I build production-style AWS platforms using Terraform, GitHub Actions, and strong automation patterns focused on reliability, cost-efficiency, and clean infrastructure design.
My focus:
- AWS infrastructure as code (Terraform, remote state, policy-as-code)
- CI/CD pipelines with GitHub Actions and OIDC (no long-lived AWS keys)
- Scale-to-zero patterns (wake on demand, auto-sleep when idle)
- Education-quality demos that look and feel like real production systems
- Cloud (AWS): EC2, ECS Fargate, Lambda, API Gateway, RDS, DynamoDB, S3, CloudFront, Route 53, Amazon Location, SageMaker
- Infrastructure as Code: Terraform (remote state, two-stage backend, modules, policy-as-code), tflint / tfsec / checkov
- CI/CD: GitHub Actions (OIDC authentication, plan/apply pipelines, zero-secrets workflows)
- Containers & Orchestration: Docker, ECS Fargate, k3s, Kubernetes fundamentals, Helm
- Automation Patterns: Wake/sleep workflows, idle reapers, scale-to-zero architecture
- Observability & Ops: CloudWatch, structured logging, basic SLOs, runbooks, dashboards
Repo: https://github.com/rusets/aws-multi-tier-infra
A full 3-tier production-style web stack on AWS with:
- VPC, ALB, EC2 application tier
- RDS MySQL in private subnets (no public exposure)
- S3 + CloudFront for static assets
- Wake-on-demand (Lambda → GitHub Actions → Terraform Apply)
- Idle reaper that auto-destroys the stack when unused
- Remote state backend (S3 + DynamoDB lock table)
- GitHub Actions OIDC for zero-secret CI/CD
Purpose: demonstrate a real-world AWS architecture with secure networking, automation, and intelligent cost control.
Repo: https://github.com/rusets/helmkube-autowake-cicd
A compact k3s cluster on EC2, fully automated through Terraform and GitHub Actions:
- k3s node bootstrap via user data + SSM
- Helm-driven app deployment from CI/CD
- Prometheus + Grafana monitoring stack deployed automatically
- Wake/sleep automation to eliminate idle costs
- OIDC authentication (no AWS keys)
- Remote state, IAM roles, monitoring, and bootstrap scripts
Purpose: demonstrate Kubernetes fundamentals on AWS with a full GitHub→Terraform→Helm pipeline, including real observability (Prometheus metrics + Grafana dashboards).
Repo: https://github.com/rusets/docker-ecs-deployment
ECS Fargate–based demo for running a containerized app with:
- GitHub Actions CI/CD (build → push to ECR → deploy to ECS)
- On-demand provisioning via Lambda + EventBridge
- Terraform-managed VPC, security groups, IAM, tasks, services
- Remote state + OIDC (no long-lived AWS keys)
Purpose: show when ECS Fargate is the simpler alternative to Kubernetes for small, cost-efficient demo platforms.
Repo: https://github.com/rusets/ml-sagemaker-serverless
End-to-end ML inference pipeline on AWS using:
- SageMaker Serverless for zero-maintenance model hosting
- Lambda + API Gateway for a clean HTTP prediction API
- Static UI on S3/CloudFront (image upload → prediction result)
- Terraform for all infrastructure (IAM, API, buckets, hosting)
- Keyless CI/CD pipeline (GitHub Actions → AWS OIDC)
Purpose: demonstrate how to take an ML model and expose it as a production-style, fully serverless inference API.
Repo: https://github.com/rusets/CI-CD-Pipeline-for-Application-Deployment
A CI/CD-centric demo showing how to deploy a web app to EC2 with:
- GitHub Actions pipelines (build → test → Terraform plan/apply)
- Wake/sleep automation for cost-optimized EC2 usage
- CloudWatch dashboards + alarms
- Separate Terraform stack for wake/status Lambdas and API Gateway
- Remote state + OIDC authentication (no AWS keys)
Purpose: highlight clean CI/CD design, infra/app separation, and efficient EC2-based deployment pipelines.
Repo: https://github.com/rusets/ridebot-infra
A fully serverless backend for a Telegram-based ride/transport bot using:
- API Gateway + Lambda (event-driven HTTP backend)
- DynamoDB for request state
- Amazon Location Service for geolocation
- Terraform-managed IAM, routing, and infra configuration
Purpose: demonstrate event-driven design, chat-platform integration, and a pure pay-per-use serverless architecture.
Repo: https://github.com/rusets/rusets-portfolio
Infrastructure for my own portfolio website https://rusets.com, using:
- S3 (private) + CloudFront (OAC)
- Route 53 + ACM (DNS validation)
- GitHub Actions OIDC for fully keyless CI/CD
Purpose: secure, low-maintenance, production-style static hosting fully automated via Terraform.
Repo: https://github.com/rusets/rdservicepros-site
Production static site stack for my small business RD Service Pros (Navarre, FL):
- S3 + CloudFront distribution
- GitHub Actions sync + automatic cache invalidation
- Clean, cost-optimized hosting for a real local business
- AWS Certified (multiple associate-level certs + cloud fundamentals)
- Strong hands-on experience building realistic demo platforms that behave like production:
- remote state backends
- multi-account / multi-domain patterns
- IAM hardening and least-privilege (work in progress across projects)
- Background in hardware & high-performance compute operations before moving fully into cloud and DevOps.
- 🌐 Portfolio: https://rusets.com
- 🔗 GitHub: you are here — @rusets
I’m always improving these projects — treating them as a living lab for production-style AWS designs.
