| services.dawarich.localDomain | The domain serving your Dawarich instance.
|
| services.castopod.localDomain | The domain serving your CastoPod instance.
|
| services.mastodon.localDomain | The domain serving your Mastodon instance.
|
| services.pangolin.baseDomain | Your base fully qualified domain name (without any subdomains).
|
| services.peertube.localDomain | The domain serving your PeerTube instance.
|
| security.ipa.chromiumSupport | Whether to whitelist the FreeIPA domain in Chromium.
|
| services.limesurvey.nginx.virtualHost.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.warpgate.settings.external_host | Configure the domain name of this Warpgate instance
|
| services.public-inbox.http.mounts | Root paths or URLs that public-inbox will be served on
|
| services.nullmailer.config.defaultdomain | The content of this attribute is appended to any host name that
does not contain a period (except localhost), including defaulthost
and idhost
|
| services.headscale.settings.dns.search_domains | Search domains to inject to Tailscale clients.
|
| services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| services.agate.hostnames | Domain name of this Gemini server, enables checking hostname and port
in requests. (multiple occurrences means basic vhosts)
|
| security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.dolibarr.h2o | With this option, you can customize an H2O virtual host which already
has sensible defaults for Dolibarr
|
| services.taskserver.fqdn | The fully qualified domain name of this server, which is also used
as the common name in the certificates.
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.misskey.reverseProxy.webserver.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| virtualisation.xen.store.settings.conflict.rateLimitIsAggregate | If the conflict.rateLimitIsAggregate option is true, then after each
tick one point of conflict-credit is given to just one domain: the
one at the front of the queue
|
| services.fedimintd.<name>.nginx.fqdn | Public domain of the API address of the reverse proxy/tls terminator.
|
| services.nextcloud.settings.trusted_domains | Trusted domains, from which the nextcloud installation will be
accessible
|
| services.hatsu.settings.HATSU_DOMAIN | The domain name of your instance (eg 'hatsu.local').
|
| services.pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.misskey.reverseProxy.host | The fully qualified domain name to bind to
|
| services.pixelfed.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Pixelfed
|
| services.kanboard.nginx | With this option, you can customize an NGINX virtual host which already
has sensible defaults for Kanboard
|
| services.cryptpad.settings | Cryptpad configuration settings
|
| services.lemmy.settings.hostname | The domain name of your instance (eg 'lemmy.ml').
|
| services.knot-resolver.enable | Whether to enable knot-resolver (version 6) domain name server
|
| services.gitea.settings.server.DOMAIN | Domain name of your server.
|
| services.filesender.localDomain | The domain serving your FileSender instance.
|
| security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| services.openafsServer.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.openafsClient.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| services.nghttpx.backends.*.server | Backend server location specified as either a host:port pair
or a unix domain docket.
|
| services.nextcloud.notify_push.bendDomainToLocalhost | Whether to add an entry to /etc/hosts for the configured nextcloud domain to point to localhost and add localhost to nextcloud's trusted_proxies config option
|
| services.dolibarr.nginx | With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr
|
| services.postgrey.greylistText | Response status text for greylisted messages; use %%s for seconds left until greylisting is over and %%r for mail domain of recipient
|
| services.hedgedoc.settings.path | Path to UNIX domain socket to listen on
If specified, host and port will be ignored.
|
| services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| services.openafsClient.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.openafsServer.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.canaille.settings.SERVER_NAME | The domain name on which canaille will be served.
|
| services.forgejo.settings.server.DOMAIN | Domain name of your server.
|
| services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id | At most one of domain_id and domain_name must be provided if using username
with Identity V3
|
| services.bluesky-pds.settings.PDS_HOSTNAME | Instance hostname (base domain name)
|
| services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| services.memcached.enableUnixSocket | Whether to enable Unix Domain Socket at /run/memcached/memcached.sock instead of listening on an IP address and port
|
| services.biboumi.settings.hostname | The hostname served by the XMPP gateway
|
| services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| services.mosquitto.listeners.*.port | Port to listen on
|
| services.netbox.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the NetBox service.
|
| virtualisation.xen.trace | Whether to enable Xen debug tracing and logging for Domain 0.
