Pains
2403 pains collected
Limited RBAC and Permissions Customization
6Clerk's RBAC capabilities are shallow and insufficient for complex application-level permission requirements. Developers need more granular control over roles and permissions beyond the basic 10 custom roles, especially for domain-specific business logic.
Lack of developer abstraction and self-service workflows
6Product teams want higher-level abstractions and self-service capabilities for infrastructure provisioning. Many teams are adopting CDKTF or building internal platforms to bridge the gap, indicating Terraform's abstraction layer is insufficient for modern development velocity.
Missing regional deployment options
6Railway lacks support for certain geographic regions (e.g., Algeria), which creates compliance and performance issues for teams that need to serve or store data in specific locations.
Lack of built-in DDoS and WAF protection
6Railway does not provide built-in edge protection, Web Application Firewall (WAF), or DDoS mitigation out of the box. Developers must add extra layers (CDN, proxy, WAF) manually if their apps need strong security or resilience against bot traffic.
Platform limitations for background workers and async tasks
6Railway lacks a native worker model for background jobs, async processing, and independent scheduled tasks. Developers must manually set up these as separate services, requiring additional configuration and ongoing management.
GitLab integration missing with no timeline
6Railway's deployment flow is tightly coupled to GitHub, and GitLab integration is only planned with no estimated timeline. Developers using GitLab must work around this significant platform limitation.
No SSH/remote shell access for interactive development
6Railway explicitly does not support SSH access or remote shell (like `rails console`) to running applications, blocking Ruby and Elixir developers who need interactive debugging and introspection capabilities due to the platform's immutability principle.
Content Security Policy blocks silent authentication iframes
6When using ssoSilent flow, MSAL loads the redirect URI in an invisible iframe. Content security policies or HTTP headers on the redirect URI page can block this iframe from loading, preventing silent SSO.
Blurred distinction between OAuth authentication and authorization
6OAuth 2.0 is fundamentally for authorization (permissions), not authentication (identity), but developers frequently misuse it for authentication. This conceptual confusion leads to security vulnerabilities and architectural mistakes that compound during production rollouts.
Mandatory parent window handle configuration for WAM authentication
6Starting with MSAL 4.52+, developers must explicitly specify parent window handles using WithParentActivityOrWindow APIs for Windows broker (WAM) authentication. Omitting this causes poor UX where auth windows hide behind the application, and window inference is no longer feasible.
Platform-specific WAM limitations and fallback handling
6Windows Broker (WAM) implementation has significant limitations: B2C and ADFS authorities aren't supported, it only works on Windows 10+ and Server 2019+, and older platforms must fall back to browser-based authentication. Developers must handle these constraints in multi-platform applications.
Half-baked and inconsistent service quality
6Many AWS services are incomplete or poorly designed (e.g., SageMaker Studio vs regular SageMaker). The vast product portfolio means quality varies significantly and some products are not production-ready.
Overly restrictive tenant governance prevents developer productivity
6Many organizations lock down Azure tenants with whitelist-based resource and operation controls on administrator advice. This prevents developers from gaining practical Azure experience through trial-and-error, increases time-to-market, and reduces the platform's developer benefits despite Azure being designed as a developer-first cloud.
Complex Azure pricing structure navigation
6The pay-as-you-go pricing model with multiple pricing options across services and resources is difficult to navigate, especially for developers new to Azure. Understanding how pricing applies to specific services is challenging.
Navigating vast and evolving Azure service ecosystem
6With over 200 Azure services evolving at a rapid pace, developers struggle to identify the most suitable service for specific scenarios. Documentation frequently falls behind new feature introductions, making it difficult to stay current.
Managing permissions and access controls
6Setting up correct access controls and permissions for resources is tricky, requiring balance between security and usability. Documentation assumes administrative privileges, leaving non-admins without clear guidance on permission discovery and processes.
Manual coordination required for database changes across environments
6Database changes across multiple environments require manual coordination between team members, increasing complexity and risk of inconsistencies.
Azure Monitor alerting and monitoring blind spots
6Azure Monitor lacks sufficient custom alerts and notifications for tracking infrastructure health, creating blind spots in monitoring. Many IT directors assume management and monitoring are built-in but find they are under-resourced.
Virtual machine and system image security risks
6VM-based system images and their management present security risks, requiring careful attention to image creation, storage, and deployment practices to prevent security vulnerabilities.
MongoDB security complexity in multi-cloud and edge environments
6MongoDB faces challenges protecting data across distributed environments including cloud providers, edge devices, and on-premises systems. Implementing consistent encryption and security policies across AWS, Azure, and edge devices impacts performance and adds complexity.
Latency from geographic distance to Azure data centers
6Developers using Azure feeds experience significant latency caused by geographic distance from data centers, leading to slow package retrieval times and reduced performance for globally distributed teams.
Manual deployment and testing overhead
6Manual deployment and testing processes create significant overhead, slow release cycles, and increase error rates. Automation is critical but often difficult to implement in Azure environments.
Unclear quota and billing transparency issues
6The API does not provide clear feedback on remaining quota or detailed billing breakdowns. Developers cannot easily track usage or understand cost allocation across API calls.
Azure management portal is slow and unreliable
6The Azure portal experiences frequent performance issues, unreliable button clicks that may or may not execute, sluggish interface responsiveness, and unknown error messages when performing routine actions like viewing deployment logs or accessing SSH/log functions.