Robert Polasek, DevOps Engineer and Developer in Toronto, ON, Canada
Robert Polasek

DevOps Engineer and Developer in Toronto, ON, Canada

Member since May 21, 2018
Robert is a senior infrastructure and DevOps engineer with over 20 years of experience in Unix/Linux system administration, server automation, programming, development, storage area networks, networking, and security. In addition, for the past seven years, he has worked as a SAN administrator. Robert is exceptionally professional and joined Toptal to work on innovative projects with exceptional talents.
Robert is now available for hire

Portfolio

Experience

Location

Toronto, ON, Canada

Availability

Part-time

Preferred Environment

Amazon Web Services (AWS), Kubernetes, Docker, Linux, Containers, OpenShift, Azure, Google Cloud Platform (GCP), Helm, Terraform

The most amazing...

...thing I've developed is a custom Kubernetes controller for interaction between Kubernetes services and Cloudflare API in Go.

Employment

  • Devops consultant

    2020 - 2022
    St. Jude Children's Research Hospital
    • Developed IaaC using Terragrunt with Terraform while applying a fully modularized approach and keeping code DRY. Deployed terraform operator for integrated deployment of application components that are not part of Kubernetes. Modified operator code.
    • Designed and deployed Nginx ingress controller with ModSecurity WAF module. Created automation gathering data that updated blacklists from internet vendors and applied those to the running configuration. Used Reloader to perform the rolling update.
    • Developed Azure NodeJs function to transfer Kubernetes control plane logs to Splunk through Fluentd while augmenting them with additional information and tags.
    • Developed CI/CD pipeline using Tekton pipelines while using the Lighthouse as a Github webhook and git chat operator. Extended the Lighthouse code to utilize Kustomize for provisioning and customizing source code versioned pipelines.
    • Implemented Oauth2 authentication and authorization for services running inside Kubernetes using Oauth2-proxy.
    • Developed Cloudflare controller, which maintained configuration of Argo tunnels between Cloudflare and Kubernetes clusters based on Ingress resource annotations.
    • Developed a central operations dashboard in Splunk governing Kubernetes and Azure resources.
    • Developed the helm chart unit test while utilizing test hooks for automated helm deployment testing.
    • Built and maintained CI/CD pipelines using Github actions. Deployed Keel operator as a tool for CD deployment from Github to Kubernetes.
    • Built JenkinsX CI/CD pipeline for container builds and deployments with a GitOps controlled pipeline following devops best practices.
    Technologies: Kubernetes, Helm, Terraform, Go, Azure, AWS, Terragrunt, Web Application Firewall (WAF), GitHub API, Jenkins, Argo CD, Azure Kubernetes Service (AKS), OAuth 2, DevOps, PostgreSQL, Cloud, GitHub, Networks, Autoscaling, HTML, Infrastructure, Containerization, Networking, Database Management, Monitoring
  • DevOps Consultant

    2020 - 2020
    Rhithm, Inc.
    • Developed an infrastructure as a code using Terragrunt with Terraform while applying a fully modularized approach. Built networking infrastructure, EKS (Kubernetes) clusters, and relational databases in AWS as a code.
    • Developed and deployed Helm charts to Kubernetes using Helmfile as a declarative configuration for deploying distributions of Helm charts while adhering to 12-factor application principles.
    • Containerized the application. Deployed infrastructure containers as an external DNS, used cert-manager and Ingress Controller to automate DNS name registration, and created auto SSL certificate provisioning and assigned them to external endpoints.
    • Load-tested the application with JMeter using different scenarios, ensuring that it met the requirements for a number of concurrent users performing various workflows. Worked with developers to identify and address bottlenecks.
    • Developed CI/CD pipelines using serverless Jenkins X controlled by a GitOps build. Deployed in Cloud Native.
    Technologies: GitLab CI/CD, Microsoft SQL Server, Apache JMeter, Helm, AWS Cloud Computing Services, Terraform, Terragrunt, PostgreSQL, Cloud, AWS Certificate Manager, GitHub, Networks, AWS ECS, Infrastructure, Containerization
  • DevOps Consultant

    2020 - 2020
    Stainless AI
    • Developed infrastructure as code using Terraform combining third-party modules with client-specific code. Deployed the infrastructure in the Amazon cloud, debugged all issues, and wrote the deployment documentation.
    • Developed a Python script to automate the input value file build and a Terraform module and workspace initialization.
    • Created a local Minikube environment to imitate the AWS cloud environment with a local dynamic DNS server.
    • Used MetalLB as the load balancer, an external DNS for DNS record updates, and cert-manager for auto-provisioning SSL certificates to deploy Helm chart to the cloud and locally.
    • Built Helm charts for the deployment of Kubernetes services as an EFS persistent volume provisioner, Ingress Controller, external DNS, as well as charts for JupyterHub and client-specific services interconnected with JupyterHub.
    • Deployed a certification manager configured with Let's Encrypt SSL certificates for DNS domains and their ongoing management.
    Technologies: CI/CD Pipelines, Python, Amazon Web Services (AWS), DNS, Amazon EKS, Helm, Terraform, AWS, Cloud, AWS Certificate Manager, GitHub, Networks, PostgreSQL, Infrastructure, Containerization, Networking
  • DevOps Consultant

    2019 - 2020
    Helpful Human
    • Developed Terraform code for a Kubernetes infrastructure build. Managed it using Kops for Kubernetes. Debugged issues and integrated Kubernetes with ECR and Amazon Route 53.
    • Designed a Helm chart and created an in-house built application using Golang. Debugged and troubleshot gRPC.
    • Developed Helm charts for infrastructure services inside Kubernetes for dynamic DNS names in Amazon Route 53. Created an SSL certificate on demand for Ingress endpoints and a persistent volume controller for EFS and Ingress Controller.
    • Built a Jenkins X CI/CD pipeline for container builds and deployments with a GitOps-controlled pipeline.
    • Troubleshot Istio installation and Istio upgrade to the latest version.
    Technologies: Amazon Web Services (AWS), Jenkins, OpenVPN, AWS Certificate Manager, Amazon EKS, Terraform, AWS, Istio, PostgreSQL, Cloud, GitHub, Networks, Autoscaling, Infrastructure, Containerization, Networking
  • DevOps Consultant

    2018 - 2020
    International Financial Data Services (IFDS)
    • Designed, installed, and troubleshot RedHat OpenShift cluster, migration from version 3.4 to 3.11.
    • Created dynamic Jenkins CI/CD pipelines running all the master and worker nodes as containers within an OpenShift cluster where each stage was represented by its own parameterized docker image tailored for a specific purpose.
    • Designed and installed Hashicorp vault for secret management. Secrets required for running the application are retrieved from a vault at a container's startup time and automatically renewed during the application's lifecycle.
    • Developed health check liveliness and readiness probes for a JBoss cluster (Wildfly) to automate OpenShift corrective actions when the node hosting pod is under memory pressure or high load, tested probes by introducing network failures.
    • Debugged Helm tiller code—identifying issues with security context constraint deployment in RedHat OpenShift version 3.4.
    • Built Docker images with built-in configuration initialization at startup, EGM Nexus docker image with Groovy scripts to fully initialize configuration upon the first startup and retain it on subsequent starts of the same container.
    • Deployed a Helm API to be used as means of deploying helm charts by third-party applications. Expanded Heketi Go code that handles volume deletion, deleting volume snapshots prior to the volume itself.
    • Implemented MetalLB with dynamic DNS as the auto-provisioning solution for load balancer on bare metal.
    • Implemented Helm deployment profiling, identifying system bottlenecks during larger deployments. Debugged and profiled OpenShift performance by identifying performance bottlenecks on bare metal.
    • Created a Helm deployment chart for automated storage provisioner to auto-provision storage in Minishift. Installed and configured an automated Gluster provisioner with Heketi using storage classes based provisioning.
    Technologies: CI/CD Pipelines, Red Hat OpenShift, SonarQube, Docker, JBoss, Vault, HashiCorp, GlusterFS, Nexus, Helm, OpenShift, DevOps, Java, Networks, PostgreSQL, Infrastructure, Containerization, Networking, Ansible, Database Management
  • DevOps Consultant

