| swapDevices.*.device | Path of the device or swap file.
|
| services.ebusd.device | Use DEV as eBUS device [/dev/ttyUSB0]
|
| fileSystems.<name>.device | The device as passed to mount
|
| services.bcg.device | Device name to configure gateway to use.
|
| boot.initrd.luks.devices.<name>.device | Path of the underlying encrypted block device.
|
| services.rshim.device | Specify the device name to attach
|
| services.tp-auto-kbbl.device | Device watched for activities.
|
| boot.initrd.systemd.repart.device | The device to operate on
|
| services.smartd.devices.*.device | Location of the device.
|
| boot.loader.grub.device | The device on which the GRUB boot loader will be installed
|
| services.logkeys.device | Use the given device as keyboard input event device instead of /dev/input/eventX default.
|
| services.bacula-sd.device | This option defines Device resources in Bacula Storage Daemon.
|
| services.rauc.slots.<name>.*.device | The device to update.
|
| services.deconz.device | Force deCONZ to use a specific USB device (e.g. /dev/ttyACM0)
|
| services.gammu-smsd.device.path | Device node or address of the phone
|
| boot.specialFileSystems.<name>.device | The device as passed to mount
|
| services.gammu-smsd.device.group | Owner group of the device
|
| services.ebusd.logs.device | Only write log for matching AREAs (all|main|network|bus|device|update|other) below or equal to LEVEL (none|error|notice|info|debug)
|
| systemd.watchdog.device | The path to a hardware watchdog device which will be managed by systemd
|
| services.gammu-smsd.device.pin | PIN code for the simcard
|
| boot.initrd.luks.devices.<name>.yubikey.storage.device | An unencrypted device that will temporarily be mounted in stage-1
|
| services.ustreamer.device | The v4l2 device to stream.
|
| services.bacula-sd.device.<name>.archiveDevice | The specified name-string gives the system file name of the storage
device managed by this storage daemon
|
| hardware.deviceTree.enable | Build device tree files
|
| hardware.alsa.controls.<name>.device | Name of the PCM device to control (slave).
|
| services.resilio.deviceName | Name of the Resilio Sync device.
|
| hardware.deviceTree.dtbSource | Path to dtb directory that overlays and other processing will be applied to
|
| services.nebula.networks.<name>.tun.device | Name of the tun device
|
| hardware.deviceTree.overlays | List of overlays to apply to base device-tree (.dtb) files.
|
| hardware.trackpoint.device | The device name of the trackpoint
|
| hardware.uni-sync.devices.*.device_id | Unique device ID displayed at each startup.
|
| services.linux-enable-ir-emitter.device | IR camera device to depend on
|
| services.kmonad.keyboards.<name>.device | Path to the keyboard's device file.
|
| services.bacula-sd.device.<name>.extraDeviceConfig | Extra configuration to be passed in Device directive.
|
| hardware.deviceTree.name | The name of an explicit dtb to be loaded, relative to the dtb base
|
| security.tpm2.tctiEnvironment.deviceConf | Configuration part of the device TCTI, e.g. the path to the TPM device
|
| services.xserver.deviceSection | Contents of the first Device section of the X server configuration file.
|
| hardware.deviceTree.filter | Only include .dtb files matching glob expression.
|
| services.gpsd.devices | List of devices that gpsd should subscribe to
|
| boot.initrd.luks.devices.<name>.header | The name of the file or block device that
should be used as header for the encrypted device.
|
| boot.initrd.luks.devices.<name>.keyFile | The name of the file (can be a raw device or a partition) that
should be used as the decryption key for the encrypted device
|
| boot.initrd.luks.devices.<name>.gpgCard | The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard
|
| hardware.deviceTree.kernelPackage | Kernel package where device tree include directory is from
|
| virtualisation.fileSystems.<name>.device | The device as passed to mount
|
| services.usbguard.deviceRulesWithPort | Generate device specific rules including the "via-port" attribute.
|
| hardware.alsa.deviceAliases | Assign custom names to sound cards.
|
| networking.wlanInterfaces.<name>.device | The name of the underlying hardware WLAN device as assigned by udev.
|
| services.bacula-sd.device.<name>.mediaType | The specified name-string names the type of media supported by this
device, for example, DLT7000
|
| boot.loader.grub.devices | The devices on which the boot loader, GRUB, will be
installed
|
| boot.initrd.luks.devices.<name>.yubikey | The options to use for this LUKS device in YubiKey-PBA
|
| services.gammu-smsd.device.connection | Protocol which will be used to talk to the phone
|
| hardware.deviceTree.overlays.*.name | Name of this overlay
|
| services.beszel.agent.smartmon.deviceAllow | List of device paths to allow access to for SMART monitoring
|
| hardware.deviceTree.overlays.*.dtboFile | Path to .dtbo compiled overlay file.
|
| swapDevices | The swap devices and swap files
|
| hardware.deviceTree.overlays.*.dtsText | Literal DTS contents, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| hardware.printers.ensurePrinters.*.deviceUri | How to reach the printer.
lpinfo -v shows a list of supported device URIs and schemes.
|
| hardware.deviceTree.overlays.*.dtsFile | Path to .dts overlay file, overlay is applied to
each .dtb file matching "compatible" of the overlay.
|
| services.rosenpass.settings.peers.*.device | Name of the local WireGuard interface to use for this peer.
|
| hardware.deviceTree.overlays.*.filter | Only apply to .dtb files matching glob expression.
|
| hardware.nvidia-container-toolkit.device-name-strategy | Specify the strategy for generating device names,
passed to nvidia-ctk cdi generate
|
| services.gammu-smsd.device.synchronizeTime | Whether to set time from computer to the phone during starting connection
|
| virtualisation.kvmgt.device | PCI ID of graphics card
|
| virtualisation.tpm.deviceModel | QEMU device model for the TPM, uses the appropriate default based on th guest platform system and the package passed.
|
| services.freefall.devices | Device paths to all internal spinning hard drives.
|
| swapDevices.*.label | Label of the device
|
| services.wyoming.faster-whisper.servers.<name>.device | Determines the platform faster-whisper is run on
|
| hardware.deviceTree.dtboBuildExtraIncludePaths | Additional include paths that will be passed to the preprocessor when creating the final .dts to compile into .dtbo
|
| services.upower.enableWattsUpPro | Enable the Watts Up Pro device
|
| services.jellyfin.hardwareAcceleration.device | Path to the hardware acceleration device that Jellyfin should use
|
| services.smartd.devices.*.options | Options that determine how smartd monitors the device.
|
| hardware.logitech.lcd.devices | List of USB device ids supported by g15daemon
|
| boot.initrd.luks.devices.<name>.keyFileSize | The size of the key file
|
| virtualisation.qemu.drives.*.deviceExtraOpts | Extra options passed to device flag.
|
| services.syncthing.settings.folders.<name>.devices | The devices this folder should be shared with
|
| boot.tmp.useZram | Whether to mount a zram device on /tmp during boot.
Large Nix builds can fail if the mounted zram device is not large enough
|
| boot.initrd.clevis.devices.<name>.secretFile | Clevis JWE file used to decrypt the device at boot, in concert with the chosen pin (one of TPM2, Tang server, or SSS).
|
| boot.loader.grub.mirroredBoots.*.devices | The path to the devices which will have the GRUB MBR written
|
| boot.initrd.luks.devices.<name>.keyFileOffset | The offset of the key file
|
| boot.initrd.luks.devices.<name>.postOpenCommands | Commands that should be run right after we have mounted our LUKS device.
|
| services.evremap.settings.device_name | The name of the device that should be remapped
|
| hardware.uni-sync.devices | List of controllers with their configurations.
|
| services.evremap.settings.phys | The physical device name to listen on
|
| boot.initrd.luks.devices.<name>.preOpenCommands | Commands that should be run right before we try to mount our LUKS device
|
| services.persistent-evdev.devices | A set of virtual proxy device labels with backing physical device ids
|
| boot.initrd.clevis.devices | Encrypted devices that need to be unlocked at boot using Clevis
|
| boot.initrd.luks.devices | The encrypted disk that should be opened before the root
filesystem is mounted
|
| boot.initrd.luks.devices.<name>.yubikey.storage.path | Absolute path of the salt on the unencrypted device with
that device's root directory as "/".
|
| boot.initrd.luks.devices.<name>.yubikey.storage.fsType | The filesystem of the unencrypted device.
|
| boot.initrd.luks.devices.<name>.fido2.passwordLess | Defines whatever to use an empty string as a default salt
|
| boot.initrd.luks.devices.<name>.preLVM | Whether the luksOpen will be attempted before LVM scan or after it.
|
| swapDevices.*.encrypted.label | Label of the unlocked encrypted device
|
| boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| services.smartd.devices | List of devices to monitor.
|
| virtualisation.emptyDiskImages.*.driveConfig.deviceExtraOpts | Extra options passed to device flag.
|
| services.prometheus.exporters.py-air-control.deviceHostname | The hostname of the air purification device from which to scrape the metrics.
|
| hardware.alsa.enableRecorder | Whether to set up a loopback device that continuously records and
allows to play back audio from the computer
|
| fileSystems.<name>.encrypted.label | Label of the unlocked encrypted device
|
| services.multipath.devices.*.features | Specify any device-mapper features to be used
|
| boot.resumeDevice | Device for manual resume attempt during boot
|