When your enterprise contract is finalized, Cartesia provisions the following resources for your account. All provisioned resources are available for download from the on-prem portal.Documentation Index
Fetch the complete documentation index at: https://docs.cartesia.ai/llms.txt
Use this file to discover all available pages before exploring further.
The on-prem portal is only accessible under the organization that has on-prem enabled. If you don’t see it, switch to that organization in the account switcher.
Service Account
A service account is created for your account, this service account has the following accesses:- Access to a private artifact registry, which is used to host cartesia provided container images.
- Access to a common storage bucket:
gs://cartesia-onpremcontaining the deployment configurations. - Access to a private storage bucket:
gs://cartesia-{{name}}used for hosting customer specific artifacts.
Customer Artifact Bucket
The customer-specific bucketgs://cartesia-{name} hosts voice migrations and LoRA checkpoints that your self-hosted deployment consumes at runtime:
migrations/v2/migrations/. Workers sync LoRA checkpoints from loras/.
Files land in migrations/v2/migrations/ when you call POST /onprem/add-voices or POST /onprem/add-pdict against the Cartesia cloud API. See Managing Artifacts for the migration APIs and hot-reload behavior.
Deployment Configurations
Thecartesia-onprem bucket contains versioned repository cartesia-kube which holds all of our deployment configurations.
cartesia-kube contains everything needed for all deployment methods:
Configuration Files
Each deployment method has its own configuration file insidecartesia-kube. Copy the .example file, fill in your values, and reference it during deployment.
| Deployment method | Config file | Documentation |
|---|---|---|
| Kubernetes (Terraform — AWS EKS) | aws-terraform.tfvars.example | Managed Kubernetes |
| Kubernetes (Terraform — GCP GKE) | gcp-terraform.tfvars.example | Managed Kubernetes |
| Kubernetes (Helm-only, existing cluster) | cartesia/values.yaml (full reference) and cartesia/sample-values.yaml (curated example) | Managed Kubernetes |
| Docker Compose / Swarm (beta) | local/.env.example | Docker |
Container Registry
Images are hosted atus-docker.pkg.dev/cartesia-external/self-serve and tagged with a release tag (e.g. sonic-20251118). The full image reference format is:
Images
| Image Name | Description |
|---|---|
cartesia-api | API server |
cartesia-license-proxy | License validation and enforcement |
cartesia-sonic-azure-disco | TTS worker — sonic-3.5 |
cartesia-sonic-rosy-dragon | TTS worker — sonic-3 |
cartesia-sonic-royal-plant | TTS worker — sonic-2 |
cartesia-sonic-voice-clone | TTS worker — voice cloning |
Listing Available Tags
List available image tags sorted by most recent:cartesia-sonic-api with any image name from the table above. The ~ prefix sorts in descending order, showing the latest tags first.
Mirroring to a Private Registry
For air-gapped or network-restricted environments, mirror images to your own registry before deployment. Authenticate Docker with the service account:infra.imageRegistry (Helm) to your private registry URL.