architecture-microservices
Architecture Microservices
Overview
Use this skill to design microservice architectures that trade monolithic simplicity for bounded autonomy intentionally.
Scope Boundaries
- Different domain areas change at different speeds and require independent release cadence.
- Team autonomy and ownership boundaries are blocked by shared code/runtime coupling.
- Operational platform maturity exists to absorb distributed-system overhead.
Core Judgments
- Service boundary: domain capability, data ownership, and team ownership alignment.
- Integration model: synchronous calls, events, or hybrid by invariant type.
- Consistency strategy: local transactions plus saga/compensation where needed.
- Operational budget: observability, incident response, platform engineering capacity.
Practitioner Heuristics
- Split services by business capability and change cadence, not by technical layer.
- One service owns its data model; cross-service joins in request path are a smell.
- Start with fewer coarse services, then split where pain is observed.
- Define service contracts with explicit schema types; avoid generic untyped payloads that drive cast-heavy consumers.
Workflow
- Identify candidate service boundaries from domain and ownership signals.
- Evaluate coupling and consistency needs across candidate boundaries.
- Choose integration patterns per interaction type.
- Define contract and data ownership rules, including versioning strategy.
- Estimate operational overhead and staffing implications.
- Document migration path from current architecture.
Common Failure Modes
- Premature decomposition creates chatty synchronous dependencies.
- Shared utility libraries become hidden coupling channel.
- Service count grows faster than team ownership maturity.
Failure Conditions
- Stop when service boundaries cannot be mapped to stable ownership.
- Stop when end-to-end reliability depends on fragile RPC chains.
- Escalate when platform and operations readiness is insufficient for distributed complexity.
More from kentoshimizu/sw-agent-skills
graph-algorithms
Graph algorithm workflow for modeling entities/relations and selecting traversal, path, ordering, or flow strategies. Use when correctness or performance depends on graph representation and algorithm choice; do not use for schema-only modeling or deployment topology planning.
14bash-style-guide
Style, review, and refactoring standards for Bash shell scripting. Trigger when `.sh` files, files with `#!/usr/bin/env bash` or `#!/bin/bash`, or CI workflow blocks with `shell: bash` are created, modified, or reviewed and Bash-specific quality controls (quoting safety, error handling, portability, readability) must be enforced. Do not use for generic POSIX `sh`, PowerShell, or language-specific application style rules. In multi-language pull requests, run together with other applicable `*-style-guide` skills.
11architecture-clean-architecture
Clean Architecture workflow for enforcing dependency direction, stable domain boundaries, and use-case-centered application design. Use when teams must separate business rules from frameworks and delivery mechanisms; do not use for isolated module cleanup without boundary implications.
11powershell-style-guide
Style, review, and refactoring standards for PowerShell scripting. Trigger when `.ps1`, `.psm1`, `.psd1` files, or CI workflow blocks with `shell: pwsh` or `shell: powershell` are created, modified, or reviewed and PowerShell-specific quality controls (error handling, parameter validation, readability, operational safety) must be enforced. Do not use for Bash, generic POSIX `sh`, or language-specific application style rules. In multi-language pull requests, run together with other applicable `*-style-guide` skills.
10github-codeowners-management
Govern CODEOWNERS rules so review routing reflects real ownership and risk boundaries on GitHub. Use when repository ownership mapping or mandatory reviewer rules must be defined, updated, or audited; do not use for non-GitHub runtime architecture or data-layer design.
9security-authentication
Security workflow for authentication architecture, credential lifecycle, and session/token assurance. Use when login, identity proofing, MFA, or session security decisions are required; do not use for authorization policy design or non-security quality tuning.
9