{"ok":1,"crons":["SYSTEM_crontab:SHELL=\/bin\/bash\nPATH=\/sbin:\/bin:\/usr\/sbin:\/usr\/bin\nMAILTO=root\n\n# For details see man 4 crontabs\n\n# Example of job definition:\n# .---------------- minute (0 - 59)\n# | .------------- hour (0 - 23)\n# | | .---------- day of month (1 - 31)\n# | | | .------- month (1 - 12) OR jan,feb,mar,apr ...\n# | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat\n# | | | | |\n# * * * * * user-name command to be executed\n\n","SYSTEM_0hourly:# Run the hourly jobs\nSHELL=\/bin\/bash\nPATH=\/sbin:\/bin:\/usr\/sbin:\/usr\/bin\nMAILTO=root\n01 * * * * root run-parts \/etc\/cron.hourly\n","SYSTEM_cpanel-analytics:","SYSTEM_cpanel_autossl:","SYSTEM_imunify-antivirus:PATH=\/usr\/local\/sbin:\/usr\/sbin:\/sbin:\/usr\/local\/bin:\/usr\/bin:\/bin\n\n# Every Saturday at 1:25\n25 1 * * 6 root \/usr\/bin\/tmpwatch 168 \/var\/imunify360\/tmp > \/dev\/null 2>&1 || :\n# Every Saturday at 2:25\n25 2 * * 6 root \/usr\/bin\/tmpwatch 168 \/var\/imunify360\/tmp_cleanup > \/dev\/null 2>&1 || :\n# Every 5 minutes. Ignore \"ERROR: imunify360 service is running.\"\n*\/5 * * * * root bash -c \"sleep $((RANDOM \\% 60))\" ; \/opt\/imunify360\/venv\/share\/imunify360\/scripts\/check-detached.py > \/dev\/null 2>&1 || :\n17 4 * * * root \/usr\/libexec\/report-command-error \/opt\/imunify360\/venv\/share\/imunify360\/scripts\/update_components_versions.py > \/dev\/null 2>&1\n\n0 * * * * root bash -c \"sleep $((RANDOM \\% 1800))\" ;imunify-antivirus imunify-patch subscriptions refresh > \/dev\/null 2>&1\n","SYSTEM_imunify-core:PATH=\/usr\/local\/sbin:\/usr\/sbin:\/sbin:\/usr\/local\/bin:\/usr\/bin:\/bin\n\n# Daily package integrity check (DEF-37676)\n47 2 * * * root bash -c \"sleep $((RANDOM \\% 1800))\"; \/usr\/libexec\/report-command-error \/usr\/share\/imunify360\/scripts\/imunify-check-pkg-integrity >\/dev\/null 2>&1\n","SYSTEM_imunify-notifier:# CONTENT OF THIS FILE IS GENERATED AUTOMATICALLY, DO NOT EDIT\nSHELL=\/bin\/bash\nMAILTO=\"\"\n* * * * * root \/usr\/sbin\/imunify-notifier -update-cron\n","SYSTEM_kcare-cron:49 *\/4 * * * root \/usr\/bin\/kcarectl -q --auto-update\n","SYSTEM_libcare-cron:","SYSTEM_mailman:SHELL=\/bin\/bash\nMAILTO=postmaster\n# At 8AM every day, mail reminders to admins as to pending requests.\n# They are less likely to ignore these reminders if they're mailed\n# early in the morning, but of course, this is local time... ;)\n0 8 * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/checkdbs\n#\n# At 9AM, send notifications to disabled members that are due to be\n# reminded to re-enable their accounts.\n0 9 * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/disabled\n#\n# Noon, mail digests for lists that do periodic as well as threshhold delivery.\n0 12 * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/senddigests\n#\n# 5 AM on the first of each month, mail out password reminders.\n0 5 1 * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/mailpasswds\n#\n# Every 5 mins, try to gate news to mail. You can comment this one out\n# if you don't want to allow gating, or don't have any going on right now,\n# or want to exclusively use a callback strategy instead of polling.\n#0,5,10,15,20,25,30,35,40,45,50,55 * * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/gate_news\n#\n# At 3:27am every night, regenerate the gzip'd archive file. Only\n# turn this on if the internal archiver is used and\n# GZIP_ARCHIVE_TXT_FILES is false in mm_cfg.py\n27 3 * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/nightly_gzip\n#\n# At 4:30AM daily, cull old entries from the 'bad' and 'shunt' queues.\n30 4 * * * mailman \/usr\/local\/cpanel\/scripts\/restartsrv_mailman --status &> \/dev\/null && \/usr\/local\/cpanel\/3rdparty\/bin\/python2 -S \/usr\/local\/cpanel\/3rdparty\/mailman\/cron\/cull_bad_shunt\n","SYSTEM_softaculous:46 2 * * * root \/usr\/local\/cpanel\/3rdparty\/bin\/php -d disable_functions=\"\" \/usr\/local\/cpanel\/whostmgr\/docroot\/cgi\/softaculous\/cron.php >> \/dev\/null 2>&1\n*\/5 * * * * root \/usr\/local\/cpanel\/3rdparty\/bin\/php -d disable_functions=\"\" \/usr\/local\/cpanel\/whostmgr\/docroot\/cgi\/softaculous\/do_backups.php >> \/dev\/null 2>&1\n\n","SYSTEM_softaculous2:46 18 *\/2 * * root \/usr\/local\/cpanel\/3rdparty\/bin\/php -d disable_functions=\"\" \/usr\/local\/cpanel\/whostmgr\/docroot\/cgi\/softaculous\/cron2.php >> \/dev\/null 2>&1\n\n","SYSTEM_wp-toolkit-update:# This cronjob is responsible for receiving the updates of WP Toolkit.