LTS

Master this essential documentation concept

Quick Definition

Long-Term Support - a designated product version that receives extended maintenance, security patches, and documentation updates well beyond the standard support window, typically for enterprise customers.

How LTS Works

stateDiagram-v2 [*] --> ActiveDevelopment : Version Released ActiveDevelopment --> Standard : Feature Freeze Standard --> LTS : LTS Designation Standard --> EndOfLife : Standard Window Expires LTS --> SecurityOnly : Active LTS Ends SecurityOnly --> EndOfLife : Maintenance LTS Ends EndOfLife --> [*] state ActiveDevelopment { [*] --> FeatureWork FeatureWork --> BugFixes BugFixes --> FeatureWork } state LTS { [*] --> SecurityPatches SecurityPatches --> DocUpdates DocUpdates --> BackportFixes BackportFixes --> SecurityPatches } state SecurityOnly { [*] --> CriticalCVE CriticalCVE --> MinimalDocs } note right of LTS : Typically 3-5 years Enterprise SLA guaranteed note right of Standard : Typically 6-18 months note right of SecurityOnly : Critical patches only No new features

Understanding LTS

Long-Term Support - a designated product version that receives extended maintenance, security patches, and documentation updates well beyond the standard support window, typically for enterprise customers.

Key Features

  • Centralized information management
  • Improved documentation workflows
  • Better team collaboration
  • Enhanced user experience

Benefits for Documentation Teams

  • Reduces repetitive documentation tasks
  • Improves content consistency
  • Enables better content reuse
  • Streamlines review processes

Keeping LTS Knowledge Accessible Beyond the Release Cycle

When your team adopts a Long-Term Support version, the reasoning behind that decision often lives in meeting recordings, architecture review sessions, and onboarding walkthroughs. Someone recorded the discussion about why the organization standardized on a specific LTS release, which security constraints drove the choice, and what the upgrade timeline looks like — but that context is buried in a video folder that few people know exists.

The challenge with video-only documentation for LTS decisions is that these versions are meant to be maintained for years. A new engineer joining 18 months after the original decision can't efficiently scrub through a 90-minute architecture call to understand why your infrastructure is pinned to a particular LTS release. The institutional knowledge exists, but it's effectively inaccessible.

Converting those recordings into structured, searchable documentation changes the equation. Instead of a timestamp buried in a video, your team gets a retrievable document explaining the LTS adoption rationale, maintenance responsibilities, and planned support windows — something a developer can find in seconds when they're questioning a dependency version or preparing a compliance audit.

If your team regularly captures decisions about LTS versions and software lifecycle policies through recorded meetings or training sessions, see how converting those videos into searchable documentation can make that knowledge last as long as the support window itself.

Real-World Documentation Use Cases

Documenting Node.js LTS Migration Paths for Enterprise DevOps Teams

Problem

Enterprise teams running Node.js 14 LTS face EOL deadlines but have no clear documentation trail showing which APIs, configurations, and deployment scripts break when upgrading to Node.js 20 LTS, causing risky last-minute migrations.

Solution

LTS versioning creates a stable documentation baseline that technical writers can anchor migration guides to, clearly mapping deprecated APIs, breaking changes, and updated configuration syntax between LTS versions without chasing moving targets in active development branches.

Implementation

['Audit all internal runbooks and API references tied to the outgoing LTS version (Node.js 14) and tag them with the LTS version identifier and EOL date.', "Create a dedicated 'LTS Migration Guide' document that maps each deprecated feature in Node.js 14 to its Node.js 20 LTS equivalent, including code snippets showing before/after syntax.", 'Publish a compatibility matrix table showing which internal microservices, CI/CD pipeline steps, and Docker base images are validated against each LTS version.', 'Set up automated doc-version alerts in your CMS (e.g., Confluence or Docusaurus) to notify maintainers 6 months before the LTS EOL date so documentation is updated before the deadline.']

Expected Outcome

Teams complete LTS upgrades 40% faster with zero unplanned API breakages because every deprecated pattern has a documented replacement, and no engineer is discovering breaking changes in production.

Maintaining Parallel Documentation Sets for Ubuntu 20.04 LTS and 22.04 LTS in a Regulated Industry

Problem

A financial services company runs Ubuntu 20.04 LTS in production and is piloting 22.04 LTS in staging. Their operations team constantly confuses package names, systemd unit configurations, and security hardening steps between the two LTS versions, leading to failed compliance audits.

Solution

LTS-scoped documentation allows technical writers to maintain version-branched doc sets where every procedure, command, and configuration example is explicitly labeled with its target LTS version, eliminating cross-version confusion in regulated environments.

Implementation

["Structure your documentation repository with top-level branches or directories named 'ubuntu-20.04-lts' and 'ubuntu-22.04-lts', ensuring no shared pages contain version-ambiguous commands.", 'Add a version selector widget (e.g., using Docusaurus versioning or MkDocs mike plugin) at the top of every operations runbook so readers actively confirm which LTS they are targeting.', "For each security hardening procedure, include an explicit 'LTS Compatibility' callout box listing the tested LTS version, the kernel version range, and the relevant CVE patches applied.", 'During compliance reviews, generate a doc coverage report showing that every CIS Benchmark control has a corresponding procedure documented for each active LTS version in the environment.']

Expected Outcome

Compliance audit pass rate improves from 78% to 96% because auditors can trace every hardening step to a specific, versioned LTS document, and operators stop applying 22.04 procedures to 20.04 systems.

Publishing SDK Reference Docs That Remain Stable for Enterprise Java LTS Consumers

Problem

A SaaS vendor ships a Java SDK consumed by enterprise customers locked to Java 11 LTS or Java 17 LTS. Their documentation site only reflects the latest Java 21 features, causing enterprise customers to file support tickets about code examples that don't compile on their certified JVM version.

Solution

Aligning SDK documentation releases to Java LTS milestones ensures that API reference pages, code samples, and integration guides are explicitly versioned to match each supported Java LTS, giving enterprise customers documentation that compiles and runs on their certified runtime.

Implementation

["Tag every code example in your SDK reference docs with a '@since Java 11 LTS' or '@since Java 17 LTS' annotation, and configure your doc build pipeline to filter examples by the selected LTS target.", "Maintain a 'Supported LTS Versions' table on the SDK landing page listing Java 11 LTS (EOL Sept 2026), Java 17 LTS (EOL Sept 2029), and Java 21 LTS (EOL Sept 2031) alongside the SDK versions validated against each.", 'Set up a doc CI check that compiles all Java code examples against each supported LTS JDK in a matrix build, failing the pipeline if any example does not compile on a declared supported LTS version.', "Publish a changelog section specifically titled 'LTS Compatibility Changes' that separates LTS-relevant updates from feature additions targeting non-LTS releases."]

Expected Outcome

Support tickets related to 'code example doesn't work' drop by 65% within one quarter, and enterprise customers report higher confidence in SDK adoption because documentation is verifiably tested against their production JVM version.

Building an Internal Knowledge Base for Kubernetes LTS-Equivalent Versions Used Across Multi-Tenant Clusters

Problem

A platform engineering team manages Kubernetes clusters across three business units, each pinned to different minor versions (1.27, 1.28, 1.29) based on their own upgrade cadence. Runbooks written for one version silently fail on another because Kubernetes API deprecations are not surfaced in shared documentation.

Solution

Treating each supported Kubernetes minor version as an LTS-like documentation target allows the platform team to maintain version-specific runbooks with explicit API version callouts, deprecation warnings, and feature gate statuses that prevent cross-version operational errors.

Implementation

["Create a Kubernetes version registry page in your internal wiki listing each cluster's Kubernetes version, its upstream end-of-support date, and the business unit responsible, so documentation authors know which versions require active maintenance.", "For every kubectl command, Helm chart value, and manifest snippet in your runbooks, add a version annotation block showing which Kubernetes minor versions the syntax is valid for and which API group version (e.g., 'apps/v1' vs deprecated 'extensions/v1beta1') applies.", "Implement a quarterly 'LTS Documentation Review' process where the platform team audits all runbooks against the Kubernetes deprecation API migration guide, updating or archiving procedures that reference removed APIs.", "Publish an automated API deprecation report generated by running 'pluto detect' against your cluster manifests, and link each flagged API to the specific runbook that needs updating."]

Expected Outcome

Cross-cluster incident rate caused by version-mismatched kubectl commands drops to zero within two quarters, and new platform engineers onboard 50% faster because runbooks explicitly declare their Kubernetes version compatibility.

