| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.regex | Regular expression against which the extracted value is matched
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs | List of Azure service discovery configurations.
|
| services.paperless.settings | Extra paperless config options
|
| services.send.environment | All the available config options and their defaults can be found here: https://github.com/timvisee/send/blob/master/server/config.js,
some descriptions can found here: https://github.com/timvisee/send/blob/master/docs/docker.md#environment-variables
Values under services.send.environment will override the predefined values in the Send service.
- Time/duration should be in seconds
- Filesize values should be in bytes
|
| services.zabbixWeb.nginx.virtualHost.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs | List of Uyuni Serverset service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs | List of AirBnB's Nerve service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn | AWS Role ARN, an alternative to using AWS API keys.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.file_sd_configs.*.files | Patterns for files from which target groups are extracted
|
| services.asterisk.useTheseDefaultConfFiles | Sets these config files to the default content
|
| services.gotify.environmentFiles | Files containing additional config environment variables for gotify-server
|
| services.bcg.environmentFiles | File to load as environment file
|
| services.dashy.enable | Whether to enable Dashy, a highly customizable, easy to use, privacy-respecting dashboard app
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server | Address of the Kuma Control Plane's MADS xDS server.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values | Value of the filter.
|
| services.gerbil.environmentFile | Path to a file containing sensitive environment variables for Gerbil
|
| services.jupyterhub.kernels | Declarative kernel config
Kernels can be declared in any language that supports and has
the required dependencies to communicate with a jupyter server
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.action | Action to perform based on regex matching
|
| services.cross-seed.useGenConfigDefaults | Whether to use the option defaults from the configuration generated by
cross-seed gen-config
|
| services.kanata.keyboards.<name>.extraDefCfg | Configuration of defcfg other than linux-dev (generated
from the devices option) and
linux-continue-if-no-devs-found (hardcoded to be yes)
|
| services.zabbixWeb.httpd.virtualHost.locations | Declarative location config
|
| services.mautrix-signal.settings | config.yaml configuration as a Nix attribute set
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus | Modulus to take of the hash of the source label values.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.livekit.ingress.settings.rtc_config.port_range_end | End of UDP port range for WebRTC
|
| programs.nix-required-mounts.allowedPatterns | The hook config, describing which paths to mount for which system features
|
| services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.drupal.sites.<name>.virtualHost.locations | Declarative location config
|
| services.rathole.credentialsFile | Path to a TOML file to be merged with the settings
|
| services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| services.newt.environmentFile | Path to a file containing sensitive environment variables for Newt
|
| services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.hadoop.hbase.regionServer.restartIfChanged | Restart regionServer con config change.
|
| services.glusterfs.killMode | The systemd KillMode to use for glusterd.
glusterd spawns other daemons like gsyncd
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.borgmatic.configurations.<name>.source_directories | List of source directories and files to backup
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths | Paths can point to a single service, or the root of a tree of services.
|
| services.tinc.networks.<name>.chroot | Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security
|
| services.nextcloud-spreed-signaling.stateDir | Directory used for state & config files.
|
| services.orangefs.server.fileSystems.<name>.extraConfig | Extra config for <FileSystem> section.
|
| services.kanidm.provision.autoRemove | Determines whether deleting an entity in this provisioning config should automatically
cause them to be removed from kanidm, too
|
| services.librespeed.settings | LibreSpeed configuration written as Nix expression
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.server | The URL to connect to the Uyuni server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.k3s.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs | List of Consul service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs | List of Linode service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs | List of Eureka service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs | List of Docker service discovery configurations.
|
| services.spacecookie.settings | Settings for spacecookie
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs | List of Triton Serverset service discovery configurations.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| services.rke2.containerdConfigTemplate | Config template for containerd, to be placed at
/var/lib/rancher/rke2/agent/etc/containerd/config.toml.tmpl
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key | The AWS API key secret
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key | The AWS API key id
|
| services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| services.kmonad.keyboards.<name>.defcfg.enable | Whether to enable automatic generation of the defcfg block
|
| services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| services.librenms.environmentFile | File containing env-vars to be substituted into the final config
|
| services.borgbackup.jobs.<name>.readWritePaths | By default, borg cannot write anywhere on the system but
$HOME/.config/borg and $HOME/.cache/borg
|
| services.quickwit.restartIfChanged | Automatically restart the service on config change
|
| services.temporal.restartIfChanged | Automatically restart the service on config change
|
| services.saunafs.metalogger.settings | Contents of metalogger config file (see sfsmetalogger.cfg(5)).
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.servers | The Zookeeper servers.
|
| services.spark.worker.restartIfChanged | Automatically restart worker service on config change
|
| services.spark.master.restartIfChanged | Automatically restart master service on config change
|
| services.logrotate.settings | logrotate freeform settings: each attribute here will define its own section,
ordered by services.logrotate.settings.<name>.priority,
which can either define files to rotate with their settings
or settings common to all further files settings
|
| services.mediagoblin.pluginPackages | Plugins to add to the environment of MediaGoblin
|
| services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout | Timeout value
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host | Address of the Docker daemon.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.prometheus.scrapeConfigs.*.relabel_configs.*.separator | Separator placed between concatenated source label values
|
| services.hadoop.hdfs.zkfc.restartIfChanged | Automatically restart the service on config change
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.token | Consul token
|
| services.gokapi.environment.GOKAPI_CONFIG_DIR | Sets the directory for the config file.
|
| virtualisation.lxc.systemConfig | This is the system-wide LXC config
|
| virtualisation.lxc.bridgeConfig | This is the config file for override lxc-net bridge default settings.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|