| users.users.<name>.uid | The account UID
|
| users.extraUsers.<name>.uid | The account UID
|
| environment.etc.<name>.uid | UID of created file
|
| boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| services.multipath.devices.*.uid_attribute | The udev attribute providing a unique path identifier (WWID)
|
| services.druid.log4j | Log4j Configuration for the druid process
|
| services.fluidd.hostName | Hostname to serve fluidd on
|
| services.mail.sendmailSetuidWrapper.setuid | Whether to add the setuid bit the wrapper program.
|
| users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| services.fluidd.nginx | Extra configuration for the nginx virtual host of fluidd.
|
| services.squid.enable | Whether to run squid web proxy.
|
| services.squid.proxyPort | TCP port on which squid will listen.
|
| containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| services.druid.broker.jdk | The JDK package to use.
|
| services.druid.router.jdk | The JDK package to use.
|
| services.squid.package | The squid package to use.
|
| services.mpd.fluidsynth | If set, add fluidsynth soundfont decoder block.
|
| services.fluidd.nginx.root | The path of the web root directory.
|
| services.druid.extraConfDirs | Extra Conf Dirs to include in the jvm
|
| services.druid.package | The apache-druid package to use.
|
| services.diod.userdb | This option disables password/group lookups
|
| services.fluidd.enable | Whether to enable Fluidd, a Klipper web interface for managing your 3d printer.
|
| services.druid.broker.jvmArgs | Arguments to pass to the JVM
|
| services.druid.router.jvmArgs | Arguments to pass to the JVM
|
| services.fluidd.package | The fluidd package to use.
|
| services.druid.commonTmpDirs | Common List of directories used by druid processes
|
| services.grafana.provision.alerting.rules.settings.deleteRules.*.uid | Unique identifier for the rule
|
| services.squid.configText | Verbatim contents of squid.conf
|
| services.nezha-agent.genUuid | Whether to generate uuid from fqdn automatically
|
| services.squid.extraConfig | Squid configuration
|
| services.druid.extraClassPaths | Extra classpath to include in the jvm
|
| services.grafana.provision.datasources.settings.datasources.*.uid | Custom UID which can be used to reference this datasource in other parts of the configuration, if not specified will be generated automatically.
|
| fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.fluidd.nginx.quic | Whether to enable the QUIC transport protocol
|
| services.druid.commonConfig | (key=value) Configuration to be written to common.runtime.properties
|
| services.multipath.devices.*.getuid_callout | (Superseded by uid_attribute) The default program and args to callout
to obtain a unique path identifier
|
| services.druid.router.enable | Whether to enable Druid Router.
|
| services.druid.broker.enable | Whether to enable Druid Broker.
|
| services.squid.proxyAddress | IP address on which squid will listen.
|
| services.fluidd.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.fluidd.nginx.listen.*.ssl | Enable SSL.
|
| services.fluidd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.druid.overlord.jdk | The JDK package to use.
|
| services.mediatomb.uuid | A unique (on your network) to identify the server by.
|
| services.fluidd.nginx.listen.*.addr | Listen address.
|
| services.fluidd.nginx.default | Makes this vhost the default.
|
| services.fluidd.nginx.kTLS | Whether to enable kTLS support
|
| users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.druid.broker.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Broker
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.druid.router.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Router
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.fluidd.nginx.serverName | Name of this virtual host
|
| services.druid.overlord.jvmArgs | Arguments to pass to the JVM
|
| services.druid.middleManager.jdk | The JDK package to use.
|
| services.fluidd.nginx.extraConfig | These lines go to the end of the vhost verbatim.
|
| security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| services.liquidsoap.streams | Set of Liquidsoap streams to start,
one systemd service per stream.
|
| services.fluidd.nginx.listen.*.port | Port number to listen on
|
| services.xtreemfs.dir.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.xtreemfs.mrc.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.xtreemfs.osd.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.squid.validateConfig | Validate config syntax.
|
| services.fluidd.nginx.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.grafana.provision.alerting.contactPoints.settings.deleteContactPoints.*.uid | Unique identifier for the receiver
|
| services.druid.middleManager.jvmArgs | Arguments to pass to the JVM
|
| services.druid.overlord.enable | Whether to enable Druid Overlord.
|
| services.fluidd.nginx.listen | Listen addresses and ports for this virtual host
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fluidd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| programs.throne.tunMode.setuid | Whether to enable setting suid bit for throne-core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| environment.etc.<name>.user | User name of file owner
|
| services.druid.overlord.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Overlord
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.fluidd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| hardware.infiniband.guids | A list of infiniband port guids on the system
|
| services.druid.broker.openFirewall | Open firewall ports for Druid Broker.
|
| services.druid.router.openFirewall | Open firewall ports for Druid Router.
