A deep system design analysis of a production-grade, event-driven Hospital Information System. Covers the full microservices topology, schema isolation, Outbox Pattern, Dead Letter Queues, three-layer security, and the full observability stack.
If you have ever worked on a billing system, you know the nightmare: every insurance provider has different rules. Some cover 80%, some have fixed discounts, and some cover nothing at all.
If you have spent more than five minutes in microservices development,
your default answer for service-to-service communication is probably REST.
It is simple, human-readable, and Postman makes it look easy. But as my Hospital Information System (HIS) grew,
I started asking: "Is 'easy to read' really more important than 'hard to break'?"
Have you ever seen "Resilience" in any system design book? It's a shortcut to say
"What happens to our system when things go wrong?" and it is a good question because
I promise you, things will definitely go wrong.
A deep dive into the Transactional Outbox Pattern. What it is, when to use it, and how I
applied it in my Hospital Information System to guarantee reliable, atomic messaging between
microservices without the Dual Write Problem.
Average latency is almost always a lie. P95 latency tells you a much more honest story.
Learn what the 95th percentile means, why averages mislead you, and how to use percentile
metrics to understand your system's real-world performance.
Zero-Trust isn't just a buzzword. Here's a brief explanation of what I've learned about workload
identity, SPIFFE/SPIRE architecture, and handling mTLS at scale while building the SecurePay
project.
Pulling back the curtain on the architectural journey of building SecurePay—a high-performance,
polyglot payment platform. Explore Zero-Trust security with SPIFFE/SPIRE, event-driven
orchestration with Kafka, and cloud-native infrastructure on AWS.
Discover how Cloudflare Tunnel provides a secure way to connect your resources to Cloudflare
without exposing public IP addresses. Learn about outbound-only connections, attack surface
reduction, and why it's essential for modern infrastructure security.
Deep dive into PostgreSQL's internal architecture covering PGDATA, database clusters, system
catalogs,
schemas, tablespaces, and the Postmaster process. Explore Multi-Version Concurrency Control
(MVCC)
with transaction IDs, isolation levels, and how PostgreSQL achieves high concurrency without
blocking readers.
Deep dive into how Kubernetes translates YAML definitions into Linux kernel instructions.
Explore the OOM killer mechanism, CPU throttling with CFS, scheduler filtering and scoring
logic,
and kubelet eviction policies. Learn what really happens under the hood when you set resource
requests and limits.
Ready to get your hands dirty? This practical guide walks you through simple exercises to
understand how resource requests and limits work in real scenarios. Learn by doing with
5 beginner-friendly exercises covering QoS classes, memory pressure, CPU throttling, and
resource quotas.
A comprehensive guide to AWS Well-Architected Framework covering all six pillars: Operational
Excellence,
Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability. Learn the
essential
design principles and best practices for building robust cloud solutions.
Have you ever felt that burnout is creeping in, and you're struggling to keep up with the
demands of your
engineering career? In this article, I explore the crucial distinction between self-maintenance
and self-care,
and how prioritizing both can lead to a healthier, more sustainable professional life.