Skip to content

I'm currently populating my catalog on the site. Pardon the prefilled data. The entries are actively being updated and cleaned up.

Previous website

Kubernetes Workload Platform on AWS EKS

Provisioned a production-grade EKS cluster on AWS with Terraform, deployed containerised workloads using Helm, and automated the full delivery pipeline with Jenkins.

Role: Cloud / DevOps EngineerTimeline: 72 hoursCategory: Cloud Infrastructure
  • AWS EKS
  • Terraform
  • Jenkins
  • Helm
  • Docker
  • ECR

Overview#

This project established a shared baseline for AWS-hosted Kubernetes services so new workloads could land on a platform with secure defaults, repeatable deployment paths, and stronger operational visibility.

Instead of treating cluster provisioning as a one-time task, the work focused on building a reusable environment contract that could scale across teams and environments without recreating the same platform decisions each time.

Guiding principle

The platform had to be understandable to service teams, not only correct from an infrastructure point of view.

Problem#

Environment setup had started to drift. Teams were making slightly different choices around networking, IAM boundaries, and cluster-facing operational defaults, which made the system harder to secure and support over time.

  • Infrastructure setup patterns were inconsistent.
  • Service onboarding took longer than it should have.
  • Operational quality depended too much on local team knowledge.

Solution#

I designed a baseline around reusable Terraform modules, clearer workload identity patterns, and GitOps-friendly deployment contracts. The goal was to move foundational platform choices into shared code without making the system too rigid to adopt.

Architecture#

A representative platform view showing cloud primitives, cluster capabilities, and the layers exposed to service teams.

The architecture separated shared cloud primitives from runtime-facing cluster capabilities so the platform could evolve its own controls without forcing teams to understand every underlying infrastructure detail.

Tech Stack#

  • AWS EKS
  • Terraform
  • Jenkins
  • Helm
  • Docker
  • ECR
Environment module contract
module "platform_environment" {source        = "../modules/platform-environment"environment   = "production"cluster_name  = "platform-prod"enable_irsa   = trueprivate_cidrs = ["10.42.0.0/16"]}

Key Features#

  • Reusable VPC, IAM, and EKS composition.
  • Shared identity patterns for workloads.
  • GitOps-ready cluster and environment setup.
  • Platform defaults for observability and release visibility.

Media#

A documentation-style system view used to explain environment and rollout structure during onboarding.

Results#

The biggest win was consistency. Teams had a clearer starting point, platform review became easier, and the baseline made it simpler to reason about how services were expected to behave in production.

Outcome

The platform improved not only infrastructure reuse, but the clarity of the operating model around it.

Lessons Learned#

Strong baselines succeed when they are legible. Engineers adopt paved roads faster when the system feels documented, reviewable, and adaptable rather than opaque.

Related Projects

A few additional builds that connect to the same infrastructure, delivery, and reliability themes.

Enterprise AWS Platform Engineering

A production-grade cloud platform built on AWS EKS with Terraform environment isolation, polyglot CI/CD across Node.js, Java, and Rust, GitOps via ArgoCD, and a layered security scanning strategy — end to end.

  • AWS EKS
  • Terraform
  • GitHub Actions
  • ArgoCD
  • Helm
  • Docker
  • ECR
  • Prometheus
  • Grafana

Containerised Application Delivery on AWS ECS

End-to-end deployment of a Node.js frontend and backend on AWS ECS Fargate, automated through a Jenkins CI/CD pipeline and provisioned with Terraform.

  • AWS ECS Fargate
  • Jenkins
  • Terraform
  • Docker
  • ECR

Multi-Region Platform Resilience

A disaster recovery and high-availability architecture across two AWS regions using Route 53 failover, cross-region RDS replication, and automated runbooks for recovery validation.

  • AWS Route 53
  • RDS Multi-Region
  • Terraform
  • CloudWatch
  • Lambda
  • S3