswordFile | File containing RPC password.
|
| services.prometheus.exporters.borgmatic.configFile | The path to the borgmatic config file
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes | Byte range from which to choose a random value to subtract from
rekey_bytes
|
| services.porn-vault.openFirewall | Whether to open the Porn-Vault port in the firewall.
|
| services.statsd.graphitePort | Port of Graphite server (i.e. carbon-cache).
|
| services.prometheus.exporters.mongodb.collector | Enabled collectors
|
| services.prometheus.exporters.pgbouncer.pidFile | Path to PgBouncer pid file
|
| services.avahi.openFirewall | Whether to open the firewall for UDP port 5353
|
| services.bosun.opentsdbHost | Host and port of the OpenTSDB database that stores bosun data
|
| services.prometheus.exporters.postgres.runAsLocalSuperUser | Whether to run the exporter as the local 'postgres' super user.
|
| services.prometheus.exporters.junos-czerwonk.extraFlags | Extra commandline options to pass to the junos-czerwonk exporter.
|
| services.prometheus.exporters.storagebox.group | Group under which the storagebox exporter shall be run.
|
| services.prometheus.exporters.scaphandre.group | Group under which the scaphandre exporter shall be run.
|
| services.polipo.socksParentProxy | Hostname and port number of an SOCKS parent proxy;
it should have the form ‘host:port’.
|
| services.prometheus.exporters.nvidia-gpu.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nvidia-gpu.openFirewall is true.
|
| services.radicle.httpd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.pihole.piholeHostname | Hostname or address where to find the Pi-Hole webinterface
|
| services.ipfs-cluster.openSwarmPort | Open swarm port, secured by the cluster secret
|
| services.chisel-server.reverse | Allow clients reverse port forwarding
|
| services.prometheus.exporters.jitsi.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.jitsi.openFirewall
is true
|
| services.prometheus.exporters.redis.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.redis.openFirewall
is true
|
| services.prometheus.exporters.nginx.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginx.openFirewall
is true
|
| services.prometheus.exporters.idrac.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.idrac.openFirewall
is true
|
| services.prometheus.exporters.kafka.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.kafka.openFirewall
is true
|
| services.prometheus.exporters.v2ray.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.v2ray.openFirewall
is true
|
| services.prometheus.exporters.fritz.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fritz.openFirewall
is true
|
| services.prometheus.exporters.dmarc.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dmarc.openFirewall
is true
|
| services.beszel.agent.openFirewall | Whether to open the firewall port (default 45876).
|
| services.prometheus.exporters.py-air-control.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nextcloud.timeout | Timeout for getting server info document.
|
| services.prometheus.exporters.tailscale.package | The prometheus-tailscale-exporter package to use.
|
| services.prometheus.exporters.pgbouncer.package | The prometheus-pgbouncer-exporter package to use.
|
| services.prometheus.exporters.restic.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.i2pd.proto.socksProxy.outproxyPort | Upstream outproxy bind port.
|
| services.prometheus.exporters.smokeping.buckets | List of buckets to use for the response duration histogram.
|
| services.prometheus.exporters.unpoller.loki.tenant_id | Tenant ID to use in Loki.
|
| services.prometheus.exporters.pve.collectors.cluster | Collect PVE cluster info
|
| services.prometheus.exporters.pve.collectors.version | Collect PVE version info
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.prometheus.exporters.node-cert.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node-cert.openFirewall
is true
|
| services.prometheus.exporters.restic.rcloneOptions | Options to pass to rclone to control its behavior
|
| services.stargazer.listen | Address and port to listen on.
|
| services.prometheus.exporters.buildkite-agent.queues | Which specific queues to process.
|
| services.neo4j.https.listenAddress | Neo4j listen address for HTTPS traffic
|
| services.prometheus.exporters.wireguard.verbose | Whether to enable verbose logging mode for prometheus-wireguard-exporter.
|
| services.prometheus.exporters.wireguard.withRemoteIp | Whether or not the remote IP of a WireGuard peer should be exposed via prometheus.
|
| services.anuko-time-tracker.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| hardware.opentabletdriver.daemon.enable | Whether to start OpenTabletDriver daemon as a systemd user service.
|
| services.prometheus.exporters.smartctl.maxInterval | Interval that limits how often a disk can be queried.
|
| services.prometheus.exporters.mailman3.mailman.passFile | Mailman3 Core REST API password.
|
| services.zabbixWeb.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.zabbixWeb.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| hardware.amdgpu.amdvlk.support32Bit.enable | Whether to enable 32-bit driver support.
|
| services.prometheus.exporters.bitcoin.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.bitcoin.openFirewall is true.
|
| services.prometheus.exporters.dnsmasq.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dnsmasq.openFirewall is true.
|
| services.prometheus.exporters.unbound.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unbound.openFirewall is true.
|
| services.prometheus.exporters.apcupsd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.apcupsd.openFirewall is true.
|
| services.prometheus.exporters.libvirt.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.libvirt.openFirewall is true.
|
| services.prometheus.exporters.varnish.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.varnish.openFirewall is true.
|
| services.prometheus.exporters.postfix.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postfix.openFirewall is true.
|
| services.prometheus.exporters.sabnzbd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.sabnzbd.openFirewall is true.
|
| services.prometheus.exporters.ecoflow.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.ecoflow.openFirewall is true.
|
| services.prometheus.exporters.klipper.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.klipper.openFirewall is true.
|
| services.prometheus.exporters.systemd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.systemd.openFirewall is true.
|
| services.prometheus.exporters.dovecot.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dovecot.openFirewall is true.
|
| services.prometheus.exporters.mongodb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mongodb.openFirewall is true.
|
| services.prometheus.exporters.process.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.process.openFirewall is true.
|
| services.prometheus.exporters.imap-mailstat.accounts | Accounts to monitor
|
| services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.exporters.mailman3.extraFlags | Extra commandline options to pass to the mailman3 exporter.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| services.prometheus.exporters.buildkite-agent.enable | Whether to enable the prometheus buildkite-agent exporter.
|
| services.filebeat.settings.output.elasticsearch.hosts | The list of Elasticsearch nodes to connect to
|
| services.prometheus.exporters.restic.repository | URI pointing to the repository to monitor.
|
| services.prometheus.exporters.bitcoin.refreshSeconds | How often to ask bitcoind for metrics.
|
| services.prometheus.exporters.fritzbox.listenAddress | Address to listen on.
|
| services.prometheus.exporters.blackbox.listenAddress | Address to listen on.
|
| services.prometheus.exporters.opnsense.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nginxlog.listenAddress | Address to listen on.
|
| services.prometheus.exporters.collectd.listenAddress | Address to listen on.
|
| services.prometheus.exporters.graphite.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smartctl.listenAddress | Address to listen on.
|
| services.prometheus.exporters.mikrotik.listenAddress | Address to listen on.
|
| services.prometheus.exporters.postgres.listenAddress | Address to listen on.
|
| services.prometheus.exporters.unpoller.listenAddress | Address to listen on.
|
| services.prometheus.exporters.keylight.listenAddress | Address to listen on.
|
| services.prometheus.exporters.influxdb.listenAddress | Address to listen on.
|
| services.minio.consoleAddress | IP address and port of the web UI (console).
|
| services.meme-bingo-web.openFirewall | Whether to enable Opens the specified port in the firewall.
