Open source alternative to AWS. Elastic compute, block storage (non replicated), firewall and load balancer, managed Postgres, K8s, AI inference, and IAM services. https://ubicloud.com
Find a file
Enes Cakir d937261d1d Use forwardable in the GithubRunner prog for easier access to associations
I didn't know about the 'forwardable' delegator when I first wrote this
prog. I learned about it from PostgresResourceNexus.

It eliminates the need to write certain property accessors, and reduces
line width significantly, and enhances code readability.
2025-08-06 17:30:37 +03:00
.github Add monitor smoke test 2025-07-30 07:00:03 +09:00
assets Add PG Configuration UI 2025-07-24 15:03:27 +05:30
bin Support setting of PGPASSWORD in bin/ubi and cli/ubi 2025-08-06 02:10:02 +09:00
cache Add migration for EC2 DNS name 2025-08-05 16:26:18 +02:00
cli Fix stdin when using cli/ubi to run external commands 2025-08-06 03:55:16 +09:00
cli-commands Support kc kubeconfig cli command 2025-08-01 04:18:57 +09:00
config Add billing rate for m7a series 2025-08-06 16:56:33 +03:00
demo Make the VM image Ubuntu Noble 2025-07-14 22:58:29 +03:00
helpers Change all create_with_id to create 2025-08-06 01:55:51 +09:00
kubernetes/csi Convert many "allow" to "expect" 2025-07-25 15:20:55 +02:00
lib Add m7a support 2025-08-06 16:56:35 +03:00
migrate Add eu-west-1 aws ami migration 2025-08-06 13:52:29 +02:00
model Enable alien VM runners on AWS 2025-08-06 17:19:18 +03:00
openapi Add eu-west-1 to the options 2025-08-06 13:52:29 +02:00
prog Use forwardable in the GithubRunner prog for easier access to associations 2025-08-06 17:30:37 +03:00
public Add lantern to Postgres database list UI 2024-10-10 21:49:50 +02:00
rhizome Make CloudHypervisor 46.0 the default in rhizome on Ubuntu 24.04 hosts 2025-07-22 00:49:42 +09:00
rodauth/features Remove old login-based API authentication 2025-04-10 13:10:23 -07:00
routes Replace unnecessary new_with_id calls with new 2025-08-06 01:55:51 +09:00
scheduling Change all create_with_id to create 2025-08-06 01:55:51 +09:00
sdk/ruby Support kc kubeconfig cli command 2025-08-01 04:18:57 +09:00
serializers Support tags for Postgres Resources 2025-08-04 19:05:28 +03:00
spec Enable alien VM runners on AWS 2025-08-06 17:19:18 +03:00
vendor Ensure OIDC nonce does not repeat 2025-07-09 00:42:54 +09:00
views Open invoices in a new tab 2025-08-04 22:04:05 +03:00
.by-session-setup.rb Update by dependencies 2025-05-02 08:25:05 +09:00
.dockerignore Add cloudify_server script for demo quick start 2023-08-01 10:10:22 +03:00
.editorconfig Add EditorConfig 2023-04-10 19:49:54 -07:00
.gitignore Add dump_sequel_caches rake task 2025-06-21 02:53:55 +09:00
.rspec rspec --init 2023-01-17 12:16:56 -08:00
.rubocop.yml For load balancers, do one free retry on a stale connection 2025-07-31 10:46:58 +02:00
.tool-versions Bump Ruby version to 3.4.5 2025-07-22 00:21:16 +09:00
clover.rb Handle OIDC providers where issuer includes a path 2025-08-01 04:44:02 +09:00
config.rb Enable alien VM runners on AWS 2025-08-06 17:19:18 +03:00
config.ru Remove explicit calls to Clover.freeze 2024-11-14 08:41:56 -08:00
db.rb Config for db pool size of monitor process 2025-07-22 14:44:50 +02:00
DEVELOPERS.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
Dockerfile Bump Ruby version to 3.4.5 2025-07-22 00:21:16 +09:00
Gemfile Use Sequel 5.95 instead of git checkout 2025-08-05 03:23:07 +09:00
Gemfile.lock Use Sequel 5.95 instead of git checkout 2025-08-05 03:23:07 +09:00
LICENSE Update LICENSE 2024-01-29 18:02:07 -08:00
loader.rb Stop using omniauth_openid_connect 2025-07-08 00:10:06 +09:00
mise.local.toml.template Rewrite first part of DEVELOPERS.md to use mise 2025-05-06 10:03:12 -07:00
model.rb Eager load tunnel/nic information in PrivateSubnet#disconnect_subnet 2025-06-25 04:47:48 +09:00
package-lock.json Bump the js-dependencies group across 1 directory with 11 updates 2025-07-23 13:36:00 +03:00
package.json Bump the js-dependencies group across 1 directory with 11 updates 2025-07-23 13:36:00 +03:00
Procfile Make partitioned respirate automatically rebalance based on number of workers 2025-06-14 01:46:43 +09:00
puma_config.rb Disable the use of HTTP 1.1 keep alives in Puma 2025-07-23 01:58:50 +09:00
Rakefile Add monitor smoke test 2025-07-30 07:00:03 +09:00
README.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
tailwind.config.js Add PG Configuration UI 2025-07-24 15:03:27 +05:30
ubid.rb Add OidcProvider model 2025-07-08 00:10:06 +09:00

Ubicloud CI Build Learn this repo using Greptile

Ubicloud is an open source cloud that can run anywhere. Think of it as an open alternative to cloud providers, like what Linux is to proprietary operating systems.

