| services.bookstack.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.prometheus.exporters.apcupsd.apcupsdNetwork | Network of the apcupsd Network Information Server (NIS): one of "tcp", "tcp4", or "tcp6".
|
| services.netdata.enableAnalyticsReporting | Enable reporting of anonymous usage statistics to Netdata Inc. via either
Google Analytics (in versions prior to 1.29.4), or Netdata Inc.'s
self-hosted PostHog (in versions 1.29.4 and later)
|
| services.cockpit.openFirewall | Open port for cockpit.
|
| services.prefect.databasePort | database port for postgres only
|
| networking.networkmanager.ethernet.macAddress | Set the MAC address of the interface.
"XX:XX:XX:XX:XX:XX": MAC address of the interface
"permanent": Use the permanent MAC address of the device
"preserve": Don’t change the MAC address of the device upon activation
"random": Generate a randomized value upon each connect
"stable": Generate a stable, hashed MAC address
|
| services.prometheus.exporters.rtl_433.ids.*.location | Location to match.
|
| services.prometheus.exporters.artifactory.user | User name under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.py-air-control.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.py-air-control.openFirewall is true.
|
| services.prometheus.exporters.buildkite-agent.tokenPath | The token from your Buildkite "Agents" page
|
| services.prometheus.exporters.buildkite-agent.extraFlags | Extra commandline options to pass to the buildkite-agent exporter.
|
| services.prometheus.exporters.nvidia-gpu.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.nvidia-gpu.openFirewall
is true
|
| services.nsd.zones.<name>.notify | This primary server will notify all given secondary servers about
zone changes
|
| hardware.amdgpu.legacySupport.enable | Whether to enable using amdgpu kernel driver instead of radeon for Southern Islands
(Radeon HD 7000) series and Sea Islands (Radeon HD 8000)
series cards
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| services.prometheus.exporters.scaphandre.extraFlags | Extra commandline options to pass to the scaphandre exporter.
|
| services.prometheus.exporters.storagebox.extraFlags | Extra commandline options to pass to the storagebox exporter.
|
| services.glances.openFirewall | Open port in the firewall for glances.
|
| services.dockerRegistry.redisUrl | Set redis host and port.
|
| services.screego.openFirewall | Open the firewall port(s).
|
| services.polaris.openFirewall | Open the configured port in the firewall.
|
| services.prometheus.exporters.surfboard.modemAddress | The hostname or IP of the cable modem.
|
| services.prometheus.exporters.mqtt.prometheusPrefix | Prefix added to the metric name.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| hardware.amdgpu.amdvlk.support32Bit.package | The amdvlk package to use.
|
| services.prometheus.exporters.imap-mailstat.listenAddress | Address to listen on.
|
| services.unifi.openFirewall | Whether or not to open the minimum required ports on the firewall
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| services.prometheus.exporters.restic.refreshInterval | Refresh interval for the metrics in seconds
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| services.borgmatic.settings.repositories | A required list of local or remote repositories with paths and
optional labels (which can be used with the --repository flag to
select a repository)
|
| services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| services.prometheus.exporters.imap-mailstat.oldestUnseenDate | Enable metric with timestamp of oldest unseen mail
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| services.prometheus.exporters.restic.repositoryFile | Path to the file containing the URI for the repository to monitor.
|
| services.prometheus.exporters.restic.rcloneConfig | Configuration for the rclone remote being used for backup
|
| services.prometheus.exporters.rtl_433.channels.*.name | Name to match.
|
| services.prometheus.exporters.unpoller.loki.verify_ssl | Verify Loki's certificate.
|
| services.teamspeak3.defaultVoicePort | Default UDP port for clients to connect to virtual servers - used for first virtual server, subsequent ones will open on incrementing port numbers by default.
|
| services.static-web-server.listen | The systemd.socket(5) "ListenStream" used in static-web-server.socket
|
| services.xserver.exportConfiguration | Whether to symlink the X server configuration under
/etc/X11/xorg.conf.
|
| services.prometheus.exporters.rtl_433.listenAddress | Address to listen on.
|
| services.prometheus.exporters.opnsense.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.opnsense.openFirewall is true.
|
| services.prometheus.exporters.graphite.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.graphite.openFirewall is true.
|
| services.prometheus.exporters.influxdb.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.influxdb.openFirewall is true.
|
| services.prometheus.exporters.postgres.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.postgres.openFirewall is true.
|
| services.prometheus.exporters.unpoller.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.unpoller.openFirewall is true.
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.prometheus.exporters.smartctl.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.smartctl.openFirewall is true.
|
| services.prometheus.exporters.fritzbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.fritzbox.openFirewall is true.
|
| services.prometheus.exporters.collectd.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.collectd.openFirewall is true.
|
| services.prometheus.exporters.blackbox.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.blackbox.openFirewall is true.
|
| services.prometheus.exporters.nginxlog.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.nginxlog.openFirewall is true.
|
| services.prometheus.exporters.mikrotik.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.mikrotik.openFirewall is true.
|
| services.esphome.openFirewall | Whether to open the firewall for the specified port.
|
| services.distccd.openFirewall | Opens the specified TCP port for distcc.
|
| services.livekit.openFirewall | Opens port range for LiveKit on the firewall.
|
| services.marytts.openFirewall | Whether to open the port in the firewall for MaryTTS.
|
| services.firezone.relay.highestPort | The highest port to use in TURN allocation
|
| services.caddy.openFirewall | Whether to enable opening the specified http(s) ports in the firewall
|
| services.tahoe.nodes.<name>.tub.location | The external location that the node should listen on
|
| services.prometheus.exporters.artifactory.group | Group under which the artifactory exporter shall be run.
|
| services.prometheus.exporters.storagebox.package | The prometheus-storagebox-exporter package to use.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| services.tailscale.serve.services.<name>.endpoints | Map of incoming traffic patterns to local targets
|
| services.prometheus.exporters.fritzbox.gatewayAddress | The hostname or IP of the FRITZ!Box.
|
| services.prometheus.exporters.postfix.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.postfix.openFirewall
is true
|
| services.prometheus.exporters.libvirt.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.libvirt.openFirewall
is true
|
| services.prometheus.exporters.klipper.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.klipper.openFirewall
is true
|
| services.prometheus.exporters.unbound.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.unbound.openFirewall
is true
|
| services.prometheus.exporters.bitcoin.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.bitcoin.openFirewall
is true
|
| services.prometheus.exporters.mongodb.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.mongodb.openFirewall
is true
|
| services.prometheus.exporters.apcupsd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.apcupsd.openFirewall
is true
|
| services.prometheus.exporters.ecoflow.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.ecoflow.openFirewall
is true
|
| services.prometheus.exporters.process.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.process.openFirewall
is true
|
| services.prometheus.exporters.sabnzbd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.sabnzbd.openFirewall
is true
|
| services.prometheus.exporters.dnsmasq.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dnsmasq.openFirewall
is true
|
| services.prometheus.exporters.dovecot.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.dovecot.openFirewall
is true
|
| services.prometheus.exporters.systemd.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.systemd.openFirewall
is true
|
| services.prometheus.exporters.varnish.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.varnish.openFirewall
is true
|
| services.prometheus.exporters.smokeping.pingInterval | Interval between pings.
|
| services.biboumi.openFirewall | Whether to enable opening of the identd port in the firewall.
|
| services.mastodon.sidekiqPort | TCP port used by the mastodon-sidekiq service.
|
| services.uptermd.openFirewall | Whether to open the firewall for the port in services.uptermd.port.
|
| services.zitadel.openFirewall | Whether to open the port specified in listenPort in the firewall.
|
| services.xonotic.openFirewall | Open the firewall for TCP and UDP on the specified port.
|
| services.prometheus.exporters.postgres.telemetryPath | Path under which to expose metrics.
|
| services.qbittorrent.torrentingPort | the port passed to qbittorrent via --torrenting-port
|
| services.zammad.websocketPort | Websocket service port.
|
| services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| services.dolibarr.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fediwall.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.agorakit.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.kanboard.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.librenms.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.pixelfed.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.mainsail.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|