.
|
| services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| services.prometheus.exporters.storagebox.enable | Whether to enable the prometheus storagebox exporter.
|
| services.prometheus.exporters.scaphandre.enable | Whether to enable the prometheus scaphandre exporter.
|
| services.prometheus.exporters.dovecot.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.postfix.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.varnish.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.mongodb.telemetryPath | Metrics expose path
|
| services.prometheus.exporters.unbound.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.rtl_433.rtl433Flags | Flags passed verbatim to rtl_433 binary
|
| services.pixiecore.dhcpNoBind | Handle DHCP traffic without binding to the DHCP server port
|
| services.prometheus.exporters.rtl_433.channels | List of channel matchers to export.
|
| services.prometheus.exporters.apcupsd.apcupsdAddress | Address of the apcupsd Network Information Server (NIS).
|
| services.prometheus.exporters.deluge.delugePasswordFile | File containing the password to connect to deluge server.
|
| services.prometheus.exporters.storagebox.tokenFile | File that contains the Hetzner API token to use.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| services.smokeping.imgUrl | Base url for images generated in the cgi
|
| services.prometheus.exporters.domain.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.domain.openFirewall
is true
|
| services.prometheus.exporters.chrony.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.chrony.openFirewall
is true
|
| services.prometheus.exporters.statsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.statsd.openFirewall
is true
|
| services.prometheus.exporters.tibber.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tibber.openFirewall
is true
|
| services.prometheus.exporters.mysqld.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mysqld.openFirewall
is true
|
| services.prometheus.exporters.rspamd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rspamd.openFirewall
is true
|
| services.prometheus.exporters.pihole.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pihole.openFirewall
is true
|
| services.prometheus.exporters.deluge.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.deluge.openFirewall
is true
|
| services.prometheus.exporters.dnssec.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnssec.openFirewall
is true
|
| services.prometheus.exporters.deluge.delugePassword | Password to connect to deluge server
|
| services.prometheus.exporters.restic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.restic.openFirewall
is true
|
| services.prometheus.exporters.script.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.script.openFirewall
is true
|
| services.prometheus.exporters.fastly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fastly.openFirewall
is true
|
| services.prometheus.exporters.shelly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.shelly.openFirewall
is true
|
| services.llama-swap.openFirewall | Whether to open the firewall for llama-swap
|
| hardware.facter.detected.uefi.supported | Whether to enable the facter uefi module.
|
| services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| services.prometheus.exporters.wireguard.prependSudo | Whether or no to prepend sudo to wg commands.
|
| services.prometheus.exporters.mqtt.hubitatTopicPrefixes | MQTT topic used for Hubitat messages.
|
| services.prometheus.exporters.dmarc.pollIntervalSeconds | How often to poll the IMAP server in seconds.
|
| services.prometheus.exporters.mqtt.esphomeTopicPrefixes | MQTT topic used for ESPHome messages.
|
| services.mjolnir.pantalaimon.options.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.kubernetes.apiserver.bindAddress | The IP address on which to listen for the --secure-port port
|
| services.bookstack.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.apcupsd.apcupsdNetwork | Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
|
| services.cockpit.openFirewall | Open port for cockpit.
|
| services.prefect.databasePort | database port for postgres only
|
| services.netdata.enableAnalyticsReporting | Enable reporting of anonymous usage statistics to Netdata Inc. via either
Google Analytics (in versions prior to 1.29.4), or Netdata Inc.'s
self-hosted PostHog (in versions 1.29.4 and later)
|
| networking.networkmanager.ethernet.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
|
| services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.rtl_433.ids.*.location | Location to match.
|
| services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| services.prometheus.exporters.buildkite-agent.extraFlags | Extra commandline options to pass to the buildkite-agent exporter.
|
| services.prometheus.exporters.nvidia-gpu.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nvidia-gpu.openFirewall
is true
|
| services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| hardware.amdgpu.legacySupport.enable | Whether to enable using amdgpu kernel driver instead of radeon for Southern Islands
(Radeon HD 7000) series and Sea Islands (Radeon HD 8000)
series cards
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| services.prometheus.exporters.scaphandre.extraFlags | Extra commandline options to pass to the scaphandre exporter.
|
| services.prometheus.exporters.storagebox.extraFlags | Extra commandline options to pass to the storagebox exporter.
|
| services.dockerRegistry.redisUrl | Set redis host and port.
|
| services.glances.openFirewall | Open port in the firewall for glances.
|
| services.polaris.openFirewall | Open the configured port in the firewall.
|
| services.screego.openFirewall | Open the firewall port(s).
|
| services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| hardware.amdgpu.amdvlk.support32Bit.package | The amdvlk package to use.
|
| services.prometheus.exporters.imap-mailstat.listenAddress | Address to listen on.
|
| services.unifi.openFirewall | Whether or not to open the minimum required ports on the firewall
|
| services.prometheus.exporters.restic.refreshInterval | Refresh interval for the metrics in seconds
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| services.borgmatic.settings.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| services.prometheus.exporters.imap-mailstat.oldestUnseenDate | Enable metric with timestamp of oldest unseen mail
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| services.static-web-server.listen | The systemd.socket(5) "ListenStream" used in static-web-server.socket
|
| services.teamspeak3.defaultVoicePort | Default UDP port for clients to connect to virtual servers - used for first virtual server, subsequent ones will open on incrementing port numbers by default.
|
| services.xserver.exportConfiguration | Whether to symlink the X server configuration under
/etc/X11/xorg.conf.
|
| services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| services.prometheus.exporters.rtl_433.listenAddress | Address to listen on.
|
| services.distccd.openFirewall | Opens the specified TCP port for distcc.
|
| services.esphome.openFirewall | Whether to open the firewall for the specified port.
|
| services.livekit.openFirewall | Opens port range for LiveKit on the firewall.
|
| services.marytts.openFirewall | Whether to open the port in the firewall for MaryTTS.
|
| services.firezone.relay.highestPort | The highest port to use in TURN allocation
|
| services.caddy.openFirewall | Whether to enable opening the specified http(s) ports in the firewall
|
| services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| services.prometheus.exporters.storagebox.package | The prometheus-storagebox-exporter package to use.
