Open source alternative to AWS. Elastic compute, block storage (non replicated), firewall and load balancer, managed Postgres, K8s, AI inference, and IAM services. https://ubicloud.com
Find a file
Daniel Farina 0f98b812af wip
2025-07-17 23:46:05 -07:00
.github Use CloudHypervisor 46.0 for GHA in E2E tests 2025-07-15 01:50:21 +09:00
assets Replace dots with dashes in form element classes 2025-07-01 00:24:58 +03:00
bin Fix running only vm and postgres e2e tests 2025-07-10 11:34:55 +03:00
cache Make locked_domain.domain column citext instead of text 2025-07-17 00:44:40 +09:00
cli Handle failure of resp.Body.Close in sendRequest 2025-05-01 01:55:49 +09:00
cli-commands Return current and target sizes in PG API 2025-07-08 20:19:56 +05:30
config OpenRouter: Delist mistral-small-3 2025-07-11 16:57:15 +02:00
demo Make the VM image Ubuntu Noble 2025-07-14 22:58:29 +03:00
helpers Fix GitHub captialization in omniauth code 2025-07-10 02:29:37 +09:00
kubernetes/csi wip 2025-07-17 23:46:05 -07:00
lib Avoid metrics export when resource is deleted 2025-07-16 17:57:17 +05:30
migrate Make locked_domain.domain column citext instead of text 2025-07-17 00:44:40 +09:00
model Make locked_domain.domain column citext instead of text 2025-07-17 00:44:40 +09:00
openapi Add us-east-1 and us-east-2 2025-07-11 15:26:00 +02:00
prog Improve ssh file permissions for syncing worker mesh 2025-07-17 10:24:11 +02:00
public Add lantern to Postgres database list UI 2024-10-10 21:49:50 +02:00
rhizome Fix persistent_device_id for NVMe disks 2025-07-16 10:26:54 -07:00
rodauth/features Remove old login-based API authentication 2025-04-10 13:10:23 -07:00
routes Allow read replica creation only when there are backups 2025-07-07 17:38:39 +02:00
scheduling Make VmHostSlice.enabled mean "not scheduled for destroy". 2025-07-15 16:54:14 -07:00
sdk/ruby Add CLI support for listing KubernetesClusters 2025-07-02 10:34:03 +02:00
serializers Return current and target sizes in PG API 2025-07-08 20:19:56 +05:30
spec Improve ssh file permissions for syncing worker mesh 2025-07-17 10:24:11 +02:00
vendor Ensure OIDC nonce does not repeat 2025-07-09 00:42:54 +09:00
views Remove "shortcut icon" link from layout 2025-07-17 00:44:29 +09:00
.by-session-setup.rb Update by dependencies 2025-05-02 08:25:05 +09:00
.dockerignore Add cloudify_server script for demo quick start 2023-08-01 10:10:22 +03:00
.editorconfig Add EditorConfig 2023-04-10 19:49:54 -07:00
.gitignore Add dump_sequel_caches rake task 2025-06-21 02:53:55 +09:00
.rspec rspec --init 2023-01-17 12:16:56 -08:00
.rubocop.yml Fix the specs to avoid defining methods on Object 2025-05-03 03:33:24 +09:00
.tool-versions Add VictoriaMetrics to .tool-versions 2025-05-28 13:04:58 +05:30
clover.rb Disallow changing login for an account to a locked domain 2025-07-16 08:06:32 +09:00
config.rb Make Alma Linux 9.6 the default Alma Linux 9 version 2025-07-15 08:25:09 +09:00
config.ru Remove explicit calls to Clover.freeze 2024-11-14 08:41:56 -08:00
db.rb Better NetAddr/Sequel integration 2025-06-12 07:32:57 +09:00
DEVELOPERS.md Use local VictoriaMetrics instance during development 2025-05-28 13:04:58 +05:30
Dockerfile Bump ruby version from 3.4.3 to 3.4.4 2025-05-20 02:33:33 +09:00
Gemfile Update to tilt 2.6.1 2025-07-08 05:24:37 +09:00
Gemfile.lock Update to tilt 2.6.1 2025-07-08 05:24:37 +09:00
LICENSE Update LICENSE 2024-01-29 18:02:07 -08:00
loader.rb Stop using omniauth_openid_connect 2025-07-08 00:10:06 +09:00
mise.local.toml.template Rewrite first part of DEVELOPERS.md to use mise 2025-05-06 10:03:12 -07:00
model.rb Eager load tunnel/nic information in PrivateSubnet#disconnect_subnet 2025-06-25 04:47:48 +09:00
package-lock.json Bump the js-dependencies group with 3 updates 2025-06-11 14:43:38 +03:00
package.json Bump the js-dependencies group across 1 directory with 20 updates 2025-05-15 18:21:51 +03:00
Procfile Make partitioned respirate automatically rebalance based on number of workers 2025-06-14 01:46:43 +09:00
puma_config.rb Go back to 15 threads 2025-05-15 02:18:07 +09:00
Rakefile Set runtime token secret for E2E 2025-07-04 22:05:06 +03:00
README.md Update README.md according to the changed cloudify script 2025-07-14 22:58:29 +03:00
tailwind.config.js Add new PostgreSQL Backup/Restore page 2025-06-19 13:07:10 +03:00
ubid.rb Add OidcProvider model 2025-07-08 00:10:06 +09:00

Ubicloud CI Build Learn this repo using Greptile

Ubicloud is an open source cloud that can run anywhere. Think of it as an open alternative to cloud providers, like what Linux is to proprietary operating systems.

