Keidrych Anton-Oates, Fog Computing Developer in Toowoomba, Queensland, Australia
Keidrych Anton-Oates

Fog Computing Developer in Toowoomba, Queensland, Australia

Member since June 26, 2019
Along with empowering organizations to optimize speed, scale, and margin via Foggy Cloud structures with zero impact on production systems, Keidrych's worked in containerization since 2013. He's recently ranked in the top ten for containerization at TechCrunch USA 2018 due to his work: authoring Cyvive (an operational and governance platform for Kubernetes) and implementing an open-source microservice configuration language.
Keidrych is now available for hire


  • Virgin Australia
    Amazon Web Services (AWS), Ansible, SonarQube, Unix, Node.js, Java...
  • Cyvive
    Amazon Web Services (AWS), Nomad, Consul, HashiCorp, VMware, Alpine Linux, Go...
  • Max Gaming (Tatts Australia)
    Amazon Web Services (AWS), Istio, Go, MongoDB, Google Cloud Platform (GCP)...



Toowoomba, Queensland, Australia



Preferred Environment

Cloud, Unix, Vim Text Editor, Linux, IT Security, Kubernetes, Google Cloud Platform (GCP), AWS, IBM SoftLayer, Azure

The most amazing...

...thing I’ve built was a universal microservice configuration language and enterprise platform for Kubernetes enabling the operational design of immutable change.


  • Foggy Cloud Architect

    2018 - 2019
    Virgin Australia
    • Chose Node.js to the primary language choice for cloud architected services.
    • Built a cloud-agnostic starter kit ( enabling 100% code coverage and a 250% increase in development speed.
    • Enabled zero-impact deployments via a microservice-optimized internal and external service backward compatibility.
    • Upgraded the system to a more container-aware security type of technology.
    • Ensured PII and PCI compliance against practices.
    • Developed secure containers via a just-enough-operating system (JeOS) for development and production environments.
    • Implemented centralized logging via the establishment of a common log format.
    • Established autonomic environments for developers and continuous integration and production lines via Nix.
    • Implemented Kubernetes as an orchestrator.
    • Reduced cluster operating costs by 20% and container image download time by 90% via a graph-based popularity contest for Nix container layers.
    Technologies: Amazon Web Services (AWS), Ansible, SonarQube, Unix, Node.js, Java, Kubernetes, Containers, Windows, AWS, VMware
  • Foggy Cloud Architect

    2018 - 2019
    • Managed microservice dependency so that any part of an organization dependency tree could be extracted and developed against in development (private or shared).
    • Implemented a just-enough-Linux (JeOS) approach for a host operating system via LinuxKit.
    • Isolated Kubernetes and system workloads against degradation through Built microservices to be able to move between geographically dispersed data centers seamlessly.
    • Worked on security enhancements such as removal of TTY and SSH removed from modes as it was unnecessary in IaaC, KataContainers for VM Isolation, and transparent node to node encryption so that developers could safely use HTTP for microservices.
    • Implemented multi-cluster and namespace networking isolation with automatic healing and resizing of the control plane.
    • Implemented shadow traffic replication for production-like environments following the process from production to its resulting performance. This enabled defect detection prior to a true production release.
    • Provided on-demand AZ or instance-type upgrade options; companies also chose when to upgrade their cloud while enabling one human operator per cloud for unlimited clusters.
    • Constructed an infrastructure on demand for all environments (namespaces) as a per-hour-billing solution.
    Technologies: Amazon Web Services (AWS), Nomad, Consul, HashiCorp, VMware, Alpine Linux, Go, Node.js, GRAPH, Governance, Continuous Delivery (CD), Metal, Google Cloud Platform (GCP), AWS, Unix, Kubernetes
  • Foggy Cloud Architect

    2017 - 2018
    Max Gaming (Tatts Australia)
    • Built disposable developer environments on-demand with sample data and microservice dependency management via Cyvive.
    • Uplifted to container-aware security technology.
    • Conducted education sessions where we deep dove into Kubernetes and containerization vulnerabilities and how to secure them.
    • Replaced HashiCorp Vault with GitOps friendly secret encryption for public repositories via a provider key management system.
    • Handled a hybrid multi-cloud implementation of Kubernetes spanning multiple on-premises data centers and AWS regions. As disaster recovery and business continuity were a critical concern of Max Gaming, it was necessary to prove applications are capable of continued operation despite cloud provider or region failure.
    • Lessened in-cluster data redundancy with S3 incremental synchronization.
    • Implemented IaaC via Terraform controlled provision for AWS and GCP with all security hardening, networking, and network optimizations enabled.
    • Replaced Istio with Cilium, a more secure IPv6 compatible hybrid-cloud alternative.
    Technologies: Amazon Web Services (AWS), Istio, Go, MongoDB, Google Cloud Platform (GCP), AWS, Linux, Terraform, Kubernetes, Node.js
  • Foggy Cloud Architect