|
| services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| services.prometheus.exporters.fritzbox.gatewayAddress | The hostname or IP of the FRITZ!Box.
|
| services.prometheus.exporters.apcupsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.apcupsd.openFirewall
is true
|
| services.prometheus.exporters.unbound.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unbound.openFirewall
is true
|
| services.prometheus.exporters.varnish.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.varnish.openFirewall
is true
|
| services.prometheus.exporters.ecoflow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ecoflow.openFirewall
is true
|
| services.prometheus.exporters.bitcoin.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bitcoin.openFirewall
is true
|
| services.prometheus.exporters.dnsmasq.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnsmasq.openFirewall
is true
|
| services.prometheus.exporters.dovecot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dovecot.openFirewall
is true
|
| services.prometheus.exporters.libvirt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.libvirt.openFirewall
is true
|
| services.prometheus.exporters.sabnzbd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sabnzbd.openFirewall
is true
|
| services.prometheus.exporters.process.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.process.openFirewall
is true
|
| services.prometheus.exporters.systemd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.systemd.openFirewall
is true
|
| services.prometheus.exporters.mongodb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mongodb.openFirewall
is true
|
| services.prometheus.exporters.klipper.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.klipper.openFirewall
is true
|
| services.prometheus.exporters.postfix.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postfix.openFirewall
is true
|
| services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| services.prometheus.exporters.smokeping.pingInterval | Interval between pings.
|
| services.biboumi.openFirewall | Whether to enable opening of the identd port in the firewall.
|
| services.mastodon.sidekiqPort | TCP port used by the mastodon-sidekiq service.
|
| services.zitadel.openFirewall | Whether to open the port specified in listenPort in the firewall.
|
| services.xonotic.openFirewall | Open the firewall for TCP and UDP on the specified port.
|
| services.uptermd.openFirewall | Whether to open the firewall for the port in services.uptermd.port.
|
| services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| services.qbittorrent.torrentingPort | the port passed to qbittorrent via --torrenting-port
|
| services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| services.zammad.websocketPort | Websocket service port.
|
| services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.target | Address to forward connections to (can be HOST:PORT or unix:PATH).
|
| services.prometheus.exporters.surfboard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.borgmatic.listenAddress | Address to listen on.
|
| services.prometheus.exporters.junos-czerwonk.listenAddress | Address to listen on.
|
| services.prometheus.exporters.wireguard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smokeping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nextcloud.listenAddress | Address to listen on.
|
| services.prometheus.exporters.tailscale.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pgbouncer.listenAddress | Address to listen on.
|
| services.prometheus.exporters.rasdaemon.listenAddress | Address to listen on.
|
| services.prometheus.exporters.ecoflow.ecoflowAccessKeyFile | Path to the file with your personal api access string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| services.prometheus.exporters.ecoflow.ecoflowSecretKeyFile | Path to the file with your personal api secret string from the Ecoflow development website https://developer-eu.ecoflow.com
|
| services.nextcloud.settings.mail_smtphost | This depends on mail_smtpmode
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.kanidm.server.settings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.restic.server.listenAddress | Listen on a specific IP address and port or unix socket.
|
| hardware.keyboard.qmk.keychronSupport | Whether to enable udev rules for keychron QMK based keyboards.
|
| services.freeciv.openFirewall | Whether to enable opening the firewall for the port listening for clients.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets | Packet range from which to choose a random value to subtract from
rekey_packets
|
| services.prometheus.exporters.rasdaemon.databasePath | Path to the RAS daemon machine check event database.
|
| services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| services.prometheus.exporters.frr.enabledCollectors | Collectors to enable
|
| services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port | The port to scrape metrics from, when role is nodes, and for discovered
tasks and services that don't have published ports
|
| services.prometheus.exporters.collectd.collectdBinary.enable | Whether to enable collectd binary protocol receiver.
|
| services.tor.torsocks.fasterServer | IP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| services.etesync-dav.openFirewall | Whether to open the firewall for the specified port.
|
| services.prometheus.exporters.artifactory.enable | Whether to enable the prometheus artifactory exporter.
|
| services.netbird.server.signal.metricsPort | Internal port of the metrics server.
|
| services.prometheus.exporters.imap-mailstat.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.imap-mailstat.openFirewall is true.
|
| services.prometheus.exporters.buildkite-agent.interval | How often to update metrics.
|
| services.prometheus.exporters.mqtt.environmentFile | File to load as environment file
|
| services.prometheus.exporters.py-air-control.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.py-air-control.openFirewall
is true
|
| services.prometheus.exporters.nextcloud.passwordFile | File containing the password for connecting to Nextcloud
|
| services.jirafeau.nginxConfig.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.buildkite-agent.endpoint | The Buildkite Agent API endpoint.
|
| services.prometheus.exporters.pve.collectors.resources | Collect PVE resources info
|
| services.esphome.enableUnixSocket | Listen on a unix socket /run/esphome/esphome.sock instead of the TCP port.
|
| programs.hyprland.portalPackage | The xdg-desktop-portal-hyprland package to use
|
| services.orangefs.server.servers | URLs for storage server including port
|
| services.dnsdist.dnscrypt.listenPort | Listen port of the endpoint
|
| services.prometheus.exporters.dnsmasq.dnsmasqListenAddress | Address on which dnsmasq listens.
|
| services.immich-kiosk.openFirewall | Whether to open the firewall for the immich-kiosk port.
|
| services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.package | Package to use for ghostunnel
|
| services.prometheus.exporters.node.enabledCollectors | Collectors to enable
|
| services.prometheus.exporters.artifactory.scrapeUri | URI on which to scrape JFrog Artifactory.
|
| services.znc.config | Configuration for ZNC, see
https://wiki.znc.in/Configuration for details
|
| services.prometheus.exporters.rtl_433.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rtl_433.openFirewall is true.
|
| services.openssh.listenAddresses | List of addresses and ports to listen on (ListenAddress directive
in config)
|
| services.anki-sync-server.openFirewall | Whether to open the firewall for the specified port.
|
| services.prometheus.exporters.kafka.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.prometheus.exporters.nginxlog.metricsEndpoint | Path under which to expose metrics.
|
| services.prometheus.exporters.mailman3.listenAddress | Address to listen on.
|
| services.public-inbox.openFirewall | Whether to enable opening the firewall when using a port option.