|
| services.invidious.nginx.enable | Whether to configure nginx as a reverse proxy for Invidious
|
| services.nghttpx.frontends.*.server | Frontend server interface binding specification as either a
host:port pair or a unix domain docket
|
| services.crab-hole.settings.blocklist.include_subdomains | Whether to enable Include subdomains.
|
| virtualisation.xen.debug | Whether to enable Xen debug features for Domain 0
|
| services.cloudflare-ddns.proxied | Whether the managed DNS records should be proxied through Cloudflare ('orange cloud')
|
| services.openafsServer.roles.backup.cellServDB.*.dnsname | DNS full-qualified domain name of a database server
|
| services.firezone.server.provision.enable | Whether to enable provisioning of the Firezone domain server.
|
| services.kubernetes.addons.dns.clusterDomain | Dns cluster domain
|
| services.netbird.server.management.dnsDomain | Domain used for peer resolution.
|
| services.kubernetes.kubelet.clusterDomain | Use alternative domain.
|
| services.postgrest.settings.server-unix-socket | Unix domain socket where to bind the PostgREST web server.
|
| services.hedgedoc.settings.protocolUseSSL | Use https:// for all links
|
| services.netbird.server.management.turnDomain | The domain of the TURN server to use.
|
| services.immich.settings.server.externalDomain | Domain for publicly shared links, including http(s)://.
|
| services.openafsServer.roles.backup.cellServDB.<name>.*.dnsname | DNS full-qualified domain name of a database server
|
| services.froide-govplan.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the Froide-Govplan service.
|
| virtualisation.xen.bootParams | Xen Command Line parameters passed to Domain 0 at boot time
|
| services.jibri.xmppEnvironments.<name>.xmppDomain | The base XMPP domain.
|
| services.matrix-synapse.settings.listeners.*.mode | File permissions on the UNIX domain socket.
|
| services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| services.akkoma.config.":pleroma"."Pleroma.Web.Endpoint".url.host | Domain name of the instance.
|
| services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| services.plausible.database.postgres.socket | Path to the UNIX domain-socket to communicate with postgres.
|
| services.trafficserver.hosting | Partition the cache according to origin server or domain
Consult the
upstream documentation for more details.
|
| services.sssd.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.peering-manager.settings.ALLOWED_HOSTS | A list of valid fully-qualified domain names (FQDNs) and/or IP
addresses that can be used to reach the peering manager service.
|
| virtualisation.xen.boot.params | Xen Command Line parameters passed to Domain 0 at boot time.
|
| services.varnish.listen.*.address | If given an IP address, it can be a host name ("localhost"), an IPv4 dotted-quad
("127.0.0.1") or an IPv6 address enclosed in square brackets ("[::1]").
(VCL4.1 and higher) If given an absolute Path ("/path/to/listen.sock") or "@"
followed by the name of an abstract socket ("@myvarnishd") accept connections
on a Unix domain socket
|
| services.anubis.instances.<name>.settings.TARGET | The reverse proxy target that Anubis is protecting
|
| services.matrix-synapse.settings.listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| services.simplesamlphp.<name>.localDomain | The domain serving your SimpleSAMLphp instance
|
| services.taler.merchant.settings.merchant.SERVE | Whether the HTTP server should listen on a UNIX domain socket ("unix") or on a TCP socket ("tcp").
|
| virtualisation.xen.enable | Whether to enable the Xen Project Hypervisor, a virtualisation technology defined as a type-1 hypervisor, which allows multiple virtual machines, known as domains, to run concurrently on the physical machine
|
| services.sftpgo.settings.ftpd.bindings.*.address | Network listen address
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| services.sftpgo.settings.sftpd.bindings.*.address | Network listen address
|
| services.sftpgo.settings.httpd.bindings.*.address | Network listen address
|
| services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| services.cyrus-imap.imapdSettings.notifysocket | Unix domain socket that the mail notification daemon listens on.
|
| services.jibri.xmppEnvironments.<name>.stripFromRoomDomain | The prefix to strip from the room's JID domain to derive the call URL.
|
| services.akkoma.config.":pleroma"."Pleroma.Upload".base_url | Base path which uploads will be stored at
|
| services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| services.matrix-synapse.settings.listeners | List of ports that Synapse should listen on, their purpose and their configuration
|