When your enterprise contract is finalized, Cartesia provisions the following resources for your account. All provisioned resources are available for download from the on-prem portal.Documentation Index
Fetch the complete documentation index at: https://docs.cartesia.ai/llms.txt
Use this file to discover all available pages before exploring further.
The on-prem portal is only accessible under the organization that has on-prem enabled. If you don’t see it, switch to that organization in the account switcher.
Service Account
A service account is created for your account, this service account has the following accesses:- Access to a private artifact registry, which is used to host cartesia provided container images.
- Access to a common storage bucket:
gs://cartesia-onpremcontaining the deployment configurations. - Access to a private storage bucket:
gs://cartesia-{{name}}used for hosting customer specific artifacts.
Deployment Configurations
Thecartesia-onprem bucket contains versioned repository cartesia-kube which holds all of our deployment configurations.
Voice model files and LoRA weights are provided in a separate bucket or as part of
cartesia-kube. Your Cartesia representative will confirm the exact paths during onboarding.cartesia-kube contains everything needed for all deployment methods:
Container Registry
Images are hosted atus-docker.pkg.dev/cartesia-external/self-serve and tagged with a release tag (e.g. sonic-20251118). The full image reference format is:
Images
| Image Name | Description |
|---|---|
cartesia-api | API server |
cartesia-license-proxy | License validation and enforcement |
cartesia-sonic-rosy-dragon | TTS worker — sonic-3 |
cartesia-sonic-royal-plant | TTS worker — sonic-2 |
cartesia-sonic-voice-clone | TTS worker — voice cloning |
Listing Available Tags
List available image tags sorted by most recent:cartesia-sonic-rosy-dragon with any image name from the table above. The ~ prefix sorts in descending order, showing the latest tags first.
Mirroring to a Private Registry
For air-gapped or network-restricted environments, mirror images to your own registry before deployment. Authenticate Docker with the service account:infra.imageRegistry (Helm) to your private registry URL.