{"id":11053,"date":"2026-04-14T17:11:46","date_gmt":"2026-04-14T17:11:46","guid":{"rendered":"https:\/\/bitep.net\/blog\/2026\/04\/14\/ubuntu-unattended-upgrades-automatic-security-updates\/"},"modified":"2026-04-14T17:11:46","modified_gmt":"2026-04-14T17:11:46","slug":"ubuntu-unattended-upgrades-automatic-security-updates","status":"publish","type":"post","link":"https:\/\/bitep.net\/blog\/2026\/04\/14\/ubuntu-unattended-upgrades-automatic-security-updates\/","title":{"rendered":"Ubuntu-da unattended-upgrades qurulumu: server yenil\u0259m\u0259l\u0259rini avtomatik v\u0259 t\u0259hl\u00fck\u0259siz edin"},"content":{"rendered":"<p>Ubuntu server i\u015fl\u0259d\u0259n h\u0259r k\u0259s \u00fc\u00e7\u00fcn \u0259n kritik m\u0259s\u0259l\u0259l\u0259rd\u0259n biri t\u0259hl\u00fck\u0259sizlik yenil\u0259m\u0259l\u0259rini vaxt\u0131nda t\u0259tbiq etm\u0259kdir. Problem ondad\u0131r ki, bir \u00e7ox server uzun m\u00fcdd\u0259t \u0259l il\u0259 yoxlanm\u0131r, n\u0259tic\u0259d\u0259 vacib security patch-l\u0259r gecikir. Bu is\u0259 x\u00fcsusil\u0259 internet\u0259 a\u00e7\u0131q VPS, cloud instansiya v\u0259 production server-l\u0259rd\u0259 real risk yarad\u0131r. <strong>unattended-upgrades<\/strong> paketi bu problemi azaltmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. O, m\u00fc\u0259yy\u0259n edilmi\u015f qaydalara \u0259sas\u0259n t\u0259hl\u00fck\u0259sizlik yenil\u0259m\u0259l\u0259rini avtomatik qura\u015fd\u0131ra bilir.<\/p>\n<p>Bu b\u0259l\u0259d\u00e7id\u0259 Ubuntu serverd\u0259 unattended-upgrades qurulmas\u0131n\u0131, nec\u0259 i\u015fl\u0259diyini, hans\u0131 konfiqurasiya fayllar\u0131n\u0131n vacib oldu\u011funu, t\u0259hl\u00fck\u0259sizlik bax\u0131m\u0131ndan n\u0259yi a\u00e7\u0131b n\u0259yi a\u00e7mama\u011f\u0131n daha do\u011fru oldu\u011funu, log-lar\u0131n nec\u0259 yoxland\u0131\u011f\u0131n\u0131 v\u0259 avtomatik reboot m\u0259s\u0259l\u0259sin\u0259 nec\u0259 yana\u015fmal\u0131 oldu\u011funuzu add\u0131m-add\u0131m g\u00f6st\u0259r\u0259c\u0259y\u0259m.<\/p>\n<h2>Bu tutorial kim \u00fc\u00e7\u00fcnd\u00fcr?<\/h2>\n<ul>\n<li>Ubuntu VPS v\u0259 dedicated server i\u015fl\u0259d\u0259nl\u0259r<\/li>\n<li>security patch-l\u0259ri \u0259l il\u0259 izl\u0259m\u0259k ist\u0259m\u0259y\u0259n sistem adminl\u0259ri<\/li>\n<li>ki\u00e7ik cloud infrastrukturunu daha dayan\u0131ql\u0131 saxlamaq ist\u0259y\u0259nl\u0259r<\/li>\n<li>server t\u0259hl\u00fck\u0259sizliyini UFW, Fail2ban v\u0259 SSH hardening-d\u0259n sonra bir pill\u0259 daha g\u00fccl\u0259ndirm\u0259k ist\u0259y\u0259nl\u0259r<\/li>\n<\/ul>\n<h2>unattended-upgrades n\u0259 edir?