|
| services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| services.prometheus.exporters.fritzbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fritzbox.openFirewall
is true
|
| services.prometheus.exporters.opnsense.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.opnsense.openFirewall
is true
|
| services.prometheus.exporters.smartctl.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smartctl.openFirewall
is true
|
| services.prometheus.exporters.mikrotik.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mikrotik.openFirewall
is true
|
| services.prometheus.exporters.influxdb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.influxdb.openFirewall
is true
|
| services.prometheus.exporters.postgres.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postgres.openFirewall
is true
|
| services.prometheus.exporters.nginxlog.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginxlog.openFirewall
is true
|
| services.prometheus.exporters.unpoller.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unpoller.openFirewall
is true
|
| services.prometheus.exporters.blackbox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.blackbox.openFirewall
is true
|
| services.prometheus.exporters.collectd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.collectd.openFirewall
is true
|
| services.prometheus.exporters.graphite.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.graphite.openFirewall
is true
|
| services.prometheus.exporters.pgbouncer.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pgbouncer.openFirewall is true.
|
| services.prometheus.exporters.nextcloud.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nextcloud.openFirewall is true.
|
| services.prometheus.exporters.surfboard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.surfboard.openFirewall is true.
|
| services.prometheus.exporters.smokeping.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smokeping.openFirewall is true.
|
| services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| services.prometheus.exporters.rasdaemon.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rasdaemon.openFirewall is true.
|
| services.prometheus.exporters.borgmatic.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.borgmatic.openFirewall is true.
|
| services.prometheus.exporters.tailscale.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.tailscale.openFirewall is true.
|
| services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| services.prometheus.exporters.junos-czerwonk.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.junos-czerwonk.openFirewall is true.
|
| services.prometheus.exporters.modemmanager.user | User name under which the modemmanager exporter shall be run.
|
| services.prometheus.exporters.artifactory.extraFlags | Extra commandline options to pass to the artifactory exporter.
|
| services.prometheus.exporters.frr.disabledCollectors | Collectors to disable which are enabled by default.
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| services.keycloak.settings.hostname-backchannel-dynamic | Enables dynamic resolving of backchannel URLs,
including hostname, scheme, port and context path
|
| services.prometheus.exporters.graphite.mappingSettings | Mapping configuration for the exporter, see
https://github.com/prometheus/graphite_exporter#yaml-config for
available options.
|
| services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| services.tigerbeetle.addresses | The addresses of all replicas in the cluster
|
| services.prometheus.exporters.smokeping.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.pgbouncer.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.junos-czerwonk.telemetryPath | Path under which to expose metrics.
|
| services.plantuml-server.listenPort | Port to listen on.
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.prometheus.exporters.buildkite-agent.listenAddress | Address to listen on.
|
| services.prometheus.exporters.unpoller.log.prometheusErrors | Whether to enable emitting errors to prometheus.
|
| services.prometheus.exporters.fastly.environmentFile | An environment file containg at least the FASTLY_API_TOKEN= environment
variable.
|
| services.fedimintd.<name>.nginx.path | Path to host the API on and forward to the daemon's api port
|
| networking.nat.forwardPorts.*.sourcePort | Source port of the external interface; to specify a port range, use a string with a colon (e.g. "60000:61000")
|
| services.quicktun.<name>.localPort | Local UDP port.
|
| services.zabbixWeb.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.node.disabledCollectors | Collectors to disable which are enabled by default.
|
| services.prometheus.exporters.sql.configuration.jobs | An attrset of metrics scraping jobs to run.
|
| services.prometheus.exporters.scaphandre.listenAddress | Address to listen on.
|
| services.prometheus.exporters.storagebox.listenAddress | Address to listen on.
|
| services.prometheus.exporters.modemmanager.group | Group under which the modemmanager exporter shall be run.
|
| services.prometheus.exporters.ecoflow.ecoflowPasswordFile | Path to the file with your personal ecoflow app login email password
|
| services.httpd.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.nginx.virtualHosts.<name>.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.buffyboard.settings.quirks.ignore_unused_terminals | If true, buffyboard won't automatically update the layout of a new terminal and
draw the keyboard, if the terminal is not opened by any process
|
| services.drupal.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.livekit.ingress.openFirewall.rtmp | Open RTMP port in the firewall.
|
| services.livekit.ingress.openFirewall.whip | Open WHIP port in the firewall.
|
| services.lavalink.openFirewall | Whether to expose the port to the network.
|
| services.matter-server.openFirewall | Whether to open the port in the firewall.
|
| services.anuko-time-tracker.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.blendfarm.serverConfig.Port | Default port blendfarm server listens on.
|
| services.prometheus.exporters.imap-mailstat.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.imap-mailstat.openFirewall
is true
|
| services.prometheus.exporters.chrony.enabledCollectors | Collectors to enable
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port | The port to scrape metrics from
|
| services.hologram-agent.dialAddress | Hologram server and port.
|
| services.n8n.environment.N8N_PORT | The HTTP port n8n runs on.
|
| services.webhook.openFirewall | Open the configured port in the firewall for external ingress traffic
|
| services.eris-server.listenCoap | Server CoAP listen address
|
| services.prometheus.exporters.mailman3.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mailman3.openFirewall is true.
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesFile | File must contain one line, example: R3300000,R3400000,NC430000,...
|
| services.prometheus.exporters.rtl_433.channels.*.channel | Channel to match.
|
| services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| services.firezone.relay.openFirewall | Opens up the main STUN port and the TURN allocation range.
|
| services.dovecot2.quotaPort | The Port the dovecot quota service binds to
|
| services.prometheus.exporters.rtl_433.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rtl_433.openFirewall
is true
|
| services.gemstash.openFirewall | Whether to open the firewall for the port in services.gemstash.bind.
|
| services.endlessh.openFirewall | Whether to open a firewall port for the SSH listener.
|
| services.rtorrent.openFirewall | Whether to open the firewall for the port in services.rtorrent.port.
|
| services.prometheus.exporters.smokeping.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.smokeping.openFirewall
is true
|
| services.prometheus.exporters.wireguard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.wireguard.openFirewall
is true
|
| services.prometheus.exporters.nextcloud.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nextcloud.openFirewall
is true
|
| services.prometheus.exporters.borgmatic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.borgmatic.openFirewall
is true
|
| services.prometheus.exporters.surfboard.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.surfboard.openFirewall
is true
|
| services.prometheus.exporters.rasdaemon.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rasdaemon.openFirewall
is true
|
| services.prometheus.exporters.pgbouncer.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pgbouncer.openFirewall
is true
|
| services.prometheus.exporters.tailscale.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tailscale.openFirewall
is true
|
| services.firezone.server.smtp.implicitTls | Whether to use implicit TLS instead of STARTTLS (usually port 465)
|
| services.prometheus.exporters.modemmanager.enable | Whether to enable the prometheus modemmanager exporter.
|
| services.prometheus.exporters.junos-czerwonk.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.junos-czerwonk.openFirewall
is true
|
| services.prometheus.exporters.buildkite-agent.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.buildkite-agent.openFirewall is true.
|
| services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| services.prometheus.exporters.ecoflow.scrapingInterval | Scrapping interval in seconds
|
| services.chromadb.openFirewall | Whether to automatically open the specified TCP port in the firewall.
|
| services.factorio.openFirewall | Whether to automatically open the specified UDP port in the firewall.
|
| services.prometheus.exporters.scaphandre.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.scaphandre.openFirewall is true.
|
| services.prometheus.exporters.storagebox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.storagebox.openFirewall is true.
|
| services.bookstack.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.grafana_reporter.addr | Listening address.
|
| services.endlessh-go.openFirewall | Whether to open a firewall port for the SSH listener.
|
| services.prometheus.exporters.unpoller.controllers | List of Unifi controllers to poll
|
| services.scollector.bosunHost | Host and port of the bosun server that will store the collected
data.
|
| services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| services.prometheus.exporters.wireguard.interfaces | Specifies the interface(s) passed to the wg show dump parameter
|
| services.prometheus.exporters.scaphandre.telemetryPath | Path under which to expose metrics.
|
| services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.unsafeTarget | If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets
|
| services.pingvin-share.openFirewall | Whether to open the firewall for the port in services.pingvin-share.frontend.port.
|
| services.nextcloud.config.dbhost | Database host (+port) or socket path
|
| services.prometheus.exporters.unpoller.controllers.*.url | URL of the Unifi controller.
|
| services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| services.prometheus.exporters.modemmanager.extraFlags | Extra commandline options to pass to the modemmanager exporter.
|
| services.grafana_reporter.grafana.addr | Grafana address.
|
| services.prometheus.exporters.sql.configuration | Exporter configuration as nix attribute set
|
| services.taskserver.listenPort | Port number of the Taskserver.
|
| services.prometheus.exporters.artifactory.artiAccessToken | Access token for authentication against JFrog Artifactory API
|
| services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| services.prometheus.exporters.collectd.collectdBinary.listenAddress | Address to listen on for binary network packets.
|
| services.unpoller.prometheus.report_errors | Whether to report errors.
|
| services.quicktun.<name>.remotePort | Remote UDP port
|
| services.prometheus.exporters.artifactory.listenAddress | Address to listen on.
|
| services.prometheus.exporters.opnsense.opnsenseServerAddress | Opnsense IP address of the opnsense appliance
|
| services._3proxy.services.*.bindPort | Override default port used for service.
|
| services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| services.prometheus.exporters.rtl_433.channels.*.location | Location to match.
|
| services.prometheus.exporters.unpoller.controllers.*.user | Unifi service user name.
|
| services.gitlab.registry.externalPort | External port used to access registry from the internet
|
| services.icecream.daemon.openFirewall | Whether to automatically open receive port in the firewall.
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.password | |
| services.icingaweb2.modules.monitoring.transports | Command transports to define
|
| services.prometheus.exporters.mailman3.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mailman3.openFirewall
is true
|
| services.xinetd.services.*.unlisted | Whether this server is listed in
/etc/services
|
| virtualisation.fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.prometheus.exporters.snmp.configuration | Snmp exporter configuration as nix attribute set
|
| services.prometheus.exporters.collectd.collectdBinary.securityLevel | Minimum required security level for accepted packets.
|
| services.prometheus.exporters.chrony.disabledCollectors | Collectors to disable which are enabled by default
|
| services.prometheus.exporters.pve.collectors.replication | Collect PVE replication info
|
| services.mediawiki.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.buildkite-agent.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.buildkite-agent.openFirewall
is true
|
| services.prometheus.exporters.artifactory.artiPassword | Password for authentication against JFrog Artifactory API
|
| services.prometheus.exporters.storagebox.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.storagebox.openFirewall
is true
|
| services.prometheus.exporters.scaphandre.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.scaphandre.openFirewall
is true
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.username | If empty string mailaddress value is used
|
| services.prometheus.exporters.snmp.environmentFile | EnvironmentFile as defined in systemd.exec(5)
|
| services.jirafeau.nginxConfig.http2 | Whether to enable the HTTP/2 protocol
|
| services.wgautomesh.settings.upnp_forward_external_port | Public port number to try to redirect to this machine's Wireguard
daemon using UPnP IGD.
|
| services.prometheus.exporters.wireguard.wireguardConfig | Path to the Wireguard Config to
add the peer's name to the stats of a peer
|
| services.prometheus.exporters.unpoller.controllers.*.pass | Path of a file containing the password for the unifi service user
|
| services.pangolin.openFirewall | Whether to enable opening TCP ports 80 and 443, and UDP port 51820 in the firewall for the Pangolin service(s).
|
| services.prometheus.exporters.snmp.configurationPath | Path to a snmp exporter configuration file
|
| services.prometheus.exporters.artifactory.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.artifactory.openFirewall is true.
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.amule.openExternalConnectPort | Whether to enable open the external connect port.
|
| services.mailpit.instances.<name>.smtp | SMTP bind interface and port.
|
| services.grafana_reporter.enable | Whether to enable grafana_reporter.
|
| services.prometheus.exporters.mail.configuration.servers.*.to | Content of 'To' Header for probing mails.
|
| services.prometheus.exporters.idrac.configuration | Configuration for iDRAC exporter, as a nix attribute set
|
| services.prometheus.exporters.opnsense.opnsenseServerProtocol | Opnsense metrics scraper protocol to use
|
| services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.prometheus.exporters.wireguard.latestHandshakeDelay | Adds the wireguard_latest_handshake_delay_seconds metric that automatically calculates the seconds passed since the last handshake.
|
| services.librechat.openFirewall | Whether to open the port in the firewall.
|
| services.prometheus.exporters.unpoller.controllers.*.sites | List of site names for which statistics should be exported
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.extraArguments | Extra arguments to pass to ghostunnel server
|
| services.immich-public-proxy.openFirewall | Whether to open the IPP port in the firewall
|
| services.tailscale.openFirewall | Whether to open the firewall for the specified port.
|
| services.navidrome.openFirewall | Whether to open the TCP port in the firewall
|
| services.prometheus.exporters.junos-czerwonk.environmentFile | File containing env-vars to be substituted into the exporter's config.
|
| services.prometheus.exporters.mail.configuration.servers.*.from | Content of 'From' Header for probing mails.
|
| services.fedimintd.<name>.nginx.config.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.wstunnel.clients.<name>.addNetBind | Whether to enable Whether add CAP_NET_BIND_SERVICE to the tunnel service, this should be enabled if you want to bind port < 1024.
|
| services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| services.prometheus.exporters.mail.configuration.servers.*.name | Value for label 'configname' which will be added to all metrics.
