Chapter 8: Scaling to Enterprise¶
Learning Objectives¶
By the end of this chapter you will be able to:
- Identify the architectural changes needed to scale FCC from a single-team tool to an enterprise platform.
- Design a multi-tenant FCC deployment with isolated persona catalogs and governance.
- Adapt FCC for industry verticals (healthcare, finance, government).
- Plan a migration path for upgrading to the v1.0.1 stable API.
- Evaluate the trade-offs between centralized and federated enterprise deployments.
The figure below shows a multi-tenant FCC deployment with shared simulation, event bus, and protocol infrastructure at the bottom, and three tenants on top — each with its own personas, constitution, and namespace.
flowchart TB
subgraph SHARED["Shared Infrastructure"]
SIM[Simulation Engine]
EB[Event Bus]
PROTO[Protocol Endpoints]
end
subgraph T1["Tenant A (Healthcare)"]
P1[Custom Personas]
G1[HIPAA Constitution]
KG1[Namespace: tenant-a]
end
subgraph T2["Tenant B (Finance)"]
P2[Custom Personas]
G2[SOX Constitution]
KG2[Namespace: tenant-b]
end
subgraph T3["Tenant C (General)"]
P3[Custom Personas]
G3[Standard Constitution]
KG3[Namespace: tenant-c]
end
T1 --> SHARED
T2 --> SHARED
T3 --> SHARED
SHARED --> CORE[(Core Persona Catalog<br/>102 Shared Personas)]
style SHARED fill:#e3f2fd
style T1 fill:#e8f5e9
style T2 fill:#fff3e0
style T3 fill:#f3e5f5
The core persona catalog is read-only and shared, which means upgrades to the framework flow through to every tenant automatically, while each tenant retains full authority over its bespoke personas and governance overlay.
From Team Tool to Enterprise Platform¶
Books 1 and 2 covered FCC as a tool for individual teams: install the package, define your personas, run your workflows. This is sufficient for many use cases, but enterprises have requirements that go beyond what a single-team deployment can satisfy:
- Multi-tenancy. Multiple teams, each with their own personas and governance rules, sharing a single FCC infrastructure.
- Compliance. Industry-specific regulations (HIPAA, SOX, GDPR, FedRAMP) that require auditable workflows and data handling.
- Scale. Hundreds of concurrent simulations, thousands of artifacts, and millions of events.
- Integration. Connection to existing enterprise systems (identity management, artifact repositories, CI/CD platforms, monitoring stacks).
- Stability. A stable API that does not break when the framework is upgraded.
This chapter addresses each of these requirements and maps them to the FCC roadmap.
Multi-Tenant Architecture¶
A multi-tenant FCC deployment serves multiple teams from a shared infrastructure. Each team (tenant) has:
- Its own persona catalog. Teams can define custom personas that are invisible to other teams, while still sharing the core catalog.
- Its own governance rules. Each team's constitutions and quality gates are independent.
- Its own knowledge graph namespace. Artifacts from different teams do not collide.
- Shared infrastructure. The simulation engine, event bus, and protocol endpoints are shared.
Tenant Isolation¶
Isolation is implemented at three levels:
Level 1: Configuration Isolation
Each tenant has its own fcc.yaml with tenant-specific settings:
tenant:
id: team_alpha
name: "Team Alpha"
namespace: "https://team-alpha.example.org/fcc/"
personas:
sources:
- "tenants/team_alpha/personas/"
include_core: true
governance:
constitutions: "tenants/team_alpha/constitutions/"
quality_gates: "tenants/team_alpha/gates/"
Level 2: Runtime Isolation
The simulation engine maintains separate execution contexts per tenant. A tenant's simulations cannot access another tenant's artifacts, sessions, or events:
from fcc.enterprise.tenancy import TenantContext
with TenantContext("team_alpha"):
# All operations within this block are scoped to team_alpha
engine.run(scenario)
# Artifacts, events, and traces are tagged with team_alpha
Level 3: Data Isolation
Each tenant's knowledge graph uses its own namespace (Chapter 4), ensuring that federated queries respect tenant boundaries. A cross-tenant query requires explicit authorization.
Shared Services¶
Some services are shared across tenants for efficiency:
- Embedding provider. A single embedding model serves all tenants (the vectors are stored separately per tenant).
- Event bus. A single bus with tenant-scoped topics.
- Protocol endpoints. A single A2A/MCP server with tenant-aware routing.
Industry Verticals¶
Enterprise FCC deployments often serve specific industries with distinct requirements:
Healthcare¶
- Persona catalog: Add HIPAA Compliance Officer, Clinical Data Steward, Medical Terminology Expert.
- Governance: Hard-stop rules for PHI (Protected Health Information) handling. AOME integration for automatic PHI detection.
- Quality gates: Clinical accuracy review, terminology validation against SNOMED/ICD-10.
- Audit: Complete provenance chain for every clinical recommendation, exportable for regulatory review.
Financial Services¶
- Persona catalog: Add SOX Compliance Auditor, Financial Data Analyst, Risk Modeler.
- Governance: Hard-stop rules for material non-public information (MNPI). Segregation of duties between data access and decision-making personas.
- Quality gates: Model validation, backtesting requirements, regulatory reporting format compliance.
- Audit: Immutable audit trail with timestamping, compatible with SEC record-keeping requirements.
Government¶
- Persona catalog: Add FedRAMP Assessor, Clearance-Aware Analyst, Policy Compliance Officer.
