Skip to content
View GreenRanger-IT's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report GreenRanger-IT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
GreenRanger-IT/README.md

Walz Ogundiran

Senior SRE & Platform Engineer — Kubernetes Observability, AI-assisted Tooling & Cloud Operations
Abingdon-on-Thames, United Kingdom

LinkedIn


5 years in site reliability and platform engineering, working on the platform that runs seismic interpretation and subsurface planning tools for energy companies in production across Europe, the Americas, and Asia-Pacific.

I build tooling that makes Kubernetes observable and incidents shorter. My current focus is AI-assisted SRE tooling — deterministic CLI tools paired with Claude Code reasoning skills.


What I'm building

Project Description Status
kubectl-sentinel 10-section Kubernetes health checker. Nodes, pods, workloads, probes, services, HPAs, PVCs. Structured JSON + HTML output. Works in CI. active
incident-triage PagerDuty alert → root cause → causation chain → fix plan. Deterministic correlation engine. Python stdlib only. active

Domain Expertise

Kubernetes Observability    ██████████████████░░   Prometheus, Thanos, Grafana, Kiali, Istio
Incident Response           █████████████████░░░   PagerDuty, causation chains, root cause classification
Platform Automation         ████████████████░░░░   Helm, ArgoCD, CI/CD pipelines, tenant provisioning
Cloud Operations            ██████████████░░░░░░   GCP, Azure, multi-region, cost optimisation
Security & Compliance       ████████████░░░░░░░░   RBAC, TLS, pod security, secrets hygiene
AI-assisted Tooling         ████████████░░░░░░░░   Dual-layer CLI + LLM reasoning pattern (building)

What I've learnt building production SRE tooling

  • The dual-layer pattern — a deterministic CLI layer that works at 3am in CI, paired with an AI reasoning layer that explains why. Separating them gives you both portability and intelligence.
  • Severity as an exit code0/1/2 makes health checkers CI-composable. Think of them as HTTP status codes for shell tools.
  • Classify before you recommend — OOMKill does not mean "raise the limit". The root cause determines the fix.
  • Building for the 3am reader — every design decision in an ops tool should be made as if the reader has been awake for 3 hours and needs to act in 5 minutes.

GreenRanger-IT/learning-journal — architecture decisions and engineering thinking from building production SRE tooling


Working toward CKA → CKS → CNCF contributor. Open to collaborating on Kubernetes observability and platform engineering tooling.

LinkedIn

Pinned Loading

  1. GreenerPlatform/kubectl-sentinel GreenerPlatform/kubectl-sentinel Public

    10-section Kubernetes health checker. Nodes, pods, workloads, probes, services, HPAs, PVCs. Structured JSON output. Works in CI.

    Shell

  2. learning-journal learning-journal Public

    What I've learnt building production SRE tooling — architecture decisions, Kubernetes concepts, and engineering thinking. Each entry is a future blog post or talk.

  3. GreenerPlatform/incident-triage GreenerPlatform/incident-triage Public

    Alert + sentinel snapshot → causation chain + fix plan. Deterministic Python, stdlib only.

    Python