TL;DR: involved with technology for the past 15 years, loves to learn new things and enjoy automating everything. From Networking to Ful Stack Development, on-premises to cloud, can tackle any complex scenarios and is used with fast-paced transformation environments.
- Website: www.caiotrevisan.com
- Linkedin: linkedin.com/in/caiocezart/
- Introduction
- Academic Curriculum
- Industry Certifications
- Recent Learnings
- Current Aspirations
- Hobbies
- Professional Projects
- Warehouse WIFI modernisation
- Wholesale returns product portal
- End-to-end integration from Retail POS systems to SAP and Warehouse Management System
- Powercycling cloud resources
- IAM Automation
- Infrastructure migration from Azure to AWS
- Many infrastructure modernisation from on-premise to AWS
- GCP + Kubernetes greenfield project
- Foreign immigrant from Brazil, got permanent residency and later citizenship through a sponsorship working as a Network Admin/Full Stack Developer
- Started in IT doing Computer Games servers at home (Ragnarok, Tibia, etc)
- Served 5 years in the Airforce as a Sys/Network Administrator
- Diploma in Information Technology and Bachelor in Networking
- Technical Consultant helping big enterprise companies moving to the cloud or improve existing environments
- Diploma in Information Technology
- Bachelor in Networking with University being both in Brazil and an extra year at University of Technology, Sydney (UTS)
- Certificate III in Commercial Cookery (TAFE)
- Certified Kubernetes Administrator
- Certified Kubernetes Application Developer
- AWS Certified Cloud Practitioner
- AWS Certified Developer - Associate
- AWS Certified SysOps Administrator - Associate
- AWS Certified Solutions Architect - Associate
- AWS Certified Solutions Architect - Professional
- AWS Certified DevOps Engineer - Professional
- AWS Certified Advanced Networking - Specialty
- AWS Certified Security - Specialty
- AWS Certified Big Data - Specialty
- Google Cloud Certified - Professional Cloud Architect
- AWS
- Shared Networking Architecture
- Elastic Kubernetes Service
- Google Cloud Platform
- Kubernetes Administration
- cluster management
- automated deployment
- Istio service mesh
- nodepool isolation strategies
- multi-tenant environment
- workloads isolation
- cluster security
- gatekeeper (openpolicy agent)
- open-source contributor
- pod security policies
- network policies
- conftest
- gatekeeper (openpolicy agent)
- cluster management
- Golang software development
- development of kubernetes custom operators
- Anthos
- Anthos Configuration Management (ACM)
- policy-controller
- Sharing Knowledge
- Community open-source DevOps classes - DevOps Academy
- Leadership
- Community meetups organization
- Focused on improving soft and leadership skills
- Work more with people and impact on other lifes
- Develop the sense of community on both personal and professional life
- sharing knowledge and helping others getting started with DevOps/Cloud space
- enabling people to achieve more rather than doing
- Blameless culture
- post mortums
- brownbags from learnings
- pair programming
- Explore data, machine learning and AI
- Co-founder of IT.BR Melbourne group
- Brazilian professonal community that work with IT living in Melbourne
- Over 300 members
- bi-monthly meetups with a mix of technical and local market opportunities talks with over 80 people attendance
- Practicing sports (soccer + tennis)
- Always happy to be involved in any physical activities
- Listen to audio books
- Recent ones are
- Dare to Lead
- Phoenix Project (again)
- Leaders Eat Last
- Recent ones are
- AWS Landing Zone
- Infrastructure migration from Azure to AWS
- Many infrastructure modernisation from on-premise to AWS
- Kubernetes greenfield project
- Spot Instances
- Warehouse WIFI modernisation
- Wholesale returns product portal
- Powercycling cloud resources
- IAM Automation
- have gone through this process countless times from startups with less than 10 employees to big corporations with few thousands of people.
- companies in highly regulated and complex environments want to get started with AWS on a secure way providing all tools required and enabling people to move their existing applications to the cloud.
- stablish AWS foundations
- develop guardrails to safekeep companies data and protect users on doing what is not allowed to
- some projects would required to keep a hybrid networking from onpremise and the cloud
- upskilling of company employess involved in the process
- help stakeholders to showcase value of the new platform providing few use cases and documentation around best practices
- discovery sessions to identify project and business requirements
- architect and design tech decisions and toolings to be used
- form teams of engineers that can get started with new tech
- provide training, sharing knowledge sessions, brown bags, lunch and learns, etc
- start building solution based on infrastructure as code and automation as much as possible
- testing and CI/CD implementation as soon as the team and code base are mature enough
- discovery sessions on possible pilots to be used as use case and POC for the new platform
- prove tech choices and code examples and build a migration pattern around it
- build cross-teams trust and relationship breaking out any existing silos
- help externals teams to re-use patterns and start finding ways to migrate applications
- company need to move around 40 apps with databases (most mysql) and 1PB of data from Azure to AWS.