|
| services.prometheus.exporters.tailscale.environmentFile | Environment file containg at least the TAILSCALE_TAILNET,
TAILSCALE_OAUTH_CLIENT_ID, and TAILSCALE_OAUTH_CLIENT_SECRET
environment variables.
|
| services.overseerr.openFirewall | Open a port in the firewall for the Overseerr web interface.
|
| services.netbird.server.management.turnPort | The port of the TURN server to use.
|
| services.prometheus.exporters.dnssec.configuration | dnssec exporter configuration as nix attribute set
|
| services.prometheus.exporters.modemmanager.refreshRate | How frequently ModemManager will refresh the extended signal quality
information for each modem
|
| services.patroni.postgresqlPort | The port on which PostgreSQL listens.
|
| services.zeronet.fileserverPort | Zeronet fileserver port.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries | SQL queries to run.
|
| power.ups.upsmon.monitor.<name>.system | Identifier of the UPS to monitor, in this form: <upsname>[@<hostname>[:<port>]]
See upsmon.conf for details.
|
| services.prometheus.exporters.modemmanager.listenAddress | Address to listen on.
|
| services.icingaweb2.modules.monitoring.transports.<name>.type | Type of this transport
|
| services.pgbouncer.openFirewall | Whether to automatically open the specified TCP port in the firewall.
|
| services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| services.prometheus.exporters.rasdaemon.enabledCollectors | List of error types to collect from the event database.
|
| networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| services.icingaweb2.modules.monitoring.transports.<name>.host | Host for the api or remote transport
|
| services.local-content-share.openFirewall | Whether to automatically open the specified port in the firewall
|
| services.jellyfin.openFirewall | Open the default ports in the firewall for the media server
|
| services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| services.pulseaudio.tcp.openFirewall | Whether to enable Open firewall for the specified port.
|
| services.prometheus.exporters.artifactory.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.artifactory.openFirewall
is true
|
| services.onlyoffice.examplePort | Port the OnlyOffice example server should listen on.
|
| services.nginx.virtualHosts.<name>.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| services.icecream.scheduler.openTelnet | Whether to open the telnet TCP port on 8766.
|
| services.prometheus.exporters.mail.configuration.mailCheckTimeout | Timeout until mails are considered "didn't make it".
|
| services.prometheus.exporters.mail.configuration.servers.*.server | Hostname of the server that should be probed.
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.fail2ban.jails | The configuration of each Fail2ban “jail”
|
| services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| services.dockerRegistry.openFirewall | Opens the port used by the firewall.
|
| services.fedimintd.<name>.nginx.path_ws | Path to host the API on and forward to the daemon's api port
|
| services.prometheus.exporters.modemmanager.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.modemmanager.openFirewall is true.
|
| services.pixiecore.openFirewall | Open ports (67, 69, 4011 UDP and 'port', 'statusPort' TCP) in the firewall for Pixiecore.
|
| services.hologram-server.listenAddress | Address and port to listen on
|
| services.limesurvey.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.limesurvey.httpd.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.home-assistant.openFirewall | Whether to open the firewall for the specified port.
|
| services.fedimintd.<name>.nginx.path_ui | Path to host the built-in UI on and forward to the daemon's api port
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.interval | How often to run this job, specified in
Go duration format.
|
| services.misskey.database.createLocally | Create the PostgreSQL database locally
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| services.wstunnel.clients.<name>.connectTo | Server address and port to connect to.
|
| services.neo4j.http.advertisedAddress | Neo4j advertised address for HTTP traffic
|
| services.neo4j.bolt.advertisedAddress | Neo4j advertised address for BOLT traffic
|
| services.mysql.replication.masterPort | Port number on which the MySQL master server runs.
|
| services.limesurvey.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help | A human-readable description of this metric.
|
| services.grafana_reporter.grafana.protocol | Grafana protocol.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action | Action to perform after a CHILD_SA gets closed by the peer.
- The default of
none does not take any action,
trap installs a trap policy for the CHILD_SA.
start tries to re-create the CHILD_SA.
close_action does not provide any guarantee that the
CHILD_SA is kept alive
|
| services.tor.relay.role | Your role in Tor network
|
| services.suwayomi-server.openFirewall | Whether to open the firewall for the port in services.suwayomi-server.settings.server.port.
|
| services.prometheus.exporters.ecoflow.mqttDeviceOfflineThreshold | The threshold in seconds which indicates how long we should wait for a metric message from MQTT broker
|
| services.meilisearch.listenPort | The port that Meilisearch will listen on.
|
| services.tmate-ssh-server.advertisedPort | External port advertised to clients
|
| services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| services.invidious.sig-helper.listenAddress | The IP address/port where inv-sig-helper should listen.
|
| services.prometheus.exporters.unpoller.controllers.*.save_ids | Collect and save data from the intrusion detection system to influxdb and Loki.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query | The SQL query to run.
|
| services.mailpit.instances.<name>.listen | HTTP bind interface and port for UI.
|
| services.tailscale.derper.openFirewall | Whether to open the firewall for the specified port
|
| services.icingaweb2.modules.monitoring.mutableTransports | Make commandtransports.ini of the monitoring module mutable (e.g. via the web interface).
|
| nix.buildMachines.*.supportedFeatures | A list of features supported by this builder
|
| services.prometheus.exporters.unpoller.controllers.*.hash_pii | Hash, with md5, client names and MAC addresses
|
| services.prometheus.exporters.modemmanager.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.modemmanager.openFirewall
is true
|
| services.fedimintd.<name>.ui.openFirewall | Opens TCP port in firewall for built-in UI
|
| services.misskey.reverseProxy.webserver.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.changedetection-io.webDriverSupport | Enable support for fetching web pages using WebDriver and Chromium
|
| services.prometheus.exporters.mikrotik.configuration | Mikrotik exporter configuration as nix attribute set
|
| services.prometheus.exporters.unpoller.controllers.*.save_dpi | Collect and save data from deep packet inspection
|
| services.neo4j.https.advertisedAddress | Neo4j advertised address for HTTPS traffic
|
| services.moosefs.cgiserver.openFirewall | Whether to automatically open the web interface port.
|
| services.grafana_reporter.templateDir | Optional template directory to use custom tex templates
|
| services.zoneminder.openFirewall | Open the firewall port(s).
|
| services.prometheus.exporters.dmarc.deduplicationMaxSeconds | How long individual report IDs will be remembered to avoid
counting double delivered reports twice.
|
| services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| services.prometheus.exporters.postgres.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.gokapi.environment.GOKAPI_PORT | Sets the port of the service.
|
| networking.firewall.rejectPackets | If set, refused packets are rejected rather than dropped
(ignored)
|
| services.linkwarden.openFirewall | Whether to open the Linkwarden port in the firewall
|
| services.prometheus.exporters.imap-mailstat.configurationFile | File containing the configuration
|
| services.klipper.firmwares.<name>.serial | Path to serial port this printer is connected to
|
| services.teamspeak3.queryPort | TCP port opened for ServerQuery connections using the raw telnet protocol.
