| services.cfssl.remote | Remote CFSSL server.
|
| networking.sits.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| services.gitwatch.<name>.remote | Optional url of remote repository
|
| networking.ipips.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| networking.greTunnels.<name>.remote | The address of the remote endpoint to forward traffic over.
|
| services.echoip.remoteIpHeader | Header to trust for remote IP, if present
|
| services.nsd.remoteControl.port | Port number for remote control operations (uses TLS over TCP).
|
| services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| services.quicktun.<name>.remotePort | Remote UDP port
|
| services.quicktun.<name>.remoteAddress | IP address or hostname of the remote end (use 0.0.0.0 for a floating/dynamic remote endpoint).
|
| services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| services.nsd.remoteControl.enable | Whether to enable remote control via nsd-control.
|
| services.journald.remote.port | The port to listen to
|
| services.journald.remote.settings | Configuration in the journal-remote configuration file
|
| services.journald.remote.listen | Which protocol to listen to.
|
| services.journald.remote.output | The location of the output journal
|
| services.prometheus.remoteRead.*.remote_timeout | Timeout for requests to the remote read endpoint.
|
| services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| services.journald.remote.enable | Whether to enable receiving systemd journals from the network.
|
| services.prometheus.remoteWrite.*.remote_timeout | Timeout for requests to the remote write endpoint.
|
| programs.steam.remotePlay.openFirewall | Open ports in the firewall for Steam Remote Play.
|
| services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| services.gnome.gnome-remote-desktop.enable | Whether to enable Remote Desktop support using Pipewire.
|
| services.vmagent.remoteWrite.url | Endpoint for prometheus compatible remote_write
|
| services.vlagent.remoteWrite.url | Endpoint for the victorialogs instance
|
| services.wstunnel.clients.<name>.remoteToLocal | Listen on remote and forwards traffic from local
|
| services.nsd.remoteControl.interfaces | Which interfaces NSD should bind to for remote control.
|
| services.thanos.receive.remote-write.address | Address to listen on for remote write requests
|
| services.prometheus.remoteRead.*.headers | Custom HTTP headers to be sent along with each remote read request
|
| programs.proxychains.remoteDNSSubnet | Set the class A subnet number to use for the internal remote DNS mapping, uses the reserved 224.x.x.x range by default.
|
| services.prometheus.remoteWrite.*.headers | Custom HTTP headers to be sent along with each remote write request
|
| services.journald.remote.settings.Remote.Seal | Periodically sign the data in the journal using Forward Secure
Sealing.
|
| services.nsd.remoteControl.serverKeyFile | Path to the server private key, which is used by the server
but not by nsd-control
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| services.prometheus.remoteRead | Parameters of the endpoints to query from
|
| services.nsd.remoteControl.serverCertFile | Path to the server self signed certificate, which is used by the server
but and by nsd-control
|
| services.prometheus.remoteRead.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.journald.remote.settings.Remote.ServerKeyFile | A path to a SSL secret key file in PEM format
|
| services.nsd.remoteControl.controlKeyFile | Path to the client private key, which is used by nsd-control
but not by the server
|
| services.slskd.settings.remote_file_management | Whether to enable modification of share contents through the web ui.
|
| services.prometheus.remoteWrite | Parameters of the endpoints to send samples to
|
| services.prometheus.remoteWrite.*.url | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| services.journald.remote.settings.Remote.SplitMode | With "host", a separate output file is used, based on the
hostname of the other endpoint of a connection
|
| services.nsd.remoteControl.controlCertFile | Path to the client certificate signed with the server certificate
|
| services.prometheus.remoteRead.*.tls_config | Configures the remote read request's TLS settings.
|
| services.prometheus.remoteWrite.*.tls_config | Configures the remote write request's TLS settings.
|
| services.prometheus.remoteWrite.*.sigv4 | Configures AWS Signature Version 4 settings.
|
| services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.vlagent.remoteWrite.maxDiskUsagePerUrl | The maximum file-based buffer size in bytes
|
| services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| services.zfs.autoReplication.remoteFilesystem | Remote ZFS filesystem where snapshots should be sent.
|
| services.vmagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| services.vlagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| services.prometheus.remoteWrite.*.sigv4.region | The AWS region.
|
| services.nullmailer.config.remotes | A list of remote servers to which to send each message
|
| services.prometheus.remoteWrite.*.queue_config | Configures the queue used to write to remote storage.
|
| services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| services.prometheus.remoteRead.*.proxy_url | Optional Proxy URL.
|
| services.nullmailer.remotesFile | Path to the remotes control file
|
| services.prometheus.remoteWrite.*.proxy_url | Optional Proxy URL.
|
| services.prometheus.remoteWrite.*.sigv4.role_arn | The AWS role ARN.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| services.prometheus.remoteWrite.*.sigv4.access_key | The Access Key ID.
|
| services.prometheus.remoteWrite.*.sigv4.secret_key | The Secret Access Key.
|
| services.journald.remote.settings.Remote.ServerCertificateFile | A path to a SSL certificate file in PEM format
|
| services.prometheus.remoteRead.*.read_recent | Whether reads should be made for queries for time ranges that
the local storage should have complete data for.
|
| services.prometheus.remoteWrite.*.queue_config.capacity | Number of samples to buffer per shard before we block reading of more
samples from the WAL
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| services.prometheus.remoteWrite.*.metadata_config | Configures the sending of series metadata to remote storage
|
| services.prometheus.remoteWrite.*.metadata_config.send | Whether metric metadata is sent to remote storage or not.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| services.prometheus.remoteRead.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.journald.remote.settings.Remote.TrustedCertificateFile | A path to a SSL CA certificate file in PEM format, or all
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| services.prometheus.remoteWrite.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| services.prometheus.remoteRead.*.basic_auth.password | HTTP password
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.remoteWrite.*.basic_auth.password | HTTP password
|
| services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|