End-to-end solution design — system integration, channel orchestration, identity management, observability, and cross-cutting concerns. Use when the user asks to "design the full solution", "integrate multiple systems", "plan API gateway strategy", "define identity and security architecture", "set up observability", or mentions C4 containers, BFF, Zero Trust, SLI/SLO, circuit breaker, or migration planning.
From maonpx claudepluginhub javimontano/mao-discovery-frameworkThis skill is limited to using the following tools:
examples/README.mdexamples/sample-output.htmlexamples/sample-output.mdprompts/metaprompts.mdprompts/use-case-prompts.mdreferences/body-of-knowledge.mdreferences/knowledge-graph.mmdreferences/solutions-arch-patterns.mdreferences/state-of-the-art.mdEnables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Solutions architecture designs the complete system that solves a business problem — how multiple systems connect, how users interact, how data flows, how security is enforced, and how the solution is observed and operated. It bridges business requirements and technical implementation.
Una solución es más que la suma de sus sistemas. La arquitectura de solución diseña cómo múltiples componentes — APIs, canales, identidad, datos, observabilidad — se integran para resolver un problema de negocio completo. Cada integración es un contrato. Cada contrato es un punto de fallo. Cada punto de fallo necesita un plan B.
The user provides a system or project name as $ARGUMENTS. Parse $1 as the solution/project name used throughout all output artifacts.
Parameters:
{MODO}: piloto-auto (default) | desatendido | supervisado | paso-a-paso
{FORMATO}: markdown (default) | html | dual{VARIANTE}: ejecutiva (~40% — S1 solution view + S2 integration + S4 security) | técnica (full 7 sections, default)Before generating architecture, detect the codebase context:
!find . -name "*.ts" -o -name "*.java" -o -name "*.py" -o -name "*.go" -o -name "*.yaml" | head -30
If reference materials exist, load them:
Read ${CLAUDE_SKILL_DIR}/references/integration-patterns.md
Read ${CLAUDE_SKILL_DIR}/references/security-models.md
High-level diagram showing all systems, boundaries, external dependencies, and integration points.
Includes:
Key decisions:
How systems connect, exchange data, and coordinate.
Includes:
Trade-offs:
How end-users and external systems interact with the solution.
Includes:
Key decisions:
How users are authenticated, authorized, and how data is protected.
Authentication (AuthN):
Authorization (AuthZ):
Zero Trust:
API Security:
Data Protection:
How the solution is monitored, debugged, and operated in production.
Logging: Structured, centralized, correlation IDs, retention policy Metrics: Application (RPS, error rate, latency p50/p95/p99), infrastructure (CPU, memory), business (transactions, revenue) Tracing: OpenTelemetry, trace spans, sampling strategy Alerting: Conditions, on-call escalation, alert fatigue management Dashboards: Executive (business), operational (latency, errors), debugging (traces, slow queries)
SLI/SLO/SLA:
Technical patterns applied across multiple components.
How to move from current state to target state without disrupting operations.
Migration Strategy: Strangler fig, parallel running, cutover (flag day vs. phased), rollback plan Data Migration: Schema evolution, dual-write, verification (checksums, counts), rollback Phased Rollout: Dark launch -> canary 5% -> 25% -> 50% -> 100%; rollback criteria Team Readiness: Documentation, training, on-call, capacity planning Risk Management: Data loss (backup, RTO), service unavailability, performance degradation, security exposure, compliance approval
| Decision | Enables | Constrains | When to Use |
|---|---|---|---|
| Synchronous Integration | Immediate consistency, simple errors | Tight coupling, latency, availability risk | Simple workflows, strong consistency |
| Asynchronous (Event-Driven) | Decoupling, resilience, independent scaling | Eventual consistency, complex debugging | High-scale, distributed, domain-driven |
| API Gateway | Central security, rate limiting, monitoring | Single point of failure, added latency | Multi-channel, external API exposure |
| BFF | Optimized API per channel, client flexibility | Duplication, consistency challenges | Multi-channel with divergent needs |
| OAuth2/OIDC | Industry standard, social login, delegation | More complex than basic auth | External users, enterprise SSO |
| Centralized Logging | Complete audit trail, easy debugging | Overhead, privacy, storage cost | Compliance-heavy, production troubleshooting |
| Distributed Tracing | End-to-end visibility, latency identification | Instrumentation overhead, sampling complexity | Multi-service, debugging latency |
| Caching (Redis) | Dramatic latency reduction | Invalidation complexity, memory cost, stale data | High-load, read-heavy workloads |
| Circuit Breaker | Fail-fast, prevent cascades | False positives, added latency | Systems calling unreliable dependencies |
| Caso | Estrategia de Manejo |
|---|---|
| Solucion greenfield multi-sistema | Iniciar con APIs sincronas simples; agregar async/caching cuando las metricas lo justifiquen; evitar sobre-diseno para escala hipotetica |
| Integracion con mainframe legacy | Capa de integracion (adapter, translator) para impedance mismatch (batch vs real-time, EBCDIC vs UTF-8); strangler fig con timeline de retiro |
| Redes de alta latencia o poco confiables | Arquitectura offline-first con cache local y sync al reconectar; conflict resolution para eventual consistency |
| Requisitos de tiempo real y baja latencia | Sincronico preferido; trade-offs de async documentados; infraestructura global con distribution y failover |
| Sistema altamente regulado (GDPR, HIPAA, PCI-DSS) | Compliance como constraint no-negociable; cada decision mapeada a requisito regulatorio; audit trails, encryption y consent management desde el inicio |
| Decision | Alternativa Descartada | Justificacion |
|---|---|---|
| Integration-first thinking (foco en costuras) | Foco en sistemas individuales | Los sistemas individuales funcionan solos; la solucion falla en los puntos de conexion; las costuras son donde se pierde valor |
| Zero Trust by default en cada servicio | Seguridad perimetral clasica | La seguridad perimetral asume que el interior es confiable; Zero Trust verifica cada request, cada canal, cada dato |
| Observabilidad disenada junto con la funcionalidad | Observabilidad agregada post-implementacion | Lo que no se puede observar no se puede operar; logging, tracing y metrics son parte del diseno, no afterthoughts |
| Circuit breaker y retry con idempotency por defecto | Llamadas directas sin proteccion | En sistemas distribuidos, las dependencias fallan; circuit breaker previene cascadas y retry con idempotency permite recovery seguro |
graph TD
subgraph Core["Core: Solutions Architecture"]
SV[Solution View - C4]
IA[Integration Architecture]
CH[Channel & BFF]
SEC[Identity & Security]
OBS[Observability - SLI/SLO]
CC[Cross-Cutting Concerns]
TP[Transition Plan]
end
subgraph Inputs["Inputs"]
BIZ[Business Requirements]
UJ[User Journeys]
QA[Quality Attributes]
TECH[Technology Choices]
end
subgraph Outputs["Outputs"]
C4[C4 Container Diagram]
SPEC[Integration Contract Specs]
OBSCONF[Observability Config]
PLAN[Transition Runbooks]
end
subgraph Related["Related Skills"]
SWA[software-architecture]
INF[infrastructure-architecture]
DSO[devsecops-architecture]
API[api-architecture]
end
BIZ --> SV
UJ --> CH
QA --> OBS
TECH --> IA
SV --> IA --> CH --> SEC --> OBS --> CC --> TP
TP --> C4
TP --> SPEC
TP --> OBSCONF
TP --> PLAN
SWA --> SV
C4 --> INF
SPEC --> DSO
IA --> API
| Formato | Nombre | Contenido |
|---|---|---|
| Markdown | A-02_Solutions_Architecture_Deep.md | Documento completo con Solution View (C4), Integration Architecture, Channel & BFF, Identity/Security, Observability, Cross-Cutting Concerns y Transition Plan. Diagramas Mermaid embebidos. |
| HTML | A-02_Solutions_Architecture_Deep.html | Mismo contenido en HTML branded (Design System MetodologIA). Diagramas C4 interactivos, navigation entre secciones, y integration contract specs detallados. |
| DOCX | {fase}_solutions_architecture_{cliente}_{WIP}.docx | Generado con python-docx y MetodologIA Design System v5. Portada con nombre de la solución y fecha, TOC automático, encabezados Poppins navy, cuerpo Montserrat, acentos dorados, tablas zebra. Secciones: Solution View (C4), Integration Architecture, Channel & BFF, Identity/Security, Observability, Cross-Cutting Concerns, Transition Plan. |
| XLSX | {fase}_solutions_architecture_{cliente}_{WIP}.xlsx | Generado via openpyxl con MetodologIA Design System v5. Encabezados con fondo navy y texto Poppins blanco, cuerpo en Montserrat, zebra striping en filas. Hojas: Integration Contracts (sistema origen, sistema destino, protocolo, patrón sync/async, SLA, fallback, responsable), Security Model (capa, mecanismo AuthN/AuthZ, cifrado, compliance mapping, gaps), SLI/SLO Targets (servicio, SLI, SLO objetivo, SLA contractual, estado actual), Cross-Cutting Concerns (concern, patrón aplicado, sistemas afectados, configuración, riesgo), Transition Plan (fase, actividad, owner, criterio de rollback, riesgo). Conditional formatting por estado de SLO y severidad de gaps de seguridad. Auto-filters en todas las hojas. Valores directos sin fórmulas. |
| PPTX | {fase}_solutions_architecture_{cliente}_{WIP}.pptx | Generado con python-pptx y MetodologIA Design System v5. Slide master con gradiente navy, títulos Poppins, cuerpo Montserrat, acentos dorados. Máximo 30 slides (técnica). Speaker notes con referencias de evidencia. Slides: Portada, Principio Rector, Solution View (C4 containers), Integration Architecture, Channel & BFF Strategy, Identity & Security (Zero Trust), Observability (SLI/SLO), Cross-Cutting Concerns, Transition Plan, próximos pasos. |
| Dimension | Peso | Criterio |
|---|---|---|
| Trigger Accuracy | 10% | Descripcion activa triggers correctos (full solution, integrate systems, API gateway, Zero Trust, observability) sin falsos positivos con software-architecture o infrastructure-architecture |
| Completeness | 25% | Las 7 secciones cubren solution view, integracion, canales, seguridad, observabilidad, cross-cutting y transicion sin huecos; todos los sistemas en scope mapeados |
| Clarity | 20% | Instrucciones ejecutables sin ambiguedad; cada integracion con protocolo, SLA y fallback; SLI/SLO con targets numericos |
| Robustness | 20% | Maneja greenfield, legacy mainframe, redes poco confiables, tiempo real y regulacion estricta con estrategias diferenciadas |
| Efficiency | 10% | Proceso no tiene pasos redundantes; variante ejecutiva reduce a S1+S2+S4 sin perder decisiones criticas de integracion y seguridad |
| Value Density | 15% | Cada seccion aporta valor practico directo; trade-off matrix y transition plan son herramientas de decision y ejecucion inmediata |
Umbral minimo: 7/10.
Before finalizing delivery, verify:
| Format | Default | Description |
|---|---|---|
markdown | Yes | Rich Markdown + Mermaid diagrams. Token-efficient. |
html | On demand | Branded HTML (Design System). Visual impact. |
dual | On demand | Both formats. |
Default output is Markdown with embedded Mermaid diagrams. HTML generation requires explicit {FORMATO}=html parameter.
Primary: A-02_Solutions_Architecture_Deep.html — Executive summary, solution view, integration architecture, channel architecture, identity/security, observability, cross-cutting concerns, transition plan.
Secondary: C4 diagram (PNG/SVG), integration contract specs, observability config templates, security checklist, transition runbooks.
Autor: Javier Montaño | Última actualización: 12 de marzo de 2026