| services.mailman.ldap.attrMap.lastName | LDAP-attribute that corresponds to the lastName-attribute in mailman.
|
| services.ocsinventory-agent.settings.ca | Path to CA certificates file in PEM format, for server
SSL certificate validation.
|
| services.open-webui.port | Which port the Open-WebUI server listens to.
|
| services.pretalx.settings.database.name | Database name.
|
| services.opkssh.authorizations.*.principal | Principal identifier (email, repo, etc.)
|
| services.maddy.hostname | Hostname to use
|
| services.prometheus.exporters.systemd.port | Port to listen on.
|
| services.nitter.preferences.muteVideos | Mute videos by default.
|
| services.prometheus.scrapeConfigs.*.file_sd_configs.*.files | Patterns for files from which target groups are extracted
|
| services.prometheus.alertmanagerWebhookLogger.extraFlags | Extra command line options to pass to alertmanager-webhook-logger.
|
| services.thanos.compact.stateDir | Data directory relative to /var/lib
in which to cache blocks and process compactions.
|
| services.system76-scheduler.settings.processScheduler.foregroundBoost.background.ioClass | IO scheduler class.
|
| services.mailhog.smtpPort | Port on which the SMTP endpoint will listen.
|
| services.mailman.packageSet | The mailmanPackages package to use.
|
| services.prometheus.exporters.ecoflow.enable | Whether to enable the prometheus ecoflow exporter.
|
| services.tlp.extraConfig | Verbatim additional configuration variables for TLP
|
| services.mautrix-discord.serviceDependencies | List of Systemd services to require and wait for when starting the application service.
|
| services.typesense.package | The typesense package to use.
|
| services.mediatomb.tg100Support | Whether to enable Telegent TG100 specific tweaks.
|
| services.navidrome.settings | Configuration for Navidrome, see https://www.navidrome.org/docs/usage/configuration-options/ for supported values.
|
| services.lokinet.settings.network.keyfile | The private key to persist address with
|
| services.thanos.receive.objstore.config | Object store configuration
|
| services.nextcloud.settings.mail_from_address | FROM address that overrides the built-in sharing-noreply and lostpassword-noreply FROM addresses
|
| services.prowlarr.dataDir | The directory where Prowlarr stores its data files
|
| services.redmine.port | Port on which Redmine is ran.
|
| services.roundcube.enable | Whether to enable roundcube
|
| services.rspamd-trainer.enable | Whether to enable Spam/ham trainer for rspamd.
|
| services.sogo.language | Language of SOGo
|
| services.spark.master.bind | Address the spark master binds to.
|
| services.tor.client.socksListenAddress | Bind to this address to listen for connections from
Socks-speaking applications.
|
| services.lifecycled.enable | Whether to enable lifecycled, a daemon for responding to AWS AutoScaling Lifecycle Hooks.
|
| services.misskey.reverseProxy.webserver.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.redmine.components.mercurial | Whether to enable Mercurial integration..
|
| services.taler.settings.taler.CURRENCY | The currency which taler services will operate with
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port | The port to scrape metrics from
|
| services.tor.settings.ControlPortWriteToFile | See torrc manual.
|
| services.searx.redisCreateLocally | Configure a local Redis server for SearXNG
|
| services.plex.package | The plex package to use
|
| services.quicktun.<name>.localPort | Local UDP port.
|
| services.tailscale.derper.package | The derper package to use.
|
| services.prometheus.exporters.nvidia-gpu.enable | Whether to enable the prometheus nvidia-gpu exporter.
|
| services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| services.mainsail.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.nextcloud.settings.mail_smtpauth | This depends on mail_smtpmode
|
| services.nomad.extraSettingsPaths | Additional settings paths used to configure nomad
|
| services.oauth2-proxy.nginx.proxy | The address of the reverse proxy endpoint for oauth2-proxy
|
| services.redlib.settings | See GitHub for available settings.
|
| services.scollector.group | Group account under which scollector runs.
