| services.movim.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.slskd.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.snapserver.streams.<name>.codec | Default audio compression method.
|
| services.vdirsyncer.jobs.<name>.config.pairs | vdirsyncer pair configurations
|
| services.znc.confOptions.networks.<name>.extraConf | Extra config for the network
|
| services.peertube-runner.instancesToRegister.<name>.runnerName | Runner name declared to the PeerTube instance.
|
| services.fedimintd.<name>.bitcoin.network | Bitcoin network to participate in.
|
| services.gancio.settings.hostname | The domain name under which the server is reachable.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| services.fedimintd.<name>.nginx.config.locations.<name>.recommendedProxySettings | Enable recommended proxy settings.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.recommendedUwsgiSettings | Enable recommended uwsgi settings.
|
| services.caddy.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.httpd.virtualHosts.<name>.robotsEntries | Specification of pages to be ignored by web crawlers
|
| services.fedimintd.<name>.p2p.openFirewall | Opens port in firewall for fedimintd's p2p port (both TCP and UDP)
|
| services.httpd.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.nginx.virtualHosts.<name>.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name | Name of the mute time interval, must be unique
|
| services.easytier.instances.<name>.enable | Enable the instance.
|
| services.firewalld.services.<name>.ports.*.port | |
| services.opkssh.providers.<name>.lifetime | Token lifetime
|
| services.traefik.staticConfigFile | Path to traefik's static configuration to use.
(Using that option has precedence over staticConfigOptions and dynamicConfigOptions)
|
| services.airsonic.contextPath | The context path, i.e., the last part of the Airsonic
URL
|
| services.ente.api.settings | Museum yaml configuration
|
| hardware.deviceTree.overlays.*.dtboFile | Path to .dtbo compiled overlay file.
|
| services.oauth2-proxy.upstream | The http url(s) of the upstream endpoint or file://
paths for static files
|
| services.ncdns.dnssec.keys.zonePrivate | Path to the file containing the ZSK private key.
|
| services.outline.secretKeyFile | File path that contains the application secret key
|
| services.moodle.database.socket | Path to the unix socket file to use for authentication.
|
| services.rkvm.server.settings.key | TLS key path.
This should be generated with rkvm-certificate-gen.
|
| services.subsonic.contextPath | The context path, i.e., the last part of the Subsonic
URL
|
| services.mirakurun.unixSocket | Path to unix socket to listen on
|
| services.zabbixWeb.nginx.virtualHost.root | The path of the web root directory.
|
| systemd.shutdownRamfs.storePaths.*.target | Path of the symlink.
|
| services.nginx.virtualHosts.<name>.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| services.btrbk.instances.<name>.settings | configuration options for btrbk
|
| systemd.network.networks.<name>.pfifoFastConfig | Each attribute in this set specifies an option in the
[PFIFOFast] section of the unit
|
| systemd.network.networks.<name>.bridgeConfig | Each attribute in this set specifies an option in the
[Bridge] section of the unit
|
| services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file | File name in the ecdsa folder for which this
passphrase should be used.
|
| services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file | File name in the pkcs8 folder for which this
passphrase should be used.
|
| systemd.user.sockets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| systemd.user.targets.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| services.gancio.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.fluidd.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.httpd.virtualHosts.<name>.locations | Declarative location config
|
| services.akkoma.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.tinc.networks.<name>.interfaceType | The type of virtual interface used for the network connection.
|
| services.monica.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| services.matomo.nginx.locations.<name>.return | Adds a return directive, for e.g. redirections.
|
| boot.specialFileSystems.<name>.options | Options used to mount the file system
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| services.firezone.server.provision.accounts.<name>.policies.<name>.description | The description of this policy
|
| services.tahoe.introducers.<name>.tub.port | The port on which the introducer will listen.
|
| services.tarsnap.archives.<name>.excludes | Exclude files and directories matching these patterns.
|
| systemd.services.<name>.reloadTriggers | An arbitrary list of items such as derivations
|
| services.snipe-it.nginx.locations.<name>.uwsgiPass | Adds uwsgi_pass directive and sets recommended proxy headers if
recommendedUwsgiSettings is enabled.
|
| services.snipe-it.nginx.locations.<name>.proxyPass | Adds proxy_pass directive and sets recommended proxy headers if
recommendedProxySettings is enabled.
|
| services.fedimintd.<name>.nginx.config.quic | Whether to enable the QUIC transport protocol
|
| systemd.user.targets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| systemd.user.sockets.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| networking.wireguard.interfaces.<name>.listenPort | 16-bit port for listening
|
| services.nginx.virtualHosts.<name>.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.blockbook-frontend.<name>.enable | Whether to enable blockbook-frontend application.
|
| services.nsd.zones.<name>.dnssecPolicy.algorithm | Which algorithm to use for DNSSEC
|
| systemd.services.<name>.environment | Environment variables passed to the service's processes.
|
| services.jibri.xmppEnvironments.<name>.control.muc.nickname | The nickname for this Jibri instance in the MUC.
|
| services.ytdl-sub.instances.<name>.schedule | How often to run ytdl-sub
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| systemd.services.<name>.startLimitIntervalSec | Configure unit start rate limiting
|
| services.drupal.sites.<name>.virtualHost.http2 | Whether to enable HTTP 2
|
| services.errbot.instances.<name>.identity | Errbot identity configuration
|
| services.gitlab-runner.services.<name>.dockerImage | Docker image to be used.
|
| networking.wlanInterfaces.<name>.flags | Flags for interface of type monitor.
|
| networking.supplicant.<name>.driver | Force a specific wpa_supplicant driver.
|
| services.wordpress.sites.<name>.settings | Structural Wordpress configuration
|
| services.acme-dns.settings.general.nsname | Zone name server.
|
| systemd.network.networks.<name>.matchConfig | Each attribute in this set specifies an option in the
[Match] section of the unit
|
| services.postfix.settings.master.<name>.args | Arguments to pass to the command
|
| services.github-runners.<name>.noDefaultLabels | Disables adding the default labels
|
| services.firewalld.zones.<name>.forwardPorts.*.port | |
| networking.wlanInterfaces.<name>.type | The type of the WLAN interface
|
| image.repart.partitions.<name>.repartConfig | Specify the repart options for a partiton as a structural setting
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| boot.loader.external.installHook | The full path to a program of your choosing which performs the bootloader installation process
|
| services.hound.settings | The full configuration of the Hound daemon
|
| services.cross-seed.settingsFile | Path to a JSON file containing settings that will be merged with the
settings option
|
| services.moodle.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.minetest-server.logPath | Path to logfile for logging
|
| services.nagios.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.oauth2-proxy.cookie.secretFile | The path to a file containing the seed string for secure cookies.
|
| services.tailscaleAuth.socketPath | Path of the socket listening to authorization requests.
|
| services.pairdrop.rtcConfig | Configuration for STUN/TURN servers
|
| services.outline.smtp.passwordFile | File path containing the password to authenticate with.
|
| services.pihole-ftl.stateDirectory | Path for pihole state files.
|
| services.matrix-synapse.configFile | Path to the configuration file on the target system
|
| systemd.shutdownRamfs.storePaths.*.source | Path of the source file.
|
| services.autorandr.profiles.<name>.fingerprint | Output name to EDID mapping
|
| services.tahoe.nodes.<name>.storage.reservedSpace | The amount of filesystem space to not use for storage.
|
| services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| networking.jool.siit.<name>.framework | The framework to use for attaching Jool's translation to the exist
kernel packet processing rules
|