|
| boot.initrd.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| services.wordpress.sites.<name>.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.lighthouse.beacon.openFirewall | Open the port in the firewall
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels | A set of columns that will be used as Prometheus labels.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values | A set of columns that will be used as values of this metric.
|
| services.jellyseerr.openFirewall | Open port in the firewall for the Jellyseerr web interface.
|
| services.szurubooru.openFirewall | Whether to open the firewall for the port in services.szurubooru.server.port.
|
| services.taskserver.openFirewall | Whether to open the firewall for the specified Taskserver port.
|
| services.wgautomesh.openFirewall | Automatically open gossip port in firewall (recommended).
|
| services.prometheus.exporters.junos-czerwonk.configuration | JunOS exporter configuration as nix attribute set
|
| services.fedimintd.<name>.nginx.config.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.mailaddress | Your email address (at the moment used as login name)
|
| services.teamspeak3.querySshPort | TCP port opened for ServerQuery connections using the SSH protocol.
|
| services.cassandra.allowClients | Enables or disables the native transport server (CQL binary protocol)
|
| services.homepage-dashboard.listenPort | Port for Homepage to bind to.
|
| nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| virtualisation.lxd.zfsSupport | Enables lxd to use zfs as a storage for containers
|
| services.prometheus.exporters.mail.configuration.disableFileDeletion | Disables the exporter's function to delete probing mails.
|
| services.prometheus.exporters.junos-czerwonk.configurationFile | Specify the JunOS exporter configuration file to use.
|
| services.SystemdJournal2Gelf.graylogServer | Host and port of your graylog2 input
|
| programs.sharing.enable | Whether to enable sharing, a CLI tool for sharing files
|
| services.pgpkeyserver-lite.hkpPort | Which port the sks-keyserver is listening on.
|
| services.netbird.server.management.metricsPort | Internal port of the metrics server.
|
| services.pantalaimon-headless.instances.<name>.listenPort | The port where the daemon will listen to client connections for
this homeserver
|
| services.icingaweb2.modules.monitoring.transports.<name>.password | Password for the api transport
|
| boot.supportedFilesystems | Names of supported filesystem types, or an attribute set of file system types
and their state
|
| services.icingaweb2.modules.monitoring.transports.<name>.username | Username for the api or remote transport
|
| services.icingaweb2.modules.monitoring.transports.<name>.instance | Assign a icinga instance to this transport
|
| services.gotosocial.openFirewall | Open the configured port in the firewall
|
| services.reposilite.openFirewall | Whether to open the firewall ports for Reposilite
|
| services.icingaweb2.modules.monitoring.transports.<name>.resource | SSH identity resource for the remote transport
|
| services.limesurvey.nginx.virtualHost.http2 | Whether to enable the HTTP/2 protocol
|
| services.teamspeak3.queryHttpPort | TCP port opened for ServerQuery connections using the HTTP protocol.
|
| services.grafana.settings.security.strict_transport_security | Set to true if you want to enable HTTP Strict-Transport-Security (HSTS) response header
|
| services.prometheus.exporters.unpoller.controllers.*.save_sites | Collect and save site data.
|
| services.prometheus.exporters.unpoller.controllers.*.verify_ssl | Verify the Unifi controller's certificate.
|
| services.icecream.scheduler.openFirewall | Whether to automatically open the daemon port in the firewall.
|
| hardware.amdgpu.amdvlk.supportExperimental.enable | Whether to enable Experimental features support.
|
| services.cassandra.rpcAddress | The address or interface to bind the native transport server to
|
| services.prometheus.exporters.mail.configuration.servers.*.detectionDir | Directory in which new mails for the exporter user are placed
|
| services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| services.misskey.reverseProxy.webserver.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.silverbullet.listenPort | Port to listen on.
|
| services.ghostunnel.servers.<name>.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| services.prometheus.exporters.sql.configuration.jobs.<name>.connections | A list of connection strings of the SQL servers to scrape metrics from
|
| services.kubernetes.apiserver.securePort | Kubernetes apiserver secure port.
|
| networking.nat.forwardPorts.*.destination | Forward connection to destination ip:port (or [ipv6]:port); to specify a port range, use ip:start-end
|
| services.netbird.clients.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| services.varnish.http_address | HTTP listen address and port.
|
| services.fedimintd.<name>.api_ws.openFirewall | Opens TCP port in firewall for fedimintd's Websocket API
|
| services.prometheus.exporters.unpoller.controllers.*.save_events | Collect and save data from UniFi events to influxdb and Loki.
|
| services.prometheus.exporters.unpoller.controllers.*.save_alarms | Collect and save data from UniFi alarms to influxdb and Loki.
|
| services.firezone.server.openClusterFirewall | Opens up the erlang distribution port of all enabled components to
allow reaching the server cluster from the internet
|
| services.prometheus.exporters.mail.configuration.monitoringInterval | Time interval between two probe attempts.
|
| services.spacecookie.openFirewall | Whether to open the necessary port in the firewall for spacecookie.
|
| services.grafana.settings.security.disable_initial_admin_creation | Disable creation of admin user on first start of Grafana.
|
| services.tahoe.introducers.<name>.tub.location | The external location that the introducer should listen on
|
| services.hadoop.yarn.nodemanager.openFirewall | Open firewall ports for nodemanager
|
| services.blendfarm.serverConfig.BroadcastPort | Default port blendfarm server advertises itself on.
|
| services.dragonflydb.memcachePort | To enable memcached compatible API on this port.
null means disabled.
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.serveraddress | mailserver name or address
|
| services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| services.netbird.clients | Attribute set of NetBird client daemons, by default each one will:
- be manageable using dedicated tooling:
netbird-<name> script,
NetBird - netbird-<name> graphical interface when appropriate (see ui.enable),
- run as a
netbird-<name>.service,
- listen for incoming remote connections on the port
51820 (openFirewall by default),
- manage the
netbird-<name> wireguard interface,
- use the /var/lib/netbird-/config.json configuration file,
- override /var/lib/netbird-/config.json with values from /etc/netbird-/config.d/*.json,
- (
hardened) be locally manageable by netbird-<name> system group,
With following caveats:
- multiple daemons will interfere with each other's DNS resolution of
netbird.cloud, but
should remain fully operational otherwise
|
| programs.coolercontrol.nvidiaSupport | Enable support for Nvidia GPUs.
|
| services.changedetection-io.playwrightSupport | Enable support for fetching web pages using playwright and Chromium
|
| services.nsd.zones.<name>.outgoingInterface | This address will be used for zone-transfer requests if configured
as a secondary server or notifications in case of a primary server
|
| services.i2pd.outTunnels.<name>.destinationPort | Connect to particular port at destination.
