| services.tlsrpt.fetcher.settings.log_level | Level of log messages to emit.
|
| services.wastebin.settings.WASTEBIN_MAX_BODY_SIZE | Number of bytes to accept for POST requests
|
| services.stash.settings.stash_boxes.*.name | The name of the Stash Box
|
| services.evremap.settings.dual_role.*.hold | The key sequence that should be output when the input key is held
|
| services.evremap.settings.dual_role.*.input | The key that should be remapped
|
| services.postfix-tlspol.settings.server.address | Path or address/port where postfix-tlspol binds its socket to.
|
| services.matrix-conduit.settings.global.address | Address to listen on for connections by the reverse proxy/tls terminator.
|
| documentation.man.mandoc.settings | Configuration for man.conf(5)
|
| services.tor.settings.DoSCircuitCreationEnabled | See torrc manual.
|
| services.rosenpass.settings.verbosity | Verbosity of output produced by the service.
|
| services.tor.settings.ServerTransportPlugin.exec | Command of pluggable transport.
|
| services.sslh.settings.transparent | Whether the services behind sslh (Apache, sshd and so on) will see the
external IP and ports as if the external world connected directly to
them.
|
| services.matrix-conduit.settings.global.port | The port Conduit will be running on
|
| services.opensnitch.settings.Ebpf.ModulesPath | Configure eBPF modules path
|
| services.archisteamfarm.bots.<name>.settings | Additional settings that are documented here.
|
| services.journald.upload.settings.Upload.URL | The URL to upload the journal entries to
|
| services.inadyn.settings.custom.<name>.password | Password for this DDNS provider
|
| services.pid-fan-controller.settings.fans.*.cutoff | Whether to stop the fan when minPwm is reached.
|
| services.veilid.settings.logging.system.enabled | Events of type 'system' will be logged.
|
| services.lasuite-meet.settings.DJANGO_ALLOWED_HOSTS | Comma-separated list of hosts that are able to connect to the server
|
| services.lasuite-docs.settings.DJANGO_ALLOWED_HOSTS | Comma-separated list of hosts that are able to connect to the server
|
| services.misskey.settings.redisForTimelines.host | The Redis host.
|
| services.misskey.settings.redisForTimelines.port | The Redis port.
|
| services.opensnitch.settings.Firewall | Which firewall backend to use.
|
| services.libeufin.nexus.settings.nexus-ebics.USER_ID | User ID of the EBICS subscriber
|
| security.pam.u2f.settings.interactive | Set to prompt a message and wait before testing the presence of a U2F device
|
| services.suricata.settings.af-xdp.*.interface | af-xdp capture interface, see upstream docs.
|
| services.taler.merchant.settings.merchant.PORT | Port on which the HTTP server listens.
|
| services.taler.exchange.settings.exchange.PORT | Port on which the HTTP server listens.
|
| services.watchdogd.settings.filenr.enabled | Whether to enable watchdogd plugin filenr.
|
| services.wastebin.settings.WASTEBIN_BASE_URL | Base URL for the QR code display
|
| services.sslh.settings.protocols | List of protocols sslh will probe for and redirect
|
| services.suricata.settings.pcap.*.interface | pcap capture interface, see upstream docs.
|
| services.resolved.settings.Resolve.Domains | List of search domains used to complete unqualified name lookups.
|
| services.pretalx.settings.filesystem.data | Base path for all other storage paths.
|
| services.opensnitch.settings.Stats.MaxEvents | Max events to send to the GUI.
|
| services.sabnzbd.settings.misc.email_from | 'From:' field for emails (needs to be an address)
|
| services.szurubooru.server.settings.smtp.port | Port of the SMTP server.
|
| services.spacecookie.settings.root | The directory spacecookie should serve via gopher
|
| services.matrix-tuwunel.settings.global.port | The port(s) tuwunel will be running on
|
| security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| services.bitmagnet.settings.postgres.host | Address, hostname or Unix socket path of the database server
|
| services.immich.settings.server.externalDomain | Domain for publicly shared links, including http(s)://.
|
| services.canaille.settings.CANAILLE_LDAP.BIND_PW | The LDAP bind password
|
| services.crowdsec.settings.simulation | Attributes inside the simulation.yaml file.
|
| services.chhoto-url.settings.public_mode | Whether to enable public mode.
|
| services.chhoto-url.settings.slug_length | The length of auto-generated slugs.
|
| services.nvme-rs.settings.email.smtp_server | SMTP server address
|
| services.pinnwand.settings.paste_size | Maximum size of a paste in bytes.
|
| virtualisation.cri-o.settings | Configuration for cri-o, see
https://github.com/cri-o/cri-o/blob/master/docs/crio.conf.5.md.
|
| services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| services.opengfw.settings.workers.tcpTimeout | How long a connection is considered dead when no data is being transferred
|
| services.nextcloud.settings.log_type | Logging backend to use.
systemd automatically adds the php-systemd extensions to services.nextcloud.phpExtraExtensions
|
| services.mbpfan.settings.general.high_temp | If temperature is above this, fan speed will gradually increase.
|
| services.livekit.ingress.settings.redis.address | Address or hostname and port for redis connection
|
| services.watchdogd.settings.filenr.warning | The high watermark level
|
| services.nezha-agent.settings.temperature | Enable temperature monitoring.
|
| services.nezha-agent.settings.disable_nat | Disable NAT penetration.
|
| services.your_spotify.settings.PORT | The port of the api server
|
| services.pretalx.settings.database.backend | Database backend to use
|
| services.openssh.settings.KexAlgorithms | Allowed key exchange algorithms
Uses the lower bound recommended in both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| services.sourcehut.settings."meta.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."todo.sr.ht".webhooks | The Redis connection used for the webhooks worker.
|
| services.sourcehut.settings."lists.sr.ht".oauth-client-id | lists.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht".oauth-client-id | pages.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."paste.sr.ht".oauth-client-id | paste.sr.ht's OAuth client id for meta.sr.ht.
|
| services.bookstack.settings.DB_PASSWORD_FILE | The file containing your mysql/mariadb database password.
|
| services.libeufin.bank.settings.libeufin-bank.PORT | The port on which libeufin-bank should listen.
|
| services.rosenpass.settings.peers.*.endpoint | Endpoint of the remote Rosenpass peer.
|
| services.pgbouncer.settings.databases | Detailed information about PostgreSQL database definitions:
https://www.pgbouncer.org/config.html#section-databases
|
| services.snapserver.settings.http.enabled | Whether to enable the HTTP JSON-RPC.
|
| services.szurubooru.server.settings.smtp.user | User to connect to the SMTP server.
|
| services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| services.sabnzbd.settings.misc.email_full | Whether to send alerts for full disks
|
| services.grafana.settings.database.host | Only applicable to MySQL or Postgres
|
| services.ferretdb.settings.FERRETDB_HANDLER | Backend handler
|
| services.privoxy.settings.filterfile | List of paths to Privoxy filter files
|
| services.inadyn.settings.provider.<name>.hostname | Hostname alias(es).
|
| services.inadyn.settings.provider.<name>.username | Username for this DDNS provider.
|
| services.ferretdb.settings.FERRETDB_SQLITE_URL | SQLite URI (directory) for 'sqlite' handler
|
| services.lidarr.settings.log.analyticsEnabled | Send Anonymous Usage Data
|
| services.radarr.settings.log.analyticsEnabled | Send Anonymous Usage Data
|
| services.sonarr.settings.log.analyticsEnabled | Send Anonymous Usage Data
|
| services.suricata.settings.unix-command.enabled | Enable unix-command socket.
|
| services.firezone.server.api.settings | Environment variables for this component of the Firezone server
|
| services.firezone.server.web.settings | Environment variables for this component of the Firezone server
|
| services.blackfire-agent.settings.server-token | Sets the server token used to authenticate with Blackfire
You can find your personal server-token at https://blackfire.io/my/settings/credentials
|
| services.logrotate.settings.<name>.priority | Order of this logrotate block in relation to the others
|
| services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| services.grafana.settings.server.cert_file | Path to the certificate file (if protocol is set to https or h2).
|
| services.mchprs.settings.max_players | Maximum number of simultaneous players
|
| services.watchdogd.settings.filenr.logmark | Whether to log current stats every poll interval.
|
| services.sourcehut.settings.mail.smtp-password | Outgoing SMTP password.
|
| services.tor.settings.ReachableAddresses | See torrc manual.
|
| services.reposilite.settings.debugEnabled | Whether to enable debug mode.
|
| services.opensnitch.settings.Server.LogFile | File to write logs to (use /dev/stdout to write logs to standard
output).
|
| services.firefly-iii-data-importer.settings | Options for firefly-iii data importer configuration
|
| services.headscale.settings.oidc.pkce.method | PKCE method to use:
- plain: Use plain code verifier
- S256: Use SHA256 hashed code verifier (default, recommended)
|
| services.neard.settings.General.ConstantPoll | Enable constant polling
|
| services.pretalx.settings.filesystem.logs | Path to the log directory, that pretalx logs message to.
|