| services.fluidd.nginx.reuseport | Create an individual listening socket
|
| services.monica.nginx.reuseport | Create an individual listening socket
|
| services.matomo.nginx.reuseport | Create an individual listening socket
|
| services.portunus.ldap.searchUserName | The login name of the search user
|
| services.athens.traceExporterURL | URL endpoint that traces will be sent to.
|
| services.diod.exportall | Export all file systems listed in /proc/mounts
|
| boot.loader.limine.efiSupport | Whether or not to install the limine EFI files.
|
| services.mullvad-vpn.enableEarlyBootBlocking | This option activates an additional oneshot systemd service to ensure that the mullvad daemon
will start and block traffic before any network configuration will be applied
|
| services.prometheus.exporters.exportarr-readarr.openFirewall | Open port in firewall for incoming connections.
|
| services.slskd.openFirewall | Whether to open the firewall for the soulseek network listen port (not the web interface port).
|
| services.cassandra.heapNewSize | Must be left blank or set together with heapNewSize
|
| programs.tsmClient.servers.<name>.genPasswd | Whether to enable automatic client password generation
|
| services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port | The port number used if the query type is not SRV.
|
| services.diod.exportopts | Establish a default set of export options
|
| services.prometheus.exporters.deluge.delugePort | Port where deluge server is listening.
|
| services.displayManager.ly.x11Support | Whether to enable support for X11
|
| services.prometheus.exporters.pihole.piholePort | The port Pi-Hole webinterface is reachable on
|
| boot.loader.systemd-boot.netbootxyz.sortKey | systemd-boot orders the menu entries by their sort keys,
so if you want something to appear after all the NixOS entries,
it should start with o or onwards
|
| services.prometheus.exporters.fritz.settings.devices.*.host_info | Enable extended host info for this device. Warning: This will heavily increase scrape time.
|
| services.home-assistant.config.http.server_port | The port on which to listen.
|
| boot.loader.limine.biosSupport | Whether or not to install limine for BIOS.
|
| services.hebbot.templates.report | A path to the Markdown file for the report template.
|
| services.mtr-exporter.jobs.*.address | Target address for MTR client.
|
| services.ax25.axports.<name>.window | Default window size for this interface.
|
| services.buildbot-master.pbPort | The buildmaster will listen on a TCP port of your choosing
for connections from workers
|
| services.prometheus.exporters.exportarr-radarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-lidarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-sonarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.prometheus.exporters.exportarr-bazarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| containers.<name>.restartIfChanged | Whether the container should be restarted during a NixOS
configuration switch if its definition has changed.
|
| services.portunus.dex.oidcClients | List of OIDC clients
|
| services.ax25.axports.<name>.paclen | Default maximum packet size for this interface.
|
| services.ax25.axports.<name>.enable | Whether to enable Enables the axport interface.
|
| services.documize.forcesslport | Redirect given http port number to TLS.
|
| services.prometheus.exporters.sql.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nut.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.frr.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.zfs.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kea.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.lnd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pve.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-prowlarr.openFirewall | Open port in firewall for incoming connections.
|
| services.pdns-recursor.exportHosts | Whether to export names and IP addresses defined in /etc/hosts.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote_port | Remote UDP port for IKE communication
|
| systemd.user.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| <imports = [ pkgs.php.services.default ]>.php-fpm.package | PHP package to use for php-fpm
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port | The port to scrape metrics from
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port | The port to scrape metrics from
|
| services.mattermost.mutableConfig | Whether the Mattermost config.json is writeable by Mattermost
|
| services.netbird.clients.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.netbird.tunnels.<name>.config | Additional configuration that exists before the first start and
later overrides the existing values in config.json
|
| services.prometheus.exporters.node.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ping.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.json.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bind.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.php-fpm.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ebpf.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mqtt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bird.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.snmp.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ipmi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.flow.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mail.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nats.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.knot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-bazarr.user | User name under which the exportarr-bazarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.user | User name under which the exportarr-radarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.user | User name under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-lidarr.user | User name under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.nginxlog.settings.namespaces | Namespaces to collect the metrics for
|
| xdg.portal.xdgOpenUsePortal | Sets environment variable NIXOS_XDG_OPEN_USE_PORTAL to 1
This will make xdg-open use the portal to open programs, which resolves bugs involving
programs opening inside FHS envs or with unexpected env vars set from wrappers
|
| services.nextcloud.config.objectstore.s3.sseCKeyFile | If provided this is the full path to a file that contains the key
to enable [server-side encryption with customer-provided keys][1]
(SSE-C)
|
| systemd.automounts.*.requires | Start the specified units when this unit is started, and stop
this unit when the specified units are stopped or fail.
|
| services.postfix.transport | Entries for the transport map, cf. man-page transport(5).
|
| services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| services.uptime-kuma.appriseSupport | Whether to enable apprise support for notifications.
|
| services.shairport-sync.enable | Enable the shairport-sync daemon
|
| programs.uwsm.enable | Whether to enable uwsm, which wraps standalone Wayland compositors with a set
of Systemd units on the fly
|
| services.moosefs.cgiserver.settings.PORT | Port for CGI server to listen on.
|
| services.radicle.httpd.nginx.reuseport | Create an individual listening socket
|
| services.thinkfan.smartSupport | Whether to build thinkfan with S
|
| services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.matrix-synapse.workers.<name>.worker_listeners.*.port | The port to listen for HTTP(S) requests on.
|
| services.taler.merchant.settings.merchant.PORT | Port on which the HTTP server listens.
|
| services.taler.exchange.settings.exchange.PORT | Port on which the HTTP server listens.
|
| services.prometheus.exporters.exportarr-readarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.livekit.ingress.settings.redis.address | Address or hostname and port for redis connection
|
| services.prometheus.exporters.exportarr-bazarr.group | Group under which the exportarr-bazarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-sonarr.group | Group under which the exportarr-sonarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-radarr.group | Group under which the exportarr-radarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-lidarr.group | Group under which the exportarr-lidarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-bazarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-radarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-lidarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.exportarr-sonarr.apiKeyFile | File containing the api-key.
|
| services.xserver.displayManager.session | List of sessions supported with the command used to start each
session
|
| services.tlsrpt.reportd.settings.sendmail_script | Path to a sendmail-compatible executable for delivery reports.
|
| services.archisteamfarm.web-ui.enable | Whether to start the web-ui
|