Because running containers in the cloud shouldn't be hard.
Per-second compute for stateless services, AI agents and jobs with built-in horizontal scaling.
push an image,
pick a region,
you're live
Trusted by developers at
"We shipped in an afternoon—no VPCs, subnets, or ALBs." — CDN77 Engineering
Simple primitives, powerful
automations
Everything you need to run
stateless services and jobs at scale.
Account → Clusters → Services/Jobs/CronJobs. Clean abstractions that map to how you think about infrastructure.
Private by default; publish via global LB with path-prefix rules. No ALBs, no VPCs to configure.
Per-cluster quotas so dev can't starve prod. Set hard limits on containers, CPUs, memory, and storage.
Standard cron semantics with retries, deadlines, and run history. Scheduled work that just works.
Optional VM isolation, deny-by-default networking, tenant DNS, and encrypted control plane volumes.
Pay for what you use, when you use it. Per-second billing with no upfront costs or commitments.
Simple pricing,
that's always predictable No surprises!
How it works
Three steps from code to production. No YAML manifests, no cluster management.
Pick regions and set quotas. Define your blast radius and resource limits upfront.
clusterforge cluster create production --regions us-east,eu-west --cpu-quota 100 --memory-quota 400GB
Push your image, set replicas, CPU/memory, and health checks. Zero-downtime deploys included.
cfo service deploy api --image ghcr.io/org/api:1.2.3 --replicas 3 --cpu 1 --memory 1GB
Add HTTP ingress or DNS publishing, then schedule CronJobs for background work.
cfo service publish api --type load-balanced --path /api clusterforge cronjob create backup --schedule '0 2 * * *'
Configuration that makes sense
Declarative YAML that maps to how you think about services. No Kubernetes complexity.
Complete service definition with health checks and isolation
# clusterforge.service.yaml
name: api
cluster: production
image: ghcr.io/org/api:1.2.3
replicas: 3
cpus: 1
memoryMB: 1024
ports:
- port: 8080
protocol: tcp
# Load-balanced for HTTP with health checks
type: load-balanced
healthCheck:
protocol: http
port: 8080
path: "/healthz"
# Stronger sandboxing, optional
isolation: vmDeploy with: cfo service apply -f clusterforge.service.yaml
Security & reliability
Enterprise-grade security built in. Compliance-ready from day one.
Optional VM isolation (Kata/QEMU)
Deny-by-default network policies
Tenant-scoped DNS resolution
WireGuard pod-to-pod encapsulation
Encrypted platform volumes (LUKS2)
Graceful pre-emption with replacement replicas
Built with compliance in mind: SOC 2, GDPR, and enterprise security standards
SOC 2 Type II GDPR Compliant Enterprise Ready