Forge Home


yum-cron module


2,327 latest version

4.7 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 7.1.0 (latest)
  • 7.0.0
  • 6.2.0
  • 6.1.0
  • 6.0.0
  • 5.1.0
  • 5.0.0
  • 4.1.1
  • 4.1.0
  • 4.0.0
  • 3.0.0
  • 2.0.0
  • 1.3.0
  • 1.2.0
  • 1.1.1
  • 1.1.0
  • 1.0.0
  • 0.1.1
  • 0.1.0
  • 0.0.1
released Nov 16th 2023
This version is compatible with:
  • Puppet Enterprise 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
  • Puppet >= 7.0.0 < 9.0.0
  • , , , ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'treydock-yum_cron', '7.1.0'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add treydock-yum_cron
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install treydock-yum_cron --version 7.1.0

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.



treydock/yum_cron — version 7.1.0 Nov 16th 2023


Puppet Forge CI Status

Table of Contents

  1. Overview - What is the yum_cron module?
  2. Backwards Compatibility - Key changes between versions
  3. Usage - Configuration and customization options
  4. Reference - Parameter and detailed reference to all options
  5. Compatibility - Operating system and Puppet compatibility


The yum_cron module manages either the yum-cron or dnf-automatic (RHEL/CentOS 8+) package to allow for automatic updates and available updates notifications.

Backwards Compatibility

Version 3.x of this module modified the way apply_updates and download_updates parameters are handled. apply_updates now takes precedence over download_updates. If apply_updates is true then download_updates has no effect.

Version 2.x of this module added and removed many parameters. See CHANGELOG for detailed list of all the changes.

Version 1.x of this module replaced the disable_yum_autoupdate and remove_yum_autoupdate parameters with yum_autoupdate_ensure. The default behavior is still to disable yum-autoupdate.


Class: yum_cron

The default parameters will install and enable yum-cron to only check for updates and notify root if any are available. Generally, dnf-automatic uses different paths, but functions very similarly and has a similar config file. For the rest of the documentation, you can generally assuming that references to yum-cron also apply to dnf-automatic.

On Scientific Linux the default behavior is also to disable yum-autoupdate.

class { 'yum_cron': }

These are the actions taken by the module with default parameter values:

  • Install yum-cron/dnf-automatic
  • Set configuration values to enable checking for updates and notify root
  • Start and enable the yum-cron/dnf-automatic service
  • Disable yum-autoupdate by setting ENABLED="false" in /etc/sysconfig/yum-autoupdate (Scientific Linux only)

This is an example of enabling automatic updates

class { 'yum_cron':
  apply_updates => true,

Refer to the yum-cron manpage for all available configuration options.

Additional configuration values can be passed to the yum-cron configurations via the extra_configs parameter.

To define additional configuration options for EL6:

class { 'yum_cron':
  extra_configs => {
    'yum_cron ERROR_LEVEL' => { 'variable' => 'ERROR_LEVEL', 'value' => '1' }

To define additional configuration options for EL7:

class { 'yum_cron':
  extra_configs => {
    'email/email_from' => { 'value' => '' }



This module should be compatible with all RedHat based operating systems and Puppet 7 and newer.

It has only been tested on:

  • RHEL and RHEL derivatives 7, 8, 9
  • Amazon Linux 2, 2022, 2023