| users.users.<name>.uid | The account UID
|
| users.extraUsers.<name>.uid | The account UID
|
| environment.etc.<name>.uid | UID of created file
|
| boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| services.multipath.devices.*.uid_attribute | The udev attribute providing a unique path identifier (WWID)
|
| services.druid.log4j | Log4j Configuration for the druid process
|
| services.fluidd.hostName | Hostname to serve fluidd on
|
| services.mail.sendmailSetuidWrapper.setuid | Whether to add the setuid bit the wrapper program.
|
| users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| services.fluidd.nginx | Extra configuration for the nginx virtual host of fluidd.
|
| services.squid.enable | Whether to run squid web proxy.
|
| services.squid.proxyPort | TCP port on which squid will listen.
|
| containers.<name>.privateUsers | Whether to give the container its own private UIDs/GIDs space (user namespacing)
|
| services.druid.broker.jdk | The JDK package to use.
|
| services.druid.router.jdk | The JDK package to use.
|
| services.squid.package | The squid package to use.
|
| services.mpd.fluidsynth | If set, add fluidsynth soundfont decoder block.
|
| services.fluidd.nginx.root | The path of the web root directory.
|
| services.druid.extraConfDirs | Extra Conf Dirs to include in the jvm
|
| services.druid.package | The apache-druid package to use.
|
| services.diod.userdb | This option disables password/group lookups
|
| services.fluidd.enable | Whether to enable Fluidd, a Klipper web interface for managing your 3d printer.
|
| services.druid.broker.jvmArgs | Arguments to pass to the JVM
|
| services.druid.router.jvmArgs | Arguments to pass to the JVM
|
| services.fluidd.package | The fluidd package to use.
|
| services.druid.commonTmpDirs | Common List of directories used by druid processes
|
| services.grafana.provision.alerting.rules.settings.deleteRules.*.uid | Unique identifier for the rule
|
| services.squid.configText | Verbatim contents of squid.conf
|
| services.nezha-agent.genUuid | Whether to generate uuid from fqdn automatically
|
| services.squid.extraConfig | Squid configuration
|
| services.druid.extraClassPaths | Extra classpath to include in the jvm
|
| services.grafana.provision.datasources.settings.datasources.*.uid | Custom UID which can be used to reference this datasource in other parts of the configuration, if not specified will be generated automatically.
|
| fileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.fluidd.nginx.quic | Whether to enable the QUIC transport protocol
|
| services.druid.commonConfig | (key=value) Configuration to be written to common.runtime.properties
|
| services.multipath.devices.*.getuid_callout | (Superseded by uid_attribute) The default program and args to callout
to obtain a unique path identifier
|
| services.druid.router.enable | Whether to enable Druid Router.
|
| services.druid.broker.enable | Whether to enable Druid Broker.
|
| services.squid.proxyAddress | IP address on which squid will listen.
|
| services.fluidd.nginx.addSSL | Whether to enable HTTPS in addition to plain HTTP
|
| services.fluidd.nginx.acmeRoot | Directory for the ACME challenge, which is public
|
| services.fluidd.nginx.listen.*.ssl | Enable SSL.
|
| services.fluidd.nginx.onlySSL | Whether to enable HTTPS and reject plain HTTP connections
|
| services.druid.overlord.jdk | The JDK package to use.
|
| services.mediatomb.uuid | A unique (on your network) to identify the server by.
|
| services.fluidd.nginx.listen.*.addr | Listen address.
|
| services.fluidd.nginx.default | Makes this vhost the default.
|
| services.fluidd.nginx.kTLS | Whether to enable kTLS support
|
| users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.druid.broker.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Broker
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.druid.router.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Router
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.fluidd.nginx.serverName | Name of this virtual host
|
| services.druid.overlord.jvmArgs | Arguments to pass to the JVM
|
| services.druid.middleManager.jdk | The JDK package to use.
|
| services.fluidd.nginx.extraConfig | These lines go to the end of the vhost verbatim.
|
| security.wrappers.<name>.setuid | Whether to add the setuid bit the wrapper program.
|
| services.liquidsoap.streams | Set of Liquidsoap streams to start,
one systemd service per stream.
|
| services.fluidd.nginx.listen.*.port | Port number to listen on
|
| services.xtreemfs.dir.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.xtreemfs.mrc.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.xtreemfs.osd.uuid | Must be set to a unique identifier, preferably a UUID according to
RFC 4122
|
| services.squid.validateConfig | Validate config syntax.
|
| services.fluidd.nginx.enableACME | Whether to ask Let's Encrypt to sign a certificate for this vhost
|
| users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| services.grafana.provision.alerting.contactPoints.settings.deleteContactPoints.*.uid | Unique identifier for the receiver
|
| services.druid.middleManager.jvmArgs | Arguments to pass to the JVM
|
| services.druid.overlord.enable | Whether to enable Druid Overlord.
|
| services.fluidd.nginx.listen | Listen addresses and ports for this virtual host
|
| services.fluidd.nginx.http2 | Whether to enable the HTTP/2 protocol
|
| services.fluidd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| programs.throne.tunMode.setuid | Whether to enable setting suid bit for throne-core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| services.fluidd.nginx.http3 | Whether to enable the HTTP/3 protocol
|
| environment.etc.<name>.user | User name of file owner
|
| services.druid.overlord.config | (key=value) Configuration to be written to runtime.properties of the druid Druid Overlord
https://druid.apache.org/docs/latest/configuration/index.html
|
| services.fluidd.nginx.forceSSL | Whether to add a separate nginx server block that redirects (defaults
to 301, configurable with redirectCode) all plain HTTP traffic to
HTTPS
|
| services.fluidd.nginx.rejectSSL | Whether to listen for and reject all HTTPS connections to this vhost
|
| hardware.infiniband.guids | A list of infiniband port guids on the system
|
| services.druid.broker.openFirewall | Open firewall ports for Druid Broker.
|
| services.druid.router.openFirewall | Open firewall ports for Druid Router.
|
| services.fluidd.nginx.locations | Declarative location config
|
| services.druid.middleManager.enable | Whether to enable Druid middleManager.
|
| services.druid.historical.jdk | The JDK package to use.
|
| programs.nekoray.tunMode.setuid | Whether to enable setting suid bit for nekobox_core to run as root, which is less
secure than default setcap method but closer to upstream assumptions
|
| services.fluidd.nginx.serverAliases | Additional names of virtual hosts served by this virtual host configuration.
|
| services.fluidd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| networking.dhcpcd.allowSetuid | Whether to relax the security sandbox to allow running setuid
binaries (e.g. sudo) in the dhcpcd hooks.
|
| services.thermald.ignoreCpuidCheck | Whether to ignore the cpuid check to allow running on unsupported platforms
|
| services.fluidd.nginx.reuseport | Create an individual listening socket
|
| services.druid.middleManager.config | (key=value) Configuration to be written to runtime.properties of the druid Druid middleManager
https://druid.apache.org/docs/latest/configuration/index.html
|
| boot.specialFileSystems.<name>.stratis.poolUuid | UUID of the stratis pool that the fs is located in
This is only relevant if you are using stratis.
|
| services.druid.historical.jvmArgs | Arguments to pass to the JVM
|
| security.pam.services.<name>.setLoginUid | Set the login uid of the process
(/proc/self/loginuid) for auditing
purposes
|
| services.fluidd.nginx.globalRedirect | If set, all requests for this host are redirected (defaults to 301,
configurable with redirectCode) to the given hostname.
|
| services.fluidd.nginx.locations.<name>.root | Root directory for requests.
|
| services.druid.coordinator.jdk | The JDK package to use.
|
| programs.atop.setuidWrapper.enable | Whether to install a setuid wrapper for Atop
|
| services.druid.historical.enable | Whether to enable Druid Historical.
|
| services.fluidd.nginx.http3_hq | Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests
|
| services.druid.overlord.openFirewall | Open firewall ports for Druid Overlord.
|