Robert Polasek, ShellScript Developer in Toronto, ON, Canada
Robert Polasek

ShellScript Developer in Toronto, ON, Canada

Member since May 21, 2018
Robert is a senior infrastructure and DevOps engineer with over 20 years of experience in Unix/Linux system administration, server automation, programming, development, storage area networks, networking, and security. In addition, for the past seven years, he has worked as a SAN administrator. Robert is extremely professional and joined Toptal to work on innovative projects with exceptional talents.
Robert is now available for hire

Portfolio

Experience

  • ShellScript, 20 years
  • Linux, 20 years
  • Docker, 8 years
  • Terraform, 8 years
  • Kubernetes, 8 years
  • Jenkins, 5 years
  • Puppet, 3 years
  • Chef, 3 years

Location

Toronto, ON, Canada

Availability

Full-time

Preferred Environment

Linux, Docker, Kubernetes, Jenkins, GitHub, AWS

The most amazing...

...thing I've designed and implemented was a Jenkins CI/CD pipeline using DSL and Groovy scripts.

Employment

  • Devops consultant

    2020 - PRESENT
    Stainless AI
    • Developed infrastructure as a code using terraform with modular approach, deployed infrastructure in Amazon cloud, deployed and debugged all issues.
    • Created local minikube environment to copy AWS cloud environment with local dynamic DNS server, metallb as loadbalancer, external-dns for DNS record updates and cert-manger for auto-provisioning SSL certificates.
    • Deployed certification manager configured with Letsencrypt SSL certificates for DNS domains and their ongoing management.
    Technologies: AWS, terraform, helm, EKS, cert-manager, external-dns, metallb
  • Devops consultant

    2018 - 2020
    IFDS (Internation financial data services)
    • • Design, installation and troubleshooting of Openshift cluster, migration from version 3.4 to 3.11.
    • • Creation of dynamic Jenkins CI/CD pipelines running all the master and worker nodes as containers within Openshift cluster where each stage is represented by its own parametrized docker image tailored for specific purpose, e.g. Nexus for artifact storage and retrieval, Sonarqube for code quality checking, Twistlock for vulnerability scanning, etc.
    • • Design and installation of Hashicorp vault for secret management. Secrets required for applications’ run are retrieved from vault at container start up time and automatically renewed during lifecycle of the application. Designed vault auto configuration script featuring auto unseal upon start up using transit secret from master vault, LDAP configuration for user authentication, initial root token revocation. The vault runs on Openshift as a cluster of API nodes with consul cluster as backend. The initial deployment is fully automated with recovery token being uploaded into master vault. Such vault cluster function separation allows simple segregation of duties where one team has access to recovery secrets but cannot access actual secrets and the other teams can only see subset of secrets.
    • • Health check liveliness and readiness probes development for JBoss cluster (Wildfly) to automate Openshift corrective actions in situations that the node hosting pod is under memory pressure or high load, testing probes using techniques introducing network failures and delays and memory starvation.
    • • Debugging of helm tiller code – identifying issue with security context constraint deployment in Openshift version 3.4.
    • • Built docker images with built-in configuration initialization at start up, e.g. Nexus docker image with groovy scripts to fully initialize configuration upon first start up and retain it on subsequent starts of the same container.
    • • Deployment of helm API to be used as means of deploying helm charts by third party applications.
    • • Implementation of Metallb with dynamic DNS as auto provisioning solution for load balancer on bare metal.
    • • Helm deployment profiling, identifying system bottlenecks during larger deployments.
    • • Openshift performance debugging and profiling, identifying performance bottlenecks on bare metal.
    • • Expansion of Heketi Golang code that handles volume deletion, deleting volume snapshots prior to volume itself.
    • • Installation and configuration of automated Gluster provisioner with Heketi using storage classes based provisioning.
    • • Jfrog artifactory installation and integration with CI/CD pipeline.
    • • Created helm deployment chart for automated storage provisioner to auto-provision storage in Minishift.
    Technologies: Openshift, Minishift, helm, Nexus, metallb, gluster, HashiCorp Vault, Heketi, JBoss, Docker, SonarQube
  • Devops consultant

