Overall 7+ years of hands-on experience as a cloud DevOps, supporting, automating, and optimizing mission critical deployments in AWS, Azure leveraging configuration management, Application support, CI/CD, Monitoring and DevOps processes.
Overview
8
8
years of professional experience
Work History
DevOps Engineer
Pluto Tv
09.2021 - Current
Involved in designing and deploying a multitude of applications utilizing AWS stack (including IAM, VPC, EC2, EBS, ECS, EKS, RDS, S3, API Gateway, Lambda, NLB, Auto Scaling, Route53, CloudFront, Elastic Cache, SQS and SNS) focusing on high availability, fault tolerance and autoscaling using IaC
Provide high durability of the available data using data storage in the AWS S3 bucket, versioning S3, lifecycle policies
Also, webhosting the data from the S3 bucket by creating URL's
And also maintaining complex s3 bucket policies and applied using those by terraform
Configured Route 53 to achieve high availability, scalability by using Cloud Formation Templates, assigned DNS mapping for AWS servers, troubleshoot issues of Load Balancers, auto scaling groups and Route 53
Created custom JSON policies for User Accounts, Groups, access Permissions and Privileges to the users and services using IAM and automated the deployments of these policy to Aws using GitHub actions
Converted Circle CI files to GitHub actions and set up the continuous integration and continuous deployment with GitHub actions using self-hosted runners
Documented the deployment process (Migration Doc) of code to production
Created and designed reusable Terraform templates to create custom sized Resource groups, Kubernetes cluster, Container, Istio, Istiod
Used reusable Terraform modules to build staging, dev, nonprod, preprod, and production environments and used Hashicorp vault to store the secrets, used terraform workspace to work on multiple environments
Built Docker images for microservice based applications and setup the Amazon ECR with Docker, actively involved in deployments on Docker using Kubernetes
Also responsible for development of Test environment using Docker containers and configuring them using Kubernetes
Used Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages
Configured the readiness probe, liveliness probe and pod auto-scaling by adding the health checks to pods in handling the failures of the cluster by effectively managing the traffic and balancing the load as part of the project deployment setup
Worked on managing Kubernetes containerized applications using config Maps, nodes, selector services, worked on Istio Service mesh to secure services in the Kubernetes cluster and establish communication between microservices
Managed the services, resources for the users and managed permissions for allowing and denying the services using IAM roles and assigned individual policies to each group
Implemented integration between Kubernetes and Hashi Corp Vault to dynamically inject configurations for each service using init containers, configuration sidecars, and shared persistent volumes between app and config containers
Created multiple re-usable Terraform modules to deploy an application AWS service in multiple environments & multi region as part of automation
Used Hashicorp Vault to store secrets related to Database and app services and used them as part of infrastructure as code to communicate with resources
Extensive experience in deploying, managing, and developing MongoDB clusters
Experience in creating Python Script for using DML operation with MongoDB
Created a fully automated build & deploy platform and coordinating code build promotions and orchestrated deployments using GitHub and harness
Also worked on creating shell scripts for canary and full deployment through harness
Created Datadog dashboards for various applications and monitored real time and historical metrics and supported various load tests
DevOps/Cloud Engineer
Beachbody
01.2020 - 08.2021
Involved in designing and deploying multiple applications utilizing the AWS stack (including IAM, VPC, EC2, EBS, RDS, S3, Glacier, Lambda, ELB, Auto Scaling, Route53, CloudFront, CloudWatch, CloudTrail, SQS and SNS) focusing on high availability, fault tolerance and autoscaling in AWS cloud formation
Responsible for designing the Architecture and creating VPC (Virtual private cloud), Security groups, NACLs, and route tables in AWS private and public networks, as well as ELB (Elastic load balancers), and auto scaling for high availability
Working on implementing a Serverless architecture using API Gateway, Lambda and Dynamo DB and deployed AWS Lambda code from Amazon S3 buckets
Created a Lambda Deployment function and configured it to receive events from S3 bucket
Designed and converted existing AWS infrastructure to serverless architecture deployed via terraform and used those templates for modules to support other teams for flexibility to deploy their application into AWS cloud
Managed the services, resources for the users and managed permissions for allowing and denying the services using IAM roles and assigned individual policies to each group
Worked on migrating On-premises applications and data onto AWS Cloud, by leveraging the usage of different services available in AWS like AWS Direct Connect, S3 Transfer Acceleration, AWS Snowball Edge, Server migration service and Data Base migration service with live migration of applications implementing Hybrid Migration Strategy
Created an AWS elastic beanstalk with company guardrails (IAM Permissions) for developers to push their code and build there infra from scratch
Engage in long - term planning of development and solutions lifecycle transition strategy to microservices architecture pattern incorporating CI/CD, Atomic, JSON/REST and simple authentication delivering bottoms-up, simple and modular solutions to complex business requirements and LOB challenges
Worked on Blue/green deployment strategy by creating new applications which are identical to the existing production environment using CloudFormation templates & Route53 weighted record sets to redirect traffic from the old version to the new version via DNS
Created AWS infrastructure as a code template using Terraform for automation of applications, created multiple staging environments like dev, test, acceptance and production
Created multiple re-usable Terraform modules to deploy an application AWS service in multiple environments as part of automation
Designed, developed and deployed applications on to several cloud-based solutions using configuration Management tools like Chef, Puppet, Ansible and Salt Stack
Experience in using configuration management tools like Puppet/Ansible/ Chef and knowledge on Salt Stack
Built Docker images for microservice based applications and setup the Azure Container Registry with Docker, actively involved in deployments on Docker using Kubernetes
Also responsible for development of Test environment using Docker containers and configuring them using Kubernetes
DevOps Engineer
Comcast
Va
05.2018 - 12.2019
Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal
Worked as a Cloud Administrator on Microsoft Azure, involved in migrating on-premises applications to Azure Cloud using Azure app services, configuring storage account, resource groups and virtual machines
Remotely login to Virtual Machines to troubleshoot, monitor and deploy applications
Used Azure Kubernetes services (AKS) to provide a platform for automating deployment, scaling and operations of application containers across clusters of hosts
Implemented idea of secret management for micro services and created service and ingress rules for each micro service
Worked on setting up the Kubernetes sandbox on Azure Kubernetes Services (AKS) for testing the different features
Data was migrated from on-premises SQL Database servers to Azure SQL Database servers, by using the Azure Data Factory copy tool and Self-Hosted Runtimes
Created secure VNets and subnets for Azure IaaS virtual machines (VMs) and Cloud services (PaaS role instances)
Setup bindings, SSL certificates, configurations (web.config/app.config) on IIS Servers and configured featured as per application requirements
Worked on Classless Inter-Domain Routing (CIDR) for allocating IP addresses and IP routing for the Subnets & VM’s
Worked with Terraform key features such as infrastructure as code, Execution plans, Resource Graphs, Change Automation
Experienced in using Terraform and ansible, migrate legacy and monolithic systems to Azure and managing ubuntu and RHEL virtual servers on Azure by creating Ansible nodes
Created Docker environments and maintain containerized systems by establishing docker files micro service-oriented environments, as well as host images in a private container registry on Microsoft Azure
Worked with Ansible to automate Kubernetes clusters, while YAML scripting was used to write playbooks
To automate tedious activities, patching, and software deployment, I used Ansible and Ansible Tower as configuration management tool
Extensively worked with Scheduling, deploying, managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters work with Helm charts running on the same cluster resources
Ansible Playbooks were created using Ansible roles, created inventory to automate the continuous deployment
Servers were configured, software was installed, and continuous deployments or zero-downtime rolling upgrades were organized
On Unix and Linux systems, I have done System Administration, Configuration, Upgrades, Patches, Troubleshooting, Security, Backup, Disaster Recovery, Performance Monitoring, and Fine-tuning
Worked with some of the bug tracking tools like JIRA, Bugzilla, ServiceNow, Clear Quest, and Quality
AWS DevOps Engineer
Persistent Systems
12.2016 - 05.2018
Company Overview: Ohio
Designing, deploying, and maintaining the application servers on AWS infrastructure, using services like EC2, S3, Glacier, VPC, Lambda, Route53, SQS, IAM, Code Deploy, CloudFront, RDS, and CloudFormation etc
Created S3 buckets for storing log applications and wrote bucket policies for lifecycle management to delete old logs and to archive logs based on the retention policies of application
Designed and converted existing AWS infrastructure to ‘Server-less’ architecture deployed via Terraform which includes AWS Elastic Beanstalk for app deployments
Worked on AWS Lambda with Amazon Kinesis and integrated Dynamo DB using Lambda for value storage and for streams backup
Used AWS Cloud watch for monitoring and alerting of Production instances
Worked with AWS Cloud Formation to create and manage IT infrastructure and application stacks, as well as writing the template file in JSON/YAML
Converted existing Terraform modules that had version conflicts to utilize cloud formation during Terraform deployments to enable more control on missing capabilities
Performed automation tasks on various Docker components like Docker Engine, Docker Machine, and Docker Registry
Custom modules and manifests were written, while pre-written modules were downloaded via puppet-forge
Upgrading or migration of the puppet community and enterprise
Continuous Delivery is being enabled through Deployment into several environments of Deployment, QA, Staging, and production using Jenkins files
Wrote Groovy scripts for Jenkins to execute jobs for a CI pipeline where Groovy Jenkins Plugin and Groovy Post Build Action Plugin is used as a build step and post build actions
Wrote Bash and python Scripts to include Boto3 which is provided by Ansible and Terraform for tasks such as encrypting EBS volumes backing AMI’s and scheduling Lambda for routine AWS tasks
Automated Nagios services for database server, webserver, application-server, networks, file sizes, RAM utilization, Disk performances using Python script in Chef
Created various branches for each purpose, merged from development to release branch, created tags for releases
Integrated Puppet with Apache Tomcat and developed load testing and monitoring suites in Python
Custom modules and manifests were written, while pre-written modules were downloaded via puppet-forge
Upgrading or migration of the puppet community and enterprise
Generated reports on different bugs & tickets using Rally/Bug tracking, created & solved blocked/unassigned tickets
Worked on version control tools GIT and bitbucket for cloning, mirroring, and pushing the changes, created web-hook in bitbucket for Jenkins