| services.transmission.settings.incomplete-dir-enabled | |
| services.transmission.settings.incomplete-dir | When enabled with
services.transmission.home
services.transmission.settings.incomplete-dir-enabled,
new torrents will download the files to this directory
|
| services.transmission.home | The directory where Transmission will create .config/transmission-daemon.
as well as Downloads/ unless
services.transmission.settings.download-dir is changed,
and .incomplete/ unless
services.transmission.settings.incomplete-dir is changed.
|
| services.transmission.settings.watch-dir-enabled | Whether to enable the
services.transmission.settings.watch-dir.
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.bacula-dir.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-dir.tls.require | Require TLS or TLS-PSK encryption
|
| boot.zfs.enabled | True if ZFS filesystem support is enabled
|
| services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.transmission.settings.utp-enabled | Whether to enable Micro Transport Protocol (µTP).
|
| hardware.nvidia.enabled | True if NVIDIA support is enabled
|
| virtualisation.directBoot.enable | If enabled, the virtual machine will boot directly into the kernel instead of through a bootloader
|
| services.pihole-ftl.lists.*.enabled | Whether this list is enabled
|
| services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| i18n.inputMethod.enabled | Deprecated - use type and enable = true instead
|
| services.wg-access-server.settings.dns.enabled | Enable/disable the embedded DNS proxy server
|
| services.grafana.settings.smtp.enabled | Whether to enable SMTP.
|
| services.frigate.settings.mqtt.enabled | Whether to enable MQTT support.
|
| services.aria2.settings.dir | Directory to store downloaded files.
|
| services.transmission.settings.watch-dir | Watch a directory for torrent files and add them to transmission.
|
| services.lemmy.settings.captcha.enabled | Enable Captcha.
|
| services.transmission.settings.script-torrent-done-enabled | Whether to run
services.transmission.settings.script-torrent-done-filename
at torrent completion.
|
| services.veilid.settings.logging.api.enabled | Events of type 'api' will be logged.
|
| services.opengfw.dir | Working directory of the OpenGFW service and home of opengfw.user.
|
| services.slskd.settings.directories.incomplete | Directory where incomplete downloading files are stored.
|
| services.transmission.settings.download-dir | Directory where to download torrents.
|
| services.xserver.xkb.dir | Path used for -xkbdir xserver parameter.
|
| services.matrix-synapse.settings.redis.enabled | Whether to use redis support
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| services.veilid.settings.logging.system.enabled | Events of type 'system' will be logged.
|
| services.immich.settings.newVersionCheck.enabled | Check for new versions
|
| services.xtreemfs.dir.enable | Whether to enable XtreemFS DIR service.
|
| services.snapserver.settings.tcp.enabled | Whether to enable the TCP JSON-RPC.
|
| services.watchdogd.settings.filenr.enabled | Whether to enable watchdogd plugin filenr.
|
| services.snapserver.settings.http.enabled | Whether to enable the HTTP JSON-RPC.
|
| services.suricata.settings.unix-command.enabled | Enable unix-command socket.
|
| services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| services.hitch.ocsp-stapling.enabled | Whether to enable OCSP Stapling
|
| services.suricata.settings.outputs.*.<name>.enabled | Whether to enable .
|
| services.watchdogd.settings.loadavg.enabled | Whether to enable watchdogd plugin loadavg.
|
| services.watchdogd.settings.meminfo.enabled | Whether to enable watchdogd plugin meminfo.
|
| services.veilid.settings.logging.terminal.enabled | Events of type 'terminal' will be logged.
|
| services.xtreemfs.dir.port | The port to listen on for incoming connections (TCP).
|
| services.listmonk.database.settings.smtp.*.enabled | Whether to enable this SMTP server for listmonk.
|
| services.sourcehut.settings."meta.sr.ht::billing".enabled | Whether to enable the billing system.
|
| services.suricata.settings.app-layer.protocols.<name>.enabled | The option "enabled" takes 3 values - "yes", "no", "detection-only".
"yes" enables both detection and the parser, "no" disables both, and
"detection-only" enables protocol detection only (parser disabled).
|
| services.dendrite.settings.sync_api.search.enabled | Whether to enable Dendrite's full-text search engine.
|
| services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| services.snapserver.settings.tcp-control.enabled | Whether to enable the TCP JSON-RPC.
|
| services.bacula-dir.tls | TLS Options for the Director
|
| services.suricata.enabledSources | List of sources that should be enabled
|
| services.xtreemfs.dir.extraConfig | Configuration of XtreemFS DIR service
|
| services.xtreemfs.dir.httpPort | Specifies the listen port for the HTTP service that returns the
status page.
|
| services.dependency-track.settings."alpine.ldap.enabled" | Defines if LDAP will be used for user authentication
|
| services.bacula-dir.name | The director name used by the system administrator
|
| services.dependency-track.settings."alpine.oidc.enabled" | Defines if OpenID Connect will be used for user authentication
|
| services.prosody.virtualHosts.<name>.enabled | Whether to enable the virtual host
|
| services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| services.xtreemfs.dir.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.snapserver.settings.tcp-streaming.enabled | Whether to enable streaming via TCP.
|
| services.public-inbox.settings.coderepo.<name>.dir | Path to a git repository
|
| services.nextcloud.settings.enabledPreviewProviders | The preview providers that should be explicitly enabled.
|
| services.xtreemfs.dir.address | If specified, it defines the interface to listen on
|
| services.bacula-dir.enable | Whether to enable Bacula Director Daemon.
|
| services.traefik.dynamic.dir | Path to the directory Traefik should watch for configuration files.
Files in this directory matching the glob _nixos-* (reserved for Nix-managed dynamic configurations) will be deleted as part of
systemd-tmpfiles-resetup.service, regardless of their origin..
|
| services.netbird.tunnels.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| services.netbird.clients.<name>.dir.baseName | A systemd service name to use (without .service suffix).
|
| services.autosuspend.checks.<name>.enabled | Whether to enable this activity check.
|
| services.netbird.clients.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.netbird.tunnels.<name>.dir.state | A state directory used by NetBird client to store config.json, state.json & resolv.conf.
|
| services.postsrsd.settings.chroot-dir | Path to chroot into at runtime as an additional layer of protection.
We confine the runtime environment through systemd hardening instead, so this option is read-only.
|
| services.peertube-runner.enabledJobTypes | Job types that this runner will execute.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.bacula-dir.extraConfig | Extra configuration for Bacula Director Daemon.
|
| services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| services.autosuspend.wakeups.<name>.enabled | Whether to enable this wake-up check.
|
| services.bluemap.webserverSettings.enabled | Enable bluemap's built-in webserver
|
| services.bacula-dir.port | Specify the port (a positive integer) on which the Director daemon
will listen for Bacula Console connections
|
| services.firefox-syncserver.settings.tokenserver.enabled | Whether to enable the token service as well.
|
| services.netbird.tunnels.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.netbird.clients.<name>.dir.runtime | A runtime directory used by NetBird client.
|
| services.typesense.settings.server.data-dir | Path to the directory where data will be stored on disk.
|
| services.chrony.initstepslew.enabled | DEPRECATED
|
| services.bacula-dir.password | Specifies the password that must be supplied for a Director.
|
| services.xtreemfs.dir.replication.enable | Whether to enable XtreemFS DIR replication plugin.
|
| services.suricata.settings.default-log-dir | The default logging directory
|
| services.strongswan.enabledPlugins | A list of additional plugins to enable if
managePlugins is true.
|
| services.filebrowser.settings.cache-dir | The directory where FileBrowser stores its cache.
|
| services.below.dirs.log | Where to store below's logs
|
| services.akkoma.config.":pleroma".":media_proxy".enabled | Whether to enable proxying of remote media through the instance's proxy.
|
| services.archisteamfarm.bots.<name>.enabled | Whether to enable the bot on startup.
|
| services.rustus.info_storage.dir | directory to store info about uploads
|
| services.cloudflared.tunnels.<name>.warp-routing.enabled | Enable warp routing
|
| services.xtreemfs.dir.replication.extraConfig | Configuration of XtreemFS DIR replication plugin
|
| services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.legit.settings.dirs.static | Directories where static files are located.
|
| services.transmission.settings.peer-port-random-low | The minimal peer port to listen to for incoming connections
when services.transmission.settings.peer-port-random-on-start is enabled.
|