From Log Chaos To Clarity With OpenTelemetry

Dear Friends!

🎉 Don’t miss our Easter Special for Tech Internals Conf 2025! Get your ticket with a 30% discount. Use the promo code EASTERTIC at checkout before April 21 to secure your spot. Please note: promo codes are not combinable.

Grab your ticket

At Tech Internals Conf 2024 in Cyprus, Alexey Korepov showed how OpenTelemetry can bring order to distributed chaos. Today, we’re sharing his article:

Debugging decoupled applications with microservices using OpenTelemetry

Debugging decoupled applications with microservices using OpenTelemetryWhy is OpenTelemetry the answer — and how did it bring order to distributed chaos?Look, once, a single log file was enough.

Today? Dozens of services in five languages. APIs that crash. Bugs that vanish between systems.

Debugging turns into a guessing game.

In this article, you'll hear a real story of scaling a simple logistics app into a 20-component monster—and surviving. Learn how adding OpenTelemetry gave the team visibility, control, and peace of mind. No vendor lock-in. No full rewrites. Just answers.

Read the article


This week, we’re spotlighting three speakers, each bringing something real, deep, and very senior-dev-worthy.

 Achieving scalability with custom locksIvan Savu — Co-Founder @ VeloxDB (Serbia)

Talk: Achieving scalability with custom locks

Ivan builds high-performance database systems for energy, e-commerce, and finance — industries that don’t tolerate downtime or bad architecture. His talk is a tour through modern memory architecture, the CPU/Memory gap, cache line contention, and how these low-level phenomena kill scalability if you’re not careful.
You’ll learn how VeloxDB engineers use custom lock strategies, like their 0-bit spin lock, to make even fine-grained locking cheap and effective. It’s system design without illusions, and it’s beautiful.

 What the @#!? is AuthWarren Parad — CTO @ Authress (Switzerland)

Talk: What the @#!? is Auth

You think you understand authentication… until you need to fix it for real. Warren dives into auth flows, access tokens, WebAuthn, scopes, JWTs with EdDSA signatures, and a dozen things that go wrong in real systems. He’s not here to sell you a tool — he’s here to show you what actually works when you need both security and UX.
From token revocation strategies to silent authentication that doesn't suck — this talk will help you rebuild your auth system without blowing it up.

An Efficient Git Workflow For High-Stakes ProjectsVladislav Shpilevoy — Senior Developer @ VirtualMinds (Germany)

Talk: An Efficient Git Workflow For High-Stakes Projects

We’ve all seen Git used wrong. Vladislav shows how Git, when taken seriously, becomes a force multiplier for fast, safe, maintainable development. This isn’t a “how to Git rebase” session — it’s a senior engineer’s guide to workflow architecture.

You’ll hear real-world examples of using multi-commit patchsets, atomic commits, and structured history to accelerate development in mission-critical projects. Also: how to convince teams to ditch merge commits with receipts.


See you there!

Tech Internals Team