Ubicloud provides IaaS cloud features on bare metal providers, such as Hetzner, Leaseweb, and AWS Bare Metal. You can set it up yourself on these providers or you can use our managed service.

Quick start

Managed platform

You can use Ubicloud without installing anything. When you do this, we pass along the underlying provider's benefits to you, such as price or location.

https://console.ubicloud.com

Build your own cloud

You can also build your own cloud. To do this, start up Ubicloud's control plane and connect to its cloud console.

git clone git@github.com:ubicloud/ubicloud.git

# Generate secrets for demo
./demo/generate_env

# Run containers: db-migrator, app (web & respirate), postgresql
docker-compose -f demo/docker-compose.yml up

# Visit localhost:3000

The control plane is responsible for cloudifying bare metal Linux machines. The easiest way to build your own cloud is to lease instances from one of those providers. For example: https://www.hetzner.com/sb

Once you lease instance(s), update the .env file with the following environment variables:

  • HETZNER_USER
  • HETZNER_PASSWORD
  • HETZNER_SSH_PUBLIC_KEY
  • HETZNER_SSH_PRIVATE_KEY

Then, run the following script for each instance to cloudify it. Currently, the script cloudifies bare metal instances leased from Hetzner. After you cloudify your instances, you can provision and manage cloud resources on these machines.

# Enter hostname/IP and provider
docker exec -it ubicloud-app ./demo/cloudify_server

Later when you create VMs, Ubicloud will assign them IPv6 addresses. If your ISP doesn't support IPv6, please use a VPN or tunnel broker such as Mullvad or Hurricane Electric's https://tunnelbroker.net/ to connect. Alternatively, you could lease IPv4 addresses from your provider and add them to your control plane.

Why use it

Public cloud providers like AWS, Azure, and Google Cloud have made life easier for start-ups and enterprises. But they are closed source, have you rent computers at a huge premium, and lock you in. Ubicloud offers an open source alternative, reduces your costs, and returns control of your infrastructure back to you. All without sacrificing the cloud's convenience.

Today, AWS offers about two hundred cloud services. Ultimately, we will implement 10% of the cloud services that make up 80% of that consumption.

Example workloads and reasons to use Ubicloud today include:

  • You have an ephemeral workload like a CI/CD pipeline (we're integrating with GitHub Actions), or you'd like to run compute/memory heavy tests. Our managed cloud is ~3x cheaper than AWS, so you save on costs.

  • You want a portable and simple app deployment service like Kamal. We're moving Ubicloud's control plane from Heroku to Kamal; and we want to provide open and portable services for Kamal's dependencies in the process.

  • You have bare metal machines sitting somewhere. You'd like to build your own cloud for portability, security, or compliance reasons.

Status

You can provide us your feedback, get help, or ask us questions regarding your Ubicloud installations in the Community Forum.

We follow an established architectural pattern in building public cloud services. A control plane manages a data plane, where the data plane leverages open source software. You can find our current cloud components / services below.

  • Elastic Compute: Our control plane communicates with Linux bare metal servers using SSH. We use Cloud Hypervisor as our virtual machine monitor (VMM); and each instance of the VMM is contained within Linux namespaces for further isolation / security.

  • Networking: We use IPsec tunneling to establish an encrypted and private network environment. We support IPv4 and IPv6 in a dual-stack setup and provide both public and private networking. For security, each customers VMs operate in their own networking namespace. For firewalls and load balancers, we use Linux nftables.

  • Block Storage, non replicated: We use Storage Performance Development Toolkit (SPDK) to provide virtualized block storage to VMs. SPDK enables us to add enterprise features such as snapshot and replication in the future. We follow security best practices and encrypt the data encryption key itself.

  • Attribute-Based Access Control (ABAC): With ABAC, you can define attributes, roles, and permissions for users and give them fine-grained access to resources. You can read more about our ABAC design here.

  • What's Next?: We're planning to work on a managed K8s or metrics/monitoring service next. If you have a workload that would benefit from a specific cloud service, please get in touch with us through our Community Forum.

  • Control plane: Manages data plane services and resources. This is a Ruby program that stores its data in Postgres. We use the Roda framework to serve HTTP requests and Sequel to access the database. We manage web authentication with Rodauth. We communicate with data plane servers using SSH, via the library net-ssh. For our tests, we use RSpec.

  • Cloud console: Server-side web app served by the Roda framework. For the visual design, we use Tailwind CSS with components from Tailwind UI. We also use jQuery for interactivity.

If youd like to start hacking with Ubicloud, any method of obtaining Ruby and Postgres versions is acceptable. If you have no opinion on this, our development team uses mise as documented here in detail.

Greptile provides an AI/LLM that indexes Ubicloud's source code can answer questions about it.

FAQ

Do you have any experience with building this sort of thing?

Our founding team comes from Azure; and worked at Amazon and Heroku before that. We also have start-up experience. We were co-founders and founding team members at Citus Data, which got acquired by Microsoft.

How is this different than OpenStack?

We see three differences. First, Ubicloud is available as a managed service (vs boxed software). This way, you can get started in minutes rather than weeks. Since Ubicloud is designed for multi-tenancy, it comes with built-in features such as encryption at rest and in transit, virtual networking, secrets rotation, etc.

Second, we're initially targeting developers. This -we hope- will give us fast feedback cycles and enable us to have 6 key services in GA form in the next two years. OpenStack is still primarily used for 3 cloud services.

Last, we're designing for simplicity. With OpenStack, you pick between 10 hypervisors, 10 S3 implementations, and 5 block storage implementations. The software needs to work in a way where all of these implementations are compatible with each other. That leads to consultant-ware. We'll take a more opinionated approach with Ubicloud.