Globular

module
v0.0.0-...-aec5def Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 3, 2026 License: Apache-2.0, Apache-2.0

README

Globular Logo

Globular

Open-source infrastructure for AI-operated distributed systems

Globular makes services, packages, nodes, workflows, identity, health, and history explicit enough for humans and AI agents to understand, diagnose, and operate real infrastructure safely.

License Website

WebsiteOrganizationCore ServicesInstallerQuickstartAdmin Console

🎧 Audio presentation: Listen to the Globular presentation


Why this matters now

AI agents are becoming part of software development and operations, but most infrastructure was not designed for agents.

Most platforms expose logs, dashboards, YAML, shell commands, and scattered state. That is hard for humans and dangerous for AI.

Globular exposes infrastructure as structured operational truth:

  • what artifacts exist
  • what the cluster wants
  • what nodes installed
  • what is actually running
  • what workflows changed
  • what health checks and doctor findings say
  • what actions are allowed through RBAC

The goal is not to give AI agents a shell.

The goal is to give them a safe, typed, permissioned operation surface through CLI, MCP, gRPC services, workflows, and RBAC.

AI Operation Plane
Claude / Codex / AI agent
        ↓
MCP tools
        ↓
gRPC reflection / service APIs
        ↓
RBAC + mTLS + token validation
        ↓
Workflow engine / doctor / controller
        ↓
Cluster state changes
        ↓
Verification and convergence

What is Globular?

Globular is a self-hosted distributed platform for running native services with explicit workflows, observable convergence, strong identity and security, and dynamic routing.

Its deeper purpose is to make infrastructure agent-operable: explicit enough for humans and AI systems to inspect state, understand drift, trigger approved workflows, and verify convergence.

It is not a library you embed into an application. It is an operating environment for services and distributed applications that need lifecycle management, discovery, routing, storage, policy, and day-0 to day-2 operational tooling.

Globular is built around a few core ideas:

  • Native services first: run services as native binaries under systemd
  • etcd as the single source of truth: cluster state lives in one authoritative place
  • Workflow-driven convergence: orchestration is explicit and inspectable
  • 4-layer state model: Repository → Desired → Installed → Runtime
  • Strong identity everywhere: TLS, mTLS, RBAC, and resource ownership are part of the platform, not bolted on later
  • Agent-safe operation surface: CLI, MCP, and gRPC service APIs expose typed operations protected by RBAC

In practice, Globular gives you a platform to bootstrap a cluster, publish and install packages, route traffic through Envoy/xDS, operate services across nodes, and manage the system through workflows and admin tools.


Repository Map

Globular is split across several repositories, each with a clear role:

Repository Role
Globular Platform entry point, top-level architecture, gateway/xDS layer, project overview
services Core backend and control-plane services, proto definitions, package build pipeline, main documentation
globular-installer Internal day-0 bootstrap and installation logic used by the release installer (install.sh); mainly relevant to contributors and packaging work
globular-quickstart Docker-based cluster simulation, testing, and operational scenarios
globular-admin Official admin console, web components, TypeScript SDK layer, and management UI

If you are new to the project:

  • Start here to understand what Globular is
  • Go to services to explore the core platform implementation
  • Use services releases to download installable release artifacts
  • Use globular-quickstart to simulate and validate cluster behavior
  • Use globular-admin to manage and operate the platform from the UI

Why Globular?

Modern distributed systems often force you into one of two awkward worlds:

  • a pile of independent services with ad hoc scripts, scattered state, and fragile operations
  • or a large orchestration stack that hides too much behavior behind implicit control loops

Globular takes a different path.

It treats infrastructure state as something that should be readable by humans, tools, and AI agents. Instead of hiding operational truth in scripts, dashboards, and scattered logs, Globular separates state, records workflow history, exposes secured operations, and verifies convergence.

It is designed for people who want:

  • self-hosted infrastructure without heavy platform dependency
  • distributed services with first-class identity, routing, and lifecycle management
  • explicit operational models instead of invisible automation
  • auditability and debuggability when something drifts, fails, or needs repair
  • local-first development with a path to clustered deployment
What makes it different
Concern Globular Approach
State management etcd as the single source of truth
Orchestration Workflow-driven, explicit, inspectable
Routing Envoy with xDS dynamic configuration
Service execution Native binaries under systemd
Security TLS, mTLS, RBAC, resource ownership
Package lifecycle Repository-backed artifacts and desired/installed/runtime separation
Operations Day-0 bootstrap, day-1 rollout, day-2 repair and observation
AI-assisted operations MCP, gRPC reflection, CLI, RBAC-controlled actions, workflow verification

Globular is especially relevant when you want a platform for native services on bare metal or VMs and do not want container orchestration to be the only story in town.


High-Level Architecture

External Traffic
    ↓
Envoy Gateway / Ingress
    ↓
Gateway + xDS-Controlled Routing
    ↓
Core Platform Services
    ├── Cluster Controller
    ├── Node Agent
    ├── Workflow Service
    ├── Repository
    ├── Authentication
    ├── RBAC
    ├── Resource
    ├── DNS
    ├── Monitoring
    └── Additional platform and application services
    ↓
Infrastructure Layer
    ├── etcd        (source of truth)
    ├── MinIO       (artifacts / objects / backups)
    ├── ScyllaDB    (high-throughput data)
    └── systemd     (native service execution)
Core ideas behind the architecture
1. Explicit workflows

Operational changes are represented as workflows instead of being buried inside opaque automation. This makes rollouts, repair, recovery, and convergence easier to inspect and reason about.

2. 4-layer state model

Globular distinguishes between:

  • Repository: what artifacts exist
  • Desired: what the cluster wants
  • Installed: what nodes have actually installed
  • Runtime: what is currently healthy and running

That separation is a major part of how the platform stays understandable.

3. Agent-operable control surface

Globular exposes operational capabilities through CLI commands, MCP tools, and gRPC service APIs. These operations are protected by identity, mTLS, token validation, and RBAC so AI agents can inspect and propose actions without relying on unsafe shell access.

4. Dynamic routing with Envoy and xDS

Traffic enters through Envoy and is routed dynamically based on platform state, rather than static host files and manual port wiring.

5. Native service platform

Globular manages services as native binaries under systemd. It is designed for environments where that model is a feature, not a compromise.


What Globular Does

Globular provides a platform layer across the full lifecycle of distributed services.

Day-0: Bootstrap
  • install the minimum infrastructure and control plane
  • initialize identity and certificates
  • establish the initial state foundation
Day-1: Publish and deploy
  • build and package services
  • publish artifacts to the repository
  • install and activate services on nodes
  • route traffic dynamically through xDS and gateway components
Day-2: Operate and evolve
  • inspect workflows and state transitions
  • detect drift and health issues
  • run repair or reseed flows
  • observe service/runtime status through admin tools and simulations

Main Building Blocks

Platform shell and routing

This repository contains the gateway/xDS-facing project shell and serves as the umbrella entry point for the platform.

Core services

The services repository contains the backend and control-plane implementation, including:

  • cluster controller
  • node agent
  • workflow engine
  • repository service
  • authentication and RBAC
  • DNS and resource services
  • monitoring, backup, and AI-assisted operational services
Install

Installable releases are published from the services releases page.

Example install flow on Linux:

VERSION="1.0.56"

curl -LO "https://github.com/globulario/services/releases/download/v${VERSION}/globular-${VERSION}-linux-amd64.tar.gz"
curl -LO "https://github.com/globulario/services/releases/download/v${VERSION}/globular-${VERSION}-linux-amd64.tar.gz.sha256"
/usr/bin/sha256sum -c "globular-${VERSION}-linux-amd64.tar.gz.sha256"

tar xzf "globular-${VERSION}-linux-amd64.tar.gz"
cd "globular-${VERSION}-linux-amd64"
sudo bash install.sh

The release archive is the user-facing install entry point. The install.sh script uses the logic from globular-installer behind the scenes, but most end users should start from the published release artifacts, not from the installer repository directly.

Quickstart and simulation

The globular-quickstart repository provides a Docker-based simulation environment for validating platform behavior with production-style binaries and realistic scenarios.