- Governance: Hard-stop rules based on data classification levels (Unclassified, CUI, Secret). AOME integration for automatic classification.
- Quality gates: Authority to Operate (ATO) compliance, NIST 800-53 control verification.
- Deployment: On-premises or government cloud (GovCloud), no data egress to commercial environments.
Customizing for Your Vertical¶
The FCC plugin system makes vertical customization straightforward:
- Create a vertical plugin package (e.g.,
fcc-healthcare,fcc-finserv,fcc-gov). - Contribute domain-specific personas via the persona plugin type.
- Contribute domain-specific governance rules via the governance plugin type.
- Contribute domain-specific quality gates via the scorer and validator plugin types.
- Contribute domain-specific scenarios via the scenario plugin type.
Install the vertical package alongside FCC, and the domain-specific capabilities are automatically discovered and registered.
Scale Considerations¶
Simulation Throughput¶
A single FCC process handles simulation sequentially within a session but can run multiple sessions concurrently. For high-throughput deployments:
- Horizontal scaling. Run multiple FCC processes behind a load balancer, with shared state in a database.
- Queue-based execution. Use a message queue (Redis, RabbitMQ, SQS) to distribute simulation tasks across workers.
- Async execution. The
async_adaptermodule provides async wrappers for the simulation engine, enabling non-blocking execution in async web frameworks.
Artifact Storage¶
The default file-based storage (JSON files) works for small deployments. At enterprise scale:
- Database backend. Store artifacts, sessions, and traces in PostgreSQL or MongoDB.
- Object storage. Store large artifacts (generated documents, code files) in S3 or Azure Blob.
- Search index. Use Elasticsearch or a managed vector database for semantic search at scale.
Event Bus Scale¶
The in-process event bus handles thousands of events per second. For distributed deployments:
- Redis Pub/Sub. Drop-in replacement for the in-process bus with network distribution.
- Kafka. For high-volume, durable event streaming with replay capability.
- CloudEvents. Standardized event format for cloud-native deployments.
The Road to v1.0.0¶
The FCC roadmap reached v1.0.1 (stable API) through three phases:
Phase 13 (v0.8.0): Knowledge Federation¶
Added semantic search, knowledge graphs, RAG pipelines, and federated knowledge -- the capabilities covered in this book's Chapters 1--4.
Phase 14 (v0.9.0): Evaluation and Compliance¶
Added automated evaluation frameworks, compliance reporting, and benchmarking:
- Evaluation harness. Automated comparison of simulation outputs across models, configurations, and persona variations.
- Compliance dashboard. Real-time visibility into governance posture across tenants.
- Benchmark suite. Standardized scenarios for measuring FCC performance and quality.
Phase 15 (v1.0.0--v1.0.1): Platform Maturation¶
Stabilized the API and added enterprise-ready capabilities:
- Stable API contract. Semantic versioning with guaranteed backward compatibility.
- Multi-tenant infrastructure. First-class tenant isolation, configuration, and monitoring.
- Domain verticals. Healthcare, finance, and legal vertical personas.
- Enterprise support. Documentation, training materials, and support channels for enterprise adopters.
Migration Planning¶
If you are building on FCC, ensure you are on the latest v1.0.x by:
- Using the public API surface. Avoid depending on private modules (anything prefixed with
_). - Pinning your dependency. Use
fcc>=1.0.0,<2.0.0in your requirements for stable API compatibility. - Writing tests against behavior, not implementation. Tests that verify persona outputs, workflow traversal, and governance results will survive API refactoring.
- Following the changelog. Each release includes a migration guide for any breaking changes.
Centralized vs. Federated Deployment¶
Two architectural patterns for enterprise FCC deployment:
Centralized¶
A single FCC instance serves all teams. All personas, workflows, and governance are managed centrally.
Pros: Consistent governance, easier management, single source of truth. Cons: Bottleneck risk, less team autonomy, change management overhead.
Best for: Regulated industries with strict governance requirements.
Federated¶
Each team runs its own FCC instance. A coordination layer (CONSTEL) enables cross-team discovery and knowledge sharing.
Pros: Team autonomy, independent scaling, blast radius containment. Cons: Governance inconsistency, duplication of effort, federation complexity.
Best for: Large enterprises with autonomous business units.
Hybrid¶
Central governance with federated execution. The governance team manages shared constitutions and quality gates; individual teams manage their own personas and workflows.
Pros: Balances governance consistency with team autonomy. Cons: Requires clear boundaries between shared and team-specific configuration.
Best for: Most enterprises. This is the recommended pattern.
Key Takeaways¶
- Multi-tenancy requires isolation at configuration, runtime, and data levels.
- Industry verticals are supported through domain-specific plugin packages.
- Enterprise scale requires horizontal scaling, database backends, and distributed event buses.
- The v1.0.0 roadmap adds evaluation, compliance, and platform maturation.
- Hybrid deployment (central governance, federated execution) is the recommended enterprise pattern.
- Build on the public API surface and pin your dependency version to ensure smooth migration.
Cross-References¶
- Series Index -- return to the series overview
- FCC Guidebook -- full reference
- Architecture Decision Records -- design rationale
- Book 2, Chapter 8: Production Deployment -- single-team deployment
- Book 1, Chapter 6: Ecosystem Overview -- ecosystem context
← Chapter 7: Docs from Code | Back to Book 3 Index | Back to Series Index