Skip to content
View rusets's full-sized avatar

Block or report rusets

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
rusets/README.md

Ruslan AWS — DevOps & Cloud Engineer


Featured Skills Highlights

I build production-style AWS platforms using Terraform, GitHub Actions, and strong automation patterns focused on reliability, cost-efficiency, and clean infrastructure design.

My focus:

  • AWS infrastructure as code (Terraform, remote state, policy-as-code)
  • CI/CD pipelines with GitHub Actions and OIDC (no long-lived AWS keys)
  • Scale-to-zero patterns (wake on demand, auto-sleep when idle)
  • Education-quality demos that look and feel like real production systems

Core Tech Stack

  • Cloud (AWS): EC2, ECS Fargate, Lambda, API Gateway, RDS, DynamoDB, S3, CloudFront, Route 53, Amazon Location, SageMaker
  • Infrastructure as Code: Terraform (remote state, two-stage backend, modules, policy-as-code), tflint / tfsec / checkov
  • CI/CD: GitHub Actions (OIDC authentication, plan/apply pipelines, zero-secrets workflows)
  • Containers & Orchestration: Docker, ECS Fargate, k3s, Kubernetes fundamentals, Helm
  • Automation Patterns: Wake/sleep workflows, idle reapers, scale-to-zero architecture
  • Observability & Ops: CloudWatch, structured logging, basic SLOs, runbooks, dashboards

Flagship Projects

AWS Multi-Tier Infra — Wake/Sleep Demo Platform

Repo: https://github.com/rusets/aws-multi-tier-infra

A full 3-tier production-style web stack on AWS with:

  • VPC, ALB, EC2 application tier
  • RDS MySQL in private subnets (no public exposure)
  • S3 + CloudFront for static assets
  • Wake-on-demand (Lambda → GitHub Actions → Terraform Apply)
  • Idle reaper that auto-destroys the stack when unused
  • Remote state backend (S3 + DynamoDB lock table)
  • GitHub Actions OIDC for zero-secret CI/CD

Purpose: demonstrate a real-world AWS architecture with secure networking, automation, and intelligent cost control.


Helmkube Autowake — k3s on EC2 with CI/CD

Repo: https://github.com/rusets/helmkube-autowake-cicd

A compact k3s cluster on EC2, fully automated through Terraform and GitHub Actions:

  • k3s node bootstrap via user data + SSM
  • Helm-driven app deployment from CI/CD
  • Prometheus + Grafana monitoring stack deployed automatically
  • Wake/sleep automation to eliminate idle costs
  • OIDC authentication (no AWS keys)
  • Remote state, IAM roles, monitoring, and bootstrap scripts

Purpose: demonstrate Kubernetes fundamentals on AWS with a full GitHub→Terraform→Helm pipeline, including real observability (Prometheus metrics + Grafana dashboards).


Docker ECS Deployment — Fargate + On-Demand Provisioning

Repo: https://github.com/rusets/docker-ecs-deployment

ECS Fargate–based demo for running a containerized app with:

  • GitHub Actions CI/CD (build → push to ECR → deploy to ECS)
  • On-demand provisioning via Lambda + EventBridge
  • Terraform-managed VPC, security groups, IAM, tasks, services
  • Remote state + OIDC (no long-lived AWS keys)

Purpose: show when ECS Fargate is the simpler alternative to Kubernetes for small, cost-efficient demo platforms.


SageMaker Serverless ML Demo

Repo: https://github.com/rusets/ml-sagemaker-serverless

End-to-end ML inference pipeline on AWS using:

  • SageMaker Serverless for zero-maintenance model hosting
  • Lambda + API Gateway for a clean HTTP prediction API
  • Static UI on S3/CloudFront (image upload → prediction result)
  • Terraform for all infrastructure (IAM, API, buckets, hosting)
  • Keyless CI/CD pipeline (GitHub Actions → AWS OIDC)

Purpose: demonstrate how to take an ML model and expose it as a production-style, fully serverless inference API.


