| services.mattermost.socket.export | Whether to enable Export socket control to system environment variables.
|
| systemd.slices.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.timers.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.varnish.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.bitcoin.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.klipper.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.process.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.unbound.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.sabnzbd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.libvirt.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dnsmasq.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.ecoflow.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postfix.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.apcupsd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dovecot.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.mongodb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.gatewayPort | The port of the FRITZ!Box UPnP service.
|
| services.prometheus.exporters.systemd.openFirewall | Open port in firewall for incoming connections.
|
| services.tailscale.derper.stunPort | STUN port to listen on
|
| systemd.user.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.user.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.exportarr-prowlarr.group | Group under which the exportarr-prowlarr exporter shall be run.
|
| services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| services.matrix-alertmanager.matrixRooms | Combination of Alertmanager receiver(s) and rooms for the bot to join
|
| services.stash.settings.preview_exclude_end | Duration of start of video to exclude when generating previews
|
| swapDevices.*.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.galene.httpPort | HTTP listen port.
|
| services.prometheus.exporters.exportarr-readarr.extraFlags | Extra commandline options to pass to the exportarr-readarr exporter.
|
| services.prometheus.exporters.exportarr-readarr.package | The exportarr package to use.
|
| services.firefly-iii-data-importer.group | Group under which firefly-iii-data-importer runs
|
| services.firewalld.services.<name>.ports | Ports of the service.
|
| services.prometheus.exporters.opnsense.enabledExporter | Collectors to enable or disable
|
| services.squid.proxyPort | TCP port on which squid will listen.
|
| services.paperless.exporter.enable | Whether to enable regular automatic document exports.
|
| services.prometheus.exporters.deluge.exportPerTorrentMetrics | Enable per-torrent metrics
|
| virtualisation.bios | An alternate BIOS (such as qboot) with which to start the VM
|
| services.kubernetes.controllerManager.leaderElect | Whether to start leader election before executing main loop.
|
| services.bind.listenOnPort | Port to listen on.
|
| services.syncthing.relay.statusPort | Port to listen on for serving the relay status API
|
| services.prometheus.exporters.py-air-control.openFirewall | Open port in firewall for incoming connections.
|
| services.deconz.httpPort | TCP port for the web server.
|
| services.firefly-iii-data-importer.enable | Whether to enable Firefly III Data Importer.
|
| services.zabbixWeb.nginx.virtualHost.reuseport | Create an individual listening socket
|
| services.home-assistant.lovelaceConfigWritable | Whether to make ui-lovelace.yaml writable
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| services.prometheus.exporters.exportarr-prowlarr.enable | Whether to enable the prometheus exportarr-prowlarr exporter.
|
| networking.nftables.extraDeletions | Extra deletion commands to be run on every firewall start, reload
and after stopping the firewall.
|
| boot.initrd.network.ifstate.cleanupSettings | Content of IfState's initrd cleanup configuration file
|
| services.prometheus.exporters.flow.asn | The ASN being monitored.
|
| services.buildbot-master.extraImports | Extra python imports to prepend to master.cfg
|
| services.anuko-time-tracker.nginx.reuseport | Create an individual listening socket
|
| services.earlyoom.reportInterval | Interval (in seconds) at which a memory report is printed (set to 0 to disable).
|
| services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| services.prometheus.exporters.graphite.graphitePort | Port to use for the graphite server.
|
| services.prometheus.exporters.nats.url | NATS monitor endpoint to query.
|
| services.resilio.listeningPort | Listening port
|
| services.prometheus.exporters.mikrotik.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.blackbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.collectd.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.influxdb.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.opnsense.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smartctl.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nginxlog.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.fritzbox.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.postgres.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.unpoller.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.graphite.openFirewall | Open port in firewall for incoming connections.
|
| xdg.portal.extraPortals | List of additional portals to add to path
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| containers.<name>.timeoutStartSec | Time for the container to start
|
| services.ax25.axports.<name>.callsign | The callsign of the physical interface to bind to.
|
| services.cryptpad.settings.websocketPort | Port for the websocket that needs to be separate
|
| services.prometheus.exporters.process.settings.process_names | All settings expressed as an Nix attrset
|
| services.prometheus.exporters.exportarr-bazarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-lidarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-sonarr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.exportarr-radarr.listenAddress | Address to listen on.
|
| systemd.targets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| systemd.sockets.<name>.wantedBy | Units that want (i.e. depend on) this unit
|
| services.prometheus.exporters.kea.user | User name under which the kea exporter shall be run.
|
| services.prometheus.exporters.zfs.user | User name under which the zfs exporter shall be run.
|
| services.prometheus.exporters.sql.user | User name under which the sql exporter shall be run.
|
| services.prometheus.exporters.pve.user | User name under which the pve exporter shall be run.
|
| services.prometheus.exporters.nut.user | User name under which the nut exporter shall be run.
|
| services.prometheus.exporters.lnd.user | User name under which the lnd exporter shall be run.
|
| services.nifi.listenPort | Bind to a port for Apache NiFi web-ui.
|
| services.ntopng.httpPort | Sets the HTTP port of the embedded web server.
|
| fileSystems.<name>.encrypted.keyFile | Path to a keyfile used to unlock the backing encrypted
device
|
| services.prometheus.exporters.exportarr-prowlarr.extraFlags | Extra commandline options to pass to the exportarr-prowlarr exporter.
|
| services.prometheus.exporters.exportarr-prowlarr.package | The exportarr package to use.
|
| boot.loader.systemd-boot.rebootForBitlocker | Enable EXPERIMENTAL BitLocker support
|
| services.prometheus.exporters.opnsense.disabledExporter | Collectors to enable or disable
|
| services.bookstack.nginx.reuseport | Create an individual listening socket
|
| services.prometheus.exporters.lnd.lndHost | lnd instance gRPC address:port.
|
| services.parsedmarc.provision.localMail.recipientName | The DMARC mail recipient name, i.e. the name part of the
email address which receives DMARC reports
|
| services.nexus.listenPort | Port to listen on.
|
| services.opensearch.settings."network.host" | Which port this service should listen on.
|
| services.prometheus.exporters.rtl_433.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.dmarc.imap.host | Hostname of IMAP server to connect to.
|