Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, ordinarily, you just know your specs and your requirements, and install rate limiting and load balancing. Just standard availability & resilience. With proper resource constraints and observability in place, your system should be fine in most cases.

I think it’s standard practice to plan for failure and simulate adversary access patterns. On the other hand you say “no one ever tests” stuff like that. I suppose it’s not that standard after all.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: