| services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish | How long after deactivation to keep a key in the zone
|
| services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish | How long after deactivation to keep a key in the zone
|
| security.duosec.integrationKey | Integration key.
|
| services.prometheus.exporters.exportarr-prowlarr.apiKeyFile | File containing the api-key.
|
| security.agnos.generateKeys.enable | Enable automatic generation of account keys
|
| services.nsd.remoteControl.controlKeyFile | Path to the client private key, which is used by nsd-control
but not by the server
|
| services.canaille.secretKeyFile | File containing the Flask secret key
|
| services.prometheus.exporters.keylight.openFirewall | Open port in firewall for incoming connections.
|
| services.druid.historical.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Historical
https://druid.apache.org/docs/latest/configuration/index.html
|
| programs.less.clearDefaultCommands | Clear all default commands
|
| systemd.repart.partitions | Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value
|
| services.drupal.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.engelsystem.settings | Options to be added to config.php, as a nix attribute set
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| services.hqplayerd.licenseFile | Path to the HQPlayer license key file
|
| services.hostapd.radios.<name>.networks.<name>.settings | Extra configuration options to put at the end of this BSS's defintion in the
hostapd.conf for the associated interface
|
| services.ncps.cache.upstream.publicKeys | A list of public keys of upstream caches in the format
host[-[0-9]*]:public-key
|
| services.forgejo.secrets | This is a small wrapper over systemd's LoadCredential
|
| services.netbird.tunnels.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| services.netbird.clients.<name>.login.setupKeyFile | A Setup Key file path used for automated login of the machine.
|
| services.gitlab.secrets.dbFile | A file containing the secret used to encrypt variables in
the DB
|
| services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| services.ntopng.enable | Enable ntopng, a high-speed web-based traffic analysis and flow
collection tool
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time | Time to schedule CHILD_SA rekeying
|
| services.prometheus.exporters.keylight.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.keylight.openFirewall is true.
|
| services.hylafax.faxqConfig | Attribute set of lines for the global
faxq config file etc/config
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| services.kubernetes.kubelet.tlsKeyFile | File containing x509 private key matching tlsCertFile.
|
| services.stargazer.routes | Routes that Stargazer should server
|
| services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.davis.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.movim.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.slskd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.canaille.jwtPrivateKeyFile | File containing the JWT private key
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.snipe-it.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| boot.loader.systemd-boot.extraEntries | Any additional entries you want added to the systemd-boot menu
|
| swapDevices.*.randomEncryption.source | Define the source of randomness to obtain a random key for encryption.
|
| services.quicktun.<name>.privateKeyFile | Path to file containing local secret key in binary or hexadecimal form.
Not needed when services.quicktun..protocol is set to raw.
|
| services.hylafax.hfaxdConfig | Attribute set of lines for the global
hfaxd config file etc/hfaxd.conf
|
| services.dysnomia.containers | An attribute set in which each key represents a container and each value an attribute set providing its configuration properties
|
| services.arsenik.tap_timeout | The key must be pressed twice in XX ms to enable repetitions.
|
| services.rss2email.config | The configuration to give rss2email
|
| services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.quicktun.<name>.privateKey | Local secret key in hexadecimal form.
This option is deprecated
|
| services.openafsServer.enable | Whether to enable the OpenAFS server
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes | Number of bytes processed before initiating CHILD_SA rekeying
|
| systemd.sysupdate.transfers | Specify transfers as a set of the names of the transfer files as the
key and the configuration as its value
|
| services.monica.config | monica configuration options to set in the
.env file
|
| services.prometheus.exporters.keylight.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.keylight.openFirewall
is true
|
| services.druid.coordinator.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Coordinator
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| services.gancio.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.akkoma.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.fluidd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.matomo.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.monica.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.gitlab.extraConfig | Extra options to be added under
production in
config/gitlab.yml, as a nix attribute
set
|
| services.cloud-init.enable | Enable the cloud-init service
|
| services.syncoid.localTargetAllow | Permissions granted for the services.syncoid.user user
for local target datasets
|
| services.mediawiki.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.gitlab.secrets.secretFile | A file containing the secret used to encrypt variables in
the DB
|
| services.peering-manager.peeringdbApiKeyFile | Path to a file containing the PeeringDB API key.
|
| services.limesurvey.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.veilid.settings.core.network.routing_table.node_id | Base64-encoded public key for the node, used as the node's ID.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.exporters.ecoflow.ecoflowDevicesPrettyNamesFile | File must contain one line, example: {"R3300000":"Delta 2","R3400000":"Delta Pro",...}
The key/value map of custom names for your devices
|
| services.cjdns.UDPInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| services.cjdns.ETHInterface.connectTo.<name>.publicKey | Public key at the opposite end of the tunnel.
|
| services.etesync-dav.sslCertificateKey | Path to server SSL certificate key
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets | Number of packets processed before initiating CHILD_SA rekeying
|
| services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| services.networking.websockify.sslKey | Path to the SSL key.
|
| services.kasmweb.sslCertificateKey | The SSL certificate's key to be used for kasmweb
|
| services.wordpress.sites.<name>.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.arsenik.hold_timeout | The key must be held XX ms to become a layer shift.
|
| services.readeck.environmentFile | File containing environment variables to be passed to Readeck
|
| services.limesurvey.httpd.virtualHost.sslServerKey | Path to server SSL certificate key.
|
| services.hylafax.modems.<name>.config | Attribute set of values for the given modem
|
| services.n8n.environment.N8N_USER_FOLDER | Provide the path where n8n will create the .n8n folder
|
| services.beszel.agent.environment | Environment variables for configuring the beszel-agent service
|
| services.radicle.httpd.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.athens.storage.azureblob.accountKey | Account key for the Azure Blob storage backend
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.librenms.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.agorakit.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.fediwall.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.kanboard.nginx.sslCertificateKey | Path to server SSL certificate key.
|
| services.dolibarr.nginx.sslCertificateKey | Path to server SSL certificate key.
|