    2019 - 2019
    2DA Analytics
    • Developed infrastructure as a code using terraform with modular approach, deployed infrastructure in Amazon cloud, performed migration of on-premise resources into cloud and debugged all migration issues in the cloud.
    • Built Hashicorp packer code for OpenVPN AMI with user authentication against AWS accounts.
    • Developed helm charts for containerized version of application running on premise, deployed it to EKS Kubernetes.
    • Deployed OpenVPN into EKS with self-service ca certification authority using corporate central authentication.
    • Deployed certification manager configured with Letsencrypt SSL certificates for DNS domains and their ongoing management.
    Technologies: AWS, terraform, EKS, cert-manager, OpenVPN, external-dns, HashiCorp packer
  • devops consultant

    2019 - 2019
    Spark
    • Development of Grafana dashboards for all containerized environments with intention for dashboards to dynamically scale with the environments without need for any dashboard code changes. Use of templated dashboards as well as boom table panel to achieve the goal.
    • Wrote customized Prometheus queries to retrieve data. Made changes to Prometheus collectors and filters ensuring all relevant data are passed into Grafana.
    • Rancher creation of services, deployment of services, troubleshooting of issues.
    • Made changes to docker images allowing to see host level disk devices and gather their metrices by Prometheus.
    Technologies: grafana, prometheus, rancher
  • DevOps Engineer

    2016 - 2018
    Stagwell Technologies
    • Built, deployed, and managed eight large Kubernetes clusters for development, user acceptance testing (UAT), and production environments with 25 nodes per cluster and load based horizontal autoscaling.
    • Implemented Jenkins as a continuous delivery tool using Groovy, DSL, pipelines, and Kubernetes running Jenkins slaves on demand.
    • Provisioned AWS and Azure services and resources using Terraform (EC2, EBS, S3, VPC, Auto Scaling, Cloud Formation, Elastic Load Balancing, RDS, Route 53, Memcache, Redis, OpsWorks, CloudWatch, CloudTrail, Identity and Access Management (IAM), SQS, Redshift, Lambda Functions, Beanstalk, Batch, Elastic Container Service, Fargate, and Firehose).
    • Migrated VMware servers into AWS and Azure Cloud, using VMware OVF and Hypervisor VHD images.
    • Designed Chef cookbooks to manage configurations and automate the installation process using the OpsWorks framework.
    • Deployed central logging to a Kibana server using Elasticsearch as a storage engine.
    • Built a central monitoring facility using Grafana and Prometheus.
    • Configured a Gluu IAM server as a user authentication gateway for Kubernetes using OpenID.
    • Built a NeoDB database for all the resources in AWS, all the repositories in GitHub, all jobs in Jenkins, and all containers in Kubernetes and their relationships with continuous updates using Mercator code as a framework.
    Technologies: Linux, Docker, Kubernetes, Terraform, Kops, Helm, Hortonworks Hadoop, Jenkins, Elasticsearch, Vault by HashiCorp, Packer, AWS, Azure, Chef, OpenID Connect
  • DevOps Engineer

    2017 - 2017
    TD Bank
    • Developed TOSCA blueprints and also deployed them to OpenStack.
    • Built Jenkins CI/CD pipelines in Groovy to automate code releases and updates of Confluence pages through a REST API.
    • Wrote Python scripts to interact with APIs for automated deployments.
    • Created a JBoss blueprint; also installed, configured and troubleshot JBoss.
    Technologies: OpenStack, TOSCA Blueprints, Jenkins, JBoss, Groovy
  • DevOps Consultant/Architect

    2014 - 2016
    Bank of Montreal
    • Designed, deployed, and configured Red Hat Satellite Server 6 (RHS6) and migrated 670 servers from RHS5 to RHS6.
    • Designed and built a Puppet infrastructure for configuration management of 700+ servers.
    • Created provisioning processes utilizing RHS6 with Puppet and coded supporting build classes and facts.
    • Managed Solaris and Red Hat enterprise servers (700+ servers).
    • Performed a difficult root cause analysis and debugged problems on the level of system library calls.
    Technologies: Puppet, Red Hat, Red Hat Satellite Server, VMware, WebSphere, JBoss
  • Senior Consultant