<\/h2>\n<p>Bu paket APT \u0259sasl\u0131 sisteml\u0259rd\u0259 m\u00fc\u0259yy\u0259n repository-l\u0259rd\u0259n g\u0259l\u0259n yenil\u0259m\u0259l\u0259ri avtomatik qura\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. Praktik olaraq \u0259n \u00e7ox istifad\u0259 olunan ssenari t\u0259hl\u00fck\u0259sizlik yenil\u0259m\u0259l\u0259rinin avtomatik t\u0259tbiqidir. Y\u0259ni siz h\u0259r d\u0259f\u0259 server\u0259 daxil olub <code>apt update<\/code> v\u0259 <code>apt upgrade<\/code> i\u015fl\u0259tm\u0259d\u0259n vacib security patch-l\u0259rin qura\u015fd\u0131r\u0131lmas\u0131n\u0131 t\u0259min etmi\u015f olursunuz.<\/p>\n<p>Amma burada vacib bir balans var. Tam avtomatik yenil\u0259m\u0259 rahatl\u0131q yarad\u0131r, eyni zamanda n\u0259zar\u0259tsiz d\u0259yi\u015fiklik riski d\u0259 yarada bil\u0259r. Buna g\u00f6r\u0259 \u0259n sa\u011flam yana\u015fma ad\u0259t\u0259n bel\u0259 olur:<\/p>\n<ul>\n<li>security update-l\u0259ri avtomatik et<\/li>\n<li>b\u00f6y\u00fck feature v\u0259 release d\u0259yi\u015fiklikl\u0259rini \u0259l il\u0259 idar\u0259 et<\/li>\n<li>log v\u0259 reboot davran\u0131\u015f\u0131n\u0131 ayr\u0131ca n\u0259zar\u0259td\u0259 saxla<\/li>\n<\/ul>\n<h2>Ba\u015flamazdan \u0259vv\u0259l<\/h2>\n<p>Bu t\u0259limat Ubuntu server \u00fc\u00e7\u00fcn haz\u0131rlan\u0131b. Sudo h\u00fcququ olan istifad\u0259\u00e7i il\u0259 i\u015fl\u0259m\u0259yiniz laz\u0131md\u0131r. \u018fg\u0259r server production-dad\u0131rsa, m\u00fcmk\u00fcn olduqda snapshot v\u0259 ya backup olmas\u0131n\u0131n faydas\u0131 var. Avtomatik update sistemi t\u0259hl\u00fck\u0259sizlik \u00fc\u00e7\u00fcn d\u0259y\u0259rlidir, amma yen\u0259 d\u0259 h\u0259r d\u0259yi\u015fiklik kimi risk da\u015f\u0131y\u0131r.<\/p>\n<h2>1. Paket siyah\u0131s\u0131n\u0131 yenil\u0259yin<\/h2>\n<pre><code>sudo apt update<\/code><\/pre>\n<p>Bu add\u0131m sistemin haz\u0131rk\u0131 repository metadata-s\u0131n\u0131 yenil\u0259yir. Paket qura\u015fd\u0131rmadan \u0259vv\u0259l bunu etm\u0259k laz\u0131md\u0131r ki, sistem k\u00f6hn\u0259 metadata il\u0259 i\u015fl\u0259m\u0259sin.<\/p>\n<h2>2. unattended-upgrades paketini qura\u015fd\u0131r\u0131n<\/h2>\n<pre><code>sudo apt install unattended-upgrades -y<\/code><\/pre>\n<p>Ubuntu community docs-da bu paket avtomatik t\u0259hl\u00fck\u0259sizlik yenil\u0259m\u0259l\u0259ri \u00fc\u00e7\u00fcn \u0259sas yol kimi g\u00f6st\u0259rilir. \u018fg\u0259r paket art\u0131q qura\u015fd\u0131r\u0131l\u0131bsa, APT bunu bildir\u0259c\u0259k.<\/p>\n<h2>3. Paketi aktiv edin<\/h2>\n<pre><code>sudo dpkg-reconfigure --priority=low unattended-upgrades<\/code><\/pre>\n<p>Bu interaktiv add\u0131m sizd\u0259n avtomatik yenil\u0259m\u0259l\u0259ri aktiv edib-etm\u0259m\u0259k bar\u0259d\u0259 soru\u015facaq. Burada t\u0259sdiq ver\u0259nd\u0259 sistem ad\u0259t\u0259n <code>\/etc\/apt\/apt.conf.d\/20auto-upgrades<\/code> fayl\u0131n\u0131 yarad\u0131r v\u0259 ya yenil\u0259yir.<\/p>\n<p>Tipik olaraq bu faylda a\u015fa\u011f\u0131dak\u0131 s\u0259tirl\u0259r g\u00f6r\u00fcn\u00fcr:<\/p>\n<pre><code>APT::Periodic::Update-Package-Lists \"1\";\nAPT::Periodic::Unattended-Upgrade \"1\";<\/code><\/pre>\n<p>Buradak\u0131 m\u0259na sad\u0259dir:<\/p>\n<ul>\n<li><code>Update-Package-Lists \"1\"<\/code> -> paket siyah\u0131lar\u0131 g\u00fcnd\u0259lik yenil\u0259nsin<\/li>\n<li><code>Unattended-Upgrade \"1\"<\/code> -> unattended upgrade g\u00fcnd\u0259lik i\u015fl\u0259sin<\/li>\n<\/ul>\n<h2>4. \u018fsas konfiqurasiya fayl\u0131n\u0131 yoxlay\u0131n<\/h2>\n<p>\u018fn vacib fayllardan biri budur:<\/p>\n<pre><code>\/etc\/apt\/apt.conf.d\/50unattended-upgrades<\/code><\/pre>\n<p>Burada unattended-upgrades hans\u0131 origin-l\u0259rd\u0259n paket q\u0259bul ed\u0259c\u0259yini m\u00fc\u0259yy\u0259nl\u0259\u015fdirir. Ubuntu docs-da t\u0259hl\u00fck\u0259sizlik v\u0259 b\u0259zi update kanallar\u0131 \u00fc\u00e7\u00fcn tipik n\u00fcmun\u0259 g\u00f6st\u0259rilir.<\/p>\n<p>Konfiqurasiyan\u0131 a\u00e7maq \u00fc\u00e7\u00fcn:<\/p>\n<pre><code>sudo nano \/etc\/apt\/apt.conf.d\/50unattended-upgrades<\/code><\/pre>\n<p>Burada ad\u0259t\u0259n bel\u0259 blok g\u00f6r\u0259c\u0259ksiniz:<\/p>\n<pre><code>Unattended-Upgrade::Allowed-Origins {\n    \"${distro_id}:${distro_codename}-security\";\n    \"${distro_id}:${distro_codename}-updates\";\n};<\/code><\/pre>\n<p>B\u0259zi sisteml\u0259rd\u0259 format bir az f\u0259rqli g\u00f6r\u00fcn\u0259 bil\u0259r, amma m\u0259ntiq eynidir. \u018fn t\u0259hl\u00fck\u0259siz ba\u015flan\u011f\u0131c yana\u015fmas\u0131 t\u0259hl\u00fck\u0259sizlik update-l\u0259rin\u0259 fokuslanmaqd\u0131r. \u018fg\u0259r daha konservativ davranmaq ist\u0259yirsinizs\u0259, yaln\u0131z security kanal\u0131 il\u0259 ba\u015flaya bil\u0259rsiniz.<\/p>\n<h2>5. Paket blacklist istifad\u0259sini anlay\u0131n<\/h2>\n<p>Eyni faylda bel\u0259 b\u00f6lm\u0259 d\u0259 olur:<\/p>\n<pre><code>Unattended-Upgrade::Package-Blacklist {\n    \/\/ \"vim\";\n    \/\/ \"libc6\";\n};<\/code><\/pre>\n<p>Bu hiss\u0259 x\u00fcsusi paketl\u0259ri avtomatik yenil\u0259m\u0259d\u0259n \u00e7\u0131xarmaq \u00fc\u00e7\u00fcnd\u00fcr. Ad\u0259t\u0259n buna h\u0259r sistemd\u0259 ehtiyac olmur. Amma \u0259g\u0259r m\u00fc\u0259yy\u0259n paket \u00fcz\u0259rind\u0259 \u00e7ox h\u0259ssas production as\u0131l\u0131l\u0131\u011f\u0131n\u0131z varsa, onu blacklist etm\u0259k bar\u0259d\u0259 d\u00fc\u015f\u00fcn\u0259 bil\u0259rsiniz.<\/p>\n<p>Burada ehtiyatl\u0131 olun. H\u0259dd\u0259n art\u0131q blacklist unattended-upgrades sisteminin faydas\u0131n\u0131 azald\u0131r. Dig\u0259r t\u0259r\u0259fd\u0259n \u00e7ox kritik paketl\u0259rd\u0259 avtomatik d\u0259yi\u015fiklik d\u0259 b\u0259z\u0259n riskli ola bil\u0259r. Bu q\u0259rar serverin roluna g\u00f6r\u0259 verilm\u0259lidir.<\/p>\n<h2>6. Cari v\u0259ziyy\u0259ti yoxlay\u0131n<\/h2>\n<p>Ubuntu docs-a g\u00f6r\u0259 yaln\u0131z bir fayla baxmaq kifay\u0259t etmir, \u00e7\u00fcnki <code>\/etc\/apt\/apt.conf.d\/<\/code> alt\u0131ndak\u0131 fayllar leksikoqrafik s\u0131rada oxunur v\u0259 sonrak\u0131 fayl \u0259vv\u0259lkini override ed\u0259 bil\u0259r. Buna g\u00f6r\u0259 cari aktiv setting-i bel\u0259 yoxlamaq daha do\u011frudur:<\/p>\n<pre><code>apt-config dump APT::Periodic::Unattended-Upgrade<\/code><\/pre>\n<p>\u018fg\u0259r n\u0259tic\u0259 bel\u0259dirs\u0259:<\/p>\n<pre><code>APT::Periodic::Unattended-Upgrade \"1\";<\/code><\/pre>\n<p>onda unattended upgrades aktivdir. \u018fg\u0259r d\u0259y\u0259r <code>\"0\"<\/code> olsa, deaktivdir.<\/p>\n<h2>7. Log-lar\u0131 nec\u0259 yoxlamaq olar?<\/h2>\n<p>Avtomatik update sistemi qurduqdan sonra \u0259n vacib i\u015fl\u0259rd\u0259n biri onun h\u0259qiq\u0259t\u0259n i\u015fl\u0259diyini yoxlamaqd\u0131r. Bunun \u00fc\u00e7\u00fcn log-lar \u00e7ox vacibdir.<\/p>\n<p>Tipik yoxlama yerl\u0259ri:<\/p>\n<pre><code>\/var\/log\/unattended-upgrades\/\n\/var\/log\/dpkg.log<\/code><\/pre>\n<p>Son unattended-upgrades log-lar\u0131na baxmaq \u00fc\u00e7\u00fcn:<\/p>\n<pre><code>sudo ls -lah \/var\/log\/unattended-upgrades\/\nsudo tail -n 100 \/var\/log\/unattended-upgrades\/unattended-upgrades.log<\/code><\/pre>\n<p>\u018fg\u0259r burada paketl\u0259rin qura\u015fd\u0131r\u0131ld\u0131\u011f\u0131n\u0131, skipped item-l\u0259ri v\u0259 ya x\u0259ta mesajlar\u0131n\u0131 g\u00f6r\u00fcrs\u00fcn\u00fczs\u0259, sistem art\u0131q i\u015fl\u0259yir v\u0259 siz onun davran\u0131\u015f\u0131n\u0131 m\u00fc\u015fahid\u0259 ed\u0259 bil\u0259rsiniz.<\/p>\n<h2>8. Debug \u00fc\u00e7\u00fcn manual run edin<\/h2>\n<p>\u018fg\u0259r unattended-upgrades i\u015fl\u0259yirmi, ya da niy\u0259 i\u015fl\u0259m\u0259di sual\u0131n\u0131z varsa, debug rejimind\u0259 manual run \u00e7ox faydal\u0131d\u0131r.<\/p>\n<pre><code>sudo unattended-upgrade -d<\/code><\/pre>\n<p>Bu \u0259mr Debian wiki-d\u0259 d\u0259 debug \u00fc\u00e7\u00fcn t\u00f6vsiy\u0259 olunur. Buradan daha detall\u0131 \u00e7\u0131x\u0131\u015f al\u0131b problem varsa s\u0259b\u0259bi daha rahat g\u00f6r\u0259 bil\u0259rsiniz.<\/p>\n<h2>9. Avtomatik reboot m\u0259s\u0259l\u0259sin\u0259 nec\u0259 yana\u015fmaq laz\u0131md\u0131r?<\/h2>\n<p>Kernel v\u0259 b\u0259zi kritik komponent yenil\u0259m\u0259l\u0259rind\u0259n sonra reboot laz\u0131m ola bil\u0259r. unattended-upgrades bunu avtomatik ed\u0259 d\u0259 bil\u0259r, etm\u0259y\u0259 d\u0259 bil\u0259r. Ubuntu docs g\u00f6st\u0259rir ki, bunun \u00fc\u00e7\u00fcn bel\u0259 setting var:<\/p>\n<pre><code>Unattended-Upgrade::Automatic-Reboot \"true\";<\/code><\/pre>\n<p>Amma bu q\u0259rar\u0131 kor-koran\u0259 verm\u0259k d\u00fczg\u00fcn deyil.<\/p>\n<p>Praktik t\u00f6vsiy\u0259 bel\u0259dir:<\/p>\n<ul>\n<li>single production server-d\u0259 avtomatik reboot-a ehtiyatla yana\u015f\u0131n<\/li>\n<li>cluster v\u0259 ya redundant infrastruktur yoxdursa, planla\u015fd\u0131r\u0131lmam\u0131\u015f restart biznes riski yarada bil\u0259r<\/li>\n<li>test v\u0259 ya az kritik serverl\u0259rd\u0259 avtomatik reboot daha rahat ola bil\u0259r<\/li>\n<\/ul>\n<p>Ubuntu community docs ayr\u0131ca qeyd edir ki, b\u0259zi hallarda avtomatik reboot davran\u0131\u015f\u0131 \u00fc\u00e7\u00fcn <code>update-notifier-common<\/code> paketinin d\u0259 m\u00f6vcudlu\u011fu vacib ola bil\u0259r. Minimal sisteml\u0259rd\u0259 bu paket default g\u0259lm\u0259y\u0259 bil\u0259r.<\/p>\n<h2>10. Random sleep v\u0259 schedule davran\u0131\u015f\u0131n\u0131 anlay\u0131n<\/h2>\n<p>APT periodic i\u015fl\u0259ri eyni anda b\u00fct\u00fcn serverl\u0259rin mirror-lara y\u00fckl\u0259nm\u0259m\u0259si \u00fc\u00e7\u00fcn random gecikm\u0259 il\u0259 i\u015fl\u0259y\u0259 bil\u0259r. Bu normal davran\u0131\u015fd\u0131r. Y\u0259ni cron v\u0259 ya timer tetikl\u0259nib, amma proses d\u0259rhal ba\u015flamay\u0131bsa, bu m\u00fctl\u0259q x\u0259ta dem\u0259k deyil.<\/p>\n<p>Daha detall\u0131 n\u0259zar\u0259t ist\u0259yirsinizs\u0259, Debian wiki bu periodic update davran\u0131\u015f\u0131n\u0131n systemd timer-l\u0259rl\u0259 d\u0259 \u0259laq\u0259li oldu\u011funu g\u00f6st\u0259rir. X\u00fcsusil\u0259 a\u015fa\u011f\u0131dak\u0131 timer-l\u0259r vacibdir:<\/p>\n<ul>\n<li><code>apt-daily.timer<\/code><\/li>\n<li><code>apt-daily-upgrade.timer<\/code><\/li>\n<\/ul>\n<p>Yoxlamaq \u00fc\u00e7\u00fcn:<\/p>\n<pre><code>systemctl status apt-daily.timer\nsystemctl status apt-daily-upgrade.timer<\/code><\/pre>\n<h2>11. Email v\u0259 d\u0259yi\u015fiklik bildiri\u015fl\u0259ri<\/h2>\n<p>\u018fg\u0259r unattended-upgrades sistemini daha ciddi idar\u0259 etm\u0259k ist\u0259yirsinizs\u0259, yaln\u0131z update-i aktiv edib unutmaq \u00e7ox da sa\u011flam yana\u015fma deyil. Debian t\u0259r\u0259fi \u0259lav\u0259 olaraq <code>apt-listchanges<\/code> kimi al\u0259tl\u0259ri d\u0259 xat\u0131rlad\u0131r. M\u0259qs\u0259d odur ki, problem \u00e7\u0131xanda v\u0259 ya vacib d\u0259yi\u015fiklik olanda x\u0259b\u0259riniz olsun.<\/p>\n<p>\u018fg\u0259r serverl\u0259riniz \u00e7oxdursa, bu tip log v\u0259 bildiri\u015f inteqrasiyas\u0131 daha vacib olur.<\/p>\n<h2>Tez-tez edil\u0259n s\u0259hvl\u0259r<\/h2>\n<h3>Yaln\u0131z 20auto-upgrades fayl\u0131na baxmaq<\/h3>\n<p>Bu yet\u0259rli deyil. Ba\u015fqa config fayllar\u0131 sonradan override ed\u0259 bil\u0259r. Ona g\u00f6r\u0259 <code>apt-config dump<\/code> il\u0259 faktiki aktiv setting-i yoxlamaq daha d\u00fczg\u00fcnd\u00fcr.<\/p>\n<h3>H\u0259r \u015feyi avtomatik update etm\u0259k<\/h3>\n<p>\u018fg\u0259r n\u0259 etdiyinizi bilm\u0259d\u0259n b\u00fct\u00fcn update kanallar\u0131n\u0131 a\u00e7san\u0131z, x\u00fcsusil\u0259 production server-l\u0259rd\u0259 g\u00f6zl\u0259nilm\u0259z d\u0259yi\u015fiklikl\u0259r arta bil\u0259r. Security-first yana\u015fma daha sa\u011flamd\u0131r.<\/p>\n<h3>Log-lara baxmamaq<\/h3>\n<p>Avtomatla\u015fd\u0131rma qurmaq \u201cbir d\u0259f\u0259 aktiv edib unutmaq\u201d deyil. \u018fn az\u0131 periodik olaraq log-lar\u0131 yoxlamaq laz\u0131md\u0131r.<\/p>\n<h3>Avtomatik reboot-u d\u00fc\u015f\u00fcnm\u0259d\u0259n a\u00e7maq<\/h3>\n<p>B\u0259zi sisteml\u0259rd\u0259 bu rahatd\u0131r, b\u0259zil\u0259rind\u0259 is\u0259 ciddi k\u0259sinti yarada bil\u0259r. Serverin rolunu n\u0259z\u0259r\u0259 almadan bunu a\u00e7maq d\u00fczg\u00fcn deyil.<\/p>\n<h2>Praktik t\u00f6vsiy\u0259<\/h2>\n<p>\u018fg\u0259r yeni ba\u015flay\u0131rs\u0131n\u0131zsa, bel\u0259 edin:<\/p>\n<ol>\n<li>unattended-upgrades paketini qura\u015fd\u0131r\u0131n<\/li>\n<li>security update-l\u0259ri aktiv edin<\/li>\n<li>manual debug run edin<\/li>\n<li>log-lar\u0131 yoxlay\u0131n<\/li>\n<li>bir ne\u00e7\u0259 g\u00fcn davran\u0131\u015f\u0131 m\u00fc\u015fahid\u0259 edin<\/li>\n<li>yaln\u0131z sonra ehtiyac varsa reboot v\u0259 \u0259lav\u0259 tuning d\u00fc\u015f\u00fcn\u00fcn<\/li>\n<\/ol>\n<h2>N\u0259tic\u0259<\/h2>\n<p>Ubuntu serverd\u0259 unattended-upgrades