Globular
Open-source infrastructure for AI-operated distributed systems
Globular makes services, packages, nodes, workflows, identity, health, and history explicit enough for humans and AI agents to understand, diagnose, and operate real infrastructure safely.

Website • Organization • Core Services • Installer • Quickstart • Admin Console
🎧 Audio presentation: Listen to the Globular presentation
Why this matters now
AI agents are becoming part of software development and operations, but most infrastructure was not designed for agents.
Most platforms expose logs, dashboards, YAML, shell commands, and scattered state. That is hard for humans and dangerous for AI.
Globular exposes infrastructure as structured operational truth:
- what artifacts exist
- what the cluster wants
- what nodes installed
- what is actually running
- what workflows changed
- what health checks and doctor findings say
- what actions are allowed through RBAC
The goal is not to give AI agents a shell.
The goal is to give them a safe, typed, permissioned operation surface through CLI, MCP, gRPC services, workflows, and RBAC.
AI Operation Plane
Claude / Codex / AI agent
↓
MCP tools
↓
gRPC reflection / service APIs
↓
RBAC + mTLS + token validation
↓
Workflow engine / doctor / controller
↓
Cluster state changes
↓
Verification and convergence
What is Globular?
Globular is a self-hosted distributed platform for running native services with explicit workflows, observable convergence, strong identity and security, and dynamic routing.
Its deeper purpose is to make infrastructure agent-operable: explicit enough for humans and AI systems to inspect state, understand drift, trigger approved workflows, and verify convergence.
It is not a library you embed into an application. It is an operating environment for services and distributed applications that need lifecycle management, discovery, routing, storage, policy, and day-0 to day-2 operational tooling.
Globular is built around a few core ideas:
- Native services first: run services as native binaries under systemd
- etcd as the single source of truth: cluster state lives in one authoritative place
- Workflow-driven convergence: orchestration is explicit and inspectable
- 4-layer state model: Repository → Desired → Installed → Runtime
- Strong identity everywhere: TLS, mTLS, RBAC, and resource ownership are part of the platform, not bolted on later
- Agent-safe operation surface: CLI, MCP, and gRPC service APIs expose typed operations protected by RBAC
In practice, Globular gives you a platform to bootstrap a cluster, publish and install packages, route traffic through Envoy/xDS, operate services across nodes, and manage the system through workflows and admin tools.
Repository Map
Globular is split across several repositories, each with a clear role:
| Repository |
Role |
| Globular |
Platform entry point, top-level architecture, gateway/xDS layer, project overview |
| services |
Core backend and control-plane services, proto definitions, package build pipeline, main documentation |
| globular-installer |
Internal day-0 bootstrap and installation logic used by the release installer (install.sh); mainly relevant to contributors and packaging work |
| globular-quickstart |
Docker-based cluster simulation, testing, and operational scenarios |
| globular-admin |
Official admin console, web components, TypeScript SDK layer, and management UI |
If you are new to the project:
- Start here to understand what Globular is
- Go to services to explore the core platform implementation
- Use services releases to download installable release artifacts
- Use globular-quickstart to simulate and validate cluster behavior
- Use globular-admin to manage and operate the platform from the UI
Why Globular?
Modern distributed systems often force you into one of two awkward worlds:
- a pile of independent services with ad hoc scripts, scattered state, and fragile operations
- or a large orchestration stack that hides too much behavior behind implicit control loops
Globular takes a different path.
It treats infrastructure state as something that should be readable by humans, tools, and AI agents. Instead of hiding operational truth in scripts, dashboards, and scattered logs, Globular separates state, records workflow history, exposes secured operations, and verifies convergence.
It is designed for people who want:
- self-hosted infrastructure without heavy platform dependency
- distributed services with first-class identity, routing, and lifecycle management
- explicit operational models instead of invisible automation
- auditability and debuggability when something drifts, fails, or needs repair
- local-first development with a path to clustered deployment
What makes it different
| Concern |
Globular Approach |
| State management |
etcd as the single source of truth |
| Orchestration |
Workflow-driven, explicit, inspectable |
| Routing |
Envoy with xDS dynamic configuration |
| Service execution |
Native binaries under systemd |
| Security |
TLS, mTLS, RBAC, resource ownership |
| Package lifecycle |
Repository-backed artifacts and desired/installed/runtime separation |
| Operations |
Day-0 bootstrap, day-1 rollout, day-2 repair and observation |
| AI-assisted operations |
MCP, gRPC reflection, CLI, RBAC-controlled actions, workflow verification |
Globular is especially relevant when you want a platform for native services on bare metal or VMs and do not want container orchestration to be the only story in town.
High-Level Architecture
External Traffic
↓
Envoy Gateway / Ingress
↓
Gateway + xDS-Controlled Routing
↓
Core Platform Services
├── Cluster Controller
├── Node Agent
├── Workflow Service
├── Repository
├── Authentication
├── RBAC
├── Resource
├── DNS
├── Monitoring
└── Additional platform and application services
↓
Infrastructure Layer
├── etcd (source of truth)
├── MinIO (artifacts / objects / backups)
├── ScyllaDB (high-throughput data)
└── systemd (native service execution)
Core ideas behind the architecture
1. Explicit workflows
Operational changes are represented as workflows instead of being buried inside opaque automation. This makes rollouts, repair, recovery, and convergence easier to inspect and reason about.
2. 4-layer state model
Globular distinguishes between:
- Repository: what artifacts exist
- Desired: what the cluster wants
- Installed: what nodes have actually installed
- Runtime: what is currently healthy and running
That separation is a major part of how the platform stays understandable.
3. Agent-operable control surface
Globular exposes operational capabilities through CLI commands, MCP tools, and gRPC service APIs. These operations are protected by identity, mTLS, token validation, and RBAC so AI agents can inspect and propose actions without relying on unsafe shell access.
4. Dynamic routing with Envoy and xDS
Traffic enters through Envoy and is routed dynamically based on platform state, rather than static host files and manual port wiring.
Globular manages services as native binaries under systemd. It is designed for environments where that model is a feature, not a compromise.
What Globular Does
Globular provides a platform layer across the full lifecycle of distributed services.
Day-0: Bootstrap
- install the minimum infrastructure and control plane
- initialize identity and certificates
- establish the initial state foundation
Day-1: Publish and deploy
- build and package services
- publish artifacts to the repository
- install and activate services on nodes
- route traffic dynamically through xDS and gateway components
Day-2: Operate and evolve
- inspect workflows and state transitions
- detect drift and health issues
- run repair or reseed flows
- observe service/runtime status through admin tools and simulations
Main Building Blocks
This repository contains the gateway/xDS-facing project shell and serves as the umbrella entry point for the platform.
Core services
The services repository contains the backend and control-plane implementation, including:
- cluster controller
- node agent
- workflow engine
- repository service
- authentication and RBAC
- DNS and resource services
- monitoring, backup, and AI-assisted operational services
Install
Installable releases are published from the services releases page.
Example install flow on Linux:
VERSION="1.0.56"
curl -LO "https://github.com/globulario/services/releases/download/v${VERSION}/globular-${VERSION}-linux-amd64.tar.gz"
curl -LO "https://github.com/globulario/services/releases/download/v${VERSION}/globular-${VERSION}-linux-amd64.tar.gz.sha256"
/usr/bin/sha256sum -c "globular-${VERSION}-linux-amd64.tar.gz.sha256"
tar xzf "globular-${VERSION}-linux-amd64.tar.gz"
cd "globular-${VERSION}-linux-amd64"
sudo bash install.sh
The release archive is the user-facing install entry point. The install.sh script uses the logic from globular-installer behind the scenes, but most end users should start from the published release artifacts, not from the installer repository directly.
Quickstart and simulation
The globular-quickstart repository provides a Docker-based simulation environment for validating platform behavior with production-style binaries and realistic scenarios.
Admin console
The globular-admin repository contains the official management UI, along with frontend building blocks, TypeScript SDK/components, and the web admin application. It can later be wrapped as a Tauri desktop app.
Start Here
- Read this README for the big picture
- Explore the docs in services/docs
Explore the core implementation
- Open services
- Review
proto/, golang/, and the architecture/operator docs
Install a cluster
- Download an installable release from services releases
- Extract the archive and run
sudo bash install.sh
Simulate and test
- Use globular-quickstart to run scenario-based simulations and validate behavior before or alongside real deployments
Operate through the UI
- Use globular-admin for administration, management, and the official operator experience
Work on installer internals
- Use globular-installer only if you are contributing to the bootstrap/install pipeline itself
Who Globular Is For
Globular is aimed at people who want to operate distributed systems with more control and less fog.
It is a strong fit for:
- AI infrastructure and agentic-operations builders
- self-hosters and infrastructure builders
- operators who want explicit workflows and visible state transitions
- teams deploying native services on bare metal or VMs
- projects that need identity, routing, storage, and lifecycle management in one platform layer
- teams that want AI assistants to inspect, diagnose, and operate infrastructure through safe APIs instead of shell access
- developers building local-first systems that can grow into clustered deployments
Philosophy
Globular is about owning your infrastructure.
We favor:
- Explicit systems over hidden magic
- Observable operations over black-box orchestration
- Identity over ad hoc trust
- Clear state boundaries over collapsed abstractions
- Self-hosting over SaaS dependency
- Typed agent operations over unsafe shell access
- Evolution over rewrite culture
The goal is not to hide distributed systems behind a curtain.
The goal is to make them operable, understandable, and yours.
In the age of AI agents, that also means making infrastructure readable and safe enough for machines to help operate it.
Project Status
Globular is an actively evolving platform. The project now spans multiple repositories with a clearer separation between platform shell, core services, installer, simulation environment, and admin tooling.
The center of gravity for the core backend implementation and documentation is currently the services repository.
Community and Links
License
MIT License. See LICENSE.
Explicit. Secure. Agent-operable.
Globular makes infrastructure readable enough for humans and AI agents to operate safely.