| services.octoprint.port | Port to bind OctoPrint to.
|
| services.prometheus.alertmanager.enable | Whether to enable Prometheus Alertmanager.
|
| services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| services.prometheus.scrapeConfigs.*.body_size_limit | An uncompressed response body larger than this many bytes will cause the
scrape to fail. 0 means no limit
|
| services.tika.package | The tika package to use.
|
| services.moodle.virtualHost.listen | Listen addresses and ports for this virtual host.
This option overrides addSSL, forceSSL and onlySSL
|
| services.plikd.settings | Configuration for plikd, see https://github.com/root-gg/plik/blob/master/server/plikd.cfg
for supported values.
|
| services.postgresqlWalReceiver.receivers.<name>.connection | Specifies parameters used to connect to the server, as a connection string
|
| services.prometheus.exporters.dmarc.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.dmarc.openFirewall is true.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.scrape_interval | How frequently to scrape targets from this job
|
| services.system76-scheduler.settings.processScheduler.foregroundBoost.background.matchers | Process matchers.
|
| services.lirc.enable | Whether to enable the LIRC daemon, to receive and send infrared signals.
|
| services.mediatomb.serverName | How to identify the server on the network.
|
| services.nezha-agent.settings.skip_connection_count | Do not monitor the number of connections.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method | The authentication method, either OAuth or ManagedIdentity
|
| services.redsocks.redsocks | Local port to proxy associations to be performed
|
| services.redsocks.redsocks.*.login | Login to send to proxy.
|
| services.snowflake-proxy.extraFlags | Extra flags to pass to snowflake-proxy
|
| services.taler.merchant.settings.merchant.LEGAL_PRESERVATION | How long to keep data in the database for tax audits after the transaction has completed.
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prosody.muc.*.extraConfig | Additional MUC specific configuration
|
| services.public-inbox.http.enable | Whether to enable the public-inbox HTTP server.
|
| services.redshift.temperature.day | Colour temperature to use during the day, between
1000 and 25000 K.
|
| services.misskey.settings.meilisearch.ssl | Whether to connect via SSL.
|
| services.neo4j.shell.enable | Enable a remote shell server which Neo4j Shell clients can log in to
|
| services.nsd.ratelimit.slip | Number of packets that get discarded before replying a SLIP response.
0 disables SLIP responses. 1 will make every response a SLIP response.
|
| services.openvscode-server.package | The openvscode-server package to use.
|
| services.podgrab.dataDirectory | Directory to store downloads.
|
| services.stalwart.group | Group ownership of service
|
| services.tailscale.serve.services.<name>.advertised | Whether the service should accept new connections
|
| services.localtimed.geoclue2Package | The Geoclue2 package to use.
|
| services.scion.stateless | Setting this value to false (stateful) can lead to improved caching and
performance
|
| services.tcsd.conformanceCred | Path to the conformance credential for your TPM
|
| services.umurmur.enable | Whether to enable uMurmur Mumble server.
|
| services.logrotate.extraArgs | Additional command line arguments to pass on logrotate invocation
|
| services.privoxy.settings | This option is mapped to the main Privoxy configuration file
|
| services.prometheus.exporters.redis.group | Group under which the redis exporter shall be run.
|
| services.public-inbox.imap.port | Listening port
|
| services.radarr.settings.server.port | Port Number
|
| services.redis.servers.<name>.logfile | Specify the log file name
|
| services.tt-rss.email.server | Hostname:port combination to send outgoing mail
|
| services.miredo.bindPort | Depending on the local firewall/NAT rules, you might need to force
Miredo to use a fixed UDP port and or IPv4 address.
|
| services.opensearch.enable | Whether to enable OpenSearch.
|
| services.teamspeak3.queryHttpPort | TCP port opened for ServerQuery connections using the HTTP protocol.
|
| services.mediamtx.env | Extra environment variables for MediaMTX
|
| services.nextcloud.settings.mail_domain | The return address that you want to appear on emails sent by the Nextcloud server, for example nc-admin@example.com, substituting your own domain, of course.
|
| services.temporal.restartIfChanged | Automatically restart the service on config change
|
| services.picom.fade | Fade windows in and out.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.proxy_url | Optional proxy URL.
|
| services.unit.config | Unit configuration in JSON format
|
| services.unpoller.influxdb.interval | Setting this lower than the Unifi controller's refresh
interval may lead to zeroes in your database.
|
| services.movim.phpCfg | Extra PHP INI options such as memory_limit, max_execution_time, etc.
|
| services.pipewire.wireplumber.configPackages | List of packages that provide WirePlumber configuration, in the form of
share/wireplumber/*/*.conf files
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.swapspace.settings | Config file for swapspace
|
| services.nitter.config.proxyAuth | Credentials for proxy.
|
| services.privoxy.certsLifetime | If inspectHttps is enabled, the time generated HTTPS
certificates will be stored in a temporary directory for reuse
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.role | The OpenStack role of entities that should be discovered.
|
| services.readarr.settings.server.port | Port Number
|
| services.pykms.port | The port on which to listen.
|
| services.microsocks.outgoingBindIp | Specifies which ip outgoing connections are bound to
|
| services.misskey.reverseProxy.webserver.nginx.default | Makes this vhost the default.
|
| services.printing.cups-pdf.instances.<name>.enable | Whether to enable this cups-pdf instance.
|
| services.scanservjs.extraDevicesConfig | Extra code to add to config.local.js's afterDevices.
|
| services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.class | CPU scheduler class.
|
| services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| services.readarr.openFirewall | Open ports in the firewall for Readarr
|
| services.speedify.package | The speedify package to use.
|
| services.tee-supplicant.enable | Whether to enable OP-TEE userspace supplicant.
|
| services.transmission.settings.incomplete-dir-enabled | |
| services.mediagoblin.settings.mediagoblin.plugins | Plugins to enable
|
| services.olivetin.package | The olivetin package to use.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| services.rmfakecloud.port | Listening port number.
|
| services.transmission.performanceNetParameters | Whether to enable tweaking of kernel parameters
to open many more connections at the same time
|
| services.lk-jwt-service.livekitUrl | The public websocket URL for livekit
|
| services.navidrome.group | Group under which Navidrome runs.
|
| services.ntp.servers | The set of NTP servers from which to synchronise.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.exporters.mqtt.port | Port to listen on.
|
| services.misskey.reverseProxy.webserver.nginx.locations | Declarative location config
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.mediawiki.database.socket | Path to the unix socket file to use for authentication.
|
| services.movim.nginx | With this option, you can customize an Nginx virtual host which
already has sensible defaults for Movim
|
| services.nohang.enable | Whether to enable nohang, a daemon that keeps system responsiveness when Linux is out of memory.
|
| services.portunus.dex.port | Port where dex should listen on.
|
| services.prometheus.exporters.frr.listenAddress | Address to listen on.
|
| services.prometheus.exporters.systemd.extraFlags | Extra commandline options to pass to the systemd exporter.
|
| services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| services.sympa.web.enable | Whether to enable Sympa web interface.
|
| services.ncps.cache.lock.allowDegradedMode | Allow falling back to local locks if Redis is unavailable (WARNING:
breaks HA guarantees).
|
| services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| services.peertube.serviceEnvironmentFile | Set environment variables for the service
|
| services.pgbouncer.enable | Whether to enable PostgreSQL connection pooler.
|
| services.radarr.package | The radarr package to use.
|
| services.thanos.sidecar.reloader.config-file | Config file watched by the reloader.
|
| services.transmission.settings.trash-original-torrent-files | Whether to delete torrents added from the
services.transmission.settings.watch-dir.
|
| services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator | The tag separator used to separate concatenated GCE instance network tags
|
| services.pulseaudio.tcp.anonymousClients.allowAll | Whether to enable all anonymous clients to stream to the server.
|