| services.prometheus.exporters.apcupsd.apcupsdAddress | Address of the apcupsd Network Information Server (NIS).
|
| services.prometheus.exporters.deluge.delugePasswordFile | File containing the password to connect to deluge server.
|
| services.prometheus.exporters.storagebox.tokenFile | File that contains the Hetzner API token to use.
|
| services.prometheus.exporters.mqtt.hubitatTopicPrefixes | MQTT topic used for Hubitat messages.
|
| services.prometheus.exporters.mqtt.esphomeTopicPrefixes | MQTT topic used for ESPHome messages.
|
| services.prometheus.exporters.wireguard.prependSudo | Whether or no to prepend sudo to wg commands.
|
| services.prometheus.exporters.dmarc.pollIntervalSeconds | How often to poll the IMAP server in seconds.
|
| services.prometheus.exporters.node-cert.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node-cert.openFirewall
is true
|
| services.prometheus.exporters.sabnzbd.servers.*.apiKeyFile | The path to a file containing the API key
|
| services.prometheus.exporters.unpoller.loki.interval | How often the events are polled and pushed to Loki.
|
| services.prometheus.exporters.pgbouncer.pidFile | Path to PgBouncer pid file
|
| services.biboumi.openFirewall | Whether to enable opening of the identd port in the firewall.
|
| services.mastodon.sidekiqPort | TCP port used by the mastodon-sidekiq service.
|
| services.zitadel.openFirewall | Whether to open the port specified in listenPort in the firewall.
|
| services.xonotic.openFirewall | Open the firewall for TCP and UDP on the specified port.
|
| services.uptermd.openFirewall | Whether to open the firewall for the port in services.uptermd.port.
|
| services.prometheus.exporters.restic.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.prometheus.exporters.fritz.settings.devices.*.name | Name to use for the device.
|
| services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.imap-mailstat.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pve.collectors.config | Collect PVE onboot status
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.key | Path to certificate private key (PEM with private key)
|
| services.prometheus.exporters.ecoflow.ecoflowEmailFile | Path to the file with your personal ecoflow app login email address
|
| services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| services.prometheus.exporters.buildkite-agent.extraFlags | Extra commandline options to pass to the buildkite-agent exporter.
|
| services.prometheus.exporters.apcupsd.apcupsdNetwork | Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
|
| services.prometheus.exporters.shelly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.shelly.openFirewall
is true
|
| services.prometheus.exporters.mysqld.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mysqld.openFirewall
is true
|
| services.prometheus.exporters.chrony.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.chrony.openFirewall
is true
|
| services.prometheus.exporters.deluge.delugePassword | Password to connect to deluge server
|
| services.prometheus.exporters.fastly.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.fastly.openFirewall
is true
|
| services.prometheus.exporters.tibber.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.tibber.openFirewall
is true
|
| services.prometheus.exporters.pihole.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.pihole.openFirewall
is true
|
| services.prometheus.exporters.script.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.script.openFirewall
is true
|
| services.prometheus.exporters.statsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.statsd.openFirewall
is true
|
| services.prometheus.exporters.deluge.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.deluge.openFirewall
is true
|
| services.prometheus.exporters.restic.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.restic.openFirewall
is true
|
| services.prometheus.exporters.domain.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.domain.openFirewall
is true
|
| services.prometheus.exporters.rspamd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.rspamd.openFirewall
is true
|
| services.prometheus.exporters.dnssec.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnssec.openFirewall
is true
|
| services.prometheus.exporters.restic.rcloneOptions | Options to pass to rclone to control its behavior
|
| services.prometheus.exporters.storagebox.extraFlags | Extra commandline options to pass to the storagebox exporter.
|
| services.prometheus.exporters.scaphandre.extraFlags | Extra commandline options to pass to the scaphandre exporter.
|
| services.prometheus.exporters.pve.collectors.status | Collect Node/VM/CT status
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| services.etesync-dav.openFirewall | Whether to open the firewall for the specified port.
|
| services.cjdns.UDPInterface.bind | Address and port to bind UDP tunnels to.
|
| services.freeciv.openFirewall | Whether to enable opening the firewall for the port listening for clients.
|
| services.prometheus.exporters.rtl_433.channels.*.channel | Channel to match.
|
| services.prometheus.exporters.postfix.systemd.journalPath | Path to the systemd journal.
|
| services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| services.prometheus.exporters.imap-mailstat.oldestUnseenDate | Enable metric with timestamp of oldest unseen mail
|
| services.prometheus.exporters.smokeping.pingInterval | Interval between pings.
|
| services.prometheus.exporters.storagebox.package | The prometheus-storagebox-exporter package to use.
|
| services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| services.prometheus.exporters.fritzbox.gatewayAddress | The hostname or IP of the FRITZ!Box.
|
| services.prometheus.exporters.mailman3.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mailman3.openFirewall is true.
|
| services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| services.prometheus.exporters.script.settings | Free-form configuration for script_exporter, expressed as a Nix attrset and rendered to YAML.
Migration note:
The previous format using script = "sleep 5" is no longer supported
|
| services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| services.prometheus.exporters.restic.refreshInterval | Refresh interval for the metrics in seconds
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| services.prometheus.exporters.wireguard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.borgmatic.listenAddress | Address to listen on.
|
| services.prometheus.exporters.smokeping.listenAddress | Address to listen on.
|
| services.prometheus.exporters.surfboard.listenAddress | Address to listen on.
|
| services.prometheus.exporters.nextcloud.listenAddress | Address to listen on.
|
| services.prometheus.exporters.tailscale.listenAddress | Address to listen on.
|
| services.prometheus.exporters.pgbouncer.listenAddress | Address to listen on.
|
| services.prometheus.exporters.junos-czerwonk.listenAddress | Address to listen on.
|
| services.prometheus.exporters.rasdaemon.listenAddress | Address to listen on.
|
| services.prometheus.exporters.script.settings.scripts.*.name | Name of the script.
|
| services.immich-kiosk.openFirewall | Whether to open the firewall for the immich-kiosk port.
|
| services.anki-sync-server.openFirewall | Whether to open the firewall for the specified port.
|
| services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| services.udp-over-tcp.udp2tcp.<name>.forward | The IP and port to forward all traffic to.
|
| services.udp-over-tcp.tcp2udp.<name>.forward | The IP and port to forward all traffic to.
|
| services.smokeping.imgUrl | Base url for images generated in the cgi
|
| services.plantuml-server.listenPort | Port to listen on.
|
| services.prometheus.exporters.nvidia-gpu.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nvidia-gpu.openFirewall
is true
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| services.cloudflared.tunnels.<name>.originRequest.proxyPort | cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP
|
| services.prometheus.exporters.mail.environmentFile | File containing env-vars to be substituted into the exporter's config.
|