Admin console

The globular-admin repository contains the official management UI, along with frontend building blocks, TypeScript SDK/components, and the web admin application. It can later be wrapped as a Tauri desktop app.


Start Here

Understand the platform
  • Read this README for the big picture
  • Explore the docs in services/docs
Explore the core implementation
  • Open services
  • Review proto/, golang/, and the architecture/operator docs
Install a cluster
  • Download an installable release from services releases
  • Extract the archive and run sudo bash install.sh
Simulate and test
  • Use globular-quickstart to run scenario-based simulations and validate behavior before or alongside real deployments
Operate through the UI
  • Use globular-admin for administration, management, and the official operator experience
Work on installer internals
  • Use globular-installer only if you are contributing to the bootstrap/install pipeline itself

Who Globular Is For

Globular is aimed at people who want to operate distributed systems with more control and less fog.

It is a strong fit for:

  • AI infrastructure and agentic-operations builders
  • self-hosters and infrastructure builders
  • operators who want explicit workflows and visible state transitions
  • teams deploying native services on bare metal or VMs
  • projects that need identity, routing, storage, and lifecycle management in one platform layer
  • teams that want AI assistants to inspect, diagnose, and operate infrastructure through safe APIs instead of shell access
  • developers building local-first systems that can grow into clustered deployments

Philosophy

Globular is about owning your infrastructure.

We favor:

  • Explicit systems over hidden magic
  • Observable operations over black-box orchestration
  • Identity over ad hoc trust
  • Clear state boundaries over collapsed abstractions
  • Self-hosting over SaaS dependency
  • Typed agent operations over unsafe shell access
  • Evolution over rewrite culture

The goal is not to hide distributed systems behind a curtain.

The goal is to make them operable, understandable, and yours.

In the age of AI agents, that also means making infrastructure readable and safe enough for machines to help operate it.


Project Status

Globular is an actively evolving platform. The project now spans multiple repositories with a clearer separation between platform shell, core services, installer, simulation environment, and admin tooling.

The center of gravity for the core backend implementation and documentation is currently the services repository.



License

MIT License. See LICENSE.


Explicit. Secure. Agent-operable.
Globular makes infrastructure readable enough for humans and AI agents to operate safely.

Directories

Path Synopsis
cmd
gateway command
xds command
internal
controlplane
controlplane/bootstrap.go
controlplane/bootstrap.go
faststart
Package faststart provides an ffmpeg-based MP4 moov-atom optimizer.
Package faststart provides an ffmpeg-based MP4 moov-atom optimizer.
gateway/handlers/admin
Package admin exposes /admin/metrics/* HTTP endpoints that return fully-derived service health and storage models so the frontend becomes a pure renderer with no client-side health computation.
Package admin exposes /admin/metrics/* HTTP endpoints that return fully-derived service health and storage models so the frontend becomes a pure renderer with no client-side health computation.
gateway/handlers/domains
Package domains exposes /api/domains/* HTTP endpoints for managing external domain specs and DNS provider configurations.
Package domains exposes /api/domains/* HTTP endpoints for managing external domain specs and DNS provider configurations.
gateway/handlers/stats
Package stats exposes a /stats HTTP endpoint that returns real-time host metrics (CPU, memory, disk, network) plus Go runtime stats.
Package stats exposes a /stats HTTP endpoint that returns real-time host metrics (CPU, memory, disk, network) plus Go runtime stats.
gateway/http/middleware
Package middleware provides HTTP middleware functions for common tasks such as security headers, CORS, logging, recovery, rate limiting, and Prometheus metrics.
Package middleware provides HTTP middleware functions for common tasks such as security headers, CORS, logging, recovery, rate limiting, and Prometheus metrics.
journal
Package journal provides helpers to read systemd journal entries via journalctl.
Package journal provides helpers to read systemd journal entries via journalctl.
observability
Package observability provides utilities for initializing and configuring OpenTelemetry tracing within the application.
Package observability provides utilities for initializing and configuring OpenTelemetry tracing within the application.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL