--- unattended_upgrades_mailto: root unattended_upgrades_package_name: unattended-upgrades unattended_upgrades_package_state: present unattended_upgrades_apticron_package_name: apticron unattended_upgrades_apticron_package_state: present unattended_upgrades_apticron_email: "{{ unattended_upgrades_mailto }}" unattended_upgrades_update_package_lists: true unattended_upgrades_download_upgradable_packages: true unattended_upgrades_autoclean_interval: 7 unattended_upgrades_unattended_upgrade: true # Automatically upgrade packages from these (origin:archive) pairs # # Note that in Ubuntu security updates may pull in new dependencies # from non-security sources (e.g. chromium). By allowing the release # pocket these get automatically pulled in. unattended_upgrades_allowed_origins: - "${distro_id}:${distro_codename}" - "${distro_id}:${distro_codename}-security" - "${distro_id}ESM:${distro_codename}" # - "${distro_id}:${distro_codename}-updates" # - "${distro_id}:${distro_codename}-proposed" # - "${distro_id}:${distro_codename}-backports" # List of packages to not update (regexp are supported) # unattended_upgrades_package_blacklist: [] # This option will controls whether the development release of Ubuntu will be # upgraded automatically. unattended_upgrades_dev_release: false # This option allows you to control if on a unclean dpkg exit # unattended-upgrades will automatically run # dpkg --force-confold --configure -a # The default is true, to ensure updates keep getting installed # unattended_upgrades_auto_fix_interrupted_dpkg: false # Split the upgrade into the smallest possible chunks so that # they can be interrupted with SIGTERM. This makes the upgrade # a bit slower but it has the benefit that shutdown while a upgrade # is running is possible (with a small delay) # unattended_upgrades_minimal_steps: false # Install all unattended-upgrades when the machine is shutting down # instead of doing it in the background while the machine is running # This will (obviously) make shutdown slower # unattended_upgrades_install_on_shutdown: true # Send email to this address for problems or packages upgrades # If empty or unset then no email is sent, make sure that you # have a working mail setup on your system. A package that provides # 'mailx' must be installed. E.g. "user@example.com" unattended_upgrades_mail: "{{ unattended_upgrades_mailto }}" # Set this value to "true" to get emails only on errors. Default # is to always send a mail if Unattended-Upgrade::Mail is set # unattended_upgrades_mail_only_on_error: true # Remove unused automatically installed kernel-related packages # (kernel images, kernel headers and kernel version locked tools). # unattended_upgrades_remove_unused_kernel_packages: false # Do automatic removal of new unused dependencies after the upgrade # (equivalent to apt-get autoremove) # unattended_upgrades_removed_unused_dependencies: false # Automatically reboot *WITHOUT CONFIRMATION* # if the file /var/run/reboot-required is found after the upgrade # unattended_upgrades_automatic_reboot: false # If automatic reboot is enabled and needed, reboot at the specific # time instead of immediately # Default: "now" # unattended_upgrades_automatic_reboot_time: '02:00' # unattended_upgrades_reboot_with_users: false # Use apt bandwidth limit feature, this example limits the download # speed to 70kb/sec # unattended_upgrades_download_limit: 70 # Enable logging to syslog. Default is False # unattended_upgrades_syslog_enable: false # Specify syslog facility. Default is daemon # unattended_upgrades_syslog_facility: daemon # Download and install upgrades only on AC power # (i.e. skip or gracefully stop updates on battery) # unattended_upgrades_only_on_ac_power: true # Download and install upgrades only on non-metered connection # (i.e. skip or gracefully stop updates on a metered connection) # unattended_upgrades_skip_updates_on_metered_connections: true # vim:ft=yaml.ansible: