| services.movim.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.system76-scheduler.assignments.<name>.matchers | Process matchers.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.linkwarden.port | The port that Linkwarden will listen on.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.monica.group | Group monica runs as.
|
| services.rathole.role | Select whether rathole needs to be run as a client or a server
|
| services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| services.mediawiki.httpd.virtualHost.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| services.prometheus.exporters.systemd.extraFlags | Extra commandline options to pass to the systemd exporter.
|
| services.nvme-rs.settings.thresholds.temp_warning | Temperature warning threshold (°C)
|
| services.patroni.user | The user for the service
|
| services.pipewire.wireplumber.enable | Whether to enable WirePlumber, a modular session / policy manager for PipeWire
|
| services.mysql.galeraCluster.nodeAddresses | IP addresses or hostnames of all nodes in the cluster, including this node
|
| services.pid-fan-controller.settings.heatSources.*.pidParams.P | K_p of PID controller.
|
| services.rshim.log-level | Specify the log level (0:none, 1:error, 2:warning, 3:notice, 4:debug).
|
| services.prometheus.exporters.mail.configuration.servers.*.detectionDir | Directory in which new mails for the exporter user are placed
|
| services.mastodon.activeRecordEncryptionDeterministicKeyFile | This key must be set to enable the Active Record Encryption feature within
Rails that Mastodon uses to encrypt and decrypt some database attributes
|
| services.sabnzbd.settings.servers.<name>.priority | Priority of this servers
|
| services.prometheus.exporters.kafka.extraFlags | Extra commandline options to pass to the kafka exporter.
|
| services.prometheus.exporters.bird.extraFlags | Extra commandline options to pass to the bird exporter.
|
| services.nextcloud-spreed-signaling.settings.backend.backendtype | Type of backend configuration
|
| services.prometheus.exporters.nvidia-gpu.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nvidia-gpu.openFirewall is true.
|
| services.openldap.group | Group account under which slapd runs.
|
| services.thanos.compact.retention.resolution-1h | How long to retain samples of resolution 2 (1 hour) in bucket.
0d - disables this retention
Defaults to 0d in Thanos
when set to null.
|
| services.rss2email.feeds | The feeds to watch.
|
| services.shorewall.package | The shorewall package to use.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config | TLS configuration.
|
| services.nginx.virtualHosts | Declarative vhost config
|
| services.nifi.enable | Whether to enable Apache NiFi.
|
| services.omnom.settings.storage.type | Storage type.
|
| services.orthanc.environment | Extra environment variables
For more details see https://orthanc.uclouvain.be/book/users/configuration.html
|
| services.privoxy.userFilters | Filters to be included in a user.filter file
|
| services.prometheus.exporters.pgbouncer.port | Port to listen on.
|
| services.snipe-it.nginx.locations.<name>.index | Adds index directive.
|
| services.meilisearch.masterKeyFile | Path to file which contains the master key
|
| services.movim.h2o.acme.enable | Whether to ask Let’s Encrypt to sign a certificate for this
virtual host
|
| services.postfix-tlspol.settings.server.socket-permissions | Permissions to the UNIX socket, if configured.
Due to hardening on the systemd unit the socket can never be created world readable/writable.
|
| services.nixseparatedebuginfod2.enable | Whether to enable nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages.
|
| services.omnom.settings | Configuration options for the /etc/omnom/config.yml file.
|
| services.pretalx.settings.files.upload_limit | Maximum file upload size in MiB.
|
| services.tor.settings.UseDefaultFallbackDirs | See torrc manual.
|
| services.taler.settings.taler.CURRENCY_ROUND_UNIT | Smallest amount in this currency that can be transferred using the underlying RTGS
|
| services.transmission.openRPCPort | Whether to enable opening of the RPC port in the firewall.
|
| services.prometheus.exporters.flow.extraFlags | Extra commandline options to pass to the flow exporter.
|
| services.nsd.ipFreebind | Whether to bind to nonlocal addresses and interfaces that are down
|
| services.suricata.settings.vars.address-groups.HTTP_SERVERS | HTTP_SERVERS variable.
|
| services.prometheus.exporters.script.port | Port to listen on.
|
| services.maubot.settings.plugin_databases | Plugin database settings
|
| services.matomo.nginx | With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo
|
| services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| services.pretalx.settings.redis.location | URI to the redis server, used to speed up locking, caching and session storage.
|
| services.prometheus.remoteWrite.*.queue_config.min_shards | Minimum number of shards, i.e. amount of concurrency.
|
| services.redis.servers.<name>.databases | Set the number of databases.
|
| services.thanos.sidecar.tracing.config-file | Path to YAML file that contains tracing configuration
|
| services.snapper.cleanupInterval | Cleanup interval
|
| services.tomcat.virtualHosts.*.aliases | aliases of the virtualhost
|
| services.pfix-srsd.enable | Whether to run the postfix sender rewriting scheme daemon.
|
| services.nginx.prependConfig | Configuration lines prepended to the generated Nginx
configuration file
|
| services.misskey.reverseProxy.webserver.nginx.listen | Listen addresses and ports for this virtual host
|
| services.ncdns.dnssec.keys.public | Path to the file containing the KSK public key
|
| services.omnom.settings.activitypub.privkey | ActivityPub private key
|
| services.qui.group | Group to run qui as.
|
| services.prometheus.scrapeConfigs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.saunafs.chunkserver.settings.DATA_PATH | Directory for chunck meta data
|
| services.prometheus.exporters.kea.listenAddress | Address to listen on.
|
| services.mailman.ldap.bindDn | Service account to bind against.
|
| services.prometheus.exporters.node.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node.openFirewall is true.
|
| services.terraria.autoCreatedWorldSize | Specifies the size of the auto-created world if worldPath does not
point to an existing world.
|
| services.matomo.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.nixops-dns.dnsmasq | Enable dnsmasq forwarding to nixops-dns
|
| services.prometheus.exporters.exportarr-radarr.environment | See the configuration guide for available options.
|
| services.prometheus.exporters.influxdb.enable | Whether to enable the prometheus influxdb exporter.
|
| services.prometheus.exporters.rspamd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.rspamd.openFirewall is true.
|
| services.sympa.mainDomain | Main domain to be used in sympa.conf
|
| services.nextcloud.extraAppsEnable | Automatically enable the apps in services.nextcloud.extraApps every time Nextcloud starts
|
| services.prometheus.exporters.smokeping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.wireguard.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.wireguard.openFirewall is true.
|
| services.pairdrop.enable | Whether to enable pairdrop.
|
| services.prowlarr.settings.update.automatically | Automatically download and install updates.
|
| services.mattermost.matterircd.parameters | Set commandline parameters to pass to matterircd
|
| services.monero.limits.upload | Limit of the upload rate in kB/s
|
| services.suricata.settings.vars.address-groups.DC_SERVERS | DC_SERVERS variable.
|
| services.netbird.clients.<name>.openInternalFirewall | Opens up internal firewall ports for the NetBird's network interface.
|
| services.pgadmin.settings | Settings for pgadmin4.
Documentation
|
| services.lighttpd.collectd.enable | Whether to enable collectd subservice accessible at http://yourserver/collectd.
|
| services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| services.meme-bingo-web.address | The address the webserver will bind to.
|
| services.pgbouncer.enable | Whether to enable PostgreSQL connection pooler.
|
| services.polaris.user | User account under which Polaris runs.
|
| services.redmine.database.name | Database name.
|
| services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.target_label | Label to which the resulting value is written in a replace action
|
| services.radicle.httpd.nginx.locations.<name>.root | Root directory for requests.
|
| services.radicle.httpd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.smartdns.settings | A set that will be generated into configuration file, see the SmartDNS README for details of configuration parameters
|
| services.prometheus.remoteWrite.*.queue_config.max_samples_per_send | Maximum number of samples per send.
|
| services.netbird.useRoutingFeatures | Enables settings required for NetBird's routing features: Network Resources, Network Routes & Exit Nodes
|
| services.prometheus.exporters.knot.enable | Whether to enable the prometheus knot exporter.
|
| services.prometheus.exporters.mongodb.collectAll | Enable all collectors
|