Best Practices

Embed LTS Version Identifiers in Every Document Title and Metadata Field

Documentation without explicit LTS version tagging becomes ambiguous the moment a second LTS version enters support. Every runbook, API reference, and configuration guide should carry the target LTS version in its title, URL slug, and metadata so search results and internal links never surface the wrong version. This is especially critical when two LTS versions overlap in active support, such as Ubuntu 20.04 LTS and 22.04 LTS coexisting in enterprise environments.

✓ Do: Name documents explicitly, e.g., 'PostgreSQL 15 LTS — Connection Pooling Configuration Guide', and set metadata fields like 'lts_version: 15' and 'lts_eol: 2027-11-11' in your CMS front matter.
✗ Don't: Don't create generic document titles like 'PostgreSQL Configuration Guide' that silently become outdated when a new LTS ships, leaving readers unsure which version the content applies to.

Publish a Dedicated LTS Lifecycle Page with EOL Dates and Documentation Freeze Schedules

Enterprise customers plan infrastructure upgrades 12-24 months in advance and need a single authoritative page showing exactly when each LTS version enters security-only maintenance and when documentation updates will cease. Without this, customers discover EOL dates through third-party blogs or support tickets rather than your own documentation. The lifecycle page should be the first result when any customer searches for LTS support timelines.

✓ Do: Maintain a versioned lifecycle table showing each LTS release date, active support end date, security maintenance end date, and the date your team will archive or freeze the corresponding documentation set.
✗ Don't: Don't scatter LTS end-of-life information across release notes, blog posts, and support articles without a canonical lifecycle reference page, as this creates conflicting information that erodes enterprise customer trust.

Automate LTS EOL Warning Banners in Documentation Six Months Before End-of-Life

Customers reading documentation for an LTS version approaching EOL need proactive warnings embedded directly in the content they are consuming, not buried in a separate announcement. Automating these banners based on the EOL date in your doc metadata ensures no version silently reaches end-of-life without readers being informed. The banner should link directly to the migration guide for the next LTS version.

✓ Do: Configure your documentation platform (e.g., Docusaurus admonitions, ReadTheDocs notifications, or a custom CMS plugin) to automatically inject an 'End-of-Life Warning' banner on all pages tagged with an LTS version whose EOL date is within 180 days.
✗ Don't: Don't rely on manual processes to add EOL warnings to individual pages, as human error will leave dozens of pages warning-free while customers continue following outdated LTS procedures past the support deadline.

Maintain Separate Documentation Branches for Each Active LTS Version in Version Control

Storing all LTS documentation in a single branch and using conditional includes or feature flags to manage version differences creates fragile, hard-to-review documentation that breaks silently when conditions are misconfigured. Separate Git branches or repository directories per LTS version make it trivial to cherry-pick security patch documentation updates to older LTS branches without accidentally introducing new-version content. This mirrors how the software itself is maintained across LTS branches.

✓ Do: Structure your docs repository with branches named 'lts/v20.04', 'lts/v22.04', etc., and use your CI pipeline to build and deploy each branch to a version-specific URL path like '/docs/20.04-lts/' and '/docs/22.04-lts/'.
✗ Don't: Don't maintain a single 'latest' documentation branch and use inline version conditionals like 'if version >= 22.04' throughout content, as this makes LTS-specific reviews, audits, and cherry-picks nearly impossible to execute reliably.

Define a Formal LTS Documentation Support Policy That Mirrors the Software Support Policy

Enterprise customers negotiate SLAs around LTS software support, but documentation is rarely included in those agreements, leading to situations where software receives security patches but the corresponding documentation explaining those patches is never published. A formal documentation support policy should explicitly state that security patch documentation, configuration change notes, and migration warnings will be published within a defined SLA window for all active LTS versions. This policy should be publicly accessible and referenced in enterprise contracts.

✓ Do: Publish a 'Documentation Support Policy' page stating that for each active LTS version, security patch documentation will be updated within 5 business days of a patch release, and breaking configuration changes will include a migration note with a minimum 90-day notice period.
✗ Don't: Don't treat LTS documentation maintenance as a best-effort activity handled only when the documentation team has spare capacity, as this leaves enterprise customers applying security patches without understanding the configuration changes those patches require.

How Docsie Helps with LTS

Build Better Documentation with Docsie

Join thousands of teams creating outstanding documentation

Start Free Trial