    2019 - 2019
    2DA Analytics
    • Developed infrastructure as a code using Terraform with a modular approach, deployed infrastructure in Amazon cloud, performed migration of on-premise resources into the cloud and debugged all migration issues in the cloud.
    • Built Hashicorp packer code for OpenVPN AMI with user authentication against AWS accounts.
    • Developed Helm charts for the containerized version of the application running on-premise, deployed it to EKS Kubernetes.
    • Deployed OpenVPN into EKS with self-service ca certification authority using corporate central authentication.
    • Deployed a certification manager configured with Let's Encrypt SSL certificates for DNS domains and their ongoing management.
    Technologies: Amazon Web Services (AWS), Packer, HashiCorp, DNS, OpenVPN, Amazon EKS, Terraform, AWS, Cloud, Networks, MySQL, PostgreSQL, Infrastructure, Containerization
  • DevOps Consultant

    2019 - 2019
    Spark
    • Developed Grafana dashboards for all containerized environments with the intention for dashboards to dynamically scale with the environments without the need for any dashboard code changes. Used templated dashboards as well as boom table panels.
    • Wrote customized Prometheus queries to retrieve data. Made changes to Prometheus collectors and filters, ensuring all relevant data are passed into Grafana.
    • Handled the Rancher creation of services, deployment of services, and troubleshooting of issues.
    • Made changes to Docker images allowing to see host-level disk devices and gather their metrics by Prometheus.
    Technologies: Microsoft SQL Server, Rancher, Prometheus, Grafana, Cloud, GitHub, Kibana, Infrastructure, Monitoring
  • DevOps Engineer

    2016 - 2018
    Stagwell Technologies
    • Built, deployed, and managed eight large Kubernetes clusters for development, user acceptance testing (UAT), and production environments with 25 nodes per cluster and load-based horizontal autoscaling.
    • Implemented Jenkins as a continuous delivery tool using Groovy, DSL, pipelines, and Kubernetes running Jenkins slaves on demand.
    • Provisioned AWS and Azure services and resources using Terraform: EC2, EBS, S3, VPC, Auto Scaling, Cloud Formation, Elastic Load Balancing, RDS, Route 53, Memcache, Redis, OpsWorks, CloudWatch, CloudTrail, Identity and Access Management (IAM).
    • Provisioned AWS and Azure services and resources using Terraform: SQS, Redshift, Lambda Functions, Beanstalk, Batch, Elastic Container Service, Fargate, and Firehose.
    • Migrated VMware servers into AWS and Azure Cloud, using VMware OVF and Hypervisor VHD images.
    • Designed Chef cookbooks to manage configurations and automate the installation process using the OpsWorks framework.
    • Build resources on GCP to utilize machine learning capabilities of the platform.
    • Deployed central logging to a Kibana server using Elasticsearch as a storage engine.
    • Configured a Gluu IAM server as a user authentication gateway for Kubernetes using OpenID.
    • Built a NeoDB database for all the resources in AWS, all the repositories in GitHub, all jobs in Jenkins, and all containers in Kubernetes and their relationships with continuous updates using Mercator code as a framework.
    Technologies: GitLab CI/CD, Microsoft SQL Server, Python, Google Cloud Platform (GCP), Amazon Web Services (AWS), OpenID, Chef, Azure, AWS, Packer, HashiCorp, Vault, Elasticsearch, Jenkins, Hortonworks Data Platform (HDP), Hadoop, Helm, Kubernetes Operations (Kops), Terraform, Kubernetes, Docker, Linux, DevOps, PostgreSQL, Cloud, MySQL, Cassandra, GitHub, Networks, Groovy Scripting, Kibana, Autoscaling, HTML, Google Kubernetes Engine (GKE), C, Infrastructure, Containerization, Networking, Ansible, Database Management, Monitoring
  • DevOps Engineer

    2017 - 2017
    TD Bank
    • Developed TOSCA blueprints and also deployed them to OpenStack.
    • Built Jenkins CI/CD pipelines in Groovy to automate code releases and updates of Confluence pages through a REST API.
    • Wrote Python scripts to interact with APIs for automated deployments.
    • Created a JBoss blueprint; also installed, configured and troubleshot JBoss.
    Technologies: GitLab CI/CD, Microsoft SQL Server, Python, Groovy, JBoss, Jenkins, Blueprint, OpenStack, DevOps, Java, Networks, Infrastructure, Containerization, Networking
  • DevOps Consultant | Architect

    2014 - 2016
    Bank of Montreal
    • Designed, deployed, and configured Red Hat Satellite Server 6 (RHS6) and migrated 670 servers from RHS5 to RHS6.
    • Designed and built a Puppet infrastructure for configuration management of 700+ servers.
    • Created provisioning processes utilizing RHS6 with Puppet and coded supporting build classes and facts.
    • Managed Solaris and Red Hat enterprise servers (700+ servers).
    • Performed a difficult root cause analysis and debugged problems on the level of system library calls.
    Technologies: Microsoft SQL Server, Red Hat OpenShift, JBoss, WebSphere, VMware, Red Hat Satellite, Red Hat Linux, Puppet, Java, Oracle, Networks, Networking, Monitoring
  • Senior Consultant

    2011 - 2013
    Resmor Trust (Royal Bank of Canada)
    • Managed RHEL Linux servers, Hitachi modular storage, Hitachi Virtual Storage Platform (VSP), Brocade FC switches, VMware ESX servers, and F5 load balancers.
    • Designed, installed, and configured Hitachi AMS 2300 and associated SAN components.
    • Built a Kickstart server for automated Linux builds with a PXE boot.
    • Designed and implemented the encapsulation of Oracle RAC cluster into a Linux HA cluster ensuring high availability of all Oracle failover components and ETL applications.
    • Migrated Oracle RAC 11G to a new Hitachi storage frame.
    Technologies: Microsoft SQL Server, CFEngine, Hitachi HPLC, VMware, Red Hat Linux, Networks, Infrastructure, Networking, Database Management, Monitoring
  • Senior Unix, SAN Consultant

    2009 - 2011
    Intria Items | CIBC
    • Managed Solaris, HP-UX, AIX, and Linux servers (200+ servers).
    • Planned and executed a physical storage migration (25 terabytes) from Montreal to Markham with minimal downtime.
    • Worked on the application design and implementation using virtualization technologies as LDOMs, Solaris zones, and HP VMware.
    • Managed and implemented improvements to cluster technologies such as HP ServiceGuard and Veritas cluster server.
    Technologies: Microsoft SQL Server, VMware, LDoms, SAN Switches, SAN Brocade, IBM SAN, Storage, Linux, HP-UX, AIX, Solaris, Perl, Oracle, Veritas Cluster Server, Networks, Infrastructure, Networking, Monitoring

Experience

  • Cloudflare Controller for Kubernetes

    I developed a Cloudflare controller, which maintained the configuration of Argo tunnels between Cloudflare and Kubernetes clusters based on ingress resource annotations. The motivation behind the development was to ensure a fully automated process of provisioning applications into Kubernetes. Without the controller, every time a new application was provisioned, somebody would need to go in and manually enable a new application in Cloudflare. This was very useful for CI/CD pipeline previews, which generated a new application a couple of times a day and allowed developers to see changes instantly. The controller was written in Go and deployed as a helm chart.

  • Streamlined Application Deployment to Kubernetes

    I designed and implemented streamlined application deployment to Kubernetes, where any external Cloud resource dependencies were auto-deployed as a part of deployment using Terraform operator and Terraform code. Helm chart deployed workspace CRDs into Kubernetes, and those were picked up by the operator and executed against cloud API. Once completed, outputs were brought back to Kubernetes to be consumed by the application itself for its configuration.

  • A Jenkins Automated Job Creation Framework with Kubernetes Containers as Slaves

    I designed, coded, and maintained a Jenkins job creation framework using Groovy, DSL, and Jenkins pipelines. The framework allowed easy configuration and deployment of new jobs and fast bulk changes of existing jobs. The pipeline incorporated the Hashicorp vault as central, secure storage for Jenkins configuration and job builds. Kubernetes containers were used as slaves for builds. Each step of a build process was defined as a Docker image, allowing us to easily build on the same source code using different tools or ensure that the versions remain the same through the product's lifecycle.

Skills

  • Libraries/APIs

    Terragrunt, Jenkins Job DSL, OpenID, GitHub API
  • Tools

    Helm, Terraform, Chef, Puppet, Jenkins, Veritas Cluster Server, AWS ECS, GitLab CI/CD, Azure Kubernetes Service (AKS), Vault, Amazon EKS, OpenVPN, Kibana, Grafana, VMware, Google Kubernetes Engine (GKE), GitHub, HashiCorp, Packer, Red Hat Satellite, Hitachi HPLC, SonarQube, Apache JMeter, Istio, Ansible
  • Paradigms

    DevOps
  • Platforms

    Docker, Linux, Kubernetes, Solaris, HP-UX, Azure, Amazon Web Services (AWS), Red Hat Linux, OpenShift, Oracle, Red Hat OpenShift, Google Cloud Platform (GCP), Hortonworks Data Platform (HDP), WebSphere, JBoss, OpenStack, Rancher, Nexus, AWS Cloud Computing Services, AIX
  • Other

    AWS, DNS, CI/CD Pipelines, Kubernetes Operations (Kops), Autoscaling, Containers, Infrastructure, Containerization, Cloud, Networks, Groovy Scripting, Networking, Monitoring, Storage, IBM SAN, SAN Brocade, SAN Switches, LDoms, Prometheus, AWS Certificate Manager, Web Application Firewall (WAF), Argo CD
  • Languages

    Java, Perl, C, Python, Groovy, HTML, Go
  • Frameworks

    Hadoop, CFEngine, Blueprint, OAuth 2
  • Storage

    MySQL, PostgreSQL, Database Management, GlusterFS, Cassandra, Elasticsearch

Education

  • Master's Degree in Computers and Electronics
    1989 - 1994
    Brno University of Technology, Department of Computers and Electronics - Brno, Czech Republic

Certifications

  • Certified Kubernetes Security Specialist
    JANUARY 2022 - PRESENT
    Cloud Native Computing Foundation
  • Certified Kubernetes Administrator
    JANUARY 2022 - PRESENT
    Cloud Native Computing Foundation
  • Hitachi Data Systems Certified Professional
    JANUARY 2012 - PRESENT
    Hitachi
  • Sun Solaris 10 Certified System Administrator
    JANUARY 2008 - PRESENT
    Sun Microsystems
  • Oracle Certified Professional
    JANUARY 2004 - PRESENT
    Oracle
  • Sun Solaris 9 Certified System Administrator
    JANUARY 2004 - PRESENT
    Sun Microsystems
  • HP-UX 11 Certified System Administrator
    JANUARY 2003 - PRESENT
    Hewlett-Packard
  • Check Point Firewall I Administrator
    JANUARY 1999 - PRESENT
    Check Point
  • HP-UX 10.20 Certified System Administrator
    JANUARY 1998 - PRESENT
    Hewlett-Packard

To view more profiles

Join Toptal
Share it with others