| services.draupnir.settings.managementRoom | The room ID or alias where moderators can use the bot's functionality
|
| services.postfix.settings.main.mydestination | List of domain names intended for local delivery using /etc/passwd and /etc/aliases.
Do not include virtual domains in this list.
https://www.postfix.org/postconf.5.html#mydestination
|
| services.prometheus.exporters.chrony.chronyServerAddress | ChronyServerAddress of the chrony server side command port. (Not enabled by default.)
Defaults to the local unix socket.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs | Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.
|
| services.jitsi-videobridge.nat.harvesterAddresses | Addresses of public STUN services to use to automatically find
the public and local addresses of this Jitsi-Videobridge instance
without the need for manual configuration
|
| services.parsedmarc.provision.elasticsearch | Whether to set up and use a local instance of Elasticsearch.
|
| services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| services.icingaweb2.modules.monitoring.transports.<name>.path | Path to the socket for local or remote transports
|
| services.matrix-synapse.workers | Options for configuring workers
|
| services.prometheus.exporters.pve.environmentFile | Path to the service's environment file
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| programs.pay-respects.aiIntegration | Whether to enable pay-respects' LLM integration
|
| services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.healthchecks.settings | Environment variables which are read by healthchecks (local)_settings.py
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| services.healthchecks.settingsFile | Environment variables which are read by healthchecks (local)_settings.py
|
| services.grafana.settings.security.admin_password | Default admin password
|
| virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| services.prometheus.exporters.idrac.configurationPath | Path to the service's config file
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.mobilizon.settings.":mobilizon"."Mobilizon.Storage.Repo".socket_dir | Path to the postgres socket directory
|
| services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.grafana.provision.datasources.settings.datasources.*.secureJsonData | Datasource specific secure configuration
|
| services.tor.relay.role | Your role in Tor network
|
| services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.peertube.settings.video_transcription.engine_path | Custom engine path for local transcription.
|
| services.postfix.settings.main.smtp_tls_security_level | The client TLS security level.
Use dane with a local DNSSEC validating DNS resolver enabled.
https://www.postfix.org/postconf.5.html#smtp_tls_security_level
|
| services.doh-server.settings.ecs_allow_non_global_ip | By default, non global IP addresses are never forwarded to upstream servers
|
| i18n.extraLocaleSettings | A set of additional system-wide locale settings other than LANG
which can be configured with i18n.defaultLocale
|
| i18n.extraLocales | Additional locales that the system should support, besides the ones
configured with i18n.defaultLocale and
i18n.extraLocaleSettings
|
| services.gancio.userLocale | Override default locales within gancio
|
| services.udev.extraHwdb | Additional hwdb files
|
| services.redsocks.log | Where to send logs
|
| services.udev.extraRules | Additional udev rules
|
| services.jenkins.prefix | Specifies a urlPrefix to use with jenkins
|
| boot.initrd.services.udev.rules | udev rules to include in the initrd
only
|
| services.mediawiki.extraConfig | Any additional text to be appended to MediaWiki's
LocalSettings.php configuration file
|
| services.private-gpt.settings | settings-local.yaml for private-gpt
|
| services.kimai.sites.<name>.settings | Structural Kimai's local.yaml configuration
|
| services.ente.api.settings | Museum yaml configuration
|
| services.redsocks.chroot | Chroot under which to run redsocks
|
| programs.singularity.enableExternalLocalStateDir | Whether to use top-level directories as LOCALSTATEDIR
instead of the store path ones
|
| services.spamassassin.config | The SpamAssassin local.cf config
If you are using this configuration:
add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_
Then you can Use this sieve filter:
require ["fileinto", "reject", "envelope"];
if header :contains "X-Spam-Flag" "YES" {
fileinto "spam";
}
Or this procmail filter:
:0:
* ^X-Spam-Flag: YES
/var/vpopmail/domains/lastlog.de/js/.maildir/.spam/new
To filter your messages based on the additional mail headers added by spamassassin.
|
| nixpkgs.pkgs | If set, the pkgs argument to all NixOS modules is the value of
this option, extended with nixpkgs.overlays, if
that is also set
|
| services.samba-wsdd.listen | Listen on path or localhost port in discovery mode.
|
| services.nginx.statusPage | Enable status page reachable from localhost on http://127.0.0.1/nginx_status.
