Open source alternative to AWS. Elastic compute, block storage (non replicated), firewall and load balancer, managed Postgres, K8s, AI inference, and IAM services. https://ubicloud.com
Find a file
Jeremy Evans 87473a168e Allow connecting and disconnecting PostgreSQL subnets in the web UI
This cleanly separates PostgreSQL private subnets from other
private subnets, by using a "PostgreSQL Database: " prefix to the
name.
2025-09-15 11:54:56 -07:00
.github Bump the github-actions-dependencies group with 3 updates 2025-09-10 13:09:52 +03:00
assets Support showing PostgreSQL connection info with private ipv4 in the web UI 2025-09-15 11:52:54 -07:00
bin Update to Puma 7 2025-09-09 02:10:31 +09:00
cache Backfill vring_workers and add constraint. 2025-09-09 11:58:45 -07:00
cli Fix stdin when using cli/ubi to run external commands 2025-08-06 03:55:16 +09:00
cli-commands Allow disconnecting from postgres private subnets in the api/cli/sdk 2025-09-15 11:54:52 -07:00
config Add new billing meters for i8g instance types 2025-09-15 19:13:52 +02:00
demo Make the VM image Ubuntu Noble 2025-07-14 22:58:29 +03:00
helpers Allow connecting and disconnecting PostgreSQL subnets in the web UI 2025-09-15 11:54:56 -07:00
kubernetes/csi Remove redundant alias 2025-09-11 11:46:17 +02:00
lib Allow creating a PostgreSQL database connected to an existing private subnet in the web UI 2025-09-15 11:28:20 -07:00
migrate Backfill vring_workers and add constraint. 2025-09-09 11:58:45 -07:00
model Include postgres private connection string in api/cli output 2025-09-15 11:52:59 -07:00
openapi Allow disconnecting from postgres private subnets in the api/cli/sdk 2025-09-15 11:54:52 -07:00
prog Allow creating a PostgreSQL database connected to an existing private subnet in the web UI 2025-09-15 11:28:20 -07:00
public Use link instead of button for Vm/PostgresResource restart button on admin site 2025-09-06 01:40:34 +09:00
rhizome Support VMs without IPv6 2025-09-04 14:15:35 +02:00
rodauth/features Remove old login-based API authentication 2025-04-10 13:10:23 -07:00
routes Allow disconnecting from postgres private subnets in the api/cli/sdk 2025-09-15 11:54:52 -07:00
scheduling Make vring_workers configurable in Vm::Nexus.assemble. 2025-09-09 11:58:45 -07:00
sdk/ruby Include postgres private connection string in api/cli output 2025-09-15 11:52:59 -07:00
serializers Include postgres private connection string in api/cli output 2025-09-15 11:52:59 -07:00
spec Allow connecting and disconnecting PostgreSQL subnets in the web UI 2025-09-15 11:54:56 -07:00
vendor Ensure OIDC nonce does not repeat 2025-07-09 00:42:54 +09:00
views Allow connecting and disconnecting PostgreSQL subnets in the web UI 2025-09-15 11:54:56 -07:00
.by-session-setup.rb Update by dependencies 2025-05-02 08:25:05 +09:00
.dockerignore Add cloudify_server script for demo quick start 2023-08-01 10:10:22 +03:00
.editorconfig Add EditorConfig 2023-04-10 19:49:54 -07:00
.gitignore Add dump_sequel_caches rake task 2025-06-21 02:53:55 +09:00
.rspec rspec --init 2023-01-17 12:16:56 -08:00
.rubocop.yml For load balancers, do one free retry on a stale connection 2025-07-31 10:46:58 +02:00
.tool-versions Update nodejs to 24.6 from 23.6 2025-08-23 10:40:51 +03:00
clover.rb Allow disconnecting from postgres private subnets in the api/cli/sdk 2025-09-15 11:54:52 -07:00
clover_admin.rb Support provisioning spare GitHub runners on the admin site 2025-09-06 01:40:34 +09:00
config.rb Add ubuntu 24 alien runner support 2025-09-05 13:45:33 +03:00
config.ru Remove explicit calls to Clover.freeze 2024-11-14 08:41:56 -08:00
db.rb Remove emit with database information when loading 2025-08-08 01:03:23 +09:00
DEVELOPERS.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
Dockerfile Update nodejs to 24.6 from 23.6 2025-08-23 10:40:51 +03:00
Gemfile Update to Sequel 5.96.0 2025-09-04 02:37:10 +09:00
Gemfile.lock Update to Puma 7 2025-09-09 02:10:31 +09:00
LICENSE Update LICENSE 2024-01-29 18:02:07 -08:00
loader.rb Only attempt to enable YJIT if RubyVM::YJIT is defined 2025-09-04 06:04:47 +09:00
mise.local.toml.template Rewrite first part of DEVELOPERS.md to use mise 2025-05-06 10:03:12 -07:00
model.rb Eager load tunnel/nic information in PrivateSubnet#disconnect_subnet 2025-06-25 04:47:48 +09:00
package-lock.json Bump the js-dependencies group across 1 directory with 15 updates 2025-09-05 13:46:23 +03:00
package.json Bump the js-dependencies group across 1 directory with 15 updates 2025-09-05 13:46:23 +03:00
Procfile Make partitioned respirate automatically rebalance based on number of workers 2025-06-14 01:46:43 +09:00
puma_config.rb Update to Puma 7 2025-09-09 02:10:31 +09:00
Rakefile Do not allow calling CloverAdmin.create_admin_account in production pry 2025-09-03 02:39:04 +09:00
README.md Remove obsolete asdf instructions 2025-07-31 08:11:40 +03:00
tailwind.config.js Add PG Configuration UI 2025-07-24 15:03:27 +05:30
ubid.rb Add Page.group_by_vm_host dataset method 2025-09-03 02:39:04 +09:00

Ubicloud CI Build Learn this repo using Greptile

Ubicloud is an open source cloud that can run anywhere. Think of it as an open alternative to cloud providers, like what Linux is to proprietary operating systems.

Ubicloud provides IaaS cloud features on bare metal providers, such as Hetzner, Leaseweb, and AWS Bare Metal. You can set it up yourself on these providers or you can use our managed service.

Quick start

Managed platform

You can use Ubicloud without installing anything. When you do this, we pass along the underlying provider's benefits to you, such as price or location.

https://console.ubicloud.com

Build your own cloud

You can also build your own cloud. To do this, start up Ubicloud's control plane and connect to its cloud console.

git clone git@github.com:ubicloud/ubicloud.git

# Generate secrets for demo
./demo/generate_env

# Run containers: db-migrator, app (web & respirate), postgresql
docker-compose -f demo/docker-compose.yml up

# Visit localhost:3000

The control plane is responsible for cloudifying bare metal Linux machines. The easiest way to build your own cloud is to lease instances from one of those providers. For example: https://www.hetzner.com/sb

Once you lease instance(s), update the .env file with the following environment variables:

  • HETZNER_USER
  • HETZNER_PASSWORD
  • HETZNER_SSH_PUBLIC_KEY
  • HETZNER_SSH_PRIVATE_KEY

Then, run the following script for each instance to cloudify it. Currently, the script cloudifies bare metal instances leased from Hetzner. After you cloudify your instances, you can provision and manage cloud resources on these machines.

# Enter hostname/IP and provider
docker exec -it ubicloud-app ./demo/cloudify_server

Later when you create VMs, Ubicloud will assign them IPv6 addresses. If your ISP doesn't support IPv6, please use a VPN or tunnel broker such as Mullvad or Hurricane Electric's https://tunnelbroker.net/ to connect. Alternatively, you could lease IPv4 addresses from your provider and add them to your control plane.