Ubicloud provides IaaS cloud features on bare metal providers, such as Hetzner, Leaseweb, and AWS Bare Metal. You can set it up yourself on these providers or you can use our managed service.

Quick start

Managed platform

You can use Ubicloud without installing anything. When you do this, we pass along the underlying provider's benefits to you, such as price or location.

https://console.ubicloud.com

Build your own cloud

You can also build your own cloud. To do this, start up Ubicloud's control plane and connect to its cloud console.

git clone git@github.com:ubicloud/ubicloud.git

# Generate secrets for demo
./demo/generate_env

# Run containers: db-migrator, app (web & respirate), postgresql
docker-compose -f demo/docker-compose.yml up

# Visit localhost:3000

The control plane is responsible for cloudifying bare metal Linux machines. The easiest way to build your own cloud is to lease instances from one of those providers. For example: https://www.hetzner.com/sb

Once you lease instance(s), update the .env file with the following environment variables:

  • HETZNER_USER
  • HETZNER_PASSWORD
  • HETZNER_SSH_PUBLIC_KEY
  • HETZNER_SSH_PRIVATE_KEY

Then, run the following script for each instance to cloudify it. Currently, the script cloudifies bare metal instances leased from Hetzner. After you cloudify your instances, you can provision and manage cloud resources on these machines.

# Enter hostname/IP and provider
docker exec -it ubicloud-app ./demo/cloudify_server

Later when you create VMs, Ubicloud will assign them IPv6 addresses. If your ISP doesn't support IPv6, please use a VPN or tunnel broker such as Mullvad or Hurricane Electric's https://tunnelbroker.net/ to connect. Alternatively, you could lease IPv4 addresses from your provider and add them to your control plane.

Why use it

Public cloud providers like AWS, Azure, and Google Cloud have made life easier for start-ups and enterprises. But they are closed source, have you rent computers at a huge premium, and lock you in. Ubicloud offers an open source alternative, reduces your costs, and returns control of your infrastructure back to you. All without sacrificing the cloud's convenience.

Today, AWS offers about two hundred cloud services. Ultimately, we will implement 10% of the cloud services that make up 80% of that consumption.

Example workloads and reasons to use Ubicloud today include:

  • You have an ephemeral workload like a CI/CD pipeline (we're integrating with GitHub Actions), or you'd like to run compute/memory heavy tests. Our managed cloud is ~3x cheaper than AWS, so you save on costs.

  • You want a portable and simple app deployment service like Kamal. We're moving Ubicloud's control plane from Heroku to Kamal; and we want to provide open and portable services for Kamal's dependencies in the process.

  • You have bare metal machines sitting somewhere. You'd like to build your own cloud for portability, security, or compliance reasons.

Status

You can provide us your feedback, get help, or ask us questions regarding your Ubicloud installations in the Community Forum.

We follow an established architectural pattern in building public cloud services. A control plane manages a data plane, where the data plane leverages open source software. You can find our current cloud components / services below.

  • Elastic Compute: Our control plane communicates with Linux bare metal servers using SSH. We use Cloud Hypervisor as our virtual machine monitor (VMM); and each instance of the VMM is contained within Linux namespaces for further isolation / security.

  • Networking: We use IPsec tunneling to establish an encrypted and private network environment. We support IPv4 and IPv6 in a dual-stack setup and provide both public and private networking. For security, each customers VMs operate in their own networking namespace. For firewalls and load balancers, we use Linux nftables.

  • Block Storage, non replicated: We use Storage Performance Development Toolkit (SPDK) to provide virtualized block storage to VMs. SPDK enables us to add enterprise features such as snapshot and replication in the future. We follow security best practices and encrypt the data encryption key itself.

  • Attribute-Based Access Control (ABAC): With ABAC, you can define attributes, roles, and permissions for users and give them fine-grained access to resources. You can read more about our ABAC design here.

  • What's Next?: We're planning to work on a managed K8s or metrics/monitoring service next. If you have a workload that would benefit from a specific cloud service, please get in touch with us through our Community Forum.

  • Control plane: Manages data plane services and resources. This is a Ruby program that stores its data in Postgres. We use the Roda framework to serve HTTP requests and Sequel to access the database. We manage web authentication with Rodauth. We communicate with data plane servers using SSH, via the library net-ssh. For our tests, we use RSpec.

  • Cloud console: Server-side web app served by the Roda framework. For the visual design, we use Tailwind CSS with components from Tailwind UI. We also use jQuery for interactivity.

If youd like to start hacking with Ubicloud, any method of obtaining Ruby and Postgres versions is acceptable. If you have no opinion on this, our development team uses asdf-vm as documented here in detail.

Greptile provides an AI/LLM that indexes Ubicloud's source code can answer questions about it.

FAQ

Do you have any experience with building this sort of thing?

Our founding team comes from Azure; and worked at Amazon and Heroku before that. We also have start-up experience. We were co-founders and founding team members at Citus Data, which got acquired by Microsoft.

How is this different than OpenStack?

We see three differences. First, Ubicloud is available as a managed service (vs boxed software). This way, you can get started in minutes rather than weeks. Since Ubicloud is designed for multi-tenancy, it comes with built-in features such as encryption at rest and in transit, virtual networking, secrets rotation, etc.

Second, we're initially targeting developers. This -we hope- will give us fast feedback cycles and enable us to have 6 key services in GA form in the next two years. OpenStack is still primarily used for 3 cloud services.

Last, we're designing for simplicity. With OpenStack, you pick between 10 hypervisors, 10 S3 implementations, and 5 block storage implementations. The software needs to work in a way where all of these implementations are compatible with each other. That leads to consultant-ware. We'll take a more opinionated approach with Ubicloud.