NC 13 - Recommendations concerning auto updates & upgrades for Ubuntu 16.04 lts

Support intro

Sorry to hear you’re facing problems :slightly_frowning_face: is for home/non-enterprise users. If you’re running a business, paid support can be accessed via where we can ensure your business keeps running smoothly.

In order to help you as quickly as possible, before clicking Create Topic please provide as much of the below as you can. Feel free to use a pastebin service for logs, otherwise either indent short log examples with four spaces:


Or for longer, use three backticks above and below the code snippet:


Some or all of the below information will be requested if it isn’t supplied; for fastest response please provide as much as you can :heart:

Nextcloud version (eg, 12.0.2): 13.0.4
Operating system and version (eg, Ubuntu 17.04): Ubuntu 16.04 lts
Apache or nginx version (eg, Apache 2.4.25): Apache 2.4.18
PHP version (eg, 7.1): 7.0.30

The issue you are facing: Whether to set up auto cronjob for both updates & upgrades or just security updates? Looking for advice.

Is this the first time you’ve seen this error? (Y/N): no error. cannot find documentation on best practice.

Steps to replicate it:

The output of your Nextcloud log in Admin > Logging:


The output of your config.php file in /path/to/nextcloud (make sure you remove any identifiable information!):


The output of your Apache/nginx/system log in /var/log/____:


Doing only security updates.
Unattended-upgrades package
sudo apt install unattended-upgrades
Location: edit /etc/apt/apt.conf.d/50unattended-upgrades
Only configured for security updates
The results of unattended-upgrades will be logged to /var/log/unattended-upgrades.

> Unattended-Upgrade::Allowed-Origins {
>         "${distro_id}:${distro_codename}";
>         "${distro_id}:${distro_codename}-security";
> //      "${distro_id}:${distro_codename}-updates";
> //      "${distro_id}:${distro_codename}-proposed";
> //      "${distro_id}:${distro_codename}-backports";
>         "${distro_id}ESM:${distro_codename}";
> };
>   "${distro_id}ESM:${distro_codename}";  (It's Canonical's Extended Security Maintenance for LTS releases after normal release end-of-life) Comment out //.

To enable automatic updates, edit/create /etc/apt/apt.conf.d/20auto-upgrades and set the appropriate apt configuration options:

> // Automatic call to run unattended security updates //
> APT::Periodic::Update-Package-Lists "1";
> APT::Periodic::AutocleanInterval "7";
> APT::Periodic::Unattended-Upgrade "1";/

Used Guide: