Skip to main content
  1. Blog
  2. Article

Canonical
on 29 May 2014

Ubuntu’s support model fosters a strong ecosystem for OpenStack


Ubuntu was the first platform to embrace OpenStack, and OpenStack development largely happens on Ubuntu. As the reference platform for OpenStack, the majority of production deployments of OpenStack are on Ubuntu. Canonical, the company behind Ubuntu, provides large-scale commercial users with both professional services and support for OpenStack.

In addition, Canonical supports Ubuntu hosts and guests in deployments that use OpenStack distributions from vendors other than Canonical. We do not restrict users to our OpenStack distribution if they want support for Ubuntu server both as a host or guest.

What services does Canonical provide?

Canonical offers:

  • Your cloud“, a fully managed on-premise “build and manage OpenStack” service for companies that want a turn-key, known-cost OpenStack solution with SLAs
  • Architectural consulting for companies that intend to operate the cloud themselves but seek assistance with architecture and implementation
  • Automated tools for OpenStack installation, scale, management and operations, and
  • Base support for the Ubuntu OS

Canonical will support Ubuntu for companies that have purchased a third-party OpenStack product or service for use with Ubuntu, where Canonical has a relationship with that vendor to enable effective three-way support and problem resolution.

Canonical offers support in multiple regions and languages, for both business-hours test-and-dev and 24/7 production deployments.

With Canonical, customers have access to a dedicated pool of technical experts to help triage and resolve issues in both Ubuntu server and OpenStack components. This is significant given that the server includes virtualization and cloud infrastructure (KVM and OpenStack) which are more complex in nature than the standalone Ubuntu server. Canonical customers also receive global, around the clock support and maintenance for packages outside the Ubuntu Main archive.

The OpenStack support model for the LTS releases of Ubuntu is described below:

Customers have the option of extending these support lengths if and when their business need arises.

 

Hypervisor Support under Ubuntu OpenStack

Canonical supports a variety of Hypervisors commonly used in the public and private clouds,  including but not limited to KVM, ESXi and soon to be announced, HyperV.

Guest Support on Ubuntu OpenStack

Guest OS support depends on the Hypervisor on which the workload (Virtual Machine) lives. On Ubuntu KVM, Canonical provides guest OS support for Windows Server and most Linux distributions, in addition to Ubuntu.  In some cases, such as Windows Server, Canonical has reciprocal agreements and certifications in place, while some commercial Linux vendors have so far not certified their OS as a guest on Ubuntu KVM.  Canonical is prepared to work with all OS vendors to support our customers’ choices of guest OS.  We believe that a strong OpenStack ecosystem is in our customers best interest.

Related posts


Canonical
16 March 2026

Canonical announces it will distribute NVIDIA DOCA-OFED in Ubuntu

AI Article

Today Canonical, the publishers of Ubuntu, announced that it will integrate and distribute the NVIDIA DOCA-OFED networking driver with Ubuntu. ...


Canonical
16 March 2026

Meet Canonical at NVIDIA GTC 2026: NVIDIA CUDA and NVIDIA Vera Rubin NVL72 support in Ubuntu 26.04 LTS

Ubuntu Article

Previewing at NVIDIA GTC 2026: NVIDIA CUDA support in Ubuntu 26.04 LTS, NVIDIA Vera Rubin NVL72 architecture support in Ubuntu 26.04, Canonical’s official Ubuntu image for NVIDIA Jetson Thor, upcoming support for NVIDIA DGX Station and NVIDIA DOCA-OFED, and NVIDIA RTX PRO 4500 support. NVIDIA GTC 2026 is here, bringing together the techno ...


Luci Stanescu
12 March 2026

AppArmor vulnerability fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs have not been assigned yet. All of the vulnerabilities require unprivileged local user access. The impact of these vulnerabilities ranges from denial of service to kernel memory information leak, rem ...