| systemd.user.sockets.<name>.conflicts | If the specified units are started, then this unit is stopped
and vice versa.
|
| services.frigate.settings | Frigate configuration as a nix attribute set
|
| services.webdav.settings | Attrset that is converted and passed as config file
|
| systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| services.xrdp.sslKey | ssl private key path
A self-signed certificate will be generated if file not exists.
|
| systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| services.xserver.windowManager.exwm.extraPackages | Extra packages available to Emacs
|
| services.gerrit.jvmPackage | The jdk21_headless package to use.
|
| services.wasabibackend.rpc.user | RPC user for the bitcoin endpoint.
|
| services.dex.enable | Whether to enable the OpenID Connect and OAuth2 identity provider.
|
| services.mautrix-signal.environmentFile | File containing environment variables to be passed to the mautrix-signal service
|
| services.yggdrasil-jumper.retrieveListenAddresses | Automatically retrieve listen addresses from the Yggdrasil router configuration
|
| services.frigate.package | The frigate package to use.
|
| virtualisation.xen.store.settings.quota.transaction | Maximum number of transactions.
|
| services.jirafeau.nginxConfig.locations.<name>.root | Root directory for requests.
|
| services.lasuite-meet.settings.LIVEKIT_API_URL | URL to the livekit server
|
| services.zammad.redis.createLocally | Whether to create a local redis automatically.
|
| systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| systemd.services.<name>.confinement.enable | If set, all the required runtime store paths for this service are
bind-mounted into a tmpfs-based
chroot(2).
|
| virtualisation.docker.daemon.settings | Configuration for docker daemon
|
| systemd.timers.<name>.partOf | If the specified units are stopped or restarted, then this
unit is stopped or restarted as well.
|
| services.unpoller.influxdb.verify_ssl | Verify the influxdb's certificate.
|
| services.vault.extraConfig | Extra text appended to vault.hcl.
|
| services.xserver.videoDriver | The name of the video driver for your graphics card
|
| xdg.mime.removedAssociations | Removes associations between mimetypes and applications
|
| services.dnscrypt-proxy.settings | Attrset that is converted and passed as TOML config file
|
| virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| system.nixos-init.package | The nixos-init package to use.
|
| services.wordpress.sites.<name>.virtualHost.globalRedirect | If set, all requests for this host are redirected permanently to
the given URL.
|
| services.zabbixWeb.enable | Whether to enable the Zabbix web interface.
|
| services.wordpress.sites.<name>.database.tablePrefix | The $table_prefix is the value placed in the front of your database tables
|
| systemd.mounts.*.after | If the specified units are started at the same time as
this unit, delay this unit until they have started.
|
| services.postsrsd.user | User for the daemon
|
| services.kubernetes.apiserver.tlsCertFile | Kubernetes apiserver certificate file.
|
| services.zabbixWeb.nginx.virtualHost | Nginx configuration can be done by adapting services.nginx.virtualHosts.<name>
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.frr.zebra.extraOptions | Extra options to be appended to the FRR zebra daemon options.
|
| services.mautrix-signal.enable | Whether to enable mautrix-signal, a Matrix-Signal puppeting bridge.
|
| systemd.user.sockets.<name>.restartTriggers | An arbitrary list of items such as derivations
|
| services.nghttpx.extraConfig | Extra configuration options to be appended to the generated
configuration file.
|
| systemd.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| users.motdFile | A file containing the message of the day shown to users when they log in.
|
| services.nghttpx.backends.*.params.affinity | If "ip" is given, client IP based session affinity is
enabled
|
| services.zammad.host | Host address.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| services.home-assistant.extraComponents | List of components that have their dependencies included in the package
|
| services.lasuite-meet.settings.CELERY_BROKER_URL | URL of the redis backend for celery
|
| services.xserver.desktopManager.phosh.enable | Enable the Phone Shell.
|
| virtualisation.installBootLoader | Install boot loader to target image
|
| services.unpoller.poller.quiet | Turns off per-interval logs
|
| services.workout-tracker.settings | Extra config options.
|
| systemd.user.sockets.<name>.unitConfig | Each attribute in this set specifies an option in the
[Unit] section of the unit
|
| nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| services.jirafeau.nginxConfig.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.rke2.gracefulNodeShutdown.enable | Whether to enable graceful node shutdowns where the kubelet attempts to detect
node system shutdown and terminates pods running on the node
|
| services.waagent.settings.ResourceDisk.FileSystem | The file system type for the resource disk
|
| services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| services.zabbixProxy.database.socket | Path to the unix socket file to use for authentication.
|
| xdg.sounds.enable | Whether to install files to support the
XDG Sound Theme specification.
|
| services.zabbixWeb.nginx.virtualHost.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| services.stash.username | Username for login.
|
| services.lasuite-docs.settings.DB_NAME | Name of the database
|
| services.zammad.redis.host | Redis server address.
|
| virtualisation.podman.autoPrune.enable | Whether to periodically prune Podman resources
|
| services.xandikos.port | The port of the Xandikos web application
|
| systemd.network.networks.<name>.qdiscConfig | Each attribute in this set specifies an option in the
[QDisc] section of the unit
|
| services.waagent.settings.OS.RootDeviceScsiTimeout | Configures the SCSI timeout in seconds on the OS disk and data drives
|
| systemd.user.targets.<name>.documentation | A list of URIs referencing documentation for this unit or its configuration.
|
| services.wyoming.openwakeword.enable | Whether to enable Wyoming protocol server for openWakeWord wake word detection system.
|
| services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| services.zabbixWeb.nginx.virtualHost.listen.*.port | Port number to listen on
|
| users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| services.unpoller.unifi.controllers | List of Unifi controllers to poll
|
| services.xserver.desktopManager.cinnamon.extraGSettingsOverridePackages | List of packages for which gsettings are overridden.
|
| services.zabbixWeb.nginx.virtualHost.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.wordpress.sites.<name>.languages | List of path(s) to respective language(s) which are copied from the 'languages' directory.
|
| virtualisation.incus.package | The incus-lts package to use.
|
| services.kubernetes.masterAddress | Clusterwide available network address or hostname for the kubernetes master server.
|
| services.varnish.package | The varnish package to use.
|
| systemd.units.<name>.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.xserver.displayManager.xserverBin | Path to the X server used by display managers.
|
| swapDevices.*.randomEncryption.cipher | Use specified cipher for randomEncryption
|
| services.uvcvideo.dynctrl.packages | List of packages containing uvcvideo dynamic controls
rules
|
| services.zabbixProxy.enable | Whether to enable the Zabbix Proxy.
|
| services.gerrit.jvmHeapLimit | How much memory to allocate to the JVM heap
|
| virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| systemd.user.paths.<name>.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| systemd.network.links.<name>.linkConfig | Each attribute in this set specifies an option in the
[Link] section of the unit
|
| systemd.services.<name>.reload | Shell commands executed when the service's main process
is reloaded.
|
| services.whisparr.settings.server.port | Port Number
|
| services.zabbixWeb.httpd.virtualHost.listen.*.ssl | Whether to enable SSL (https) support.
|
| services.veilid.settings.core.protected_store.always_use_insecure_storage | Should we bypass any attempt to use system-provided secure storage?
|
| <imports = [ pkgs.php.services.default ]> | This is a modular service, which can be imported into a NixOS configuration using the system.services option.
|
| services.wivrn.highPriority | Whether to enable high priority capability for asynchronous reprojection.
|
| services.varnish.enableConfigCheck | Whether to enable checking the config during build time.
|
| services.stash.mutableScrapers | Whether to enable Whether scrapers can be installed, updated, uninstalled manually..
|
| services.yggdrasil-jumper.settings | Configuration for Yggdrasil Jumper as a Nix attribute set.
|