| services.seafile.adminEmail | Seafile Seahub Admin Account Email.
|
| services.uptime.configFile | The uptime configuration file
If mongodb: server != localhost, please set usesRemoteMongo = true
If you only want to run the monitor, please set enableWebService = false
and enableSeparateMonitoringService = true
If autoStartMonitor: false (recommended) and you want to run both
services, please set enableSeparateMonitoringService = true
|
| services.orangefs.server.fileSystems.<name>.extraStorageHints | Extra config for <StorageHints> section.
|
| services.sympa.settings | The sympa.conf configuration file as key value set
|
| services.lldap.settings | Free-form settings written directly to the lldap_config.toml file
|
| services.dovecot2.configFile | Config file used for the whole dovecot configuration.
|
| services.znc.confOptions.extraZncConf | Extra config to znc.conf file.
|
| services.printing.extraConf | Extra contents of the configuration file of the CUPS daemon
(cupsd.conf).
|
| services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| security.sudo.extraRules | Define specific rules to be in the sudoers file
|
| services.charybdis.config | Charybdis IRC daemon configuration file.
|
| services.thelounge.extraConfig | The Lounge's config.js contents as attribute set (will be
converted to JSON to generate the configuration file)
|
| services.promtail.configFile | Config file path for Promtail
|
| services.k3s.manifests.<name>.content | Content of the manifest file
|
| services.rke2.charts | Packaged Helm charts that are linked to /var/lib/rancher/rke2/server/static/charts before rke2 starts
|
| services.aria2.settings | Generates the aria2.conf file
|
| services.unpoller.loki.pass | Path of a file containing the password for Loki
|
| nix.extraOptions | Additional text appended to nix.conf.
|
| services.athens.githubToken | Creates .netrc file with the given token to be used for GitHub
|
| services.forgejo.useWizard | Whether to use the built-in installation wizard instead of
declaratively managing the app.ini config file in nix.
|
| services.neard.settings | Neard INI-style configuration file as a Nix attribute set
|
| services.synergy.server.configFile | The Synergy server configuration file.
|
| services.radicale.config | Radicale configuration, this will set the service
configuration file
|
| services.keepalived.secretFile | Environment variables from this file will be interpolated into the
final config file using envsubst with this syntax: $ENVIRONMENT
or ${VARIABLE}
|
| security.sudo-rs.extraRules | Define specific rules to be in the sudoers file
|
| services.traefik.dynamic.files.<name>.settings | Dynamic configuration for Traefik, written in Nix.
This will be serialized to JSON (which is considered valid YAML) at build, and passed as part of the static file.
|
| services.prometheus.scrapeConfigs.*.file_sd_configs | List of file service discovery configurations.
|
| services.lokinet.settings.network.keyfile | The private key to persist address with
|
| services.lighttpd.configText | Overridable config file contents to use for lighttpd
|
| environment.etc.<name>.gid | GID of created file
|
| environment.etc.<name>.uid | UID of created file
|
| services.filebeat.enable | Whether to enable filebeat.
|
| services.drupal.sites.<name>.filesDir | The location of the Drupal files directory.
|
| services.radicle.checkConfig | Whether to enable checking the config.json file resulting from services.radicle.settings.
|
| services.xtreemfs.mrc.syncMode | The sync mode influences how operations are committed to the disk
log before the operation is acknowledged to the caller.
-ASYNC mode the writes to the disk log are buffered in memory by the operating system
|
| services.xtreemfs.dir.syncMode | The sync mode influences how operations are committed to the disk
log before the operation is acknowledged to the caller.
-ASYNC mode the writes to the disk log are buffered in memory by the operating system
|
| boot.initrd.services.udev.rules | udev rules to include in the initrd
only
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| boot.swraid.mdadmConf | Contents of /etc/mdadm.conf.
|
| services.rke2.manifests.<name>.content | Content of the manifest file
|
| services.webdav-server-rs.configFile | Path to config file
|
| systemd.user.services.<name>.path | Packages added to the service's PATH
environment variable
|
| services.samba.settings | Configuration file for the Samba suite in ini format
|
| services.hickory-dns.configFile | Path to an existing toml file to configure hickory-dns with
|
| services.graphite.carbon.config | Content of carbon configuration file.
|
| services.seafile.workers | The number of gunicorn worker processes for handling requests.
|
| services.prometheus.exporters.php-fpm.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.sickbeard.configFile | Path to config file.
|
| services.trickster.configFile | Path to configuration file.
