Default setup
TurboCI provisions the baseline infrastructure for every deployment.
Networking, relay routing, SSH keys, and firewall defaults are all created automatically so the configuration can stay focused on services.
1 relay
per deployment for orchestration, distribution, and SSH ingress
2 firewalls
default SSH and HTTP policies created automatically
$ turboci up
-> Private network ready
-> Relay server provisioned
-> SSH keys registered
-> Firewall rules appliedProvisioned defaults
What gets created on every deployment
These resources come along even before your application processes start.
Relay server
A control point for the whole deployment
- Controls every other server in the deployment.
- Acts as a NAT gateway for private servers where the provider does not offer managed NAT.
- Receives synced files first, then fans them out to the target fleet in parallel.
- Exposes only a public SSH endpoint by default.
Private network
A secure internal lane for every service
- Every deployment gets its own private network automatically.
- Services communicate over the internal network instead of relying on public ingress.
SSH setup
Generated keys and linked server access
- TurboCI creates SSH keys automatically and associates them with the deployment fleet.
- The generated key material lives under `.turboci/.ssh/` for operational access when needed.
Firewalls
Minimal inbound exposure by default
- An SSH firewall allows only port 22.
- An HTTP firewall allows ports 80 and 443 for load balancer services.
- Everything else is blocked unless the service topology requires it.
File distribution
TurboCI syncs through a relay-first architecture.
File transfers use a hub-and-spoke path that reduces repeated uploads and speeds up deployment across large fleets.
Stage 1
Local to relay
Source files move from the operator machine to the relay server once.
Stage 2
Relay to services
The relay fans those files out to all target servers in parallel.
This pattern reduces bandwidth waste and improves update times when many servers need the same payload.
Operator access
Where the generated SSH material lives
Use the generated key if you need to connect to the relay server directly during diagnostics or operator intervention.
.turboci/.ssh/The path can also be relocated globally by settingTURBOCI_DIR.
No extra setup
You do not need to model any of this manually.
Define the services you want and let TurboCI create the supporting network, SSH, and firewall baseline around them.
Next step
Move from defaults to service design
The next step is defining deployments, services, and runtime hooks in the YAML configuration.
Continue to configuration