Lazy Bird - Broken System List
Lazy Bird - Broken System List
Hereβs a list of broken systems that we can implement on this project. These are not backlog or roadmap, these are only ideas of broken systems that can be implemented or not. Each of broken system is grouped based on its problem domain and it is rated according to the following criterias:
π’ Easy Systems | π‘ Medium Systems | π΄ Hard Systems |
---|---|---|
Simple configuration changes | Multiple component changes | Distributed system concepts |
Standard library solutions | Some infrastructure setup | Complex infrastructure requirements |
Clear cause-and-effect relationships | Moderate research required | Advanced debugging needed |
Single-file modifications | Mid-level concepts | Enterprise-level patterns |
Beginner-friendly concepts | Testing complexity | Multiple interacting components |
Database
- Query Performance
- π’
01-employee-directory/
- Missing indexes on search columns - π’
02-customer-lookup/
- Inefficient WHERE clauses with functions - π’
03-product-catalog/
- Full table scans on large datasets - π‘
04-order-history/
- Missing composite indexes
- π’
- Query Optimization
- π‘
05-sales-reports/
- N+1 query problems - π΄
06-user-analytics/
- Inefficient JOINs and subqueries - π‘
07-inventory-tracking/
- Cartesian product issues - π΄
08-audit-logs/
- Query plan optimization
- π‘
- Connection & Resource Management
- π΄
09-user-sessions/
- Connection pool exhaustion - π‘
10-batch-processing/
- Transaction timeout issues - π΄
11-reporting-system/
- Long-running query blocking - π΄
12-data-migration/
- Lock contention problems
- π΄
APIs
- Call Patterns
- π’
01-product-catalog/
- Sequential vs parallel API calls - π’
02-user-profile/
- Synchronous blocking calls - π‘
03-order-processing/
- Nested API dependency chains - π‘
04-inventory-sync/
- Inefficient polling patterns
- π’
- Error Handling & Resilience
- π‘
05-payment-gateway/
- Missing timeout configurations - π‘
06-notification-service/
- No retry mechanisms - π΄
07-third-party-integration/
- Circuit breaker missing - π΄
08-microservice-calls/
- Cascade failure scenarios
- π‘
- Rate Limiting & Throttling
- π‘
09-search-api/
- No rate limiting implementation - π΄
10-upload-service/
- Missing backpressure handling - π΄
11-analytics-collector/
- Burst traffic overwhelming - π‘
12-webhook-handler/
- Resource exhaustion attacks
- π‘
Caching
- Cache Layers
- π’
01-content-delivery/
- Missing application cache - π’
02-database-queries/
- No query result caching - π’
03-api-responses/
- Repeated expensive computations - π‘
04-session-management/
- Database-stored sessions
- π’
- Cache Strategies
- π‘
05-product-prices/
- Cache invalidation problems - π‘
06-user-preferences/
- Cache warming strategies - π΄
07-real-time-data/
- Stale cache issues - π΄
08-distributed-cache/
- Cache consistency problems
- π‘
- Memory Management
- π‘
09-large-datasets/
- Memory cache overflow - π‘
10-image-processing/
- Inefficient cache usage - π‘
11-search-results/
- Cache key collision - π΄
12-multi-tenant/
- Cache isolation issues
- π‘
Events
- Message Queues
- π‘
01-notification-system/
- Backpressure and overflow - π‘
02-order-tracking/
- Event ordering problems - π‘
03-audit-trail/
- Message durability issues - π΄
04-user-actions/
- Dead letter queue handling
- π‘
- Event Processing
- π΄
05-real-time-updates/
- Event storm scenarios - π‘
06-data-synchronization/
- Out-of-order processing - π΄
07-workflow-engine/
- Event replay mechanisms - π‘
08-monitoring-alerts/
- Event deduplication
- π΄
- Async Patterns
- π’
09-email-service/
- Fire-and-forget reliability - π‘
10-file-processing/
- Long-running task handling - π΄
11-batch-jobs/
- Event-driven orchestration - π΄
12-integration-hub/
- Event transformation issues
- π’
Concurrency
- Race Conditions
- π‘
01-booking-system/
- Double booking scenarios - π’
02-counter-service/
- Non-atomic increment operations - π‘
03-resource-allocation/
- Shared resource conflicts - π’
04-user-registration/
- Duplicate account creation
- π‘
- Locking & Synchronization
- π΄
05-inventory-updates/
- Deadlock scenarios - π΄
06-bank-transfers/
- Transaction isolation issues - π‘
07-voting-system/
- Read-write lock problems - π‘
08-cache-updates/
- Lock contention hotspots
- π΄
- Parallel Processing
- π‘
09-batch-processing/
- Thread pool exhaustion - π‘
10-data-analysis/
- CPU-bound task blocking - π‘
11-image-resizing/
- Resource starvation - π΄
12-report-generation/
- Memory sharing issues
- π‘
Architecture
- System Design
- π΄
01-monolith-scaling/
- Single point of failure - π΄
02-service-boundaries/
- Tight coupling issues - π΄
03-data-consistency/
- Distributed transaction problems - π‘
04-service-discovery/
- Hard-coded dependencies
- π΄
- Load Distribution
- π‘
05-traffic-routing/
- Uneven load balancing - π‘
06-session-affinity/
- Sticky session problems - π΄
07-auto-scaling/
- Scale-up delay issues - π΄
08-circuit-patterns/
- Cascading failure prevention
- π‘
- Resource Management
- π‘
09-memory-leaks/
- Garbage collection issues - π‘
10-connection-pools/
- Resource exhaustion - π‘
11-thread-management/
- Context switching overhead - π‘
12-disk-io/
- File handle limitations
- π‘
Security
- Authentication & Authorization
- π‘
01-user-login/
- JWT token vulnerabilities - π’
02-api-access/
- Missing authorization checks - π‘
03-session-management/
- Session fixation attacks - π‘
04-password-reset/
- Insecure token generation
- π‘
- Data Protection
- π’
05-sensitive-data/
- Information leakage - π’
06-sql-injection/
- Input validation bypass - π‘
07-file-upload/
- Malicious file execution - π‘
08-data-encryption/
- Weak encryption implementation
- π’
- Network Security
- π’
09-api-endpoints/
- CORS misconfiguration - π‘
10-rate-limiting/
- DDoS vulnerability - π‘
11-ssl-certificates/
- Certificate validation issues - π’
12-input-sanitization/
- XSS attack vectors
- π’
Monitoring
- Observability
- π’
01-application-logs/
- Missing critical logging - π’
02-performance-metrics/
- No monitoring instrumentation - π’
03-error-tracking/
- Silent failure scenarios - π’
04-health-checks/
- Inadequate service monitoring
- π’
- Alerting Systems
- π‘
05-threshold-alerts/
- Alert fatigue problems - π΄
06-anomaly-detection/
- False positive rates - π‘
07-incident-response/
- Alert correlation issues - π‘
08-dependency-monitoring/
- Blind spot identification
- π‘
- Performance Analysis
- π‘
09-profiling-tools/
- Performance bottleneck identification - π‘
10-resource-usage/
- Capacity planning data gaps - π΄
11-user-experience/
- End-to-end tracing missing - π‘
12-business-metrics/
- KPI measurement implementation
- π‘
This post is licensed under CC BY 4.0 by the author.