| services.prometheus.exporters.rasdaemon.databasePath | Path to the RAS daemon machine check event database.
|
| services.resolved.settings.Resolve.DNS | List of IP addresses to query as recursive DNS resolvers.
|
| services.mosquitto.dataDir | The data directory.
|
| services.tuned.ppdSettings.battery | Map of PPD battery states to TuneD profiles.
|
| services.mattermost.group | Group which runs the Mattermost service.
|
| services.smartd.notifications.mail.recipient | Recipient of the notification messages.
|
| services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.rstudio-server.rsessionExtraConfig | Extra contents for resssion.conf.
|
| services.scion.scion-daemon.settings | scion-daemon configuration
|
| services.spiped.config.<name>.target | Address to which spiped should connect.
|
| services.ntp.extraConfig | Additional text appended to ntp.conf.
|
| services.pangolin.settings | Additional attributes to be merged with the configuration options and written to Pangolin's config.yml file.
|
| services.phylactery.port | Listen port for Phylactery
|
| services.prometheus.exporters.idrac.extraFlags | Extra commandline options to pass to the idrac exporter.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.scrutiny.settings.web.influxdb.scheme | URL scheme to use when connecting to InfluxDB.
|
| services.traccar.settingsFile | File used as configuration for traccar
|
| services.litellm.enable | Whether to enable LiteLLM server.
|
| services.mlmmj.user | mailinglist local user
|
| services.postfix.rootAlias | Who should receive root e-mail
|
| services.prometheus.exporters.bitcoin.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bitcoin.openFirewall
is true
|
| services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| services.openiscsi.enableAutoLoginOut | Whether to enable automatic login and logout of all automatic targets
|
| services.prometheus.exporters.varnish.withGoMetrics | Export go runtime and http handler metrics.
|
| services.scrutiny.settings.web.influxdb.tls.insecure_skip_verify | Whether to enable skipping TLS verification when connecting to InfluxDB.
|
| services.nitter.preferences.bidiSupport | Support bidirectional text (makes clicking on tweets harder).
|
| services.nsd.zonefilesWrite | Write changed secondary zones to their zonefile every N seconds
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.rauc.slots | RAUC slot definitions
|
| services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| services.movim.nginx.sslCertificate | Path to server SSL certificate.
|
| services.nginx.recommendedOptimisation | Enable recommended optimisation settings.
|
| services.oauth2-proxy.nginx.virtualHosts | Nginx virtual hosts to put behind the oauth2 proxy
|
| services.openldap.settings.includes | LDIF files to include after the parent's attributes but before its children.
|
| services.reposilite.settings.keyPassword | Plaintext password used to unlock the Java KeyStore set in services.reposilite.settings.keyPath
|
| services.thanos.store.objstore.config | Object store configuration
|
| services.mastodon.elasticsearch.user | Used for optionally authenticating with Elasticsearch.
|
| services.mailman.ldap.enable | Whether to enable LDAP auth.
|
| services.mealie.credentialsFile | File containing credentials used in mealie such as POSTGRES_PASSWORD
or sensitive LDAP options
|
| services.mediatomb.mediaDirectories.*.recursive | Whether the indexation must take place recursively or not.
|
| services.nextcloud.config.objectstore.s3.region | Required for some non-Amazon implementations.
|
| services.sharkey.settings.address | The address that Sharkey binds to.
|
| services.logstash.extraJvmOptions | Extra JVM options, one per line (jvm.options format).
|
| services.monica.database.user | Database username.
|
| services.postgrest.settings.server-port | The TCP port to bind the web server.
|
| services.open-webui.openFirewall | Whether to open the firewall for Open-WebUI
|
| services.pantalaimon-headless.instances.<name>.extraSettings | Extra configuration options
|
| services.postgresql.settings.log_line_prefix | A printf-style string that is output at the beginning of each log line
|
| services.prometheus.xmpp-alerts.settings | Configuration for prometheus xmpp-alerts, see
https://github.com/jelmer/prometheus-xmpp-alerts/blob/master/xmpp-alerts.yml.example
for supported values.
