| services.nezha-agent.settings.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.fluidd.nginx.redirectCode | HTTP status used by globalRedirect and forceSSL
|
| services.fluidd.nginx.locations.<name>.index | Adds index directive.
|
| services.fluidd.nginx.locations.<name>.alias | Alias directory for requests.
|
| services.fluidd.nginx.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.druid.coordinator.jvmArgs | Arguments to pass to the JVM
|
| services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.locations.<name>.tryFiles | Adds try_files directive.
|
| services.mail.sendmailSetuidWrapper.owner | The owner of the wrapper program.
|
| services.mail.sendmailSetuidWrapper.group | The group of the wrapper program.
|
| services.fluidd.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.druid.middleManager.openFirewall | Open firewall ports for Druid middleManager.
|
| programs.singularity.enableSuid | Whether to enable the SUID support of Singularity/Apptainer.
|
| services.gmediarender.uuid | A UUID for uniquely identifying the endpoint
|
| services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.mail.sendmailSetuidWrapper.enable | Whether to enable the wrapper.
|
| services.fluidd.nginx.listenAddresses | Listen addresses for this virtual host
|
| services.druid.coordinator.enable | Whether to enable Druid Coordinator.
|
| services.mail.sendmailSetuidWrapper.source | The absolute path to the program to be wrapped.
|
| services.fluidd.nginx.sslCertificate | Path to server SSL certificate.
|
| services.fluidd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.fluidd.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.mail.sendmailSetuidWrapper.setgid | Whether to add the setgid bit the wrapper program.
|
| services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.locations.<name>.extraConfig | These lines go to the end of the location verbatim.
|
| services.druid.router.restartIfChanged | Automatically restart the service on config change
|
| services.druid.broker.restartIfChanged | Automatically restart the service on config change
|
| services.mail.sendmailSetuidWrapper.program | The name of the wrapper program
|
| services.slurm.user | Set this option when you want to run the slurmctld daemon
as something else than the default slurm user "slurm"
|
| services.druid.historical.openFirewall | Open firewall ports for Druid Historical.
|
| security.chromiumSuidSandbox.enable | Whether to install the Chromium SUID sandbox which is an executable that
Chromium may use in order to achieve sandboxing
|
| services.fluidd.nginx.listen.*.extraParameters | Extra parameters of this listen directive.
|
| services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.fluidd.nginx.locations.<name>.priority | Order of this location block in relation to the others in the vhost
|
| services.druid.coordinator.openFirewall | Open firewall ports for Druid Coordinator.
|
| services.druid.overlord.restartIfChanged | Automatically restart the service on config change
|
| virtualisation.kvmgt.vgpus.<name>.uuid | UUID(s) of VGPU device
|
| services.fluidd.nginx.sslTrustedCertificate | Path to root SSL certificate for stapling and client certificates.
|
| services.fluidd.nginx.locations.<name>.fastcgiParams | FastCGI parameters to override
|
| services.druid.middleManager.restartIfChanged | Automatically restart the service on config change
|
| services.druid.historical.segmentLocations | Locations where the historical will store its data.
|
| services.druid.historical.segmentLocations.*.path | the path to store the segments
|
| services.fluidd.nginx.locations.<name>.proxyWebsockets | Whether to support proxying websocket connections with HTTP/1.1.
|
| services.druid.historical.restartIfChanged | Automatically restart the service on config change
|
| services.druid.historical.segmentLocations.*.maxSize | Max size the druid historical can occupy
|
| services.mpd.extraConfig | Extra directives added to to the end of MPD's configuration file,
mpd.conf
|
| users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| services.mail.sendmailSetuidWrapper.permissions | The permissions of the wrapper program
|
| services.druid.coordinator.restartIfChanged | Automatically restart the service on config change
|
| virtualisation.fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.druid.historical.segmentLocations.*.freeSpacePercent | Druid Historical will fail to write if it exceeds this value
|
| services.fluidd.nginx.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.fluidd.nginx.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| services.mollysocket.settings.allowed_uuids | UUIDs of Signal accounts that may use this server
|
| services.mail.sendmailSetuidWrapper.capabilities | A comma-separated list of capability clauses to be given to the
wrapper program
|
| services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| networking.networkmanager.ensureProfiles.secrets.entries.*.matchUuid | UUID of the connection profile
UUIDs are assigned once on connection creation and should never change as long as the connection still applies to the same network.
|
| services.firefox-syncserver.enable | Whether to enable the Firefox Sync storage service
|
| services.chhoto-url.settings.try_longer_slugs | Whether to try a longer UID upon collision.
|
| virtualisation.oci-containers.containers.<name>.user | Override the username or UID (and optionally groupname or GID) used
in the container.
|
| virtualisation.sharedDirectories.<name>.securityModel | The security model to use for this share:
passthrough: files are stored using the same credentials as they are created on the guest (this requires QEMU to run as root)
mapped-xattr: some of the file attributes like uid, gid, mode bits and link target are stored as file attributes
mapped-file: the attributes are stored in the hidden .virtfs_metadata directory
|
| services.filesender.settings.admin | UIDs (as per the configured saml_uid_attribute) of FileSender administrators
|
| security.isolate.firstUid | Start of block of UIDs reserved for sandboxes.
|
| security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.isolate.numBoxes | Number of UIDs and GIDs to reserve, starting from
firstUid and firstGid.
|
| services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| programs.benchexec.users | Users that intend to use BenchExec
|
| services.grafana.provision.alerting.rules.settings.deleteRules | List of alert rule UIDs that should be deleted.
|
| services.grafana.provision.alerting.templates.settings.deleteTemplates | List of alert rule UIDs that should be deleted.
|