Skip to content
View olu-folarin's full-sized avatar

Block or report olu-folarin

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
olu-folarin/README.md

Folarin Oyenuga

Platform Engineer | FinOps & Cloud Infrastructure Specialist

I build infrastructure tooling that prevents costly mistakes at scale.

Impact

Significant ££ savings through EBS optimization methodology with cross-team adoption
Prevented six-figure data loss: resolved 18-day disaster recovery crisis through systematic diagnosis
Open-source maintainer of terraform-tag-validator and can-i-tag-aws
Supporting FinOps initiatives across multiple teams in UK government

Featured Work

Terraform Tag Validator

Tag Enforcement GitHub Action | Python, Docker, GitHub Actions

Pre-deployment tag compliance enforcement preventing cost attribution gaps across AWS infrastructure. Validates 25+ resource types with configurable YAML rules, posts detailed PR feedback with exact violations.

Currently being evaluated alongside Checkov, OPA, and tfsec for tag compliance.

Repository: https://github.com/olu-folarin/terraform-tag-validator

Can I Tag AWS

Untaggable Resource Detection | Python, Docker, GitHub Actions

Automatically detects which AWS resources cannot be tagged, enabling accurate SCP policies and avoiding compliance gaps.

Repository: https://github.com/olu-folarin/can-i-tag-aws

Cost Optimization Methodologies

  • EBS Optimization Framework: 7-step verification methodology for large-scale storage optimization
  • DR Systematic Diagnosis: Root cause analysis framework for critical incidents

Technical Expertise

Cloud: AWS (EC2, EBS, RDS, S3, IAM, EKS) • Terraform • Kubernetes
Platform: GitHub Actions • Policy-as-Code (OPA, Checkov, tfsec) • CI/CD
Languages: Python (Boto3) • Go • Bash
Focus: FinOps • Cloud Governance • Cost Attribution • Security Compliance

Approach

I solve organizational problems, not just technical tasks:

  1. Identify systematic gaps: manual processes that don't scale
  2. Build automated solutions: tooling that enforces best practices
  3. Enable adoption: optimise developer experience for minimal friction
  4. Measure impact: £ saved, risks prevented, time recovered

Connect: https://www.linkedin.com/in/folarin-o-46389b128/

Pinned Loading

  1. can-i-tag-aws can-i-tag-aws Public

    Detect which AWS resources support tagging at the API level. Identifies untaggable resources by parsing the IAM Service Authorization Reference; the definitive source of truth for tag support acros…

    Python 3

  2. terraform-tag-validator terraform-tag-validator Public

    Python 3

  3. aws-ebs-optimization-methodology aws-ebs-optimization-methodology Public

    A systematic approach for safely identifying and removing orphaned EBS volumes in production AWS environments, balancing cost optimization with operational safety.

    3

  4. disaster-recovery-systematic-diagnosis disaster-recovery-systematic-diagnosis Public

    3

  5. kubernetes-the-hard-way-on-azure kubernetes-the-hard-way-on-azure Public

    2

  6. vulnerability-scanning vulnerability-scanning Public

    Go