|
| services.fluidd.nginx.locations | Declarative location config
|
| services.druid.middleManager.enable | Whether to enable Druid middleManager.
|
| services.druid.historical.jdk | The JDK package to use.
|
| programs.nekoray.tunMode.setuid | Whether to enable setting suid bit for nekobox_core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| services.fluidd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.fluidd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| networking.dhcpcd.allowSetuid | Whether to relax the security sandbox to allow running setuid
binaries (e.g. sudo) in the dhcpcd hooks.
|
| services.thermald.ignoreCpuidCheck | Whether to ignore the cpuid check to allow running on unsupported platforms
|
| services.fluidd.nginx.reuseport | Create an individual listening socket
|
| services.druid.middleManager.config | (key=value) Configuration to be written to runtime.properties of the druid Druid middleManager
https://druid.apache.org/docs/latest/configuration/index.html
|
| boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.druid.historical.jvmArgs | Arguments to pass to the JVM
|
| security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| services.fluidd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| services.druid.coordinator.jdk | The JDK package to use.
|
| programs.atop.setuidWrapper.enable | Whether to install a setuid wrapper for Atop
|
| services.druid.historical.enable | Whether to enable Druid Historical.
|
| services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.druid.overlord.openFirewall | Open firewall ports for Druid Overlord.
|
| services.nezha-agent.settings.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.fluidd.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| services.fluidd.nginx.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.druid.coordinator.jvmArgs | Arguments to pass to the JVM
|
| services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| services.mail.sendmailSetuidWrapper.owner | The owner of the wrapper program.
|
| services.mail.sendmailSetuidWrapper.group | The group of the wrapper program.
|
| services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.druid.middleManager.openFirewall | Open firewall ports for Druid middleManager.
|
| programs.singularity.enableSuid | Whether to enable the SUID support of Singularity/Apptainer.
|
| services.gmediarender.uuid | A UUID for uniquely identifying the endpoint
|
| services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.mail.sendmailSetuidWrapper.enable | Whether to enable the wrapper.
|
| services.fluidd.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.druid.coordinator.enable | Whether to enable Druid Coordinator.
|
| services.mail.sendmailSetuidWrapper.source | The absolute path to the program to be wrapped.
|
| services.fluidd.nginx.sslCertificate | Path to server SSL certificate.
|
| services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.mail.sendmailSetuidWrapper.setgid | Whether to add the setgid bit the wrapper program.
|
| services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| services.slurm.user | Set this option when you want to run the slurmctld daemon
as something else than the default slurm user "slurm"
|
| services.druid.historical.openFirewall | Open firewall ports for Druid Historical.
|
| security.chromiumSuidSandbox.enable | Whether to install the Chromium SUID sandbox which is an executable that
Chromium may use in order to achieve sandboxing
|
| services.fluidd.nginx.listen.*.extraParameters | Extra parameters of this listen directive.
|
| services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| services.druid.coordinator.openFirewall | Open firewall ports for Druid Coordinator.
|
| services.druid.overlord.restartIfChanged | Automatically restart the service on config change
|
| virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| services.fluidd.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.druid.middleManager.restartIfChanged | Automatically restart the service on config change
|
| services.druid.historical.segmentLocations | Locations where the historical will store its data.
|
| services.druid.historical.segmentLocations.*.path | the path to store the segments
|
| services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.druid.historical.restartIfChanged | Automatically restart the service on config change
|
| services.druid.historical.segmentLocations.*.maxSize | Max size the druid historical can occupy
|
| services.mpd.extraConfig | Extra directives added to to the end of MPD's configuration file,
mpd.conf
|
| users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| services.mail.sendmailSetuidWrapper.permissions | The permissions of the wrapper program
|
| services.druid.coordinator.restartIfChanged | Automatically restart the service on config change
|
| virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.druid.historical.segmentLocations.*.freeSpacePercent | Druid Historical will fail to write if it exceeds this value
|
| services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| services.mollysocket.settings.allowed_uuids | UUIDs of Signal accounts that may use this server
|
| services.mail.sendmailSetuidWrapper.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| services.firefox-syncserver.enable | Whether to enable the Firefox Sync storage service
|
| services.chhoto-url.settings.try_longer_slugs | Whether to try a longer UID upon collision.
|
| virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| services.filesender.settings.admin | UIDs (as per the configured saml_uid_attribute) of FileSender administrators
|
| security.isolate.firstUid | Start of block of UIDs reserved for sandboxes.
|
| security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.isolate.numBoxes | Number of UIDs and GIDs to reserve, starting from
firstUid and firstGid.
|
| services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| programs.benchexec.users | Users that intend to use BenchExec
|
| services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| services.grafana.provision.alerting.templates.settings.deleteTemplates | List of alert rule UIDs that should be deleted.
|