logoalt Hacker News

motorest04/24/20252 repliesview on HN

Event sourcing also works great. You don't need an audit log per se if you already track a history of all commands that introduced changes to your system.


Replies

nine_k04/24/2025

Event sourcing and "the right to be forgotten" are not always easy to marry.

show 1 reply
arialdomartini04/24/2025

Yep. But Event Sourcing comes with its own set of other problems. Also, I don't think this would apply to OP's post: with Event Sourcing you would not even have those DB tables.

show 1 reply