Configuring rate limiter in a distributed systems are not so easy and maintaining them is additional overhead , and there are instance we mark legitimate users as malicious which misleads and causes losses in legitimate network traffic ,also DDoS attackers can take advantage of mimicking such system.
videos are amazing, and i would request you to upload videos faster
Can't you use redis itself for cached rules? What if common redis cluster crashes in distributed environment?
Thank you, very well explained
Hi,NIKHIL i will surely watch your whole series on system design, But i have a request can i have one of Ferrari from your wall? 😅
How many parts left in this video series?
Shai hnnn bro
great
Configuring rate limiter in a distributed systems are not so easy and maintaining them is additional overhead , and there are instance we mark legitimate users as malicious which misleads and causes losses in legitimate network traffic ,also DDoS attackers can take advantage of mimicking such system.
people even do custom implement of these algorithms at gateway level, which is a stupidity.
bhai directly system design interview by Alex xu see hi pel diya 🤦♂
Yes
That is a great book to learn about these designs