Build a shrine for your app.
A sacred suite of tools for those who care about their infrastructure.
Each product is designed to stand alone — and to work beautifully together.
Docker-native hosting where every project lives in its own isolated container with a dedicated subdomain. Choose your stack, launch your shrine.
Transactional and hosted email, drawn from the same sacred source. Your own domain, your own mailboxes — fully managed and beautifully simple.
Node.js, Python, PHP, databases — pick your stack. Your choices are saved into the container manifest.
A Dockerfile and docker-compose.yml are created automatically based on your selection — an isolated, reproducible environment.
An isolated container spins up with dedicated resources, fully separated from every other environment on the platform.
A subdomain like your-app.hakurei.cloud is assigned instantly with a valid SSL certificate. No manual DNS setup needed.
Docker-native hosting means full isolation, reproducible environments, and instant scaling. Every project lives in its own sacred space.
Every project runs in an isolated container. No dependency conflicts, no cross-contamination between environments.
ContainerLet's Encrypt certificates are issued and renewed automatically for every subdomain you create.
SecurityEach container runs in its own Docker network. Communication between services only through explicit configuration.
NetworkNode.js, Python, PHP, Ruby, Go, Rust. PostgreSQL, MySQL, Redis, MongoDB. Assemble the exact stack you need from ready-made building blocks.
FlexibleA *.hakurei.cloud subdomain is created in seconds. DNS records are configured automatically when the container is provisioned.
DNSBuilt-in dashboard with CPU, memory and traffic metrics. Alerts on anomalies — before your users ever notice.
ObservabilityChoose your packages, set a name — your shrine will be ready in moments.
Hakurei Cloud is completely free. No credit card. No hidden fees.
Just pick your stack and launch your shrine.
Your applications are protected at every layer — from the network down to the container filesystem.
Every container lives in its own Docker network. No access to other projects without an explicit configuration.
All traffic is encrypted. SSL termination at the reverse proxy level with automatic certificate renewal.
Containers run without root privileges. Even if an application is compromised, the host system stays protected.
Every action is logged. Full history of deployments, configuration changes, and security events.