| services.postgresqlWalReceiver.receivers.<name>.directory | Directory to write the output to.
|
| services.swapspace.settings.max_swapsize | Greatest allowed size for individual swapfiles
|
| services.openvscode-server.withoutConnectionToken | Run without a connection token
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| services.tor.settings.DataDirectory | See torrc manual.
|
| services.mediawiki.httpd.virtualHost.extraConfig | These lines go to httpd.conf verbatim
|
| services.nextcloud.settings.trusted_domains | Trusted domains, from which the nextcloud installation will be
accessible
|
| services.prometheus.exporters.imap-mailstat.configurationFile | File containing the configuration
|
| services.mobilizon.settings.":mobilizon".":instance".hostname | Your instance's hostname
|
| services.prometheus.exporters.collectd.collectdBinary.port | Network address on which to accept collectd binary network packets.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.prometheus.exporters.borgmatic.openFirewall | Open port in firewall for incoming connections.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| services.postfix.settings.master | The master.cf configuration file as an attribute set of service
defitions
|
| services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| services.scion.scion-ip-gateway.enable | Whether to enable the scion-ip-gateway service.
|
| services.terraria.dataDir | Path to variable state data directory for terraria.
|
| services.snipe-it.nginx.acmeFallbackHost | Host which to proxy requests to if ACME challenge is not found
|
| services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects | Configure whether HTTP requests follow HTTP 3xx redirects
|
| services.mediatomb.user | User account under which the service runs.
|
| services.photoprism.settings | See the getting-started guide for available options.
|
| services.subsonic.enable | Whether to enable Subsonic daemon.
|
| services.pgadmin.emailServer.port | SMTP server port for email delivery
|
| services.plex.dataDir | The directory where Plex stores its data files.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96 | HMAC-SHA-256 is used with 128-bit truncation with IPsec
|
| services.self-deploy.sshKeyFile | Path to SSH private key used to fetch private repositories over
SSH.
|
| services.outline.smtp.username | Username to authenticate with.
|
| services.pgmanage.package | The pgmanage package to use.
|
| services.postfix.enableHeaderChecks | Whether to enable postfix header checks
|
| services.syncthing.settings.folders.<name>.type | Controls how the folder is handled by Syncthing
|
| services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| services.metricbeat.settings.name | Name of the beat
|
| services.smartd.enable | Whether to enable smartd daemon from smartmontools package.
|
| services.prosody.modules.welcome | Welcome users who register accounts
|
| services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| services.redmine.user | User under which Redmine is ran.
|
| services.suricata.settings.dpdk.interfaces | See upstream docs: docs/capture-hardware/dpdk and docs/configuration/suricata-yaml.html#data-plane-development-kit-dpdk.
|
| services.nagios.virtualHost.servedDirs | This option provides a simple way to serve static directories.
|
| services.minio.region | The physical location of the server
|
| services.udp-over-tcp.tcp2udp.<name>.bind | Which local IP to bind the UDP socket to.
|
| services.prometheus.exporters.varnish.varnishStatPath | Path to varnishstat.
|
| services.send.port | Port the Send service listens on.
|
| services.step-ca.enable | Whether to enable the smallstep certificate authority server.
|
| services.sharkey.settings.url | The full URL that the Sharkey instance will be publically accessible on
|
| services.transfer-sh.enable | Whether to enable Easy and fast file sharing from the command-line.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.servers | List of URLs to be used to contact Marathon servers
|
| services.netbox.port | Port the server will listen on
|
| services.prometheus.exporters.buildkite-agent.endpoint | The Buildkite Agent API endpoint.
|
| services.smokeping.imgUrl | Base url for images generated in the cgi
|
| services.mediawiki.url | URL of the wiki.
|
| services.photoprism.address | Web interface address.
|
| services.pretix.group | Group under which pretix should run.
|
| services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint | Custom endpoint to be used.
|
| services.nginx.virtualHosts.<name>.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.scrutiny.collector.settings | Collector settings to be rendered into the collector configuration file
|
| services.szurubooru.client.package | The client package to use.
|
| services.prosody.modules.bosh | Enable BOSH clients, aka 'Jabber over HTTP'
|
| services.orthanc.package | The orthanc package to use.
|
| services.prometheus.remoteWrite.*.write_relabel_configs.*.action | Action to perform based on regex matching
|
| services.netdata.configDir | Complete netdata config directory except netdata.conf
|
| services.rosenpass.settings.listen | List of local endpoints to listen for connections.
|
| services.rauc.client.enable | Whether to enable RAUC client in the system environment.
|
| services.matrix-appservice-discord.port | Port number on which the bridge should listen for internal communication with the Matrix homeserver.
|
| services.outline.databaseUrl | URI to use for the main PostgreSQL database
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.redis.servers | Configuration of multiple redis-server instances.
|
| services.ostinato.portList.exclude | A list of ports does not appear on the port list managed by drone.
|
| services.multipath.devices.*.skip_kpartx | If set to yes, kpartx will not automatically create partitions on the device
|
| services.nsd.zones.<name>.maxRefreshSecs | Limit refresh time for secondary zones
|
| services.redis.servers.<name>.maxclients | Set the max number of connected clients at the same time.
|
| services.rutorrent.dataDir | Storage path of ruTorrent.
|
| services.sickbeard.configFile | Path to config file.
|
| services.stunnel.enableInsecureSSLv3 | Enable support for the insecure SSLv3 protocol.
|
| services.umami.settings.APP_SECRET_FILE | A file containing a secure random string
|
| services.listmonk.package | The listmonk package to use.
|
| services.pinchflat.extraConfig | The configuration of Pinchflat is handled through environment variables
|
| services.unpoller.influxdb.pass | Path of a file containing the password for influxdb
|
| services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| services.nginx.virtualHosts.<name>.listen.*.proxyProtocol | Enable PROXY protocol.
|
| services.munin-cron.extraGlobalConfig | munin.conf extra global configuration
|
| services.postgres-websockets.pgpassFile | The password to authenticate to PostgreSQL with
|
| services.nagios.objectDefs | A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the
network that you want Nagios to monitor.
|
| services.thanos.store.objstore.config-file | Path to YAML file that contains object store configuration
|
| services.rmfakecloud.package | The rmfakecloud package to use.
|
| services.squid.configText | Verbatim contents of squid.conf
|
| services.prosody.modules.websocket | Enable WebSocket support
|
| services.miniflux.config.WATCHDOG | Enable or disable Systemd watchdog.
|
| services.tsmBackup.autoTime | The backup service will be invoked
automatically at the given date/time,
which must be in the format described in
systemd.time(5)
|
| services.omnom.user | The Omnom service user.
|
| services.prometheus.exporters.mqtt.zigbee2MqttAvailability | Whether to enable Normalize sensor name for device availability metric added by Zigbee2MQTT..
|
| services.prometheus.alertmanager.logFormat | If set use a syslog logger or JSON logging.
|
| services.prometheus.exporters.restic.environmentFile | File containing the credentials to access the repository, in the
format of an EnvironmentFile as described by systemd.exec(5)
|
| services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| services.opengfw.settings.ruleset | The path to load specific local geoip/geosite db files
|
| services.livebook.environmentFile | Additional environment file as defined in systemd.exec(5)
|
| services.opentracker.package | The opentracker package to use.
|
| services.octoprint.enable | Whether to enable OctoPrint, web interface for 3D printers.
|
| services.physlock.lockOn.hibernate | Whether to lock screen with physlock just before hibernate.
|
| services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|