| services.postfix-tlspol.settings.dns.address | IP and port to your DNS resolver
|
| services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| services.youtrack.environmentalParameters.listen-port | The port YouTrack will listen on.
|
| services.prometheus.exporters.v2ray.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginx.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dmarc.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.kafka.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritz.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.jitsi.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.idrac.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.redis.openFirewall | Open port in firewall for incoming connections.
|
| services.libeufin.bank.settings.libeufin-bank.PORT | The port on which libeufin-bank should listen.
|
| services.cassandra.jmxPort | Specifies the default port over which Cassandra will be available for
JMX connections
|
| services.nifi.proxyPort | Allow requests from a specific port.
|
| services.rqbit.httpPort | The listen port for the HTTP API.
|
| services.shairport-sync.package | The shairport-sync package to use.
|
| services.ax25.axports.<name>.kissParams | Kissattach parameters for this interface.
|
| services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| services.ncps.server.addr | The address and port the server listens on.
|
| services.consul.webUi | Enables the web interface on the consul http port.
|
| services.firefly-iii-data-importer.user | User account under which firefly-iii-data-importer runs.
|
| services.prometheus.exporters.exportarr-readarr.user | User name under which the exportarr-readarr exporter shall be run.
|
| boot.zfs.forceImportRoot | Forcibly import the ZFS root pool(s) during early boot
|
| programs.pay-respects.runtimeRules | List of rules to be added to /etc/xdg/pay-respects/rules.
pay-respects will read the contents of these generated rules to recommend command corrections
|
| services.deconz.wsPort | TCP port for the WebSocket.
|
| networking.wg-quick.interfaces.<name>.preUp | Commands called at the start of the interface setup.
|
| services.mediatomb.ps3Support | Whether to enable ps3 specific tweaks
|
| systemd.user.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.units.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.mounts.*.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.paths.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.portunus.seedSettings | Seed settings for users and groups
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.caddy.httpPort | The default port to listen on for HTTP traffic.
|
| services.reposilite.settings.sslPort | SSL port to bind to
|
| programs.tsmClient.servers.<name>.tcpport | TCP port of the IBM TSM server
|
| services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey | Legacy RSA public key of the host in PEM format, including start and
end markers
|
| services.amule.settings.ExternalConnect.ECPort | TCP port for external connections, like remote control via amule-gui
|
| services.prometheus.exporters.exportarr-sonarr.enable | Whether to enable the prometheus exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.enable | Whether to enable the prometheus exportarr-radarr exporter.
|
| services.prometheus.exporters.exportarr-lidarr.enable | Whether to enable the prometheus exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-bazarr.enable | Whether to enable the prometheus exportarr-bazarr exporter.
|
| services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| services.mediatomb.dsmSupport | Whether to enable D-Link DSM 320 specific tweaks
|
| services.outline.maximumImportSize | The maximum size of document imports
|
| services.pgbouncer.settings.pgbouncer.ignore_startup_parameters | By default, PgBouncer allows only parameters it can keep track of in startup packets:
client_encoding, datestyle, timezone and standard_conforming_strings
|
| services.ax25.axports.<name>.package | The ax25-tools package to use.
|
| services.prometheus.exporters.exportarr-readarr.group | Group under which the exportarr-readarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-readarr.apiKeyFile | File containing the api-key.
|
| services.prometheus.exporters.fastly.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.domain.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnssec.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mysqld.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.restic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tibber.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.deluge.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.shelly.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pihole.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.rspamd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.script.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.statsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.chrony.openFirewall | Open port in firewall for incoming connections.
|
| systemd.automounts.*.enable | If set to false, this unit will be a symlink to
/dev/null
|
| services.prometheus.exporters.exportarr-prowlarr.url | The full URL to Sonarr, Radarr, or Lidarr.
|
| services.nbd.server.exports.<name>.extraOptions | Extra options for this export
|
| services.firefly-iii-data-importer.dataDir | The place where firefly-iii data importer stores its state.
|
| hardware.facter.report | Hardware report data generated by nixos-facter
|
| services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| services.pipewire.alsa.support32Bit | Whether to enable 32-bit ALSA support on 64-bit systems.
|
| services.postfix.enableSmtp | Whether to enable the smtp service configured in the master.cf
|
| services.prometheus.exporters.dnssec.listenAddress | Listen address as host IP and port definition.
|
| services.prometheus.exporters.ecoflow.exporterType | The type of exporter you'd like to use
|
| services.oauth2-proxy.httpAddress | HTTPS listening address
|
| services.pixiecore.statusPort | HTTP port for status information (can be the same as --port)
|
| services.prometheus.exporters.nvidia-gpu.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.exportarr-sonarr.extraFlags | Extra commandline options to pass to the exportarr-sonarr exporter.
|
| services.prometheus.exporters.exportarr-lidarr.extraFlags | Extra commandline options to pass to the exportarr-lidarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.extraFlags | Extra commandline options to pass to the exportarr-radarr exporter.
|
| services.prometheus.exporters.exportarr-bazarr.extraFlags | Extra commandline options to pass to the exportarr-bazarr exporter.
|
| services.prometheus.exporters.exportarr-radarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-sonarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-bazarr.package | The exportarr package to use.
|
| services.prometheus.exporters.exportarr-lidarr.package | The exportarr package to use.
|
| services.mtr-exporter.jobs.*.schedule | Schedule of MTR checks
|
| services.librenms.nginx.reuseport | Create an individual listening socket
|
| services.kanboard.nginx.reuseport | Create an individual listening socket
|
| services.dolibarr.nginx.reuseport | Create an individual listening socket
|
| services.agorakit.nginx.reuseport | Create an individual listening socket
|
| services.fediwall.nginx.reuseport | Create an individual listening socket
|
| services.pixelfed.nginx.reuseport | Create an individual listening socket
|
| services.mainsail.nginx.reuseport | Create an individual listening socket
|
| services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| services.photoprism.importPath | Relative or absolute to the originalsPath from where the files should be imported.
|
| services.prometheus.exporters.exportarr-prowlarr.user | User name under which the exportarr-prowlarr exporter shall be run.
|
| services.elasticsearch.tcp_port | Elasticsearch port for the node to node communication.
|
| services.mediatomb.tg100Support | Whether to enable Telegent TG100 specific tweaks.
|
| services.prometheus.exporters.exportarr-readarr.enable | Whether to enable the prometheus exportarr-readarr exporter.
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| services.hound.listen | Listen on this [IP]:port
|