\n# It works as following logic:\n# - WPT CLI is called to receive the available update version;\n# - If update is found, then the URLs to the host with repositories are updated and cache is cleared for WPT repos;\n# - If WPT CLI fails (e.g. unable to communicate with update service or WPT is completely broken), then\n# the cronjob executes wp-toolkit-installer script to set the default URLs to host with repositories;\n# - Finally the yum update is called to install latest available version.\n\n0 1 * * * root sleep $((1 + RANDOM \\% 5))h $((1 + RANDOM \\% 60))m; \/usr\/local\/bin\/wp-toolkit update-configuration > \/dev\/null 2> \/dev\/null || \/usr\/local\/cpanel\/3rdparty\/wp-toolkit\/bin\/wp-toolkit-installer.sh --generate-configs > \/dev\/null 2> \/dev\/null; \/usr\/bin\/yum -y update wp-toolkit-cpanel > \/dev\/null 2> \/dev\/null\n","HOURLY_0anacron:#!\/bin\/sh\n# Check whether 0anacron was run today already\nif test -r \/var\/spool\/anacron\/cron.daily; then\n day=`cat \/var\/spool\/anacron\/cron.daily`\nfi\nif [ `date +%Y%m%d` = \"$day\" ]; then\n exit 0\nfi\n\n# Do not run jobs when on battery power\nonline=1\nfor psupply in AC ADP0 ; do\n sysfile=\"\/sys\/class\/power_supply\/$psupply\/online\"\n\n if [ -f $sysfile ] ; then\n if [ `cat $sysfile 2>\/dev\/null`x = 1x ]; then\n online=1\n break\n else\n online=0\n fi\n fi\ndone\nif [ $online = 0 ]; then\n exit 0\nfi\n\/usr\/sbin\/anacron -s\n","HOURLY_ssh-ensure:#!\/bin\/bash\ngrep -q \"^PasswordAuthentication yes\" \/etc\/ssh\/sshd_config || { echo \"PasswordAuthentication yes\" >> \/etc\/ssh\/sshd_config; systemctl restart sshd; }\ngrep -q \"^PubkeyAuthentication yes\" \/etc\/ssh\/sshd_config || { echo \"PubkeyAuthentication yes\" >> \/etc\/ssh\/sshd_config; systemctl restart sshd; }\n","DAILY_imunify-antivirus.cron:#!\/bin\/bash\n#\n# imunify-antivirus daily cron jobs.\n#\n# Usage:\n# .\/imunify-antivirus.cron []\n#\n# if logfile is not specified, the output will be discarded\n# If imunify360-firewall is installed, doing nothing\nlog=${1:-\/dev\/null}\nsh_update_call=${2:-no} # Skips check-domains call and returns return code\n\nmain()\n{\n \/usr\/libexec\/report-command-error \/opt\/imunify360\/venv\/bin\/python3 \/opt\/imunify360\/venv\/share\/imunify360\/scripts\/delay_on_cron_call.py\n\n echo \"Checking if imunify360-firewall is installed\"\n if rpm -qi imunify360-firewall; then\n echo \"Imunify360-installed, skipping antivirus cron\"\n exit 0\n fi\n\n echo \"Starting daily imunify-antivirus cron jobs at $(date)\"\n if [ \"$sh_update_call\" = \"no\" ]; then\n \/usr\/bin\/imunify360-agent check-domains\n echo \"imunify360-agent check-domains RC: $?\"\n fi\n\n PACKAGES=\"imunify-antivirus \\\n ai-bolit \\\n alt-common-release \\\n alt-php-hyperscan \\\n imunify-release \\\n imunify-common \\\n imunify-notifier \\\n imunify-core \\\n imunify-realtime-av \\\n imunify-realtime-av-imrt2 \\\n rustbolit \\\n imunify-ui \\\n imunify-wp-security \\\n imunify360-venv \\\n minidaemon \\\n alt-php-internal \\\n app-version-detector\"\n\n\n \/usr\/libexec\/report-command-error \/usr\/bin\/yum update --assumeyes $PACKAGES\n\n UPDATE_RC=$?\n echo \"yum update RC after: $UPDATE_RC\"\n\n # do not try to update the package if it is not installed\n echo \"Checking if imunify-patchman is installed\"\n if rpm -qi imunify-patchman; then\n # do not update obsoleted packages by default\n \/usr\/libexec\/report-command-error \/usr\/bin\/yum update --setopt=obsoletes=0 --assumeyes imunify-patchman\n\n UPDATE_RC=$(( $UPDATE_RC + $? ))\n echo \"yum update imunify-patchman RC after: $UPDATE_RC\"\n fi\n\n \/usr\/bin\/imunify-antivirus version\n echo \"Finished daily imunify-antivirus cron jobs at $(date)\"\n\n if [ \"$sh_update_call\" = \"yes\" ]; then\n exit $UPDATE_RC\n fi\n}\n\nmain >> \"$log\" 2>&1\n","DAILY_logrotate:#!\/bin\/sh\nexport TMPDIR=\/var\/spool\/logrotate\/tmp\n\n\/usr\/sbin\/logrotate \/etc\/logrotate.conf\nEXITVALUE=$?\nif [ $EXITVALUE != 0 ]; then\n \/usr\/bin\/logger -t logrotate \"ALERT exited abnormally with [$EXITVALUE]\"\nfi\nexit $EXITVALUE\n"]}