Open source alternative to AWS. Elastic compute, block storage (non replicated), firewall and load balancer, managed Postgres, K8s, AI inference, and IAM services. https://ubicloud.com
Find a file
Daniel Farina 78c4971fd1 Remove odd use of regexp in specs for simple string equality
search-and-replace "/sudo.*systemctl.*stop.*#{nx.vm_name}-dnsmasq/"
for "sudo systemctl stop #{nx.vm_name}-dnsmasq": the result is more
legible, faster, and more constrained: `.*` can be anything, after
all.
2025-10-02 12:01:56 -07:00
.github Clover: Support Ubiblk v0.2.1. 2025-10-01 15:41:41 -07:00
assets Hide health check endpoint in load balancer create form when tcp is used 2025-09-17 01:42:58 +09:00
bin Add Steps for Generating K8s Resize Screenshots 2025-10-02 10:40:33 +03:00
cache Cleanup AWS subnet info from private_subnet_aws_resource - migration 2025-09-19 16:19:50 +02:00
cli Fix stdin when using cli/ubi to run external commands 2025-08-06 03:55:16 +09:00
cli-commands Cli & Sdk for Kubernetes Nodepool Resizing 2025-09-30 13:07:32 +03:00
config Add a default quota for KubernetesVCpu 2025-09-26 13:43:45 +03:00
demo Make the VM image Ubuntu Noble 2025-07-14 22:58:29 +03:00
helpers Check KubernetesVCpu quota when scaling out 2025-09-30 13:07:32 +03:00
kubernetes/csi Remove unnecessary test from CSI 2025-09-24 14:19:38 +02:00
lib Close SSH session on event loop failure 2025-10-01 22:28:56 +02:00
migrate Partition management for archived_records 2025-09-22 12:17:17 +02:00
model Use a timeout by default in Sshable#cmd 2025-10-02 08:14:56 -07:00
openapi Return the Kubernetes Nodepool object to API upon resize 2025-09-30 13:07:32 +03:00
prog Rely on Sshable#channel_wait for VM Nexus command timeout 2025-10-02 12:01:56 -07:00
public Paginate by filter instead of offset in the autoforme tables on the admin site 2025-09-23 02:53:47 +09:00
rhizome Start metadata-endpoint even if the Cert is not ready 2025-10-02 16:35:27 +02:00
rodauth/features Remove old login-based API authentication 2025-04-10 13:10:23 -07:00
routes Send invoice success email when paid manually 2025-10-02 17:53:19 +03:00
scheduling Use a timeout by default in Sshable#cmd 2025-10-02 08:14:56 -07:00
sdk/ruby Cli & Sdk for Kubernetes Nodepool Resizing 2025-09-30 13:07:32 +03:00
serializers Allow customers to add additional note to invoice 2025-09-05 13:46:45 +03:00
spec Remove odd use of regexp in specs for simple string equality 2025-10-02 12:01:56 -07:00
vendor Ensure OIDC nonce does not repeat 2025-07-09 00:42:54 +09:00
views Add Cert related information to the load balancer overview 2025-10-02 16:35:27 +02:00
.by-session-setup.rb Update by dependencies 2025-05-02 08:25:05 +09:00
.dockerignore Add cloudify_server script for demo quick start 2023-08-01 10:10:22 +03:00
.editorconfig Add EditorConfig 2023-04-10 19:49:54 -07:00
.gitignore Add dump_sequel_caches rake task 2025-06-21 02:53:55 +09:00
.rspec rspec --init 2023-01-17 12:16:56 -08:00
.rubocop.yml For load balancers, do one free retry on a stale connection 2025-07-31 10:46:58 +02:00
.tool-versions Update to Ruby 3.4.6 2025-09-24 02:42:00 +09:00
clover.rb Add invoice route helper 2025-10-01 18:52:48 +03:00
clover_admin.rb Add account model to admin panel 2025-09-27 21:50:20 +03:00
config.rb Clover: Support Ubiblk v0.2.1. 2025-10-01 15:41:41 -07:00
config.ru Remove explicit calls to Clover.freeze 2024-11-14 08:41:56 -08:00
db.rb Remove emit with database information when loading 2025-08-08 01:03:23 +09:00
DEVELOPERS.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
Dockerfile Update to Ruby 3.4.6 2025-09-24 02:42:00 +09:00
Gemfile Update Rodauth to version that clears account tokens on account change 2025-09-30 09:03:56 +09:00
Gemfile.lock Update to puma 7.0.4 2025-09-30 09:17:08 +09:00
LICENSE Update LICENSE 2024-01-29 18:02:07 -08:00
loader.rb Only attempt to enable YJIT if RubyVM::YJIT is defined 2025-09-04 06:04:47 +09:00
mise.local.toml.template Rewrite first part of DEVELOPERS.md to use mise 2025-05-06 10:03:12 -07:00
model.rb Eager load tunnel/nic information in PrivateSubnet#disconnect_subnet 2025-06-25 04:47:48 +09:00
package-lock.json Bump the js-dependencies group across 1 directory with 11 updates 2025-09-26 13:37:12 +03:00
package.json Bump the js-dependencies group across 1 directory with 11 updates 2025-09-26 13:37:12 +03:00
Procfile Make partitioned respirate automatically rebalance based on number of workers 2025-06-14 01:46:43 +09:00
puma_config.rb Update to Puma 7 2025-09-09 02:10:31 +09:00
Rakefile Do not allow calling CloverAdmin.create_admin_account in production pry 2025-09-03 02:39:04 +09:00
README.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
tailwind.config.js Add PG Configuration UI 2025-07-24 15:03:27 +05:30
ubid.rb Add Page.group_by_vm_host dataset method 2025-09-03 02:39:04 +09:00

