Skip to content
View ohanyere's full-sized avatar

Block or report ohanyere

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ohanyere/README.md

Hi, I’m Francis 👋

Platform Engineer focused on Kubernetes, AWS, and production-grade infrastructure.

I design and build systems that help teams deploy, operate, and recover applications reliably.


🚀 What I Do

  • Build Kubernetes-based platforms on AWS (EKS)
  • Design CI/CD and GitOps workflows (GitHub Actions + ArgoCD)
  • Implement disaster recovery and backup systems
  • Enforce cost control using FinOps practices
  • Analyze cluster efficiency and resource utilization

🧩 Featured Projects

🔹 Cluster Meter (Core Project)

A Kubernetes capacity analysis tool that inspects cluster resource usage and provides actionable recommendations.

Tech: Go, Kubernetes API, Docker, EKS, ArgoCD, GitHub Actions Highlights:

  • CLI + HTTP API for cluster analysis
  • Real-time capacity metrics and pressure detection
  • Rule-based recommendation engine
  • Containerized and deployed via Kubernetes
  • CI pipeline with linting, testing, and security scanning

🔹 EKS Disaster Recovery Platform

A system that simulates failure and restores Kubernetes workloads using Velero and S3-backed backups.

Highlights:

  • Backup and restore of Kubernetes namespaces
  • Failure simulation (namespace deletion)
  • Full recovery validation with live cluster
  • Zero data loss during recovery test

🔹 FinOps Cost Guardrail Pipeline

A CI-based system that prevents expensive infrastructure changes before deployment.

Tech: Terraform, Infracost, GitHub Actions Highlights:

  • Plan-only Terraform pipeline
  • Cost estimation before apply
  • PR-based cost enforcement
  • Multi-environment cost comparison

🔹 Progressive Delivery Demo

Implements canary deployments and rollback strategies using Argo Rollouts.

Highlights:

  • Canary deployment strategy
  • Controlled rollout progression
  • Failure simulation and rollback
  • Kubernetes-native progressive delivery

🛠 Tech Stack

  • Cloud: AWS (EKS, EC2, S3, IAM)
  • Containers: Docker, Kubernetes
  • IaC: Terraform
  • CI/CD: GitHub Actions
  • GitOps: ArgoCD
  • Languages: Go
  • Observability: Prometheus, Grafana

📌 Current Focus

  • Platform engineering for Kubernetes workloads
  • Improving cluster efficiency and cost optimization
  • Building internal developer platforms

📫 Contact

Pinned Loading

  1. aws-platform-infra aws-platform-infra Public

    HCL

  2. scholarship-mvp scholarship-mvp Public

    A production-style Scholarship Platform MVP built with Go (Chi), PostgreSQL, and JWT authentication, featuring user bookmarks, application tracking, and a clean, infrastructure-ready architecture f…

    Go

  3. Cost-Aware-Infrastructure-Deployment-Pipeline Cost-Aware-Infrastructure-Deployment-Pipeline Public

    FinOps cost-aware deployment pipeline using Terraform, Infracost, and GitHub Actions to estimate, diff, and enforce infrastructure costs before deployment.

    HCL

  4. EKS-Disaster-Recovery-Platform EKS-Disaster-Recovery-Platform Public

    EKS disaster recovery platform using Velero, S3 backups, failure simulation, and restore validation to prove Kubernetes workload recovery.

    Shell

  5. kubernetes-cost-guard kubernetes-cost-guard Public

    Kubernetes workload analysis and cost optimization with safe apply, GitOps, and DevSecOps CI/CD.

    Go

  6. cluster-meter cluster-meter Public

    Kubernetes cluster resource analyzer built in Go, deployed on AWS EKS with GitOps (ArgoCD), providing real-time capacity insights, risk classification, and operational recommendations.

    Go