| services.shairport-sync.openFirewall | Whether to automatically open ports in the firewall.
|
| services.hadoop.hbase.rest.infoPort | web UI port
|
| services.prometheus.exporters.knot.user | User name under which the knot exporter shall be run.
|
| services.prometheus.exporters.json.user | User name under which the json exporter shall be run.
|
| services.prometheus.exporters.ebpf.user | User name under which the ebpf exporter shall be run.
|
| services.prometheus.exporters.nats.user | User name under which the nats exporter shall be run.
|
| services.prometheus.exporters.node.user | User name under which the node exporter shall be run.
|
| services.prometheus.exporters.ping.user | User name under which the ping exporter shall be run.
|
| services.prometheus.exporters.mail.user | User name under which the mail exporter shall be run.
|
| services.prometheus.exporters.ipmi.user | User name under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.bind.user | User name under which the bind exporter shall be run.
|
| services.prometheus.exporters.flow.user | User name under which the flow exporter shall be run.
|
| services.prometheus.exporters.bird.user | User name under which the bird exporter shall be run.
|
| services.prometheus.exporters.mqtt.user | User name under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.snmp.user | User name under which the snmp exporter shall be run.
|
| services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| services.davis.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.slskd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.movim.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.imap-mailstat.openFirewall | Open port in firewall for incoming connections.
|
| services.redsocks.redsocks | Local port to proxy associations to be performed
|
| services.prometheus.exporters.php-fpm.user | User name under which the php-fpm exporter shall be run.
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.prometheus.exporters.kea.group | Group under which the kea exporter shall be run.
|
| services.prometheus.exporters.zfs.group | Group under which the zfs exporter shall be run.
|
| services.prometheus.exporters.nut.group | Group under which the nut exporter shall be run.
|
| services.prometheus.exporters.sql.group | Group under which the sql exporter shall be run.
|
| services.prometheus.exporters.pve.group | Group under which the pve exporter shall be run.
|
| services.prometheus.exporters.lnd.group | Group under which the lnd exporter shall be run.
|
| services.prometheus.exporters.chrony.chronyServerAddress | ChronyServerAddress of the chrony server side command port. (Not enabled by default.)
Defaults to the local unix socket.
|
| services.caddy.httpsPort | The default port to listen on for HTTPS traffic
|
| services.deluge.openFirewall | Whether to open the firewall for the ports in
services.deluge.config.listen_ports
|
| services.mailhog.uiPort | Port on which the HTTP UI will listen.
|
| services.prometheus.exporters.exportarr-readarr.listenAddress | Address to listen on.
|
| services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| services.prometheus.exporters.lnd.lndTlsPath | Path to lnd TLS certificate.
|
| services.prometheus.exporters.frr.user | User name under which the frr exporter shall be run
|
| services.portunus.dex.oidcClients.*.callbackURL | URL where the OIDC client should redirect
|
| services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| services.prometheus.exporters.exportarr-bazarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-bazarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-sonarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-sonarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-radarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-radarr.openFirewall is true.
|
| services.prometheus.exporters.exportarr-lidarr.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.exportarr-lidarr.openFirewall is true.
|
| services.prometheus.exporters.flow.topic | The Kafka topic to consume from.
|
| services.tlsrpt.reportd.settings.organization_name | Name of the organization sending out the reports.
|
| services.bosun.influxHost | Host and port of the influxdb database.
|
| services.athens.pprofPort | Port number for pprof endpoints.
|
| services.ncps.analytics.reporting.enable | Enable reporting anonymous usage statistics (DB type, Lock type, Total Size) to the project maintainers.
|
| services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.listen | Address and port to listen on (can be HOST:PORT, unix:PATH).
|
| services.prometheus.exporters.bind.bindURI | HTTP XML API address of an Bind server.
|
| services.epmd.enable | Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),
which acts as a name server on all hosts involved in distributed
Erlang computations.
|
| services.snipe-it.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.ebpf.names | List of eBPF programs to load
|
| services.nixseparatedebuginfod.port | port to listen
|
| services.prometheus.exporters.zfs.pools | Name of the pool(s) to collect, repeat for multiple pools (default: all pools).
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port | The port to scrape metrics from
|
| services.your_spotify.settings.PORT | The port of the api server
|
| services.prometheus.exporters.junos-czerwonk.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.wireguard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.surfboard.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.tailscale.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.rasdaemon.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.borgmatic.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.pgbouncer.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.nextcloud.openFirewall | Open port in firewall for incoming connections.
|
| services.prometheus.exporters.smokeping.openFirewall | Open port in firewall for incoming connections.
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| services.matomo.periodicArchiveProcessing | Enable periodic archive processing, which generates aggregated reports from the visits
|
| services.prometheus.exporters.json.group | Group under which the json exporter shall be run.
|
| services.prometheus.exporters.knot.group | Group under which the knot exporter shall be run.
|
| services.prometheus.exporters.snmp.group | Group under which the snmp exporter shall be run.
|
| services.prometheus.exporters.bird.group | Group under which the bird exporter shall be run.
|
| services.prometheus.exporters.mail.group | Group under which the mail exporter shall be run.
|
| services.prometheus.exporters.flow.group | Group under which the flow exporter shall be run.
|
| services.prometheus.exporters.ping.group | Group under which the ping exporter shall be run.
|
| services.prometheus.exporters.ipmi.group | Group under which the ipmi exporter shall be run.
|
| services.prometheus.exporters.nats.group | Group under which the nats exporter shall be run.
|
| services.prometheus.exporters.mqtt.group | Group under which the mqtt exporter shall be run.
|
| services.prometheus.exporters.bind.group | Group under which the bind exporter shall be run.
|
| services.prometheus.exporters.node.group | Group under which the node exporter shall be run.
|
| services.prometheus.exporters.ebpf.group | Group under which the ebpf exporter shall be run.
|
| services.bind.listenOnIpv6Port | Ipv6 port to listen on.
|
| services.prometheus.exporters.node-cert.user | User owning the certs.
|
| services.elasticsearch.single_node | Start a single-node cluster
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port | The port to use for discovery and metric scraping
|
| services.nfs.server.statdPort | Use a fixed port for rpc.statd
|
| services.prometheus.exporters.redis.user | User name under which the redis exporter shall be run.
|
| services.prometheus.exporters.php-fpm.group | Group under which the php-fpm exporter shall be run.
|
| services.prometheus.exporters.jitsi.user | User name under which the jitsi exporter shall be run.
|
| services.prometheus.exporters.kafka.user | User name under which the kafka exporter shall be run.
|
| services.prometheus.exporters.v2ray.user | User name under which the v2ray exporter shall be run.
|
| services.prometheus.exporters.idrac.user | User name under which the idrac exporter shall be run.
|
| services.prometheus.exporters.fritz.user | User name under which the fritz exporter shall be run.
|
| services.prometheus.exporters.nginx.user | User name under which the nginx exporter shall be run.
|
| services.prometheus.exporters.dmarc.user | User name under which the dmarc exporter shall be run.
|
| services.polipo.proxyPort | TCP port on which Polipo will listen.
|
| services.mailhog.apiPort | Port on which the API endpoint will listen.
|
| services.kanidm.server.settings.bindaddress | Address/port combination the webserver binds to.
|
| services.jirafeau.nginxConfig.reuseport | Create an individual listening socket
|