Why use it

Public cloud providers like AWS, Azure, and Google Cloud have made life easier for start-ups and enterprises. But they are closed source, have you rent computers at a huge premium, and lock you in. Ubicloud offers an open source alternative, reduces your costs, and returns control of your infrastructure back to you. All without sacrificing the cloud's convenience.

Today, AWS offers about two hundred cloud services. Ultimately, we will implement 10% of the cloud services that make up 80% of that consumption.

Example workloads and reasons to use Ubicloud today include:

  • You have an ephemeral workload like a CI/CD pipeline (we're integrating with GitHub Actions), or you'd like to run compute/memory heavy tests. Our managed cloud is ~3x cheaper than AWS, so you save on costs.

  • You want a portable and simple app deployment service like Kamal. We're moving Ubicloud's control plane from Heroku to Kamal; and we want to provide open and portable services for Kamal's dependencies in the process.

  • You have bare metal machines sitting somewhere. You'd like to build your own cloud for portability, security, or compliance reasons.

Status

You can provide us your feedback, get help, or ask us questions regarding your Ubicloud installations in the Community Forum.

We follow an established architectural pattern in building public cloud services. A control plane manages a data plane, where the data plane leverages open source software. You can find our current cloud components / services below.

  • Elastic Compute: Our control plane communicates with Linux bare metal servers using SSH. We use Cloud Hypervisor as our virtual machine monitor (VMM); and each instance of the VMM is contained within Linux namespaces for further isolation / security.

  • Networking: We use IPsec tunneling to establish an encrypted and private network environment. We support IPv4 and IPv6 in a dual-stack setup and provide both public and private networking. For security, each customers VMs operate in their own networking namespace. For firewalls and load balancers, we use Linux nftables.

  • Block Storage, non replicated: We use Storage Performance Development Toolkit (SPDK) to provide virtualized block storage to VMs. SPDK enables us to add enterprise features such as snapshot and replication in the future. We follow security best practices and encrypt the data encryption key itself.

  • Attribute-Based Access Control (ABAC): With ABAC, you can define attributes, roles, and permissions for users and give them fine-grained access to resources. You can read more about our ABAC design here.

  • What's Next?: We're planning to work on a managed K8s or metrics/monitoring service next. If you have a workload that would benefit from a specific cloud service, please get in touch with us through our Community Forum.

  • Control plane: Manages data plane services and resources. This is a Ruby program that stores its data in Postgres. We use the Roda framework to serve HTTP requests and Sequel to access the database. We manage web authentication with Rodauth. We communicate with data plane servers using SSH, via the library net-ssh. For our tests, we use RSpec.

  • Cloud console: Server-side web app served by the Roda framework. For the visual design, we use Tailwind CSS with components from Tailwind UI. We also use jQuery for interactivity.

If youd like to start hacking with Ubicloud, any method of obtaining Ruby and Postgres versions is acceptable. If you have no opinion on this, our development team uses mise as documented here in detail.

Greptile provides an AI/LLM that indexes Ubicloud's source code can answer questions about it.

FAQ

Do you have any experience with building this sort of thing?

Our founding team comes from Azure; and worked at Amazon and Heroku before that. We also have start-up experience. We were co-founders and founding team members at Citus Data, which got acquired by Microsoft.

How is this different than OpenStack?

We see three differences. First, Ubicloud is available as a managed service (vs boxed software). This way, you can get started in minutes rather than weeks. Since Ubicloud is designed for multi-tenancy, it comes with built-in features such as encryption at rest and in transit, virtual networking, secrets rotation, etc.

Second, we're initially targeting developers. This -we hope- will give us fast feedback cycles and enable us to have 6 key services in GA form in the next two years. OpenStack is still primarily used for 3 cloud services.

Last, we're designing for simplicity. With OpenStack, you pick between 10 hypervisors, 10 S3 implementations, and 5 block storage implementations. The software needs to work in a way where all of these implementations are compatible with each other. That leads to consultant-ware. We'll take a more opinionated approach with Ubicloud.