Microbus is the Fabric for Agentic Workflows#
Microbus is the only fabric where every agentic workflow runs on a true microservice substrate. That single design choice gives your workflows security, scale, observability and prompt-driven authoring that bolt-on workflow engines cannot match.
Get started in minutes. Microbus is free and open source under the Apache 2.0 license.
Two Paths, One Fabric#
Pick the path that fits your domain — or use both, since they share the same plumbing.
- Agentic Workflows — Multi-step processes with branching, parallel fan-out/fan-in, human-in-the-loop interrupts, and durable state. Lead with this if your problem is orchestrating a flow that takes minutes to hours and may need a human in the middle.
- Microservices — Production-grade microservices with the substrate handling transport, observability, security, configuration and operational concerns. Lead with this if your problem is exposing a service that other services can call, or building out the toolset your agentic workflows invoke.
Why a Microservice Substrate Matters#
Every agentic claim Microbus makes — actor identity that follows a request through every tool call, security ACLs that match exactly what your code uses, distributed tracing across the entire workflow, OpenAPI documents that double as LLM tool descriptions — is a property of the microservice substrate, not of the workflow engine. Bolt-on workflow engines cannot deliver these because they do not own the runtime that processes the work.
Performant — Persistent multiplexed connections deliver up to 10x the throughput of HTTP/1.1, benchmarked at over 100,000 req/sec on a single machine.
Observable — Distributed tracing, structured logging and metrics are built in from the start, not bolted on after the fact.
Secure — A layered security model that pushes authentication and authorization down to the broker, where it is verified once and trusted everywhere.
Testable — Spin up a full integration test of multiple microservices in a single Go test function, with no containers or external dependencies.
Build an Agentic Workflow#
Microbus includes a built-in workflow engine — the Foreman — that orchestrates agentic workflows. Define the process as a directed graph of tasks. The Foreman handles execution, parallel fan-out and fan-in, state merging, human-in-the-loop interrupts, and automatic recovery from failures. State is persisted to a SQL database; the whole system is testable in-memory with go test.
Three prompts. One workflow. Tasks become independently testable, the graph is explicit and reviewable, and the Foreman handles the orchestration. See Build a Workflow for the full walkthrough.
Build a Microservice#
Microbus is designed to work hand-in-hand with coding agents like Claude Code. Each microservice is small, well-defined, and fits entirely in an agent’s context window. Tighter build-test-debug loops mean fewer mistakes and faster delivery. Multiple agents can work on different microservices in parallel without merge conflicts.
Six prompts. Under 10 minutes. 819 lines of code at 87% test coverage. See Build a Microservice for the full walkthrough that exercises all six features of a microservice.
Security in Depth#
Microbus’s security model is built into the framework itself, not bolted on as middleware. Several independent layers stack to close different attack vectors:
- Per-microservice identity. Each microservice opens its own NATS connection with its own signed credentials. The broker verifies the source of every message.
- Precise true-to-code interservice ACL. Allow-lists are derived directly from each microservice’s source code at deploy time. A compromised microservice can do only what its code already does.
- JWKS pinning. Actor JWTs are pinned to two framework-controlled issuers. Forged tokens fail verification immediately.
- Actor-based authorization. Every request carries a short-lived actor JWT identifying the user it is being made on behalf of. Endpoints declare
requiredClaimsboolean expressions that the framework enforces uniformly. - Trust-root tier. Endpoints that mint tokens or perform privileged operations sit on a dedicated port that external traffic never reaches.
Operating Securely walks through the production deployment.
Scale and Performance#
Microbus scales horizontally without bottlenecks and performs well per instance. The transport, the microservices, the workflow engine, the cache, and even the trust-root services all add capacity by adding instances rather than upgrading hardware. See Scale and Performance for the full breakdown.
Architecture#
A Microbus solution is built on top of 5 layers:
- OSS — A curated selection of proven technologies — NATS for messaging, OpenTelemetry for observability, Grafana for visualization — abstracted away by the layers above.
- Connector — The base construct from which all microservices are derived. Provides a consistent API for transport, observability, configuration and lifecycle management.
- Coding Agents — Generate boilerplate, business logic, tests and documentation using embedded skills that guide each feature end to end.
- Microservices — Core microservices ship with the framework. Solution microservices implement your business logic. Both are built the same way using the same tools.
- Applications — Microservices are bundled into applications according to the desired topology — a single binary, a handful of containers, or across availability zones.
What to Read Next#
- Ready to build? Get Started walks through bootstrapping a project, taking the agent-guided tour, and shipping your first workflow or microservice.
- Building agentic workflows? Building Agentic Workflows is the deep dive — tasks, graphs, fan-out/fan-in, reducers, control signals, and debugging.
- Building a microservice? Building a Microservice walks through every one of the 6 user-facing features — functional endpoints, web handlers, events, configs, tickers — with one running example.
- Curious how the agent gets so productive? Agentic RAD explains the rules, skills, and
CLAUDE.mdlayering that make coding agents accurate and consistent across microservices. - Evaluating for production? Security in Depth lays out the nine-layer security model, and Scale and Performance covers capacity planning. Operating Securely is the operator’s deployment walkthrough.
- Reading critically? The Mission Statement is the philosophical anchor — what we believe about distributed systems, why microservices, and the conventional alternative we replace.
- Already on Microbus? Release Notes tracks every version. When it’s time to bump, the upgrade skill handles the migration end to end.