Skip to content

siro-devops/siro-devops

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 

Repository files navigation

Siro Collins

DevOps & Cloud Engineer

I build cloud infrastructure that's secure, observable, and recovers from failure automatically.

AWS · Azure · Kubernetes · Terraform · CI/CD · Chaos Engineering · GitOps · Security


What I build

Area What it looks like in practice
Cloud infrastructure Private S3 + CloudFront delivery, VPC networking, EC2 behind ALB, IAM scoped to least privilege — all in Terraform
CI/CD pipelines GitHub Actions → Jenkins → Docker → Kubernetes. Commit to production in minutes, automated rollback on failure
GitOps ArgoCD watching Git repos automated sync, self-healing, drift correction. No manual kubectl apply
Observability Prometheus + Grafana + Loki stacks with SLOs, error budgets, and burn rate alerts
Incident response Chaos engineering with LitmusChaos, synthetic monitoring with k6, runbooks for every alert
Security Vault secret injection, Trivy CVE scanning, RBAC, network policies, zero hardcoded credentials

Projects

LitmusChaos injects real failures — pod kills, network latency, CPU saturation while Prometheus fires scoped alerts and k6 synthetic traffic measures user impact in real time. Every failure scenario has a documented runbook mapping detection to recovery.

LitmusChaos Prometheus Alertmanager k6 Kubernetes Runbooks


Git is the source of truth. ArgoCD watches the repo and automatically syncs the cluster to match no kubectl apply, no manual deployments. Proved automated sync, self-healing, and drift correction.

ArgoCD Kubernetes GitOps GitHub YAML


Three isolated environments (dev, staging, prod) deployed from a shared VPC module with S3 remote state and versioning. Each environment has its own CIDR range and state file. No hardcoded values anywhere.

Terraform AWS S3 Modules Remote State


Zero hardcoded credentials. Vault agent injects secrets at runtime directly into the pod filesystem. No Kubernetes secrets, no environment variables, no credentials in Git. Scoped policy pod can only read one specific path.

HashiCorp Vault Kubernetes Helm RBAC Least Privilege


Every Docker image scanned for CVEs before it can deploy. Detected CVE-2026-31789 in python:3.9-slim, pipeline blocked automatically. Upgraded base image, pipeline passed. Shift-left security in practice.

Trivy GitHub Actions Docker CVE Shift-left Security


Namespace isolation, least-privilege RBAC, and default-deny network policies. Proved yes/no/no with kubectl auth can-i. Blocked cross-namespace traffic then restored selective access with an allow rule.

Kubernetes RBAC NetworkPolicy Namespace Isolation


99% availability SLO defined, measured, and alerted on in Prometheus. Error budget tracking and multi-window burn rate alerts. Simulated SLO breach and measured error budget consumption in real time.

Prometheus Grafana SLOs Error Budgets Burn Rate Alerts


Full autoscaling cycle proved end to end. CPU spiked above 50% threshold, HPA scaled from 1 to 3 replicas automatically. Load removed, HPA scaled back to 1 after cooldown.

Kubernetes HPA Metrics Server Load Testing


CI/CD pipeline running inside the Kubernetes cluster using Actions Runner Controller. Runner registered with GitHub, picked up jobs and executed them inside the cluster. No secrets leaving the infrastructure.

ARC GitHub Actions Kubernetes cert-manager Ephemeral Runners


Eliminated manual deployments by building an end-to-end pipeline from commit to production in minutes. GitHub Actions triggers the chain Jenkins runs tests, Docker containerises, Kubernetes orchestrates. Zero-downtime with automated rollback.

Jenkins Docker Kubernetes GitHub Actions


Full observability platform so nothing breaks silently. Prometheus scrapes metrics, Loki aggregates logs, Grafana surfaces everything in real-time dashboards deployed on Minikube via Helm.

Kubernetes Prometheus Grafana Loki Helm


Production-grade AWS infrastructure entirely in code. Custom VPC with public and private subnets, EC2 behind ALB, IAM roles scoped to least privilege. Reproducible in any region with a single terraform apply.

Terraform AWS VPC EC2 ALB IAM


Live site auto-deployed via GitHub Actions on every push. The pipeline itself is the demo.

GitHub Actions GitHub Pages CI/CD


Stack

Cloud — AWS (S3, EC2, Lambda, CloudFront, Route 53, IAM, VPC, RDS, CloudWatch, CloudTrail) · Azure (VMs, Blob Storage, AAD, Monitor)

Containers & orchestration — Docker · Kubernetes · Helm · Minikube

IaC & automation — Terraform · Ansible · GitHub Actions · Jenkins · ArgoCD · ARC

Security — HashiCorp Vault · Trivy · RBAC · NetworkPolicy · cert-manager

Observability — Prometheus · Grafana · Loki · Alertmanager · k6 · SLOs

Chaos engineering — LitmusChaos · Runbooks · Synthetic monitoring

Languages — Python · Bash · YAML · HCL


GitHub Stats

Available for

Cloud setup and migration · DevOps audits · Infrastructure-as-code builds · Kubernetes deployments · Security hardening · Ongoing cloud operations on AWS and Azure

📧 collins.siro.c@gmail.com · LinkedIn · 🌐 Portfolio

About

A brief introduction

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors