I build the infrastructure tools that teams use to run Kubernetes and AI/ML workloads on AWS. Most of my work lives in the open — if you've deployed EKS or VPC resources with Terraform, there's a good chance you've used something I've built or maintain.
| Terraform Registry downloads |
GitHub stars across maintained modules |
Terraform modules maintained |
merged PRs in terraform-aws-modules |
I'm a core maintainer of terraform-aws-modules — the most widely adopted Terraform modules for AWS, covering everything from EKS and VPC to Lambda, RDS, IAM, and dozens more. I created 20+ of those modules from scratch.
terraform-aws-eks (4,900+ stars) is the one I'm most known for — it's how most teams provision and manage their EKS clusters. I also contribute upstream to kubernetes-sigs projects like Karpenter, aws-iam-authenticator, and others.
I'm working on something new — a ground-up rethink of how container images are built, distributed, and run. The format, the developer tooling, security, reproducibility, all of it. The easiest way to build the most performant and efficient container images. Tar was designed for tape drives in 1979; containers, and developers, deserve better. Much better.
Terraform got me here, but Rust is where I'm headed. I use it to build the kind of infrastructure tooling that needs to be fast, correct, and small enough to ship anywhere — from CLI tools to container runtimes to node-level agents.
What I've built:
- eksup — analyzes running EKS clusters for upgrade readiness: deprecated APIs, compatibility issues, the works
- cookiecluster — interactive CLI that generates production EKS Terraform definitions without needing AWS credentials
- eksnode — EKS node bootstrap interface, cross-compiled to static Linux binaries with containerd gRPC integration (predates AWS's own
nodeadmfor the EKS AMI) - ktime — measures pod startup latency from apply to ready
Where I contribute upstream:
- containerd/rust-extensions — protobuf definitions, dependency hygiene, workspace standardization
- opentelemetry-rust — performance in the metrics hot path, spec compliance, fixing exporter deadlocks on constrained tokio runtimes
I've spent a lot of time making it practical to run GPU and accelerator workloads on Kubernetes:
- NVIDIA Triton, vLLM, and NVFlare deployments on EKS
- AWS Inferentia/Trainium scheduling with Neuron device plugins
- EFA networking for distributed training
- Container image caching for 20GB+ ML images
- Karpenter autoscaling for heterogeneous GPU fleets
Much of this lives in EKS Blueprints (3,000+ stars) where I was a core maintainer.
If these tools save your team time, consider sponsoring my work. Sponsorship directly funds continued maintenance of 60+ Terraform modules, new Rust infrastructure tools, and upstream contributions to projects like Karpenter, containerd, and OpenTelemetry.
Chicago · clowd.haus






