Meet the Grafana Labs Team: Aengus Rooney

Published: 13 Dec 2019

As Grafana Labs continues to grow, we’d like you to get to know the team members who are working on the cool stuff you’re using. Check out the latest of our Friday team profiles.

Meet Aengus!

Name: Aengus Rooney

Aengus Rooney
Grafana Labs Solutions Engineer Aengus Rooney

Current location/time zone Greenwich Meridian - BST.

What do you do at Grafana Labs? Solutions Engineering. We take Grafana’s existing and new releases and help our prospects and clients integrate with our SaaS offerings, and/or deploy our software to their own environments.

What open source projects do you contribute to? ASF projects and more recently CNCF projects. Currently working on Grafana, Prometheus, and Loki!

What are your GitHub and Twitter handles? Twitter - @aengusrooney | GitHub - aengusrooneygrafana.

What do you like to do in your free time? Reading and some exercise! Jogging, cycling, swimming…

What’s your favorite new gadget or tech toy? An IoT project using home weather stations…

Do you like to code in silence, with music or ambient noise on your headphones, or with people talking around you? With music for sure! I find electronic/progressive house and trance the best for concentration. However I’m a fan of many different genres of music!!

What do you do to get “in the zone” when you code? Turn off all comms channels and listen to music!

Favorite ice cream flavor? Matcha and sesame.

What’s the last thing you binge-watched? Mr. Robot.

Spaces or tabs? Spaces definitely!! I’ve wasted too much time porting code with tabs across platforms to work with tabs anymore…

What superhero powers do you wish you had (or do you have!)? Flying, super-power vision and hearing, mind reading, shooting laser beams… there’s so many useful things really…

Related Posts

Here’s a closer look at one of the new features in the Grafana 6.4 release: using Loki as an annotations query source.
Meet Grafana Labs team member Goutham!
A guide to using Loki with Prometheus and Grafana to visualize the OSSEC security application, all running on a Raspberry Pi