    2011 - 2013
    Resmor Trust (Royal Bank of Canada)
    • Managed RHEL Linux servers, Hitachi modular storage, Hitachi Virtual Storage Platform (VSP), Brocade FC switches, VMware ESX servers, and F5 load balancers.
    • Designed, installed, and configured Hitachi AMS 2300 and associated SAN components.
    • Built a Kickstart server for automated Linux builds with a PXE boot.
    • Designed and implemented the encapsulation of Oracle RAC cluster into a Linux HA cluster ensuring high availability of all Oracle failover components and ETL applications.
    • Migrated Oracle RAC 11G to a new storage frame.
    Technologies: Red Hat, VMware, Hitachi Storage Array, CFEngine
  • Senior Unix/SAN Consultant

    2009 - 2011
    Intria Items | CIBC
    • Managed Solaris, HP-UX, AIX, and Linux servers (200+ servers).
    • Planned and executed a physical storage migration (25 terabytes) from Montreal to Markham with minimal downtime.
    • Worked on the application design and implementation using virtualization technologies as LDOMs, Solaris zones, and HP VMware.
    • Managed and implemented improvements to cluster technologies such as HP ServiceGuard and Veritas cluster server.
    Technologies: Solaris, AIX, HP-UX, Linux, IBM SAN Storage, Brocade FC Switches, LDOMs, Solaris Zones, HP VMware

Experience

  • A Jenkins Automated Job Creation Framework with Kubernetes Containers as Slaves (Development)

    I designed, coded, and maintained a Jenkins job creation framework using Groovy, DSL, and Jenkins pipelines. The framework allowed easy configuration and deployment of new jobs as well as fast bulk changes of existing jobs. The pipeline incorporated Hashicorp vault as a central secure storage to be used for Jenkins configuration and job builds. Kubernetes containers were used as slaves for builds, where each step of a build process was defined as a docker image, allowing us to easily build on the same source code using different tools or ensure that the versions remain same through the lifecycle of the product.

Skills

  • Tools

    Chef, Puppet, Jenkins, Veritas Cluster Server, AWS ECS, Terraform, Kibana, Grafana, VMware
  • Platforms

    Docker, Linux, Kubernetes, Solaris, AIX, HP-UX, Red Hat OpenShift, Oracle, Azure
  • Other

    Kubernetes Operations (Kops), ShellScript, SCM Engineer, CI/CD pipelines, Autoscaling, Cloud, Networks, Groovy Scripting
  • Languages

    Java, Perl, C, Python, HTML
  • Frameworks

    Hadoop
  • Libraries/APIs

    Jenkins Job DSL
  • Storage

    MySQL, PostgreSQL, Cassandra, Elasticsearch

Education

  • Master's degree in Computers and Electronics
    1989 - 1994
    Brno University of Technology, Department of Computers and Electronics - Brno, Czech Republic
Certifications
  • Hitachi Data Systems Certified Professional
    JANUARY 2012 - PRESENT
    Hitachi
  • Sun Solaris 10 Certified System Administrator
    JANUARY 2008 - PRESENT
    Sun Microsystems
  • Oracle Certified Professional
    JANUARY 2004 - PRESENT
    Oracle
  • Sun Solaris 9 Certified System Administrator
    JANUARY 2004 - PRESENT
    Sun Microsystems
  • HP-UX 11 Certified System Administrator
    JANUARY 2003 - PRESENT
    Hewlett-Packard
  • Check Point Firewall I Administrator
    JANUARY 1999 - PRESENT
    Check Point
  • HP-UX 10.20 Certified System Administrator
    JANUARY 1998 - PRESENT
    Hewlett-Packard

To view more profiles

Join Toptal
I really like this profile
Share it with others