Browse the Repo
Browse the Repo
Configure a Linux server to automatically install critical security updates.
Automatically install critical security updates once per night so your servers don’t go unpatched for long periods of time.
Built-in random delay (between 0 and 30 minutes, by default) so all of your servers don’t update at the exact same time.
Supports Ubuntu 14.04, 16.04, and 18.04 via unattended-upgrades.
Supports Amazon Linux, Amazon Linux 2, and CentOS via yum-cron.
|This repo is a part of the Gruntwork Infrastructure as Code Library, a collection of reusable, battle-tested, production ready infrastructure code. If you’ve never used the Infrastructure as Code Library before, make sure to read How to use the Gruntwork Infrastructure as Code Library!|
If you just want to try this repo out for experimenting and learning, check out the following resources:
auto-update example: The
examples/auto-update folder contains sample code optimized for
learning, experimenting, and testing (but not production usage).
If you want to deploy this repo in production, check out the following resources:
Packer template in the Acme example Reference Architecture: Production-ready sample code from the Acme Reference Architecture examples.
If you need help with this repo or anything else related to infrastructure or DevOps, Gruntwork offers Commercial Support via Slack, email, and phone/video. If you’re already a Gruntwork customer, hop on Slack and ask away! If not, subscribe now. If you’re not sure, feel free to email us at email@example.com.
Contributions to this repo are very welcome and appreciated! If you find a bug or want to add a new feature or even contribute an entirely new module, we are very happy to accept pull requests, provide feedback, and run your changes through our automated test suite.
Please see Contributing to the Gruntwork Infrastructure as Code Library for instructions.
We're here to talk about our services, answer any questions, give advice, or just to chat.