Scott Hatlen

Software engineer & homelab enthusiast

blog.scottyah.com

Thoughts on engineering, homelab, and projects

All Sites

Everything else on the cluster

How This Site Works

This page is a single Go binary with no external dependencies. A CronJob running in the cluster scrapes all Ingress routes from the k3s API every 5 minutes and writes them to a ConfigMap. On each request, the server reads that file, merges it with embedded descriptions, groups everything by base domain, and renders this page. The site list updates itself automatically whenever a new service gets an Ingress.

Scott Hatlen

Platform Engineer / SRE

Platform Engineer / DevSecOps / SRE with experience across Air Force, Navy, large & small corporations. Builds and maintains secure, scalable infrastructure from cloud to edge. Passion for tooling, observability, and process optimization, with a built-in business mindset.

10+ Years Experience
CKA Certified
TS/SCI Clearance
5,000+ Users Supported

Skills

Platforms
Kubernetes OpenShift K3s Docker / Podman AWS GovCloud EC2 vSphere RHEL Rocky Linux CentOS Ubuntu Arch Linux Raspberry Pi OS
CI/CD & Automation
ArgoCD Jenkins Tekton GitHub Actions Gitea Actions Helm Kustomize Ansible
Languages
Python Bash Java / J2EE HTML / CSS JavaScript TypeScript CMD / PowerShell
Tools
GitHub GitLab Atlassian Suite Zabbix Grafana SonarQube Fortify
Methodologies
GitFlow SAFe Agile DevSecOps SRE DISA STIGs

Experience

SRC Site Reliability Engineer 04/2023 — Present
  • Containerization of third-party software suite for a Software Factory (~5,000 users)
  • Utilized AWS GovCloud services, kustomized Helm charts, Bash scripting, and Python
  • Developed custom management suite to track essential operations
  • Containerized and deployed Zabbix and Grafana observability stack with LDAP auth, AWS RDS backend, custom domain, and rewrote data-fetching scripts
  • Hardened K8s nodes via DISA STIGs, custom AMI images, and AWS launch templates
  • Solved outage issues at different parts of DoD infrastructure
  • Moved applications from EC2 to OpenShift to EKS
  • Production support — researched and resolved escalated issues that other tiers could not tackle
Insight Global Site Reliability Engineer 10/2023 — 04/2024

Same role as SRC — Insight Global was a temp/recruiting subcontractor agency for six months

Forward Slope Inc Software Engineer / DevOps Engineer 02/2023 — 09/2023
  • CI/CD for MTC2, a multi-team application running on OpenShift across cloud and edge environments
  • Deployed to Navy destroyers via OTA and manual configuration through Application Arsenal
  • Managed multiple OpenShift clusters from AWS to on-ship custom hardware test beds
  • Created pipelines with image creation, security scans, compilation and staging
  • Created custom hardened images for distributed edge deployment
  • Coordinated with PMO, test teams, developers, and teammates to ensure mission success
Northrop Grumman Corp Principal Software Analyst & DevOps Engineer 10/2019 — 02/2023
  • Lead role on DevOps teams for three programs
  • Invented and simplified automated business processes in unclassified and classified systems, reducing "Toil" by an average of 15 hrs/week on top of primary job functions
  • Rewrote and simplified collection of VisualBuild and batch scripts into Python
  • Took 1 Release Branch from SVN & manual builds to Gitflow in 8 months, then led the team's DevOps adoption for two new programs (team sizes ~9 and ~22)
  • Implemented Ansible for fleet lifecycle management — automated VM provisioning, destruction, installs, testing, and development environments
Northrop Grumman Corporation Software Analyst & DevOps Engineer 05/2017 — 10/2019
  • Fullstack web developer for internal business tool on a team of three
  • Implemented configuration-based database connections
  • Upgraded from non-versioned PHP on Apache to containerized TypeScript/React/Node.js using Git Flow
  • Total revamp on database, redesigned and rewrote all UI, integrated visualizations for key data
FedEx Programmer Analyst 08/2015 — 05/2017
  • Maintenance and upgrades on an extremely visible J2EE business application that processed all scans couriers made
  • Handled most UI tasks and server configurations
  • Refactored test suite
  • Sorting algorithms, helped team adopt Agile, enterprise Java design patterns, WebLogic queues

Education

University of Colorado Colorado Springs

May 2015

B.S. Business Information Systems & International Business
Minor in Entrepreneurship

On-campus: Web development for Office of the Provost

DoD Top Secret (CI) — August 2019

Certifications

  • 2026 ISC2 CC
  • 2026 CompTIA Security+ (renewed)
  • 2026 CompTIA Linux+ (renewed)
  • 2024 Certified Kubernetes Administrator
  • 2022 CyberSecurity Tech Cohort
  • 2020 CalTech MBSE Certificate
  • 2017 NG Software Development Class
  • 2015 SAFe Agile
  • NG Mentoring Technical Professional Program
  • Design of Computer Programs — Peter Norvig
INTERNET FIREWALL deny all BEELINK MINI PC Arch Linux / k3s host K3S CLUSTER POWER HTTPS proxy origin certs SSH SSH Internet *.scottyah.com Public Users HTTPS traffic Cloudflare HTTPS proxy Tailscale SSH tunnel You (remote) via tailscale Traefik Ingress terminates TLS via Cloudflare origin certs cert-manager homepage scottyah.com blog blog.scottyah.com gitea git.scottyah.com harbor container registry longhorn block storage secret-santa family app calbo towel store + more kube-system, etc. Longhorn PVCs HOST SERVICES PostgreSQL primary database MinIO S3 object storage 500 GB Drive ext4 / USB 3.0 data Amazon Basics UPS server + router Internet Firewall Server k3s Cluster Power (UPS) Cloudflare HTTPS Tailscale SSH TLS / certs