Enterprise Migration
Enterprise Migration
Section titled “Enterprise Migration”This guide covers adopting AgentCTX in an enterprise environment — phased rollout strategy, data migration, compliance considerations, and multi-tenant setup.
Migration Phases
Section titled “Migration Phases”Phase 1: Pilot (Weeks 1–2)
Section titled “Phase 1: Pilot (Weeks 1–2)”Start with a single team on a non-critical project:
- Install AgentCTX locally or via Docker Compose
- Connect existing MCP backends (GitHub, filesystem)
- Enable knowledge plane on project documentation
- Measure token savings and agent productivity gains
actx initactx add github --command "npx -y @modelcontextprotocol/server-github" --roles "code"actx start --transport sse --port 3100Phase 2: Team Rollout (Weeks 3–4)
Section titled “Phase 2: Team Rollout (Weeks 3–4)”Expand to the full team:
- Deploy Docker Compose stack for shared SurrealDB and NATS
- Enable team-level memory (
#teamlayer) - Configure RBAC roles per team member’s agent
- Set up token budgets
Phase 3: Organization (Weeks 5–8)
Section titled “Phase 3: Organization (Weeks 5–8)”Scale across the organization:
- Deploy to Kubernetes for HA and multi-tenant isolation
- Enable org-level memory (
#orglayer) - Integrate 1Password for secrets management
- Enable Sentinel monitoring in
activemode - Set up compliance audit trail via
actx verify
Phase 4: Production (Ongoing)
Section titled “Phase 4: Production (Ongoing)”- Enable federation for cross-org communication
- Deploy Rust native components for performance
- Set up SurrealDB clustering for HA
- Enable NATS superclusters for global messaging
Data Migration
Section titled “Data Migration”From RAG Systems
Section titled “From RAG Systems”If you’re migrating from a RAG (Retrieval-Augmented Generation) system:
- Export documents from your vector store
- Ingest into AgentCTX’s knowledge plane:
Terminal window actx ingest exported-docs/ - Verify with semantic search:
?k "your test query" ^5
From Custom Memory Systems
Section titled “From Custom Memory Systems”Export memories as JSON and import via the CLI:
actx import memories.json --plane memory --layer teamCompliance
Section titled “Compliance”Audit Trail
Section titled “Audit Trail”Every agent action produces a cryptographically signed translation:
- What the agent did (CTX statement)
- How it was described (human-readable translation)
- Proof it wasn’t tampered with (Ed25519 signature)
- When it happened (ISO 8601 timestamp)
Run actx verify at any time to validate the entire audit trail.
Data Residency
Section titled “Data Residency”- SurrealDB can be deployed in any region
- Content-addressed store keeps data local
- NATS superclusters support geo-aware routing
SOC 2 / ISO 27001
Section titled “SOC 2 / ISO 27001”AgentCTX’s security model maps to common compliance frameworks:
| Control | AgentCTX Feature |
|---|---|
| Access control | RBAC + ring-based access |
| Audit logging | Signed sidecar translations |
| Data encryption | AES-256-GCM convergent encryption |
| Key management | 1Password integration or local Ed25519 |
| Monitoring | Sentinel + OpenTelemetry |
Multi-Tenant Setup
Section titled “Multi-Tenant Setup”For SaaS or shared infrastructure:
# Each tenant gets isolated namespacetenants: - id: team-alpha namespace: alpha budget: { perDay: 1000000 } roles: [code, issues, admin] - id: team-beta namespace: beta budget: { perDay: 500000 } roles: [code, issues]Tenants share infrastructure but have isolated:
- SurrealDB namespaces
- NATS subjects
- Memory layers
- Token budgets
See Also
Section titled “See Also”- Deployment — infrastructure options
- Security Model — compliance-relevant security
- Configuration — setup reference