CI/CD Pipeline for Application Deployment — EC2 + Scale-to-Zero

Repo: https://github.com/rusets/CI-CD-Pipeline-for-Application-Deployment

A CI/CD-centric demo showing how to deploy a web app to EC2 with:

  • GitHub Actions pipelines (build → test → Terraform plan/apply)
  • Wake/sleep automation for cost-optimized EC2 usage
  • CloudWatch dashboards + alarms
  • Separate Terraform stack for wake/status Lambdas and API Gateway
  • Remote state + OIDC authentication (no AWS keys)

Purpose: highlight clean CI/CD design, infra/app separation, and efficient EC2-based deployment pipelines.


RideBot Infra — Serverless “Ride Request” Bot

Repo: https://github.com/rusets/ridebot-infra

A fully serverless backend for a Telegram-based ride/transport bot using:

  • API Gateway + Lambda (event-driven HTTP backend)
  • DynamoDB for request state
  • Amazon Location Service for geolocation
  • Terraform-managed IAM, routing, and infra configuration

Purpose: demonstrate event-driven design, chat-platform integration, and a pure pay-per-use serverless architecture.


Portfolio & Business Site Infrastructure

rusets-portfolio

Repo: https://github.com/rusets/rusets-portfolio
Infrastructure for my own portfolio website https://rusets.com, using:

  • S3 (private) + CloudFront (OAC)
  • Route 53 + ACM (DNS validation)
  • GitHub Actions OIDC for fully keyless CI/CD

Purpose: secure, low-maintenance, production-style static hosting fully automated via Terraform.

rdservicepros-site

Repo: https://github.com/rusets/rdservicepros-site
Production static site stack for my small business RD Service Pros (Navarre, FL):

  • S3 + CloudFront distribution
  • GitHub Actions sync + automatic cache invalidation
  • Clean, cost-optimized hosting for a real local business

Purpose: demonstrate how lightweight static sites can be served securely and professionally on AWS.

Certifications & Background

  • AWS Certified (multiple associate-level certs + cloud fundamentals)
  • Strong hands-on experience building realistic demo platforms that behave like production:
    • remote state backends
    • multi-account / multi-domain patterns
    • IAM hardening and least-privilege (work in progress across projects)
  • Background in hardware & high-performance compute operations before moving fully into cloud and DevOps.

Let’s Connect

I’m always improving these projects — treating them as a living lab for production-style AWS designs.

Pinned Loading

  1. docker-ecs-deployment docker-ecs-deployment Public

    A fully automated, scale-to-zero AWS ECS Fargate platform — wake-on-demand via API Gateway + Lambda, auto-sleep via EventBridge, Terraform IaC, and GitHub Actions OIDC CI/CD. Zero idle cost. Clean,…

    HCL 2 1

  2. helmkube-autowake-cicd helmkube-autowake-cicd Public

    Production-style k3s Kubernetes demo with on-demand wake & auto-sleep. Terraform-provisioned EC2, serverless control plane (Lambda + API Gateway), GitHub Actions CI/CD, Helm deploy, and optional Pr…

    HCL 2

  3. aws-multi-tier-infra aws-multi-tier-infra Public

    Automated AWS Multi-Tier Infrastructure — Wake/Sleep Environment powered by Terraform, Lambda & GitHub Actions.

    HCL 2 1

  4. ml-sagemaker-serverless ml-sagemaker-serverless Public

    End-to-end serverless ML app on AWS — SageMaker Serverless + Lambda + Terraform. Fast image classification with a lightweight UI and production-grade architecture.

    HCL 1

  5. CI-CD-Pipeline-for-Application-Deployment CI-CD-Pipeline-for-Application-Deployment Public

    Production-grade CI/CD pipeline for deploying a web app on AWS with Terraform, GitHub Actions (OIDC), Lambda wake/sleep logic, CloudWatch dashboards, and cost-optimized EC2.

    HCL 2

  6. ridebot-infra ridebot-infra Public

    Serverless Telegram ride-request bot on AWS (API Gateway v2, Lambda, DynamoDB, Amazon Location, SSM). Fully IaC with Terraform.

    Python 1