- Senior Platform Architect
I’m a multi-disciplined Architect with over two decades of experience spanning various client, server and cloud infrastructure technologies. Experienced at deploying, supporting, and managing the infrastructure and platform components that provide the foundation to build and run business applications. Familiar with infra-as-code primitives and automation/scripting languages, as well the fundamental characteristics of network, storage, and databases.
These days I work extensively with the following and more:
- Cloud Provider(s): AWS
- Kubernetes: AWS EKS
- CI/CD: ArgoCD, CodeFresh, and GitHub Actions
- Language(s): Go
- Databases: AWS RDS, DynamoDB
- Cache engines: ElastiCache
- IaC: Terraform
- Scaling: KEDA, and Karpenter
- Managing Secrets: Vault, vault-injector, External Secrets Operator
- Observability: Prometheus, Grafana, NewRelic, Cloudwatch
- Tooling: kubebuilder, skaffold, goreleaser, golangci-lint, govulncheck, gosec, betteralign, staticcheck, revive, identypo, nakedret, checkov, trivy, copa, syft, grype, semgrep, tfsec, gitleaks, trufflehog, and more.
- Built Kubernetes Operators using Go.
- Built Microservice and API using Go
- Used Drupal to develop Content Management Systems
- Used Drupal, Wordpress, Zend framework, and CakePhp to develop various web applications.
- Lead cluster migration from OpenStack VMs to GKE and GitLab for CI.
- Maintained a set of helm charts responsible for the workloads created from the Gitlab CI process. That task inspired this WebProject Operator.
- Provided support for: Docker, Docksal, Apache, PHP, NodeJS, Gatsby, Mysql, Mariadb, Redis, Memcached, Varnish, Solr and a number of other tools. As a result of using Redis for years, I created this simple operator
- Maintained compute infrastructure using Ansible as configuration management tool.
- Implemented the CI/CD automation and managed the deployment of software and configuration to production environments.
- Performed planned and unplanned failover to standby data centers testing disaster recovery plan runsheet
- Maintained a number Teleport clusters (notes I keep about this tool as I was learning to manage it)
- Built infra that monitored commits to master for multiple Git repos and backported that to other environments using automation.
- Managed the hand-off of code for upcoming production releases developed by various teams.
- Communicated with internal and external stakeholders about the completion of application distributions.
- Provided GitLab CI and operation support for project teams.
- Developed AWS Cloudformation templates used to provision the AWS infrastructure.
- Responsible for the day-to-day maintenance of multiple project AWS environments running workloads using ECS, Aurora Mariadb, EFS, Redis ElastiCache, API Gateway, and Lambda.
- Responsible for code and/or configuration deployments to multiple client production environments.
- Performed full client site migrations to/from Blackmesh/Contegix, Acquia, Pantheon, and AWS.
- Developed Ansible roles responsible for managing the configuration of production VMs
- B.A. in Criminal Justice with minor in Information Systems
- Certified Kubernetes Administrator 01/16/2020 - 01/16/2023
- Certified Kubernetes Application Developer 10/2/2019 - 10/02/2021
- AWS Solution Architect Associate 10/17/2016 - 10/17/2018
- AWS Certified Developer - Associate 12/30/2017 - 12/30/2020
Large Language Model(s) (LLM)
- Primary focus using llms locally using Ollama.
- Using K8sgpt's cli and operator as the SRE for Kubernetes clusters
- Using kubebuilder to create a LLM as a Service using Ollama to provide the API for interacting with LLMs
Cloud Environments
- AWS (primary focus)
- Google Cloud
- Azure
Platform design patterns
- Account as a Service
- Template as a Service
- Cluster as a Service
- Namespace as a Service
Testing infrastructure
- Testkube, EnvTest, Terratest, Kyverno Chainsaw
- K6, JMeter, locust
- Cypress, Selenium
Progressive delivery
- ArgoCD
- Argo Rollouts
- FluxCD
Observability
- Data-pipelines: Fluent-bit, Otel collector, Logging operator, Loki
- Tracing: Jaeger, Zipkin
- Metrics: Prometheus, OpenTelemetry
- Dashboards: Grafana
Infrastructure as Code
- Crossplane
- Terraform
- Pulumi
Governance & policies
- OPA, Kyverno, AWS SCP
- Useful Tools: trivy copa, snyk, grype
Identity and access
- AWS IAM
- Keycloak
Tools I've deployed to Kubernetes clusters and think should installed
- ArgoCD
- KEDA
- External Secrets Operator or vault-injector
- Cert Manager
- Fluent-bit
- Argo Rollouts
- Argo Events (optional)
- Argo Workflows (optional)
- Karpenter (EKS)
- Kubecost
- Velero (optional)
- Metrics server
- AWS loadbalancer controller / Ingress Nginx controller
- Kyverno
- OPA gatekeeper
- K8sgpt operator (optional)
- Atlas Operator (optional)
- CloudNativePG (CNPG)
- Knative serving