| services.loki.group | Group under which the Loki service runs.
|
| services.rss-bridge.pool | Name of phpfpm pool that is used to run web-application
|
| services.shadowsocks.localAddress | Local addresses to which the server binds.
|
| services.umurmur.enable | Whether to enable uMurmur Mumble server.
|
| services.prometheus.exporters.jitsi.extraFlags | Extra commandline options to pass to the jitsi exporter.
|
| services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| services.snipe-it.maxUploadSize | The maximum size for uploads (e.g. images).
|
| services.livekit.ingress.settings.rtc_config.port_range_start | Start of UDP port range for WebRTC
|
| services.misskey.settings.redis.host | The Redis host.
|
| services.uhub | Uhub ADC hub instances
|
| services.movim.group | Group running Movim service
|
| services.nginx.sso.enable | Whether to enable nginx-sso service.
|
| services.tlsrpt.reportd.settings.log_level | Level of log messages to emit.
|
| services.osrm.threads | Number of threads to use.
|
| services.opkssh.authorizations.*.issuer | Issuer URI
|
| services.prometheus.alertmanager-ntfy.settings.ntfy.notification.tags | Tags to add to ntfy.sh messages
|
| services.strongswan-swanctl.swanctl.connections.<name>.ppk_id | String identifying the Postquantum Preshared Key (PPK) to be used.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.pict-rs.storePath | The directory where to store the uploaded images
|
| services.mattermost.socket.export | Whether to enable Export socket control to system environment variables.
|
| services.nar-serve.cacheURL | Binary cache URL to connect to
|
| services.listmonk.database.settings.smtp.*.host | Hostname for the SMTP server
|
| services.seatd.logLevel | Logging verbosity
|
| services.moodle.virtualHost.documentRoot | The path of Apache's document root directory
|
| services.sanoid.datasets.<name>.useTemplate | Names of the templates to use for this dataset.
|
| services.prometheus.exporters.pve.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.pve.openFirewall is true.
|
| services.nipap.user | User to use for running NIPAP services.
|
| services.overseerr.package | The overseerr package to use.
|
| services.pihole-ftl.lists.*.url | URL of the domain list
|
| services.tor.settings.AutomapHostsSuffixes | See torrc manual.
|
| services.movim.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| services.tee-supplicant.enable | Whether to enable OP-TEE userspace supplicant.
|
| services.prometheus.exporters.mail.configuration | Specify the mailexporter configuration file to use.
|
| services.meshtasticd.package | The meshtasticd package to use.
|
| services.umurmur.settings.bindaddr6 | IPv6 address to bind to
|
| services.oncall.settings.db.conn.kwargs.host | Database host.
|
| services.resilio.uploadLimit | Upload speed limit. 0 is unlimited (default).
|
| services.radicle.ci.adapters.native.instances.<name>.settings.log | File where radicle-native-ci should write the run log.
|
| services.tailscale.useRoutingFeatures | Enables settings required for Tailscale's routing features like subnet routers and exit nodes
|
| services.nextdns.enable | Whether to enable the NextDNS DNS/53 to DoH Proxy service.
|
| services.pretalx.settings.filesystem.static | Path to the directory that contains static files.
|
| services.nncp.daemon.enable | Whether to enable NNCP TCP synronization daemon
|
| services.tuned.settings.profile_dirs | Directories to search for profiles, separated by , or ;.
|
| services.nixops-dns.user | The user the nixops-dns daemon should run as
|
| services.pixelfed.nginx.extraConfig | These lines go to the end of the vhost verbatim.
|
| services.prometheus.exporters.collectd.collectdBinary.enable | Whether to enable collectd binary protocol receiver.
|
| services.pdfding.secretKeyFile | File containing the Django SECRET_KEY
|
| services.prometheus.exporters.smokeping.group | Group under which the smokeping exporter shall be run.
|
| services.tigerbeetle.cacheGridSize | The grid cache size
|
| services.outline.oidcAuthentication.clientId | Authentication client identifier.
|
| services.tarsnap.archives | Tarsnap archive configurations
|
| services.sickbeard.enable | Whether to enable the sickbeard server.
|
| services.tinc.networks | Defines the tinc networks which will be started
|
| services.silverbullet.extraArgs | Extra arguments passed to silverbullet.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.exporters.libvirt.libvirtUri | Libvirt URI from which to extract metrics
|
| services.mattermost.group | Group which runs the Mattermost service.
|
| services.thanos.rule.web.route-prefix | Prefix for API and UI endpoints
|
| services.prometheus.exporters.mailman3.mailman.addr | Mailman3 Core REST API address.
|
| services.protonmail-bridge.package | The protonmail-bridge package to use.
|
| services.scrutiny.collector.settings.api.endpoint | Scrutiny app API endpoint for sending metrics to.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.exporters.statsd.user | User name under which the statsd exporter shall be run.
|
| services.scion.scion-dispatcher.settings | scion-dispatcher configuration
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| services.tailscale.derper.verifyClients | Whether to verify clients against a locally running tailscale daemon if they are allowed to connect to this node or not.
|
| services.trafficserver.plugins.*.arg | arguments to pass to the plugin
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| services.nginx.upstreams | Defines a group of servers to use as proxy target.
|
| services.mail.sendmailSetuidWrapper.enable | Whether to enable the wrapper.
|
| services.szurubooru.user | User account under which Szurubooru runs.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| services.limesurvey.nginx.virtualHost.root | The path of the web root directory.
|
| services.misskey.reverseProxy.webserver.nginx.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| services.nitter.preferences.theme | Instance theme.
|
| services.movim.podConfig | Pod configuration (values from php daemon.php config --help)
|
| services.nginx.virtualHosts.<name>.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| services.openafsClient.packages.module | OpenAFS kernel module package
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| services.physlock.disableSysRq | Whether to disable SysRq when locked with physlock.
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| services.prometheus.exporters.apcupsd.openFirewall | Open port in firewall for incoming connections.
|
| services.soju.tlsCertificate | Path to server TLS certificate.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.suricata.settings.logging.default-output-filter | A regex to filter output
|
| services.pantalaimon-headless.instances.<name>.logLevel | Set the log level of the daemon.
|
| services.matrix-continuwuity.settings.global.allow_encryption | Whether new encrypted rooms can be created
|
| services.portunus.domain | Subdomain which gets reverse proxied to Portunus webserver.
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| services.prometheus.alertmanagerGotify.messageAnnotation | Annotation holding the alert message.
|
| services.tt-rss.database.type | Database to store feeds
|
| services.nitter.cache.redisMaxConnections | Maximum number of connections to Redis
|
| services.nostr-rs-relay.settings | See https://git.sr.ht/~gheartsfield/nostr-rs-relay/#configuration for documentation.
|
| services.patroni.postgresqlDataDir | The data directory for PostgreSQL
|
| services.netbird.clients.<name>.autoStart | Start the service with the system
|
| services.nezha-agent.clientSecretFile | Path to the file contained the client_secret of the dashboard.
|
| services.photoprism.passwordFile | Admin password file.
|