    2017 - 2017
    Cook Medical
    • Fulfilled the needs of globally distributed manufacturing facilities (which were operating on various clouds) by transparently stitching them together—ensuring microservice reallocation and service discovery.
    • Chose and integrated HashiCrop's Consul along with technology from eBay which ensured a global datacenter-aware service discovery approach with dynamic bridging tunnels automatically established between Kubernetes clusters.
    Technologies: Amazon Web Services (AWS), Consul, Kubernetes, Metal, AWS, Google Cloud Platform (GCP), Azure
  • Foggy Cloud Architect

    2017 - 2017
    Flight Centre
    • Developed stateful services that were available in-cluster 12 months ahead of any kind of official Kubernetes support.
    • Established disposable developer environments on-demand with sample data and microservice-dependency management via Cyvive.
    • Upgraded to more container-aware security technology type.
    • Approved CoreOS as a suitable container host operating system.
    • Implemented GitOps friendly secret encryption for public repositories via a provider key management System.
    • Created an SM, PCI, & PII compliance-directed design, enabling a reduction in external audit frequency.
    • Installed clusters and all applications started within 60 minutes, enabling for the first time a fixed cost for disaster recovery.
    • Implemented IaaC via a Terraform controlled provision for AWS and GCP with all security hardening, networking, and network optimizations enabled.
    • Pioneered the concept of production and everything else via namespace isolation which reduced the infrastructure operating costs by 50% without sacrificing security or compliance.
    Technologies: Amazon Web Services (AWS), JBoss Infinispan, Go, Linux, Bash, Kubernetes, AWS, Java
  • Foggy Cloud Architect

    2016 - 2016
    Vodafone Hutchinson, ING Direct, and National Australia Bank
    • Implemented operating system and application level automation without rooting mobile devices.
    • Integrated CI/CD with existing toolsets.
    • Incorporated co-located data-centers with the telecommunication equipment and bank-level security.
    • Implemented VPN capabilities as required on mobile devices.
    • Constructed on-demand tunnels between the cloud providers and a device data center.
    Technologies: Amazon Web Services (AWS), AWS, Metal
  • Foggy Cloud Architect

    2014 - 2016
    Containerized WordPress Hosting
    • Rearchitected WordPress from its legacy status to be 12-factor compliant—enabling native container adoption and the core performance necessary to run as the platforms scale.
    • Automated the detection of real users vs spambots for registration, which increased the business value of clients websites and reduced overhead costs of contacting many false users.
    • Prevented zero-day exploits—which are frequent and of strong concern in WordPress—by having a fully automatic daily production release testing and deployment system for all client websites so that the client brand's reputation was maintained.
    • Secure websites against hacking, including actively attacked client websites.
    • Advocated early on for the adoption of containerization, entire infrastructure from CI to CD-used containers.
    • Empowered individual websites on the cluster to be able to handle 1 billion hits per month without caching; the most complex running up to 160,000 lines of PHP code on 512 MB servers.
    Technologies: Amazon Web Services (AWS), GlusterFS, Consul, MySQL, SQLite, PHP, WordPress, Kubernetes, Linux, AWS, Metal, Docker


  • Cyvive

    Cloud-Native Computing Foundation (CNCF) in advanced implementations (enterprise) assumes that companies have well-established CI approaches following GitOps while requiring IaaC, CD, microservice governance, and Kubernetes to operate as a data-center replacement.

    Cyvive enables microservice governance and CD to be implemented in any Kubernetes installation or to upgrade and optimize cloud providers to enable Kubernetes as a data-center replacement.

  • Sotekton: Agnostic Development

    Cloud-Native Computing Foundation (CNCF) lays a path for the architecture provided and is supported by graduate projects such as Kubernetes.

    Developing software that conforms to these architecture best principles, and leverages the advantage of the entire supporting ecosystem is challenging using the usual development approaches, i.e., broadcast and multicast are unavailable.

    Agnostic outlines a raw minimal starting point following best practices to maintain backward compatibility with external and internal microservices while ensuring microservices behave like good citizens in CNCF environments.

  • Anonymous User Tracking Over Multiple Devices and Multichannel Attribution

    Anonymous users visit websites every day, yet companies are forced to present non-personalized content to them. I developed a machine learning approach to track and identify anonymous users against demographics identifying the same user (with a high degree of confidence) on multiple devices and from any of the attribution channels.

    The system was self-validating using the feedback of converted users to validate and correct the machine learning models daily.

  • Foggy Ubiquity's Language

    Microservice dependency, configuration, and secret management were nonexistent at the time; a few isolated approaches existed but nothing with permanence.

    Partnering with three universities and 35 industry publications, I created and open-sourced a universal microservice language using machine learning.

  • Containizen

    These are maximum security minimal footprint base image/language containers.

    It has over 500,000 downloads from February to May 2020, Currently, it is the most secure, CI/CD compatible and update optimized base container available.

  • Automated Registration DDoS Protection

    This is a machine registration endpoint with no prior traffic should automatically register new machine users while being able to resist port scanning and DDoS attacks while maintaining cost by not triggering auto-scale events for false traffic.


  • Languages

    JavaScript, Nim, Bash, Java, Go, PHP, Python
  • Frameworks

    Fastify, Metal
  • Libraries/APIs

    Node.js, API Development, Jenkins Pipeline, Terragrunt
  • Tools

    Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), PHP-FPM, Amazon ECR (Amazon Elastic Container Registry), Amazon EKS, Terraform, Helm, GitHub, Hashistack, HashiCorp, GitLab CI/CD, Jenkins, AWS CloudFormation, AWS CLI, Logging, NGINX, Vim Text Editor, SonarQube, Istio, ELK (Elastic Stack), VMware, Apache Tomcat, SaltStack, Ansible, Travis CI, AWS CloudTrail, Amazon CloudWatch, RabbitMQ, AWS IAM, Codeship
  • Paradigms

    DevOps, Azure DevOps, Agile, Microservices, Microservices Architecture, Continuous Integration (CI), Continuous Development (CD), Continuous Delivery (CD), DevSecOps, Serverless Architecture, API Architecture
  • Platforms

    Kubernetes, Cloud Native, WordPress, Docker, Google Cloud Platform (GCP), Linux, Amazon Web Services (AWS), Azure, Linux RHEL/CentOS, Red Hat Linux, Ubuntu Linux, Unix, Alpine Linux, Windows, Xen
  • Industry Expertise

    IT Security
  • Storage

    Redis, Google Cloud SQL, MySQL Clustering, MongoDB, Alibaba Cloud, SQLite, ArangoDB, Amazon S3 (AWS S3), Google Cloud Storage, PostgreSQL, JBoss Infinispan, MySQL, CockroachDB, GlusterFS, Elasticsearch
  • Other

    CNCF, Zero Trust, Network Security Monitoring, Cilium, CNCF Security, Elastic Load Balancers, Google Cloud Build, LinuxKit, Containerization, Container Orchestration, Secure Containers, Google Container Engine, AWS DevOps, Code Coverage, Cloud Storage, Data Management, Content Delivery Networks (CDN), Domain Name System (DNS), Containerd, RESTful Microservices, Consul, Fog Computing, Data Architecture, Code Architecture, NixOS, Content Management Systems (CMS), Build Pipelines, Operations, Clustering, Security Architecture, Kata Containers, Amazon Route 53, Caching, Software Development, Containers, SPIFFE/SPIRE, Open Policy Agent, Pomerium, Kubernetes Operations (Kops), Artificial Intelligence (AI), Network Stack, High Availability Disaster Recovery (HADR), Business Continuity & Disaster Recovery (BCDR), Virtual Machines, Serverless, Prometheus, System Administration, Cloud, AWS, Governance, GRAPH, Nomad, IBM SoftLayer


  • ATM-G & CL in Public Speaking & Leadership
    2000 - 2006
    Toastmasters International - Colorado, USA
  • Bachelors of Engineering (Infomechatronics) in Mechanical, Electrical & Information Technology Engineering
    2000 - 2003
    Queensland Institute of Technology (QUT) - Brisbane, Australia
  • Advanced Placement Scholar in Biology
    1999 - 1999
    Princeton University - New Jersey, USA

To view more profiles

Join Toptal
Share it with others