| services.oauth2-proxy.cookie.httpOnly | Set HttpOnly cookie flag.
|
| services.subsonic.defaultMusicFolder | Configure Subsonic to use this folder for music
|
| services.prometheus.exporters.pihole.listenAddress | Address to listen on.
|
| services.netbird.server.management.dnsDomain | Domain used for peer resolution.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.exporters.blackbox.enableConfigCheck | Whether to run a correctness check for the configuration file
|
| services.nginx.statusPage | Enable status page reachable from localhost on http://127.0.0.1/nginx_status.
|
| services.pixelfed.nginx.listen.*.addr | Listen address.
|
| services.tor.settings.ReducedExitPolicy | See torrc manual.
|
| services.mtr-exporter.jobs.*.name | Name of ICMP pinging job.
|
| services.openafsClient.cellServDB | This cell's database server records, added to the global
CellServDB
|
| services.prometheus.exporters.script.settings | Free-form configuration for script_exporter, expressed as a Nix attrset and rendered to YAML.
Migration note:
The previous format using script = "sleep 5" is no longer supported
|
| services.limesurvey.httpd.virtualHost.adminAddr | E-mail address of the server administrator.
|
| services.nebula.networks | Nebula network definitions.
|
| services.minecraft-server.serverProperties | Minecraft server properties for the server.properties file
|
| services.snipe-it.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.prometheus.scrapeConfigs.*.static_configs.*.targets | The targets specified by the target group.
|
| services.taskchampion-sync-server.host | Host address on which to serve
|
| services.prometheus.exporters.wireguard.enable | Whether to enable the prometheus wireguard exporter.
|
| services.mediawiki.httpd.virtualHost.listenAddresses | Listen addresses for this virtual host
|
| services.terraria.noUPnP | Disables automatic Universal Plug and Play.
|
| services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.pinchflat.logLevel | Log level for Pinchflat.
|
| services.prometheus.remoteWrite.*.metadata_config.send_interval | How frequently metric metadata is sent to remote storage.
|
| services.snapraid.scrub.olderThan | Number of days since data was last scrubbed before it can be scrubbed again.
|
| services.stunnel.enable | Whether to enable the stunnel TLS tunneling service.
|
| services.nextcloud.notify_push.dbtableprefix | Table prefix in Nextcloud's database.
Note: since Nextcloud 20 it's not an option anymore to create a database
schema with a custom table prefix
|
| services.openafsClient.inumcalc | Inode calculation method. compat is
computationally less expensive, but md5 greatly
reduces the likelihood of inode collisions in larger scenarios
involving multiple cells mounted into one AFS space.
|
| services.maubot.settings.homeservers.<name>.url | Client-server API URL
|
| services.tor.settings.ServerDNSAllowBrokenConfig | See torrc manual.
|
| services.movim.nginx.listen.*.port | Port number to listen on
|
| services.opensnitch.settings.Rules.Path | Path to the directory where firewall rules can be found and will
get stored by the NixOS module.
|
| services.opensearch.extraCmdLineOptions | Extra command line options for the OpenSearch launcher.
|
| services.prometheus.exporters.restic.port | Port to listen on.
|
| services.privatebin.group | Group under which privatebin runs
|
| services.toxvpn.enable | Whether to enable toxvpn running on startup.
|
| services.nsd.ratelimit.ratelimit | Max qps allowed from any query source.
0 means unlimited
|
| services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.shiori.package | The shiori package to use.
|
| services.prosody.modules.server_contact_info | Publish contact information for this service
|
| services.prometheus.exporters.nginx.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nginx.openFirewall
is true
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.prowlarr.settings.update.mechanism | which update mechanism to use
|
| services.opengfw.settings.ruleset.geoip | Path to geoip.dat.
|
| services.pixelfed.settings | .env settings for Pixelfed
|
| services.salt.minion.configuration | Salt minion configuration as Nix attribute set
|
| services.resolved.enable | Whether to enable the Systemd DNS resolver daemon (systemd-resolved).
|
| services.oink.domains | List of attribute sets containing configuration for each domain
|
| services.slskd.settings.shares.filters | Regular expressions of files to exclude from sharing.
|
| services.prometheus.exporters.ecoflow.listenAddress | Address to listen on.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config | TLS configuration.
|
| services.prometheus.exporters.zfs.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.zfs.openFirewall
is true
|
| services.terraria.secure | Adds additional cheat protection to the server.
|
| services.ntopng.extraConfig | Configuration lines that will be appended to the generated ntopng
configuration file
|
| services.matrix-tuwunel.settings.global.unix_socket_path | Listen on a UNIX socket at the specified path
|
| services.redsocks.redsocks.*.ip | IP on which redsocks should listen
|
| services.prometheus.exporters.mikrotik.user | User name under which the mikrotik exporter shall be run.
|
| services.suricata.settings.vars.address-groups.DNS_SERVERS | DNS_SERVERS variable.
|
| services.nitter.preferences.squareAvatars | Square profile pictures.
|
| services.prosody.authentication | Authentication mechanism used for logins.
|
| services.nostr-rs-relay.enable | Whether to enable nostr-rs-relay.
|
| services.ncps.cache.databaseURL | The URL of the database (currently only SQLite is supported)
|
| services.strongswan-swanctl.swanctl.connections.<name>.mediated_by | The name of the connection to mediate this connection through
|
| services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| services.mediawiki.httpd.virtualHost.adminAddr | E-mail address of the server administrator.
|
| services.mycelium.enable | Whether to enable mycelium network.
|
| services.system76-scheduler.settings.cfsProfiles.default.nr-latency | sched_nr_latency.
|
| services.tlsrpt.package | The tlsrpt-reporter package to use.
|
| services.lokinet.settings.dns.upstream | Upstream resolver(s) to use as fallback for non-loki addresses
|
| services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts | See torrc manual.
|
| services.netdata.python.recommendedPythonPackages | Whether to enable a set of recommended Python plugins
by installing extra Python packages.
|
| services.readeck.enable | Whether to enable Readeck.
|
| services.snapserver.settings.http.doc_root | Path to serve from the HTTP servers root.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.photoprism.settings | See the getting-started guide for available options.
|
| services.suwayomi-server.enable | Whether to enable Suwayomi, a free and open source manga reader server that runs extensions built for Tachiyomi.
|
| services.spiped.config.<name>.timeout | Timeout, in seconds, after which an attempt to connect to
the target or a protocol handshake will be aborted (and the
connection dropped) if not completed
|
| services.netbird.tunnels.<name>.openFirewall | Opens up firewall port for communication between NetBird peers directly over LAN or public IP,
without using (internet-hosted) TURN servers as intermediaries.
|
| services.trickster.origin-url | URL to the Origin
|
| services.sshwifty.sharedKeyFile | Path to a file containing the shared key.
|
| services.tayga.ipv4.router.address | The IPv4 address of the router.
|
| services.prometheus.exporters.rtl_433.group | Group under which the rtl_433 exporter shall be run.
|
| services.prometheus.exporters.pgbouncer.connectionEnvFile | File that must contain the environment variable
PGBOUNCER_EXPORTER_CONNECTION_STRING which is set to the connection
string used by pgbouncer
|
| services.oink.settings.ttl | The TTL ("Time to Live") value to set for your DNS records
|
| services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile | Path to the SSH host public key.
|
| services.sftpgo.settings.httpd.bindings.*.port | The port for serving HTTP(S) requests
|
| services.thanos.rule.log.format | Log format to use.
|
| services.thanos.downsample.objstore.config | Object store configuration
|
| services.rauc.slots.<name>.*.device | The device to update.
|
| services.nextcloud.notify_push.nextcloudUrl | Configure the nextcloud URL notify_push tries to connect to.
|
| services.nagios.virtualHost.locations.<name>.proxyPass | Sets up a simple reverse proxy as described by https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.traefik.environmentFiles | Files to load as environment file
|
| services.scrutiny.settings.web.listen.host | Interface address for web application to bind to.
|
| services.triggerhappy.bindings | Key bindings for triggerhappy.
|
| services.unbound.resolveLocalQueries | Whether unbound should resolve local queries (i.e. add 127.0.0.1 to
/etc/resolv.conf).
|