Skip to content

I'm currently populating my catalog on the site. Pardon the prefilled data. The entries are actively being updated and cleaned up.

Previous website

AWS Infrastructure Automation with Terraform and Ansible

Provisioned EC2, S3, and IAM resources on AWS using Terraform, then configured a production-ready Nginx web server on the instance using Ansible playbooks.

Role: Cloud EngineerTimeline: 72 hoursCategory: Infrastructure
  • Terraform
  • Ansible
  • AWS EC2
  • AWS S3
  • Nginx

Overview#

This project focused on reshaping operational signals so alerts became more actionable and dashboards better reflected real service health.

Problem#

Too many alerts were routed without enough context, making on-call work noisier than it needed to be. Teams had metrics, but not always the right hierarchy of signal to support decision-making during incidents.

Solution#

I reviewed service signals, refined alert thresholds, grouped routing logic more intentionally, and improved dashboard structure so operators could move faster from symptom to likely cause.

Architecture#

A placeholder signal pipeline view representing collection, routing, and operational review layers.

Tech Stack#

  • Terraform
  • Ansible
  • AWS EC2
  • AWS S3
  • Nginx

Key Features#

  • Better separation between noisy events and actionable incidents.
  • Clearer ownership mapping in alert routing.
  • More operator-friendly dashboards.
  • Repeatable patterns for signal review.

Media#

A framed media block representing the kind of visual system used to discuss signal quality and response paths.

Results#

The most important result was a calmer operational posture. Teams still saw the system, but with better prioritization and fewer distractions during response work.

Lessons Learned#

Observability improves when you design it as a decision-support system rather than a metrics collection system. The difference is usually in signal quality, context, and ownership clarity.

Related Projects

A few additional builds that connect to the same infrastructure, delivery, and reliability themes.

Enterprise AWS Platform Engineering

A production-grade cloud platform built on AWS EKS with Terraform environment isolation, polyglot CI/CD across Node.js, Java, and Rust, GitOps via ArgoCD, and a layered security scanning strategy — end to end.

  • AWS EKS
  • Terraform
  • GitHub Actions
  • ArgoCD
  • Helm
  • Docker
  • ECR
  • Prometheus
  • Grafana

Kubernetes Workload Platform on AWS EKS

Provisioned a production-grade EKS cluster on AWS with Terraform, deployed containerised workloads using Helm, and automated the full delivery pipeline with Jenkins.

  • AWS EKS
  • Terraform
  • Jenkins
  • Helm
  • Docker
  • ECR

Containerised Application Delivery on AWS ECS

End-to-end deployment of a Node.js frontend and backend on AWS ECS Fargate, automated through a Jenkins CI/CD pipeline and provisioned with Terraform.

  • AWS ECS Fargate
  • Jenkins
  • Terraform
  • Docker
  • ECR