Categories: TutorialsUbuntu

Set Up Automatic Unattended Updates for Ubuntu 20.04

Regularly updating your server is a crucial aspect to the overall security of your system. Sysadmins must be concerned about the security of Linux servers. Installing security updates on time fixes vulnerabilities that could be exploited by malicious individuals to gain access to the system.

Manually updating your Linux system is a task that’s easy to overlook, especially when you’re always dealing with other issues that arise. Configuring automatic updates provides an easy way to get the security patches and feature updates regularly.

This guide will discuss how to enable automatic updates on Ubuntu 20.04.

Step 1: Install unattended-upgrades package

The unattended-upgrades package allows you to configure automatic updates. The package ensures that your system is up to date on all security and feature upgrades.

Sponsored

First, lets install the unattended-upgrades package via the apt package manager as shown:

$ sudo apt install unattended-upgrades

Next, confirm the package was installed using the following systemctl command:

$ sudo systemctl status unattended-upgrades

The unattended-upgrades service is now up and running.

Next, let’s install the update-notifier-common package to enable automatic updates.

$ sudo apt install update-notifier-common

Step 2: Configure unattended-upgrades service

Now let’s make changes to the unattended-upgrades configuration file.

This file allows you to specify which packages should automatically be updated or excluded during the update process. By default, only security updates are set to be automatically installed.

$ sudo vim /etc/apt/apt.conf.d/50unattended-upgrades

The configurations in the file are commented using the double slash (//). Uncomment or remove the double slash if you want to update a repository or make changes in your settings.

To exclude a package from being updated, include it in the Unattended-Upgrade::Package-Blacklist section. For example, to prevent Nginx from being updated, include the name as shown below:

Step 3: Set up email notifications

It’s a good idea to set up e-mail notifications, especially if you’re running unattended servers. You can also select “only-on-error” to receive notifications only when there is an error. Locate the line below to set up an email.

//Unattended-Upgrade::Mail " ";

Make sure to provide the email address of the receiver.

Unattended-Upgrade::Mail "me@example.com ";

In addition, you can also select “only-on-error” to receive notifications only when there is an error. Selecting email “on-change” in the configuration file allows you to receive notifications when software changes.

Sponsored

Uncomment the following line and change it according to your preferences. //Unattended-Upgrade::MailReport “on-change”;

Step 4: Enable Automatic Reboot

It’s always a good idea to restart the server after applying security updates so that the kernel can be updated. You can activate an automated reboot in the line shown below:

//Unattended-Upgrade::Automatic-Reboot "false";

Set it to true to enable automatic reboot.

If there are any users logged in and you still want to reboot locate the following line and set it to true”

// Unattended-Upgrade::Automatic-Reboot-WithUsers "true";

You can specify the time the automatic reboot will occur.

// Unattended-Upgrade::Automatic-Reboot-Time "04:00";

There are many other settings you can change to suit your needs. Simply uncomment them as we have discussed in this section.

Once you are done, save the changes and exit the configuration file.

Step 5: Enable automatic updates

In this step we will enable automatic upgrades. Edit the 20auto-upgrades configuration file as follows:

$ sudo vim /etc/apt/apt.conf.d/20auto-upgrades

This file has only two lines as shown.

The first line is responsible for updating the package lists, while the second initiates the automated upgrades. The auto-update and auto-upgrade are enabled by the value “1.” Set this value to “0” if you wish to disable it.

Conclusion

You have successfully configured Ubuntu 20.04 to receive automatic updates. You can be confident that your packages will always be updated.

Ubuntu Server Admin

Recent Posts

How is Livepatch safeguarded against bad actors?

Canonical Livepatch is a security patching automation tool which supports reboot-less security updates for the…

4 hours ago

Accelerating data science with Apache Spark and GPUs

Apache Spark has always been very well known for distributing computation among multiple nodes using…

4 hours ago

Cut data center energy costs with bare metal automation

Data centers are popping up everywhere. With the rapid growth of AI, cloud services, streaming…

1 day ago

Build the future of *craft: announcing Starcraft Bounties!

Our commitment to building a thriving open source community is stronger than ever. We believe…

1 day ago

NodeJS 18 LTS EOL extended from April 2025 to May 2032 on Ubuntu

The clock was ticking: Node.js 18’s upstream End of Life (EOL) The OpenJS Foundation is…

1 day ago

Native integration now available for Pure Storage and Canonical LXD

June 25th, 2025 – Canonical, the company behind Ubuntu, and Pure Storage, the IT pioneer…

2 days ago