Backend Development 8 min read

Microservice System Classification, Evolution, and Governance Practices

The article outlines how to classify microservice-based systems into interface, web, and task categories, describes their architectural evolution, and provides a step‑by‑step methodology for identifying core (golden) functions and processes, distinguishing strong and weak dependencies, and implementing resilient disaster‑recovery strategies for large‑scale e‑commerce events.

JD Tech
JD Tech
JD Tech
Microservice System Classification, Evolution, and Governance Practices

1. System Classification and Evolution

1.1 System Classification

Based on functionality, the systems can be divided into three categories:

Interface service systems provide external APIs such as JD's custom RPC framework (JSF), HTTP interfaces, and Hessian interfaces. Write interfaces must ensure idempotency and anti‑scraping measures, while read interfaces are naturally idempotent.

Web page systems serve user‑facing pages; data displayed on a page may originate from multiple sources, requiring decisions on data merging and consistency.

Task systems include statistics, data synchronization, etc. They need to consider whether tasks are hot‑standby or cold‑standby, distributed scheduling, resource allocation, and computational accuracy.

1.2 System Evolution

The architecture has evolved from early monolithic systems to the current microservice‑oriented architecture, bringing new challenges in service governance such as network latency, distributed transactions, and asynchronous messaging.

2. Purpose of the Review

Before major sales events like 618 and Double‑11, a comprehensive review of all systems is conducted to identify weak points. By focusing on the most critical (golden) functions and applying the 80/20 principle, resources can be concentrated on the most impactful areas, while less critical components may be handled via throttling or degradation.

3. How to Conduct the Review

The review proceeds from a high‑level view of system functions to a detailed analysis of each core function’s workflow, pinpointing strong and weak dependencies. Strong dependencies require disaster‑recovery plans; weak dependencies can be degraded gracefully.

3.1 Interface Service Systems

Identify all provided service interfaces and mark the golden ones. Golden interfaces must remain available; ensure this through multi‑zone Redis clusters, redundant deployments, and other high‑availability measures.

3.2 Web Page Systems

Critical pages such as the homepage, category listings, navigation, and ad slots must never be empty. Each area should have multi‑level caching and fallback data to guarantee content display.

3.3 Task Systems

Task systems require distributed workers without single points of failure. Solutions may involve Zookeeper‑based scheduling, custom implementations, or open‑source frameworks like Elastic‑Job.

All three system types have already been micro‑service‑ified; the review therefore focuses on communication dependencies, distinguishing strong from weak dependencies.

3.4 Core Function Process Review

After identifying golden functions, map their end‑to‑end processes, marking key nodes. Strong dependencies (highlighted in deep yellow) must have disaster‑recovery plans; weak dependencies (light green) can be degraded.

4. Summary

The article presented system classification, architectural evolution, and process mapping with the ultimate goal of uncovering golden functions and golden processes, and distinguishing strong from weak dependencies. By ensuring strong dependencies have robust disaster‑recovery solutions, the organization can confidently handle system evolution and large‑scale events such as 618 and Double‑11.

distributed systemssystem architecturemicroservicesDependency Analysisservice governance
JD Tech
Written by

JD Tech

Official JD technology sharing platform. All the cutting‑edge JD tech, innovative insights, and open‑source solutions you’re looking for, all in one place.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.