|
| i18n.defaultCharset | The default locale character set.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server | Consul server to query
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts | List of remote selectors to include in CHILD_SA
|
| services.trilium-server.host | The host address to bind to (defaults to localhost).
|
| services.portunus.port | Port where the Portunus webserver should listen on
|
| i18n.defaultLocale | The default locale
|
| services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| networking.proxy.noProxy | This option specifies the no_proxy environment variable
|
| services.xandikos.address | The IP address on which Xandikos will listen
|
| services.riemann-tools.riemannHost | Address of the host riemann node
|
| services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| services.mailman.webHosts | The list of hostnames and/or IP addresses from which the Mailman Web
UI will accept requests
|
| services.pingvin-share.hostname | The domain name of your instance
|
| services.postfix.networks | Net masks for trusted - allowed to relay mail to third parties -
hosts
|
| services.uptime.configFile | The uptime configuration file
If mongodb: server != localhost, please set usesRemoteMongo = true
If you only want to run the monitor, please set enableWebService = false
and enableSeparateMonitoringService = true
If autoStartMonitor: false (recommended) and you want to run both
services, please set enableSeparateMonitoringService = true
|
| services.irkerd.listenAddress | Specifies the bind address on which the irker daemon listens
|
| services.postfix.networksStyle | Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
|
| services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| networking.hosts | Locally defined maps of hostnames to IP addresses.
|
| services.nextcloud.notify_push.bendDomainToLocalhost | Whether to add an entry to /etc/hosts for the configured nextcloud domain to point to localhost and add localhost to nextcloud's trusted_proxies config option
|
| services.hickory-dns.settings.zones.*.zone | Zone name, like "example.com", "localhost", or "0.0.127.in-addr.arpa".
|
| services.keycloak.database.useSSL | Whether the database connection should be secured by SSL / TLS
|
| services.tor.torsocks.allowInbound | Set Torsocks to accept inbound connections
|
| services.apcupsd.configText | Contents of the runtime configuration file, apcupsd.conf
|
| services.librenms.database.socket | A unix socket to mysql, accessible by the librenms user
|
| services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| services.roundcube.database.host | Host of the postgresql server
|
| services.mailman.hyperkitty.baseUrl | Where can Mailman connect to Hyperkitty's internal API, preferably on
localhost?
|
| services.sympa.database.host | Database host address
|
| services.keter.globalKeterConfig.ip-from-header | You want that ip-from-header in the nginx setup case
|
| services.nextjs-ollama-llm-ui.enable | Whether to enable Simple Ollama web UI service; an easy to use web frontend for a Ollama backend service
|
| services.nominatim.database.host | Host of the postgresql server
|
| services.postgresql.enableTCPIP | Whether PostgreSQL should listen on all network interfaces
|
| hardware.i2c.enable | Whether to enable i2c devices support
|
| networking.dhcpcd.setHostname | Whether to set the machine hostname based on the information
received from the DHCP server.
The hostname will be changed only if the current one is
the empty string, localhost or nixos
|
| services.languagetool.public | Whether to enable access from anywhere (rather than just localhost).
|
| services.pgbackrest.repos | An attribute set of repositories as described in:
https://pgbackrest.org/configuration.html#section-repository
Each repository defaults to set repo-host to the attribute's name
|
| services.ipp-usb.enable | Whether to enable ipp-usb, a daemon to turn an USB printer/scanner supporting IPP everywhere (aka AirPrint, WSD, AirScan) into a locally accessible network printer/scanner.
|
| services.lokinet.useLocally | Whether to use Lokinet locally.
|
| services.nominatim.database.superUser | Postgresql database superuser used to create Nominatim database and
import data
|
| services.davis.database.name | Database name, only used when the databse is created locally.
|
| services.jitsi-meet.prosody.lockdown | Whether to disable Prosody features not needed by Jitsi Meet
|
| services.roundcube.database.username | Username for the postgresql connection
|
| services.meilisearch.listenAddress | The IP address that Meilisearch will listen on
|
| services.avahi.publish.domain | Whether to announce the locally used domain name for browsing by other hosts.
|
| services.homepage-dashboard.allowedHosts | Hosts that homepage-dashboard will be running under
|
| services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| services.reposilite.settings.hostname | The hostname to bind to
|
| services.keter.globalKeterConfig.listeners | You want that ip-from-header in
the nginx setup case
|