|
| services.adguardhome.openFirewall | Open ports in the firewall for the AdGuard Home web interface
|
| services.prosody.modules.admin_telnet | Opens telnet console interface on localhost port 5582
|
| services.kanidm.serverSettings.bindaddress | Address/port combination the webserver binds to.
|
| services.shibboleth-sp.fastcgi.shibResponderPort | Port for shibauthorizer FastCGI process to bind to
|
| security.agnos.settings.dns_listen_addr | Address for agnos to listen on
|
| services.misskey.meilisearch.createLocally | Create and use a local Meilisearch instance
|
| services.silverbullet.openFirewall | Open port in the firewall.
|
| networking.fooOverUDP.<name>.local | Local address (and optionally device) to bind to using the given port.
|
| services.flaresolverr.openFirewall | Open the port in the firewall for FlareSolverr.
|
| hardware.infiniband.guids | A list of infiniband port guids on the system
|
| services.nextcloud.notify_push.dbhost | Database host (+port) or socket path
|
| services.teamspeak3.fileTransferPort | TCP port opened for file transfers.
|
| services.blockbook-frontend.<name>.public | Public http server binding [address]:port.
|
| services.thanos.rule.alertmanagers.urls | Alertmanager replica URLs to push firing alerts
|
| services.postfix.enableSubmission | Whether to enable the `submission` service configured in master.cf
|
| services.postfix.enableSubmissions | Whether to enable the submissions service configured in master.cf
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| services.fedimintd.<name>.api_iroh.openFirewall | Opens UDP port in firewall for fedimintd's API Iroh endpoint
|
| services.kubernetes.apiserverAddress | Clusterwide accessible address for the kubernetes apiserver,
including protocol and optional port.
|
| boot.initrd.luks.mitigateDMAAttacks | Unless enabled, encryption keys can be easily recovered by an attacker with physical
access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port
|
| networking.networkmanager.ensureProfiles.profiles | Declaratively define NetworkManager profiles
|
| services.foundationdb.publicAddress | Publicly visible IP address of the process
|
| services.foundationdb.listenAddress | Publicly visible IP address of the process
|
| virtualisation.forwardPorts.*.from | Controls the direction in which the ports are mapped:
"host" means traffic from the host ports
is forwarded to the given guest port.
"guest" means traffic from the guest ports
is forwarded to the given host port.
|
| services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| services.shibboleth-sp.fastcgi.shibAuthorizerPort | Port for shibauthorizer FastCGI process to bind to
|
| services.autossh.sessions.*.monitoringPort | Port to be used by AutoSSH for peer monitoring
|
| services.prometheus.exporters.unpoller.controllers.*.save_anomalies | Collect and save data from UniFi anomalies to influxdb and Loki.
|
| services.matrix-synapse.workers | Options for configuring workers
|
| services.multipath.devices.*.fast_io_fail_tmo | Specify the number of seconds the SCSI layer will wait after a problem has been
detected on a FC remote port before failing I/O to devices on that remote port
|
| services.kubernetes.controllerManager.securePort | Kubernetes controller manager secure listening port.
|
| services.blockbook-frontend.<name>.internal | Internal http server binding [address]:port.
|
| programs.localsend.openFirewall | Whether to enable opening the firewall port 53317 for receiving files.
|
| services.librenms.distributedPoller.rrdcachedPort | Port of the memcached server.
|
| services.librenms.distributedPoller.memcachedPort | Port of the memcached server.
|
| nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| services.taskchampion-sync-server.openFirewall | Whether to enable Open firewall port for taskchampion-sync-server.
|
| services.static-web-server.configuration | Configuration for Static Web Server
|
| networking.jool.siit | Definitions of SIIT instances of Jool
|
| programs.kdeconnect.enable | Whether to enable kdeconnect
|
| networking.vswitches.<name>.supportedOpenFlowVersions | Supported versions to enable on this switch.
|
| services.prometheus.alertmanager.openFirewall | Open port in firewall for incoming connections.
|
| services.armagetronad.servers.<name>.openFirewall | Set to true to open the configured UDP port for Armagetron Advanced.
|
| networking.jool.nat64 | Definitions of NAT64 instances of Jool
|
| networking.rxe.interfaces | Enable RDMA on the listed interfaces
|
| services.changedetection-io.chromePort | A free port on which webDriverSupport or playwrightSupport listen on localhost.
|
| services.headscale.settings.tls_letsencrypt_listen | When HTTP-01 challenge is chosen, letsencrypt must set up a
verification endpoint, and it will be listening on:
:http = port 80.
|
| services.grafana.settings.security.strict_transport_security_preload | Set to true to enable HSTS preloading option
|
| services.prometheus.alertmanagerGotify.openFirewall | Opens the bridge port in the firewall.
|
| services.redsocks.redsocks.*.redirectCondition | Conditions to make outbound packets go through this redsocks
instance
|
| services.kanidm.serverSettings.ldapbindaddress | Address and port the LDAP server is bound to
|
| services.grafana.settings.security.content_security_policy_report_only | Set to true to add the Content-Security-Policy-Report-Only header to your requests
|
| services.multipath.devices.*.dev_loss_tmo | Specify the number of seconds the SCSI layer will wait after a problem has
been detected on a FC remote port before removing it from the system
|
| services.grafana.settings.security.strict_transport_security_subdomains | Set to true to enable HSTS includeSubDomains option
|
| networking.wg-quick.interfaces.<name>.listenPort | 16-bit port for listening
|
| security.agnos.temporarilyOpenFirewall | When true, will open the port specified in settings.dns_listen_addr
before running the agnos service, and close it when agnos finishes running.
|
| services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| services.grafana.settings.security.strict_transport_security_max_age_seconds | Sets how long a browser should cache HSTS in seconds
|
| networking.resolvconf.dnsSingleRequest | Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)
address queries at the same time, from the same port
|
| containers.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| virtualisation.podman.networkSocket.openFirewall | Whether to open the port in the firewall.
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| networking.sits.<name>.encapsulation.sourcePort | Source port when using UDP encapsulation
|
| containers.<name>.forwardPorts | List of forwarded ports from host to container
|
| services.borgmatic.configurations.<name>.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| containers.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort | Source port of the external interface on host
|
| containers.<name>.privateNetwork | Whether to give the container its own private virtual
Ethernet interface
|
| containers.<name>.forwardPorts.*.containerPort | Target port of container
|
| containers.<name>.extraVeths.<name>.forwardPorts | List of forwarded ports from host to container
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.protocol | The protocol specifier for port forwarding between host and container
|
| containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort | Target port of container
|