|
| services.mighttpd2.config | Verbatim config file to use
(see https://kazu-yamamoto.github.io/mighttpd2/config.html)
|
| virtualisation.fileSystems.<name>.noCheck | Disable running fsck on this filesystem.
|
| programs.neovim.enable | Whether to enable Neovim
|
| services.supybot.configFile | Path to initial supybot config file
|
| services.grafana.settings.server.cert_file | Path to the certificate file (if protocol is set to https or h2).
|
| systemd.user.tmpfiles.rules | Global user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| systemd.automounts.*.overrideStrategy | Defines how unit configuration is provided for systemd:
asDropinIfExists creates a unit file when no unit file is provided by the package
otherwise it creates a drop-in file named overrides.conf.
asDropin creates a drop-in file named overrides.conf
|
| services.headscale.configFile | Path to the configuration file of headscale.
|
| services.httpd.logPerVirtualHost | If enabled, each virtual host gets its own
access.log and
error.log, namely suffixed by the
hostName of the virtual host.
|
| boot.initrd.systemd.root | Controls how systemd will interpret the root FS in initrd
|
| services.znc.confOptions.modules | A list of modules to include in the znc.conf file.
|
| programs.dconf.profiles | Attrset of dconf profiles
|
| services.prometheus.remoteRead.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| services.disnix.profiles | Names of the Disnix profiles to expose in the system's PATH
|
| services.slurm.extraCgroupConfig | Extra configuration for cgroup.conf
|
| services.bitcoind.<name>.configFile | The configuration file path to supply bitcoind.
|
| fileSystems.<name>.overlay.useStage1BaseDirectories | If enabled, lowerdir, upperdir and workdir will be prefixed with /sysroot
|
| services.riemann.configFiles | Extra files containing Riemann configuration
|
| services.cachix-agent.profile | Profile name, defaults to 'system' (NixOS).
|
| services.udev.packages | List of packages containing udev rules
|
| systemd.user.tmpfiles.enable | Whether to enable systemd user units systemd-tmpfiles-setup.service and systemd-tmpfiles-clean.timer.
|
| services.diod.exports | List the file systems that clients will be allowed to mount
|
| services.reposilite.keyPasswordFile | Path the the file containing the password used to unlock the Java KeyStore file specified in services.reposilite.settings.keyPath
|
| services.openssh.moduliFile | Path to moduli file to install in
/etc/ssh/moduli
|
| systemd.nspawn.<name>.filesConfig | Each attribute in this set specifies an option in the
[Files] section of this unit
|
| virtualisation.fileSystems.<name>.enable | Whether to enable the filesystem mount.
|
| services.litestream.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.glusterfs.tlsSettings | Make the server communicate via TLS
|
| services.mqtt2influxdb.mqtt.cafile | Certification Authority file for MQTT
|
| services.oauth2-proxy.profileURL | Profile access endpoint.
|
| services.restic.backups.<name>.rcloneConfigFile | Path to the file containing rclone configuration
|
| services.asusd.profileConfig | The content of /etc/asusd/profile.ron
|
| services.nominatim.ui.config | Nominatim UI configuration placed to theme/config.theme.js file
|
| services.homer.settings | Settings serialized into config.yml before build
|
| services.umami.settings.DATABASE_URL_FILE | A file containing a connection string for the database
|
| services.mympd.settings | Manages the configuration files declaratively
|
| services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| environment.etc.<name>.mode | If set to something else than symlink,
the file is copied instead of symlinked, with the given
file mode.
|
| services.hedgedoc.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.pdfding.secretKeyFile | File containing the Django SECRET_KEY
|
| services.matrix-synapse.configFile | Path to the configuration file on the target system
|
| services.rtorrent.configText | The content of rtorrent.rc
|
| services.suricata.settings.pcap-file.checksum-checks | Possible values are:
- yes: checksum validation is forced
- no: checksum validation is disabled
- auto: Suricata uses a statistical approach to detect when
checksum off-loading is used. (default)
Warning: 'checksum-validation' must be set to yes to have checksum tested.
|
| services.home-assistant.configDir | The config directory, where your configuration.yaml is located.
|
| services.thanos.query.store.sd-files | Path to files that contain addresses of store API servers
|
| services.jitsi-meet.extraConfig | Text to append to config.js web application config file
|
| networking.wg-quick.interfaces.<name>.configFile | wg-quick .conf file, describing the interface
|
| services.prometheus.exporters.fastly.configFile | Path to a fastly-exporter configuration file
|
| services.minetest-server.config | Settings to add to the minetest config file
|