|
| services.nixseparatedebuginfod2.enable | Whether to enable nixseparatedebuginfod2, a debuginfod server providing source and debuginfo for nix packages.
|
| services.mediagoblin.settings.mediagoblin.sql_engine | Database to use.
|
| services.prometheus.exporters.ecoflow.listenAddress | Address to listen on.
|
| services.prometheus.exporters.graphite.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.graphite.openFirewall
is true
|
| services.prometheus.exporters.postfix.enable | Whether to enable the prometheus postfix exporter.
|
| services.nvme-rs.settings.thresholds.temp_critical | Temperature critical threshold (°C)
|
| services.recyclarr.configuration | Recyclarr YAML configuration as a Nix attribute set
|
| services.listmonk.database.mutableSettings | Database settings will be reset to the value set in this module if this is not enabled
|
| services.opkssh.user | System user for running opkssh
|
| services.pixelfed.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.radicle.httpd.nginx.listen.*.port | Port number to listen on
|
| services.stirling-pdf.environmentFiles | Files containing additional environment variables to pass to Stirling PDF
|
| services.trafficserver.records | List of configurable variables used by Traffic Server
|
| services.monero.dataDir | The directory where Monero stores its data files.
|
| services.pgbackrest.commands.expire | Options for the 'expire' command
|
| services.prometheus.exporters.frr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.frr.openFirewall is true.
|
| services.prometheus.exporters.surfboard.group | Group under which the surfboard exporter shall be run.
|
| services.prometheus.remoteWrite.*.queue_config.max_shards | Maximum number of shards, i.e. amount of concurrency.
|
| services.routedns.package | The routedns package to use.
|
| services.tuned.ppdSettings | Settings for TuneD's power-profiles-daemon compatibility service.
|
| services.moosefs.masterHost | IP or DNS name of the MooseFS master server.
|
| services.mysql.replication.serverId | Id of the MySQL server instance
|
| services.orangefs.client.fileSystems.*.mountPoint | Mount point.
|
| services.paperless.port | Web interface port.
|
| services.tayga.ipv4.address | The source IPv4 address of the TAYGA server.
|
| services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| services.navidrome.enable | Whether to enable Navidrome music server.
|
| services.octoprint.stateDir | State directory of the daemon.
|
| services.privatebin.user | User account under which privatebin runs.
|
| services.prometheus.exporters | Prometheus exporter configuration
|
| services.prometheus.exporters.rasdaemon.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port | The port to scrape metrics from
|
| services.mautrix-discord.registerToSynapse | Whether to add the bridge's app service registration file to
services.matrix-synapse.settings.app_service_config_files.
|
| services.nar-serve.enable | Whether to enable serving NAR file contents via HTTP.
|
| services.nvme-rs.settings.check_interval_secs | Check interval in seconds
|
| services.peertube.database.user | Database user.
|
| services.snipe-it.nginx | With this option, you can customize the nginx virtualHost settings.
|
| services.prometheus.alertmanagerNotificationQueueCapacity | The capacity of the queue for pending alert manager notifications.
|
| services.shadowsocks.enable | Whether to run shadowsocks-libev shadowsocks server.
|
| services.quickwit.settings.grpc_listen_port | The port to listen on for gRPC traffic.
|
| services.strongswan-swanctl.strongswan.extraConfig | Contents of the strongswan.conf file.
|
| services.nix-serve.bindAddress | IP address where nix-serve will bind its listening socket.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint | Custom endpoint to be used.
|
| services.pid-fan-controller.settings.fans | List of fans to be controlled.
|
| services.nscd.group | User group under which nscd runs.
|
| services.misskey.reverseProxy.webserver.caddy.listenAddresses | A list of host interfaces to bind to for this virtual host.
|
| services.step-ca.enable | Whether to enable the smallstep certificate authority server.
|
| services.postgresql.finalPackage | The postgresql package that will effectively be used in the system
|
| services.misskey.reverseProxy.webserver.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.snipe-it.mail.host | Mail host address.
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|