|
| services.prometheus.exporters.bird.newMetricFormat | Enable the new more-generic metric format.
|
| services.mainsail.nginx.listen.*.ssl | Enable SSL.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter | Specify a name filter (works as a LIKE) to apply on the server listing request.
|
| services.nextcloud.config.objectstore.s3.verify_bucket_exists | Create the objectstore bucket if it does not exist.
|
| services.nipap.enable | Whether to enable global Neat IP Address Planner (NIPAP) configuration.
|
| services.mtr-exporter.jobs | List of MTR jobs
|
| services.nsd.zones.<name>.data | The actual zone data
|
| services.outline.smtp.replyEmail | Reply address in outgoing mail.
|
| services.postfix-tlspol.enable | Whether to enable postfix-tlspol.
|
| services.tarsnap.archives.<name>.verylowmem | Reduce memory consumption by a factor of 2 beyond what
lowmem does, at the cost of significantly
slowing down the archiving process.
|
| services.rustus.log_level | Desired log level
|
| services.sickbeard.dataDir | Path where to store data files.
|
| services.thinkfan.levels | [LEVEL LOW HIGH]
LEVEL is the fan level to use: it can be an integer (0-7 with thinkpad_acpi),
"level auto" (to keep the default firmware behavior), "level full-speed" or
"level disengaged" (to run the fan as fast as possible)
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.prometheus.exporters.kea.extraFlags | Extra commandline options to pass to the kea exporter.
|
| services.netbird.server.enable | Whether to enable Netbird Server stack, comprising the dashboard, management API and signal service.
|
| services.system76-scheduler.useStockConfig | Use the (reasonable and featureful) stock configuration
|
| services.restic.backups.<name>.timerConfig | When to run the backup
|
| services.nifi.user | User account where Apache NiFi runs.
|
| services.listmonk.settings | Static settings set in the config.toml, see https://github.com/knadh/listmonk/blob/master/config.toml.sample for details
|
| services.pixiecore.extraArguments | Additional command line arguments to pass to Pixiecore
|
| services.shoko.webui | The shoko-webui package to use.
|
| services.prosody.modules.admin_telnet | Opens telnet console interface on localhost port 5582
|
| services.radicle.ci.broker.settings.triggers.*.filters | Trigger filter.
|
| services.thanos.compact.consistency-delay | Minimum age of fresh (non-compacted) blocks before they are being
processed
|
| services.postfix.settings.master.<name>.maxproc | The maximum number of processes to spawn for this service
|
| services.matrix-appservice-discord.settings | config.yaml configuration as a Nix attribute set
|
| services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| services.shairport-sync.package | The shairport-sync package to use.
|
| services.trilium-server.nginx.hostName | The hostname use to setup the virtualhost configuration
|
| services.mame.hostAddr | IP address of the host system
|
| services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret | Value of the PPK
|
| services.nginx.proxyTimeout | Change the proxy related timeouts in recommendedProxySettings.
|
| services.ombi.port | The port for the Ombi web interface.
|
| services.limesurvey.database.passwordFile | A file containing the password corresponding to
database.user.
|
| services.netbird.server.coturn.useAcmeCertificates | Whether to use ACME certificates corresponding to the given domain for the server.
|
| services.matrix-continuwuity.package | The matrix-continuwuity package to use.
|
| services.postfix.dnsBlacklistOverrides | contents of check_client_access for overriding dnsBlacklists
|
| services.qbittorrent.package | The qbittorrent-nox package to use.
|
| services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth
|
| services.monica.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.prometheus.exporters.tibber.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tibber.openFirewall
is true
|
| services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| services.traefik.package | The traefik package to use.
|
| services.prometheus.exporters.fritzbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| services.sshwifty.socks5PasswordFile | Path to a file containing the SOCKS5 password.
|
| services.prometheus.exporters.bitcoin.openFirewall | Open port in firewall for incoming connections.
|