Lazy Bird Project - Broken System List Update
Lazy Bird Project - Broken System List Update
Hereβs an updated list of broken systems that we can implement on this project. The update is related to the categories. First, we defined it as categories related to domains. Now, they are related to problems domains, but without mentioning the problem itself.
These are not backlog or roadmap, these are only ideas of broken systems that can be implemented or not. Each of broken system is grouped based on its problem domain and it is rated according to the following criterias:
π’ Easy Systems | π‘ Medium Systems | π΄ Hard Systems |
---|---|---|
Simple configuration changes | Multiple component changes | Distributed system concepts |
Standard library solutions | Some infrastructure setup | Complex infrastructure requirements |
Clear cause-and-effect relationships | Moderate research required | Advanced debugging needed |
Single-file modifications | Mid-level concepts | Enterprise-level patterns |
Beginner-friendly concepts | Testing complexity | Multiple interacting components |
1. Database Performance
Query Optimization
- π’
01-employee-directory/
- Missing indexes on search columns - π’
02-customer-lookup/
- Inefficient WHERE clauses with functions - π’
03-product-catalog/
- Full table scans on large datasets - π‘
04-order-history/
- Missing composite indexes - π‘
05-sales-reports/
- N+1 query problems - π΄
06-user-analytics/
- Inefficient JOINs and subqueries - π‘
07-inventory-tracking/
- Cartesian product issues - π΄
08-audit-logs/
- Query plan optimization
Connection Management
- π΄
09-user-sessions/
- Connection pool exhaustion - π‘
10-batch-processing/
- Transaction timeout issues - π΄
11-reporting-system/
- Long-running query blocking - π΄
12-data-migration/
- Lock contention problems
2. Asynchronous Patterns
API Call Patterns
- π’
01-product-catalog/
- Sequential vs parallel API calls - π’
02-user-profile/
- Synchronous blocking calls - π‘
03-order-processing/
- Nested API dependency chains - π‘
04-inventory-sync/
- Inefficient polling patterns
Task Processing
- π’
05-email-service/
- Fire-and-forget reliability - π‘
06-file-processing/
- Long-running task handling - π΄
07-batch-jobs/
- Event-driven orchestration
3. Response Time Optimization
Caching Strategies
- π’
01-content-delivery/
- Missing application cache - π’
02-database-queries/
- No query result caching - π’
03-api-responses/
- Repeated expensive computations - π‘
04-session-management/
- Database-stored sessions - π‘
05-product-prices/
- Cache invalidation problems - π‘
06-user-preferences/
- Cache warming strategies - π΄
07-real-time-data/
- Stale cache issues - π΄
08-distributed-cache/
- Cache consistency problems
Cache Management
- π‘
09-large-datasets/
- Memory cache overflow - π‘
10-image-processing/
- Inefficient cache usage - π‘
11-search-results/
- Cache key collision - π΄
12-multi-tenant/
- Cache isolation issues
4. System Resilience
Error Handling
- π‘
01-payment-gateway/
- Missing timeout configurations - π‘
02-notification-service/
- No retry mechanisms - π΄
03-third-party-integration/
- Circuit breaker missing - π΄
04-microservice-calls/
- Cascade failure scenarios - π΄
05-circuit-patterns/
- Cascading failure prevention
System Design
- π΄
06-monolith-scaling/
- Single point of failure - π΄
07-service-boundaries/
- Tight coupling issues - π΄
08-data-consistency/
- Distributed transaction problems - π‘
09-service-discovery/
- Hard-coded dependencies
5. Traffic Management
Rate Control
- π‘
01-search-api/
- No rate limiting implementation - π΄
02-upload-service/
- Missing backpressure handling - π΄
03-analytics-collector/
- Burst traffic overwhelming - π‘
04-webhook-handler/
- Resource exhaustion attacks - π‘
05-rate-limiting/
- DDoS vulnerability
Load Distribution
- π‘
06-traffic-routing/
- Uneven load balancing - π‘
07-session-affinity/
- Sticky session problems - π΄
08-auto-scaling/
- Scale-up delay issues
6. Data Integrity
Race Conditions
- π‘
01-booking-system/
- Double booking scenarios - π’
02-counter-service/
- Non-atomic increment operations - π‘
03-resource-allocation/
- Shared resource conflicts - π’
04-user-registration/
- Duplicate account creation
Locking & Synchronization
- π΄
05-inventory-updates/
- Deadlock scenarios - π΄
06-bank-transfers/
- Transaction isolation issues - π‘
07-voting-system/
- Read-write lock problems - π‘
08-cache-updates/
- Lock contention hotspots
7. Resource Management
Compute Resources
- π‘
01-batch-processing/
- Thread pool exhaustion - π‘
02-data-analysis/
- CPU-bound task blocking - π‘
03-image-resizing/
- Resource starvation - π΄
04-report-generation/
- Memory sharing issues - π‘
05-memory-leaks/
- Garbage collection issues - π‘
06-thread-management/
- Context switching overhead
System Resources
- π‘
07-connection-pools/
- Resource exhaustion - π‘
08-disk-io/
- File handle limitations
8. Event-Driven Architecture
Message Queues
- π‘
01-notification-system/
- Backpressure and overflow - π‘
02-order-tracking/
- Event ordering problems - π‘
03-audit-trail/
- Message durability issues - π΄
04-user-actions/
- Dead letter queue handling
Event Processing
- π΄
05-real-time-updates/
- Event storm scenarios - π‘
06-data-synchronization/
- Out-of-order processing - π΄
07-workflow-engine/
- Event replay mechanisms - π‘
08-monitoring-alerts/
- Event deduplication - π΄
09-integration-hub/
- Event transformation issues
9. Application Security
Authentication & Authorization
- π‘
01-user-login/
- JWT token vulnerabilities - π’
02-api-access/
- Missing authorization checks - π‘
03-session-management/
- Session fixation attacks - π‘
04-password-reset/
- Insecure token generation
Data Protection
- π’
05-sensitive-data/
- Information leakage - π’
06-sql-injection/
- Input validation bypass - π‘
07-file-upload/
- Malicious file execution - π‘
08-data-encryption/
- Weak encryption implementation
Network Security
- π’
09-api-endpoints/
- CORS misconfiguration - π‘
10-ssl-certificates/
- Certificate validation issues - π’
11-input-sanitization/
- XSS attack vectors
10. System Observability
Monitoring Fundamentals
- π’
01-application-logs/
- Missing critical logging - π’
02-performance-metrics/
- No monitoring instrumentation - π’
03-error-tracking/
- Silent failure scenarios - π’
04-health-checks/
- Inadequate service monitoring
Alerting Systems
- π‘
05-threshold-alerts/
- Alert fatigue problems - π΄
06-anomaly-detection/
- False positive rates - π‘
07-incident-response/
- Alert correlation issues - π‘
08-dependency-monitoring/
- Blind spot identification
Performance Analysis
- π‘
09-profiling-tools/
- Performance bottleneck identification - π‘
10-resource-usage/
- Capacity planning data gaps - π΄
11-user-experience/
- End-to-end tracing missing - π‘
12-business-metrics/
- KPI measurement implementation
This post is licensed under CC BY 4.0 by the author.