Ubicloud CI Build Learn this repo using Greptile

Ubicloud is an open source cloud that can run anywhere. Think of it as an open alternative to cloud providers, like what Linux is to proprietary operating systems.

Ubicloud provides IaaS cloud features on bare metal providers, such as Hetzner, Leaseweb, and AWS Bare Metal. You can set it up yourself on these providers or you can use our managed service.

Quick start

Managed platform

You can use Ubicloud without installing anything. When you do this, we pass along the underlying provider's benefits to you, such as price or location.

https://console.ubicloud.com

Build your own cloud

You can also build your own cloud. To do this, start up Ubicloud's control plane and connect to its cloud console.

git clone git@github.com:ubicloud/ubicloud.git

# Generate secrets for demo
./demo/generate_env

# Run containers: db-migrator, app (web & respirate), postgresql
docker-compose -f demo/docker-compose.yml up

# Visit localhost:3000

The control plane is responsible for cloudifying bare metal Linux machines. The easiest way to build your own cloud is to lease instances from one of those providers. For example: https://www.hetzner.com/sb

Once you lease instance(s), update the .env file with the following environment variables:

  • HETZNER_USER
  • HETZNER_PASSWORD
  • HETZNER_SSH_PUBLIC_KEY
  • HETZNER_SSH_PRIVATE_KEY

Then, run the following script for each instance to cloudify it. Currently, the script cloudifies bare metal instances leased from Hetzner. After you cloudify your instances, you can provision and manage cloud resources on these machines.

# Enter hostname/IP and provider
docker exec -it ubicloud-app ./demo/cloudify_server

Later when you create VMs, Ubicloud will assign them IPv6 addresses. If your ISP doesn't support IPv6, please use a VPN or tunnel broker such as Mullvad or Hurricane Electric's https://tunnelbroker.net/ to connect. Alternatively, you could lease IPv4 addresses from your provider and add them to your control plane.

Why use it

Public cloud providers like AWS, Azure, and Google Cloud have made life easier for start-ups and enterprises. But they are closed source, have you rent computers at a huge premium, and lock you in. Ubicloud offers an open source alternative, reduces your costs, and returns control of your infrastructure back to you. All without sacrificing the cloud's convenience.

Today, AWS offers about two hundred cloud services. Ultimately, we will implement 10% of the cloud services that make up 80% of that consumption.

Example workloads and reasons to use Ubicloud today include:

  • You have an ephemeral workload like a CI/CD pipeline (we're integrating with GitHub Actions), or you'd like to run compute/memory heavy tests. Our managed cloud is ~3x cheaper than AWS, so you save on costs.

  • You want a portable and simple app deployment service like Kamal. We're moving Ubicloud's control plane from Heroku to Kamal; and we want to provide open and portable services for Kamal's dependencies in the process.

  • You have bare metal machines sitting somewhere. You'd like to build your own cloud for portability, security, or compliance reasons.

Status

You can provide us your feedback, get help, or ask us questions regarding your Ubicloud installations in the Community Forum.

We follow an established architectural pattern in building public cloud services. A control plane manages a data plane, where the data plane leverages open source software. You can find our current cloud components / services below.

  • Elastic Compute: Our control plane communicates with Linux bare metal servers using SSH. We use Cloud Hypervisor as our virtual machine monitor (VMM); and each instance of the VMM is contained within Linux namespaces for further isolation / security.

  • Networking: We use IPsec tunneling to establish an encrypted and private network environment. We support IPv4 and IPv6 in a dual-stack setup and provide both public and private networking. For security, each customers VMs operate in their own networking namespace. For firewalls and load balancers, we use Linux nftables.

  • Block Storage, non replicated: We use Storage Performance Development Toolkit (SPDK) to provide virtualized block storage to VMs. SPDK enables us to add enterprise features such as snapshot and replication in the future. We follow security best practices and encrypt the data encryption key itself.

  • Attribute-Based Access Control (ABAC): With ABAC, you can define attributes, roles, and permissions for users and give them fine-grained access to resources. You can read more about our ABAC design here.

  • What's Next?: We're planning to work on a managed K8s or metrics/monitoring service next. If you have a workload that would benefit from a specific cloud service, please get in touch with us through our Community Forum.

  • Control plane: Manages data plane services and resources. This is a Ruby program that stores its data in Postgres. We use the Roda framework to serve HTTP requests and Sequel to access the database. We manage web authentication with Rodauth. We communicate with data plane servers using SSH, via the library net-ssh. For our tests, we use RSpec.

  • Cloud console: Server-side web app served by the Roda framework. For the visual design, we use Tailwind CSS with components from Tailwind UI. We also use jQuery for interactivity.

If youd like to start hacking with Ubicloud, any method of obtaining Ruby and Postgres versions is acceptable. If you have no opinion on this, our development team uses mise as documented here in detail.

Greptile provides an AI/LLM that indexes Ubicloud's source code can answer questions about it.

FAQ

Do you have any experience with building this sort of thing?

Our founding team comes from Azure; and worked at Amazon and Heroku before that. We also have start-up experience. We were co-founders and founding team members at Citus Data, which got acquired by Microsoft.

How is this different than OpenStack?

We see three differences. First, Ubicloud is available as a managed service (vs boxed software). This way, you can get started in minutes rather than weeks. Since Ubicloud is designed for multi-tenancy, it comes with built-in features such as encryption at rest and in transit, virtual networking, secrets rotation, etc.

Second, we're initially targeting developers. This -we hope- will give us fast feedback cycles and enable us to have 6 key services in GA form in the next two years. OpenStack is still primarily used for 3 cloud services.

Last, we're designing for simplicity. With OpenStack, you pick between 10 hypervisors, 10 S3 implementations, and 5 block storage implementations. The software needs to work in a way where all of these implementations are compatible with each other. That leads to consultant-ware. We'll take a more opinionated approach with Ubicloud.