event-driven
Event-Driven Architecture
Overview
Event-driven architecture (EDA) enables loosely coupled, scalable systems by communicating through events rather than direct calls. This skill covers message queues, pub/sub patterns, event sourcing, CQRS, distributed transaction management with sagas, and data streaming with Kafka.
Available Agents
- senior-software-engineer (Opus) - Architecture design, pattern selection, distributed system design
- senior-software-engineer (Opus) - Event handler implementation, consumer/producer code
- senior-software-engineer (Opus) - Event security, authorization patterns, message encryption
- senior-software-engineer (Opus) - Message broker setup, Kafka clusters, queue configuration
- software-engineer (Sonnet) - ONLY for unit tests, boilerplate event handlers following established patterns, or scaffolding from a concrete plan
Key Concepts
Message Queues
RabbitMQ Implementation:
More from cosmix/loom
prometheus
|
64ci-cd
Designs and implements CI/CD pipelines for automated testing, building, deployment, and security scanning across multiple platforms. Covers pipeline optimization, test integration, artifact management, and release automation.
61grafana
|
58logging-observability
Comprehensive logging and observability patterns for production systems including structured logging, distributed tracing, metrics collection, log aggregation, and alerting. Triggers for this skill - log, logging, logs, trace, tracing, traces, metrics, observability, OpenTelemetry, OTEL, Jaeger, Zipkin, structured logging, log level, debug, info, warn, error, fatal, correlation ID, span, spans, ELK, Elasticsearch, Loki, Datadog, Prometheus, Grafana, distributed tracing, log aggregation, alerting, monitoring, JSON logs, telemetry.
56data-validation
Data validation patterns including schema validation, input sanitization, output encoding, and type coercion. Use when implementing validate, validation, schema, form validation, API validation, JSON Schema, Zod, Pydantic, Joi, Yup, sanitize, sanitization, XSS prevention, injection prevention, escape, encode, whitelist, constraint checking, invariant validation, data pipeline validation, ML feature validation, or custom validators.
50refactoring
|
40