Baserow launched its no-code application builder in 2024-03 with a clear positioning shot: "Self-Hosted Airtable Alternative Launches No-Code Application Builder." The HN thread was short but the strategic move was loud. Bubble, Glide, Adalo, and the SaaS-only no-code incumbents cannot match a self-host pitch without killing their revenue model. Baserow and a small cohort of open-source no-code platforms own the lane.

This article is about which buyers actually need self-host, which ones think they do, and how to evaluate the options that exist.

The four real self-host cases

Self-host is genuinely required in four cases:

  1. Regulated industries with on-premise mandates. Healthcare (some HIPAA buyers), defense, intelligence, certain financial services. Their compliance team has written "data must not leave our network" into policy and there is no SaaS escape hatch.
  2. Sovereignty requirements. Government agencies, EU public sector, certain B2B contracts that specify the data plane runs under the customer's jurisdiction. Self-host is the cleanest way to meet this.
  3. Air-gapped networks. Manufacturing floors, secure research, certain industrial environments where the cluster is not connected to the public internet at all.
  4. Extreme cost sensitivity at scale. Some buyers run such high volumes that any SaaS per-seat or per-row pricing breaks. Self-hosting on commodity hardware is the only way the math works.

These are the cases where SaaS is structurally wrong, not a preference.

The fake-requirement cases

The procurement-theater versions:

The diagnostic question to ask the buyer: "If we satisfy your security and data-residency requirements with a vendor-managed deployment, is that acceptable, or is self-host itself the requirement?" The answer separates the real cases from the theater.

The viable self-host options (2026)

Open-source no-code platforms that you can actually self-host today:

Each one has trade-offs. Baserow is strongest for spreadsheet-like data. Appsmith and Tooljet are stronger for action-heavy internal tools. NocoDB is best when you are wrapping an existing database. The choice depends on which side of the data-vs-action axis your tool lives on.

The trade-offs the buyer needs to know

Self-host comes with costs that the procurement form does not list:

  1. You run the infrastructure. Patches, scaling, backups, restore drills, upgrades. The vendor's SaaS team does this for you; the self-host buyer signs up to do it themselves.
  2. Feature velocity lags. The vendor ships features to SaaS first, then backports to the on-prem release. Lag is typically 1-3 months, occasionally longer.
  3. Support is structurally different. The vendor cannot SSH into your cluster. Diagnostic loops are longer; logs have to be shipped, not viewed.
  4. Total cost is often higher. Internal SRE time, hardware, networking, the upgrade cadence. Self-host beats SaaS only at scale or for compliance reasons; for small teams it is usually more expensive.

Buyers who came to "self-host" through procurement theater often did not price this in. Show them the numbers honestly. Sometimes the conversation flips to "okay, we can accept a SaaS-with-strong-DPA arrangement" once the SRE cost is in front of them.

What this means for makers

If you are a maker shipping a SaaS product and a buyer asks "do you offer self-host?", the answer hierarchy is:

  1. Probe whether the requirement is real. Use the diagnostic question above.
  2. If theatrical: offer your strongest SaaS-with-DPA posture. Encryption at rest, signed DPA, audit logs, regional residency, breach plan. Most procurement teams accept this after the diagnostic conversation.
  3. If real: be honest you do not offer it. Building a self-host SKU on top of a SaaS-only architecture is a multi-quarter engineering project, and you will lose money on every deployment for the first two years. Some buyers are worth this; most are not.
  4. Refer to a self-host-native vendor. Baserow, Appsmith, NocoDB. The buyer gets what they need; you maintain the relationship without breaking your architecture.

What I would actually do

  1. Have a written self-host posture. "We offer SaaS with [DPA / encryption / audit logging / regional residency]." Send it before the buyer fills the procurement form.
  2. Have a referral list. Two or three self-host-native vendors you have evaluated and can recommend honestly when the buyer needs that path.
  3. Do not build self-host on top of SaaS architecture unless you have a multi-million-dollar customer who will fund it. This is the trap; the engineering is huge and most SaaS-priced contracts will not cover it.

The honest framing: self-host is real for a subset of buyers and theater for the rest. Knowing which one you are looking at saves weeks of vendor selection on both sides.