Multi-Tenancy
Greentic は、multi-tenant deployment のためにゼロから設計されています。platform のあらゆる側面が tenant isolation をサポートしており、単一の deployment で複数の組織に安全にサービスを提供できます。
Tenant Hierarchy
Section titled “Tenant Hierarchy”Workspace└── Tenant (organization) └── Environment (prod, staging, dev) └── Team (department, group) └── Channel (messaging provider instance) └── Session (user conversation)TenantCtx
Section titled “TenantCtx”TenantCtx struct は、すべての操作に渡って流れます:
pub struct TenantCtx { pub tenant_id: String, pub env_id: String, pub team_id: Option<String>,}すべての API call、flow execution、data access は TenantCtx によって scope されます。
Tenant Definition
Section titled “Tenant Definition”tenant: id: acme name: "ACME Corporation" settings: timezone: "America/New_York" language: "en-US"
environments: - id: prod name: "Production" - id: staging name: "Staging"Team Definition
Section titled “Team Definition”team: id: support name: "Customer Support" tenant_id: acme
channels: slack: provider: messaging-slack config: workspace_id: "T123456" channel_id: "C789012"
telegram: provider: messaging-telegram config: chat_id: "-1001234567890"Bundle Configuration
Section titled “Bundle Configuration”tenants: acme: name: "ACME Corporation" teams: support: name: "Customer Support" channels: slack: provider: messaging-slack telegram: provider: messaging-telegram
sales: name: "Sales Team" channels: teams: provider: messaging-teams
bigcorp: name: "BigCorp Inc." teams: helpdesk: channels: webchat: provider: messaging-webchatSession Storage
Section titled “Session Storage”session は tenant context ごとに分離されます:
sessions/├── acme/│ ├── prod/│ │ ├── support/│ │ │ ├── session_001.cbor│ │ │ └── session_002.cbor│ │ └── sales/│ │ └── session_003.cbor│ └── staging/│ └── support/│ └── session_004.cbor└── bigcorp/ └── prod/ └── helpdesk/ └── session_005.cborState Isolation
Section titled “State Isolation”working memory (state) は session ごとに scope されます:
// State key formatlet key = format!( "state:{}:{}:{}:{}", tenant_ctx.tenant_id, tenant_ctx.env_id, tenant_ctx.team_id.unwrap_or("default"), session_id);NATS Subject Isolation
Section titled “NATS Subject Isolation”message routing は tenant-scoped subject を使用します:
greentic.messaging.ingress.{env}.{tenant}.{team}.{channel} │ │ │ │ │ │ │ └─ Channel ID (slack, telegram) │ │ └──────── Team ID │ └─────────────── Tenant ID └────────────────────── Environment (prod, staging)Secret Isolation
Section titled “Secret Isolation”secret は tenant scope で保存および取得されます:
// Secret retrieval includes tenant contextlet secret = secrets_client .get_secret(&tenant_ctx, "api_key") .await?;Secret Namespacing
Section titled “Secret Namespacing”secrets/├── global/ # Platform-wide secrets│ └── signing_key├── acme/ # Tenant: ACME│ ├── slack_bot_token│ ├── openai_api_key│ └── teams/│ └── support/│ └── webhook_secret└── bigcorp/ # Tenant: BigCorp └── telegram_bot_tokenFlow Isolation
Section titled “Flow Isolation”各 tenant は異なる flow と configuration を持つことができます:
name: acme_support_flowversion: "1.0"
# ACME-specific support flownodes: - id: greet type: reply config: message: "Welcome to ACME Support! How can I help?"name: bigcorp_helpdesk_flowversion: "1.0"
# BigCorp-specific helpdesk flownodes: - id: greet type: reply config: message: "BigCorp Helpdesk here. What's your issue?"アクセス制御
Section titled “アクセス制御”Component Access
Section titled “Component Access”component は TenantCtx を受け取り、境界を守る必要があります:
impl Guest for MyComponent { fn process(input: Input, ctx: &TenantCtx) -> Output { // Verify tenant has access to requested resource if !has_permission(ctx, &input.resource_id) { return Output::error("Access denied"); }
// Process with tenant scope process_for_tenant(ctx, input) }}API Access
Section titled “API Access”REST API は tenant scope を強制します:
GET /api/v1/sessionsAuthorization: Bearer <token>X-Tenant-ID: acmeX-Team-ID: supportDeployment Models
Section titled “Deployment Models”Single-Tenant
Section titled “Single-Tenant”tenant ごとに 1 つの Greentic instance:
┌─────────────────┐│ Greentic (ACME) │└─────────────────┘
┌─────────────────┐│ Greentic (BigCorp)│└─────────────────┘Multi-Tenant Shared
Section titled “Multi-Tenant Shared”共有インフラ上で複数 tenant を運用:
┌───────────────────────────────────┐│ Greentic Instance ││ ┌─────────┐ ┌─────────────────┐││ │ ACME │ │ BigCorp │││ │ (prod) │ │ (prod) │││ └─────────┘ └─────────────────┘││ ┌─────────┐ ┌─────────────────┐││ │ ACME │ │ BigCorp │││ │(staging)│ │ (staging) │││ └─────────┘ └─────────────────┘│└───────────────────────────────────┘Hybrid
Section titled “Hybrid”専有リソースと共有リソースを組み合わせるモデル:
┌───────────────────────────────────┐│ Shared Greentic Instance ││ ┌─────────┐ ┌─────────────────┐││ │ Small │ │ Medium │││ │ Tenants │ │ Tenants │││ └─────────┘ └─────────────────┘│└───────────────────────────────────┘
┌───────────────────────────────────┐│ Dedicated: Enterprise Tenant ││ (Custom SLA, dedicated resources)│└───────────────────────────────────┘ベストプラクティス
Section titled “ベストプラクティス”- Always pass TenantCtx - tenant ID をハードコードしない
- Validate at boundaries - API と component level で tenant access を確認する
- Use tenant-scoped logging - すべての log entry に tenant ID を含める
- Separate secrets - tenant 間で secret を共有しない
- Test isolation - ある tenant が別の tenant の data にアクセスできないことを確認する
- Monitor per-tenant - tenant ごとに usage と error を追跡する