- stablish AWS foundations
- upgrade existing databases to be compatible with managed servers
- upgrade Windows Server pet instances to auto-scaling groups
- connect Azure > Client DC > AWS through direct fiber connection
- application cutovers
- AWS Direct Connect project to client datacentre
- Dynamic routing configuration between Azure > Client DC > AWS
- Local application to buffer blob storage from Azure express route and send to AWS S3
- AWS Landing Zone foundations (Identity, Audit, Shared, Envs)
- Migration of .NET framework apps to EC2 on auto-scaling groups
- AWS ASG automation to join cattle instances to AD and cleaning up jobs
- Octopus Deploy for CICD
- deployment strategies (blue/green, canary)
- Mysql database upgrades to be compatible with AWS Aurora
- once everything ready, required downtime for a last minute database backup/restore and DNS cutover
- companies want to move from onpremise to cloud
- discovery sessions for identifying workloads that need migrationa
- case by case identify lift and shifts and application modernisation
- go to containers where possible
- cloud foundations (accounts, baseline security, integration with existing IDP)
- infrastructure as code -> CICD
- team upskilling to manage new infrastructure (brownbags, 101)
- stablish a multi-cluster Kubernetes infrastructure in the cloud on a highly regulated environment
- traditional slow-paced environment
- not agile
- internal politics
- people egos
- iterations and discovery to decide which cloud provider
- security controls
- architecture diagrams
- proof of concepts
- cloud native
- golang
- everything as code
- squads formed
- breaking silos and working cross-teams
- agile methodologies used
- blameless culture implemented
- Kubernets on GCP due to better support for Kubernetes (GKE)
- security control tools analysis and comparison
- twistlock
- gatekeeper
- conftest
- psp
- network policies
- rbac integration with local IDP
- cluster design and automation
- nodepool isolation (ingress, egress, tiers)
- security by default
- cluster bootstrap automation (namespaces)
- 3musketeers + helm charting
- gatekeeper
- matching security GKE controls to opa policies
- deployment/patching/update automation
- workload isolation
- istio service mesh
- namespace communication isolation
- binary authentication
-
CI/CD private workers using ECS with Spot instances
- $15/month
-
Kubernetes spot instances node
- non-critical batch jobs
- cicd workers
- intesive resource data jobs
- peak traffic
- cluster auto-scaler(CA)
- interrupt-handler
- horizontal pod autoscaler (HPA)
- disruption budget
- use of affinity/taints/tolerations
-
CS:GO Server running on ECS + Spot Blocks. API request to API Gateway + lambda will trigger spot block for X hours and bring down stack when not needed.
- warehouse with 5k orders daily
- 14k square meters of size
- 15 meters high ceilings
- metal structures everywhere
- wifi signal analysis for access points installation
- hardware sourcing
- planned work for minimal disruption of a 18 hours a day warehouse
- stakeholders project proposal
- effective physical installation of all new hardware with zero downtime
- wholesale faulty products complaint being received as spreadsheets
- manual entry of forms to SAP
- 2 full time employes to process returns
- create an external portal where clients can login and lodge faulty or missing order items with option to upload images
- full stack solution in C# .net
- backend using WebAPI 2.0 as a big monolith serving all endpoints
- frontend in AngularJS consuming backend api's
- API's running from AWS Lambda being served by AWS API Gateway
- Static content with js scripts hosted on S3. Image upload also sent to S3 and only images metadata saved to database
- Clients can retrieve pre-existing details from SAP
- Clients can auto-fill orders based on existing invoice numbers from SAP
- hard to do full stack engineering by itself
- no project management results in many iterations for the same issue
- slow paced project
- at v1 release many new features requested due to bad planning
- lack of software versioning makes collaboration hard
- existing tool written in python taking over 1hour to loop through resources
- no error handling
- resources being ignored
- complete rewrite of python automation using Nodejs
- error and logging handling
- admin management tasks (manual, yaml config)
- complete application consuming AWS API's to loop through 200+ accounts to powercycle resources and save money on iddle services
- stablished a clear path of development and a roadmap of new features (instances, ebs, snapshots)
- solution pilot showcase for stakeholders
- discovery sessions to identify priority order of resources onboarding to new automation and avoid disruption
- fully deployed to production within 6 months
- admins have full manual control of tasks
- automation is idempotent
- lack of AWS guardrails to allow end-users to have open freedom of IAM resources creation
- too many requests of resource creation to be handled manully
- possibility of human error when peer reviewing code to create IAM resources and allowing more permission than necessary
- integration of Github webhooks with AWS Step Functions to trigger an automated suit of tests
- code submitted and all tests pass, gets deployed to the AWS account through cloudformation
- an end-user submits a cloudformation template to a github repository and triggers a step function pipeline
- the automation does from basic lint/syntax checks to least privilege code analysis testing
- any errors, lambdas will post log to Github Pull Request
- admins have manual controls to override tests through Github labels