Skip to main content

Monitoring plugin to check automatic updates (unattended-upgrades) on Debian / Ubuntu.

Project description

This package on the Python Package Index Tests

Command line interface

check_unattended_upgrades v1.4
Copyright (c) 2015-2026 Josef Friedrich <josef@friedrich.rocks>

Monitoring plugin to check automatic updates (unattended-upgrades) on Debian / Ubuntu.

Usage: check_unattended_upgrades <options>

Options:
 -A, --anacron
    Check if the package 'anacron' is installed.
 -a, --autoclean
    Check if the configuration 'APT::Periodic::AutocleanInterval' is set
    properly.
 -c, --critical
    Time interval since the last execution to result in a critical state
    (seconds).
 -D, --short-description
    Show a short description of this check plugin.
 -d, --download
    Check if the configuration 'APT::Periodic:Download-Upgradeable-Packages'
    is set properly.
 -e, --enable
    Check if the configuration 'APT::Periodic::Enable' is set properly.
 -h, --help
    Show this help message.
 -l, --lists
    Check if the configuration 'APT::Periodic::Update-Package-Lists' is set
    properly.
 -m, --mail
    Check if the configuration 'Unattended-Upgrade::Mail' is set properly.
 -n, --dry-run
    Check if 'unattended-upgrades --dry-run' is working. Warning: If you use
    this option the performance data last_ago is always 0 or near to 0.
 -p, --repo
    Check if 'Unattended-upgrades' is configured to include the specified
    custom repository.
 -R, --reboot
    Check if the machine needs a reboot.
 -r, --remove
    Check if the configuration 'Unattended-Upgrade::Remove-Unused-
    Dependencies' is set properly.
 -S, --security
    Check if 'Unattended-upgrades' is configured to handle security updates.
 -s, --sleep
    Check if the configuration 'APT::Periodic::RandomSleep' is set properly.
 -t, --systemd-timers
    Check if the appropriate Systemd timers are enabled ( apt-daily-upgrade.timer, apt-daily.timer ).
 -u, --unattended
    Check if the configuration 'APT::Periodic::Unattended-Upgrade' is set
    properly.
 -v, --version
    Show the version number.
 -w, --warning
    Time interval since the last execution to result in a warning state
    (seconds).

Performance data:
  - last_ago
      Time interval in seconds for last unattended-upgrades execution.
  - warning
      Interval in seconds.
  - critical
      Interval in seconds.

About file system permissions:
    The user which executes this plugin must have read permissions to this
    log file:

            /var/log/unattended-upgrades/unattended-upgrades.log

    To allow every user on your system to read the mentioned log file this
    permissions are recommended:

            751 (drwxr-x--x) /var/log/unattended-upgrades
            644 (-rw-r--r--) /var/log/unattended-upgrades/unattended-upgrades.log

Project pages

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

check_unattended_upgrades-2.0.0a1.tar.gz (7.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

check_unattended_upgrades-2.0.0a1-py3-none-any.whl (8.7 kB view details)

Uploaded Python 3

File details

Details for the file check_unattended_upgrades-2.0.0a1.tar.gz.

File metadata

  • Download URL: check_unattended_upgrades-2.0.0a1.tar.gz
  • Upload date:
  • Size: 7.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for check_unattended_upgrades-2.0.0a1.tar.gz
Algorithm Hash digest
SHA256 ac638d9b0e5c23d2f529b6c71e25f6245c4a832018d1f6139c442efee6b1c635
MD5 2bfc091ca33f78e85ed71e89c2067680
BLAKE2b-256 2678e8c11f12021b2555247fac328803b83f123c27f2922929ae5f171e0b6b48

See more details on using hashes here.

File details

Details for the file check_unattended_upgrades-2.0.0a1-py3-none-any.whl.

File metadata

  • Download URL: check_unattended_upgrades-2.0.0a1-py3-none-any.whl
  • Upload date:
  • Size: 8.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for check_unattended_upgrades-2.0.0a1-py3-none-any.whl
Algorithm Hash digest
SHA256 ba4231235ea43a59cc409b70d0408543cf0bc5c98d48a152749aab34634fc047
MD5 46c7b0435f207fa15a09a2eb008b4952
BLAKE2b-256 72c73278383f0ec9dd29fa4029b7bba8898a3f62cb4637fcae78189fc598d09c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page