Why Hetzner (and not AWS)

The more effort is poured into big cloud alternatives, the better they will be. Consider contributing your experience to open-source projects, writing docs, tutorials etc.

Lots has been written on the topic online. This move is a strategic shift from renting convenience to owning control. It is definitely not for everyone. Use this checklist to determine if it aligns with your business needs:

Key Benefits Risks & Mitigations
💰 Radical Cost Savings (70-90%) Risk: Hidden Labor Costs (TCO). The savings on infrastructure could be offset by increased engineering time for setup and maintenance.
Mitigation: Acknowledge this is an upfront investment. Automate heavily with IaC (Ansible/Terraform) to minimize ongoing operational load.
🇪🇺 True Data Sovereignty Risk: Provider Instability. Budget providers like Hetzner have a reputation for sudden account terminations or less reliable support.
Mitigation: Do not use a single provider. Implement a multi-provider strategy from day one (e.g., Hetzner + OVHcloud).
⚙️ Greater Control & Forced Innovation Risk: Increased Complexity. You become responsible for the entire stack, including backups, patching, and disaster recovery.
Mitigation: Adopt a “compliance-as-code” mindset. Build robust, automated, and tested playbooks for all critical operations.

If you decide to proceed, this is the high-level playbook. The core principle is to build a resilient, auditable, and automated system using (preferably) open-source tools.

1. Foundational Strategy: Multi-Provider by Design

Never depend on a single budget provider. The recommended architecture combines at least two:

2. The Core Technology Stack

Replace AWS managed services with popular open-source stacks, managed via Infrastructure-as-Code (IaC). Most popular cloud provider services have open source equivalent/alternative.

Component Purpose Replaces (in AWS)
Terraform Provisioning virtual machines and basic network resources. CloudFormation
Ansible Configuration, hardening, application deployment, and compliance engine. Systems Manager
Prometheus & Alertmanager Metrics collection and alerting. CloudWatch Metrics
Grafana & Loki Dashboards and log aggregation. CloudWatch Logs
PostgreSQL (Self-hosted) Primary database, managed via Ansible. RDS / Aurora
Cloudflare DNS, WAF, CDN, and load balancing. Route 53, WAF

3. The Compliance-as-Code Engine

This is the key to maintaining ISO 27001 without AWS’s built-in tools.

4. High Availability and Disaster Recovery (DR) Plan

While this stack depends again on Cloudflare, there are quite a few alternatives out there, and you do need to draw a line somewhere.

Continue to -> HN: algolia, Q: Hetzner