qurmaq t\u0259hl\u00fck\u0259sizlik bax\u0131m\u0131ndan \u00e7ox faydal\u0131 add\u0131md\u0131r. X\u00fcsusil\u0259 internet\u0259 a\u00e7\u0131q sisteml\u0259rd\u0259 security patch-l\u0259rin gecikm\u0259si risk yarad\u0131r. Bu al\u0259t h\u0259min bo\u015flu\u011fu ba\u011flama\u011fa k\u00f6m\u0259k edir. Amma \u0259n yax\u015f\u0131 n\u0259tic\u0259 \u00fc\u00e7\u00fcn onu kor-koran\u0259 deyil, log, allowed origins, reboot davran\u0131\u015f\u0131 v\u0259 real server rolu n\u0259z\u0259r\u0259 al\u0131naraq qurmaq laz\u0131md\u0131r. D\u00fcz qurulanda unattended-upgrades h\u0259m vaxt qazand\u0131r\u0131r, h\u0259m d\u0259 serverin t\u0259hl\u00fck\u0259sizlik s\u0259viyy\u0259sini y\u00fcks\u0259ldir.<\/p>\n<p><strong>M\u0259nb\u0259l\u0259r:<\/strong><br \/>\nUbuntu Community Help Wiki, Automatic Security Updates<br \/>\nDebian Wiki, PeriodicUpdates \/ unattended-upgrades guidance<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ubuntu server i\u015fl\u0259d\u0259n h\u0259r k\u0259s \u00fc\u00e7\u00fcn \u0259n kritik m\u0259s\u0259l\u0259l\u0259rd\u0259n biri t\u0259hl\u00fck\u0259sizlik yenil\u0259m\u0259l\u0259rini vaxt\u0131nda t\u0259tbiq etm\u0259kdir. Problem ondad\u0131r ki, bir \u00e7ox server uzun m\u00fcdd\u0259t \u0259l il\u0259 yoxlanm\u0131r, n\u0259tic\u0259d\u0259 vacib security patch-l\u0259r gecikir. Bu is\u0259 x\u00fcsusil\u0259 internet\u0259 a\u00e7\u0131q VPS, cloud instansiya v\u0259 production server-l\u0259rd\u0259 real risk yarad\u0131r. unattended-upgrades paketi bu problemi azaltmaq \u00fc\u00e7\u00fcn istifad\u0259 olunur. O, m\u00fc\u0259yy\u0259n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31,17,41],"tags":[],"class_list":["post-11053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hosting","category-tutoriallar"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/bitep.net\/blog\/wp-content\/uploads\/2026\/04\/unattended-upgrades-replicate.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/posts\/11053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/comments?post=11053"}],"version-history":[{"count":0,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/posts\/11053\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/media\/11052"}],"wp:attachment":[{"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/media?parent=11053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/categories?post=11053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitep.net\/blog\/wp-json\/wp\/v2\/tags?post=11053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}