Summary
Overview
Work History
Education
Skills
CAREER OBJECTIVE
Certification
Timeline
Generic

Srikanth Reddy Etikala

Summary

  • Experience in Architecting and securing the Infrastructure on AWS using EC2, S3, RDS, EBS, VPC, ELB, IAM, KMS, EMR, API Gateway, Cloud Trail, Cloud Watch, Amazon SQS, AWS Kinesis, Lambda.
  • · Experience with AWS Command line interface and PowerShell for automating administrative tasks. Defined AWS Security Groups which acted as virtual firewalls that controlled the traffic reaching one or more AWS EC2, LAMBDA instances.
  • · Launched and configured the Amazon EC2 Cloud servers using Linux AMI and Ubuntu AMI and configured the servers for specified applications using Jenkins.
  • · Experience in Windows Azure and Azure internal tools for monitoring network and server health.
  • · Azure cloud experience with ADF V2, ADF Data flows, Azure Databricks, and other Azure services. ADF source code version control using AZURE DevOps or Git.
  • · Expert in various Azure services like Compute (Web Roles, Worker Roles), Caching, Azure SQL, NoSQL, Storage, Network services, Azure Active Directory (AD), API Management, Scheduling, Azure Auto Scaling, and PowerShell Automation.
  • · Strong Experience in Microservices architecture and Migration of all servers from on-premises to Docker/Kubernetes container technologies in Azure.
  • · Hands-on experience in Backup and restoring Azure services and in designing and configuring Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing. Azure cloud services, Blob storage, Active Directory, Azure Service Bus, Cosmos DB.
  • · Developed Terraform templates to create load balancers (ELB), EC2 instances with auto-scaling, and monitoring on the fly for different environments such as QA, SIT, and stage which will run on different VPCs.
  • · Built scalable Docker infrastructure for Microservices utilizing ECS - AWS Elastic Container service by creating task definition JSON file.
  • · Experience in working with container-based deployments using Docker, Docker images, Docker files, Docker Hub, Docker Compose and Docker registry, Used Docker-Swarm to maintain the cluster of containers.
  • · Integrated Jenkins with Docker container using Cloudbees Docker pipeline plugin and provisioned the EC2 instance using Amazon EC2 plugin.
  • · Experience in OpenShift architecture for OpenShift build automation, OpenShift CLI and CLI operations, OpenShift cluster and cluster maintenance.
  • · Experience in implementing Spark processing, Kafka messaging, JBoss BRMS and Cassandra DB on the OpenShift container platform.
  • · Perform maintenance and troubleshooting of our enterprise Redhat OpenShift systems.
  • · Built and delivered Kubernetes cluster using Kops and EKS on AWS.
  • · Experience in orchestration of Docker Images and Containers using Kubernetes by creating whole master and minion. Installed Artifactory on top of Kubernetes for dynamic PVC provisioning.
  • · Implemented continuous integration and deployment using various CI/CD tools like Jenkins, Nexus, GIT and SVN.
  • · Experience in JIRA for ticketing as well as defect tracking system and configuring various workflows, customizations and plug-ins for JIRA bug/issue tracker, integrated Jenkins with JIRA, GitHub, and Maven.
  • · Worked on Java and .net applications by automating their build from end to end, even by integrating test tools like SonarQube and Visual Studio using Jenkins.
  • · Hands-on experience using MAVEN, ANT, and Gradle as build tools for the building of deployable artifacts (jar, ear & war) from the source and static code analysis using SonarQube.
  • · Installed Prometheus and Grafana using Helm to monitor the application performance in the Kubernetes cluster.
  • · Having experience with NoSQL databases like Cassandra and MongoDB.
  • · I provided troubleshooting and support for Splunk-related issues, collaborating with cross-functional teams to resolve complex problems and ensure the smooth operation of the platform. I continuously kept up to date with the latest Splunk features and updates, ensuring that the organization benefited from the most advanced capabilities.

Overview

11
11
years of professional experience
1
1
Certification

Work History

Senior Cloud DevOps Engineer

Southern Company
08.2022 - Current

Responsibilities

  • · Using AWS CLI and Management Console to manage AWS Identity and Access Management (IAM) roles, AWS License Manager, AWS Elastic Beanstalk for web applications, Amazon EC2 Instances (for worker roles), Amazon RDS for SQL databases, Amazon S3 for storage, and AWS Backup for virtual machine backups.
  • · Expertise using Amazon Virtual Private Cloud (VPC) for Windows virtual machines (EC2 instances) and Application Load Balancer (ALB) to load balance Windows virtual machines (EC2 instances) for developing highly available applications. Familiarity with backing up and restoring Windows virtual machine (EC2 instance) files on AWS.
  • · Employed Ansible playbooks for configuring and managing infrastructure using Ansible modules.
  • · Utilized the traditional editor and YAML to configure the development and release pipeline in AWS CodePipeline.
  • · Configured Single Sign-On (SSO) with Security Assertion Markup Language (SAML) and Multifactor Authentication (MFA) for user management in AWS Identity and Access Management (IAM) and AWS Single Sign-On (SSO).
  • · Effectively managed production Kubernetes clusters across multiple AWS Availability Zones, ensuring resource efficiency and high availability.
  • · Implemented Prometheus on AWS to collect metrics from both infrastructure and applications. Tailored scrape configurations and set up notifications for comprehensive metric collection. Integrated Prometheus with Grafana to design visualization dashboards.
  • · Implemented monitoring solutions such as Amazon CloudWatch and AWS CloudTrail to proactively identify and address performance issues. Developed incident response procedures to ensure rapid resolution of system incidents.
  • · Implemented Infrastructure as Code using tools like AWS CloudFormation or Terraform to automate and provision resources, ensuring reproducibility and scalability.
  • · Implemented high availability architecture and disaster recovery strategies using AWS services like Amazon Route 53, Amazon RDS Multi-AZ deployments, and AWS Backup.
  • · Implemented security best practices and compliance controls in AWS environments, utilizing services such as AWS Identity and Access Management (IAM), AWS Key Management Service (KMS), and AWS Config.
  • · Established log monitoring and performance management using Splunk and AppDynamics on AWS.
  • · Created ETL pipelines in AWS Glue to extract, transform, and load data from various sources, including Amazon RDS (equivalent to Azure SQL), Amazon S3 (equivalent to Blob storage), and Amazon Redshift (equivalent to Azure SQL Data Warehouse). Used linked services, datasets, and pipelines in AWS Glue for seamless data integration.
  • · Utilized Helm Charts on AWS for the development and deployment of Kubernetes applications, ensuring reliable and efficient deployment of complex applications across multiple environments.
  • · Utilised AWS EventBridge to initiate Jenkins jobs based on events such as source code commits. Ensured the security of Jenkins credentials and secrets by managing them using AWS Secrets Manager.
  • · Utilized Amazon Elastic Kubernetes Service (EKS) to create Kubernetes clusters on AWS, providing a reliable and scalable platform for container orchestration.
  • · Established an EKS cluster in the AWS Management Console using the AWS CLI. Employed template-driven deployment options, including AWS CloudFormation templates and terraform. Leveraged Amazon EKS to deploy a managed Kubernetes cluster on AWS.
  • · Strong expertise in RBAC, secrets management, Kubernetes network policies, pod security policies, and security best practices on EKS. Designed and implemented Kubernetes clusters for containerized applications using Amazon EKS.
  • · For enabling infrastructure as code, developed Helm charts and packaged/deployed apps to Kubernetes. Proficient in integrating Amazon EKS with AWS services such as CloudWatch Logs, AWS Identity and Access Management (IAM) Managed Identities, AWS Directory Service (AAD), AWS Key Management Service (KMS), and AWS CloudWatch for monitoring.
  • · Utilized Terraform modules to provision replica resources in AWS regions for Disaster Recovery. Deployed pods and replicas in Amazon EKS leveraging a structured cluster auto scaler.
  • · Set up the release pipeline and defined deployment tasks for deploying applications to specified destinations. Employed AWS services such as Amazon EKS, AWS Elastic Beanstalk, and Infrastructure as Code tools like AWS CloudFormation or Terraform for AWS cloud.

Environment: AWS, Terraform, Kubernetes, Ansible, Shell, Python, Linux, Jira, GitHub, RDS My SQL, Elastic Beanstalk, Jenkins, Docker, Dynamo DB, Cloud Formation, Virtualization, Nagios, Splunk, App Dynamics Nginx, LDAP, JDK1.7, XML, SVN, Git, Windows, and Maven.

Senior DevOps Engineer

Vanguard
10.2020 - 07.2022

Responsibilities:

  • Involved in designing and deploying large applications utilizing almost all the AWS stack (including EC2, Route53, S3, RDS, Dynamo DB, SNS, SQS, and IAM), focusing on high availability, fault tolerance, and auto-scaling in AWS Cloud Formation.
  • I worked on creating and maintaining Infrastructure as Code (IaC) solutions using Terraform, ensuring seamless and reliable provisioning of AWS resources.
  • I worked on implementing Terraform modules and templates to automate the provisioning, scaling, and lifecycle management of AWS resources.
  • I worked on adhering to Terraform best practices and version control to ensure consistent and compliant infrastructure.
  • Build and configure a virtual data centre in the AWS cloud to support Enterprise Data Warehouse hosting including Virtual Private Cloud (VPC), Public and Private Subnets, Security Groups, Route Tables, and Elastic Load Balancer (ELB).
  • Performed maintenance and troubleshooting on the RedHat OpenShift systems and used it to manage the Kubernetes containerized applications in the worker nodes in EKS clusters.
  • I worked on utilizing advanced clustering technologies, such as provisioned load balancers and auto-scaling, to achieve load balancing and high availability.
  • I worked on implementing robust data synchronization and failover mechanisms for seamless operation across geographically dispersed data centres.
  • I worked on creating and maintaining Ansible playbooks and roles for configuring and managing servers, applications, and services in an automated and consistent manner.
  • § Worked on orchestrating complex deployment workflows using Ansible, streamlining software deployment and updates.
  • worked on managing Ansible inventories, including dynamic inventories, to efficiently govern the infrastructure.
  • Successfully implemented RBAC policies within Amazon EKS clusters to regulate access to Kubernetes resources.
  • I worked on applying infrastructure as code methodologies to automate provisioning and management tasks related to Cassandra clusters.
  • Configured audit logs for RBAC activities, ensuring compliance with security standards and providing visibility into user actions.
  • Implemented and adhered to security best practices in RBAC configurations to fortify the EKS cluster against unauthorized access.
  • I worked on the creation of custom Docker container images, tagging, and pushing the images and Docker consoles for maintaining the application life cycle.
  • Experience building microservices and deploying them into elastic Kubernetes clusters.
  • I worked with AWS services like Glacier, ELB (Elastic Load Balancer), RDS, SNS, SWF, Lambda, and IAM and hands-on experience with Amazon Web Services provision.
  • Manage Kubernetes charts using Helm.

Environment: AWS (EC2, ECS, EKS, S3, EBS, ELB, RDS, SNS, SQS, VPC, Cloud formation, Cloud watch, ELK Stack), Ansible, LDAP, Python (BOTO API), Red Hat Linux, Packer, CloudWatch, Node.js, Groovy, Shell scripting, Ruby, Kubernetes, Grafana, OpenShift, Terraform, JIRA, GIT, New Relic, Nagios.

DevOps Engineer

Guideline
02.2019 - 09.2020

Responsibilities:

  • Worked on Migration of On-premises SQL databases to the Azure MYSQL Using Azure Data Factory Pipelines.
  • Used Azure Virtual Network (VNet) to isolate network environments in Azure also used it to Segment and isolate resources within VNets, established network security and access controls using network security groups (NSGs), connected VNets using virtual network peering and virtual network gateways.
  • Leveraged Azure Load Balancer to distribute incoming network traffic across multiple backend resources to provide high availability and fault tolerance for applications.
  • Setup Azure Application Gateway to Optimize and secure web traffic for applications and act as a web traffic load balancer and reverse proxy also used it for SSL termination, URL-based routing, session affinity and advanced application layer (Layer 7) load balancing capabilities.
  • Used Azure Traffic Manager to distribute user traffic across global Azure regions and Improve application performance and availability for users.
  • Used Azure VPN Gateway to establish secure, encrypted connections between on-premises networks and Azure VNets. I have also integrated Azure VPN Gateway with Azure Active Directory for user authentication.
  • Integrate Red Hat Quay with Kubernetes/OpenShift 4.13 for seamless container orchestration.
  • Configured Azure ExpressRoute to establish private, dedicated network connections between on-premises networks and Azure to enable fast, reliable, and low-latency connectivity to Azure resources.
  • Configured Azure Boards for Agile project management, work item tracking, and team collaboration. I have set up projects in Azure DevOps, configured boards and backlogs, defined work item types and fields, set up iterations and sprints, and invited team members to collaborate on work items.
  • Monitor Red Hat Quay and its interactions with other infrastructure components.
  • Configured Azure Repos for Version control and source code management for collaborative software development. Configured branch policies, set up access controls, and invited team members to contribute and collaborate on code.
  • Created Azure Pipelines for Continuous Integration and Continuous Deployment (CI/CD) to build, test, and deploy applications and configured Azure Artifacts for Package management for storing and managing software artifacts.
  • Configured a package feed in Azure Artifacts, defined feeds for specific package types (e.g., npm, Maven), set up permissions and access controls, and published packages to the feed using your build pipelines.
  • Configured application and infrastructure monitoring in Azure Monitor, set up metric and log collection, created alerts based on defined criteria, defined dashboards, and visualizations, and integrated with other Azure services for enhanced monitoring capabilities.
  • Created Azure Key Vault, configured access policies and permissions, imported, and generated cryptographic keys and certificates, stored secrets, and integrated with applications to securely retrieve and use sensitive information.
  • Created Azure Resource Manager (ARM) templates for the provisioning, managing, and deployment of Azure resources using Infrastructure as Code (IaC) principles. Streamlined the creation and maintenance of infrastructure to ensure consistent and reproducible deployments.
  • Optimized deployment strategies in Red Hat OpenShift to minimize downtime and ensure application availability.
  • Pull container images from Quay as needed for their applications.
  • Authored Bicep scripts for the declarative deployment of Azure resources, leveraging the principles of Infrastructure as Code (IaC).
  • By leveraging Bicep's integration with Azure tooling like Azure CLI and Azure PowerShell, I've streamlined the process of deploying and managing Azure resources, leading to increased efficiency in our DevOps practices.
  • By using the Bicep transpiler to generate ARM templates, I've ensured that our Bicep scripts are fully compatible with all the existing Azure services and features that support ARM.
  • Created Azure Virtual Machines (VMs) for running applications, including hosting web applications, running background services, and performing development and testing tasks.
  • Configured Azure Container Registry to securely store and manage container images, which enabled seamless integration with Azure Kubernetes Service (AKS) for container orchestration and scalable application deployments.

Environment: Azure, Terraform, Kubernetes, Ansible, Shell, Python, Linux, Jira, Bitbucket, My SQL, Jenkins, Apache Tomcat 7. x, Azure-DevOps, Docker, NoSQL, ARM, Virtualization, Nagios, Splunk, App Dynamics Nginx, LDAP, JDK1.7, XML, SVN, Git, Windows, Maven

Cloud DevOps Engineer

Remco Auto Insurance
08.2017 - 01.2019

Responsibilities:

  • I worked on the portal for triggering builds and releasing them to stakeholders by understanding the pain points of developers and QA engineers.
  • I worked extensively with Apache Cassandra, leveraging its open-source capabilities to develop robust and scalable data storage solutions.
  • Hands-on experience in architecting and deploying Cassandra clusters, ensuring seamless data distribution and redundancy across multiple nodes.
  • I played a pivotal role in optimizing Cassandra’s schema design, utilizing my hands-on experience to enhance data retrieval performance.
  • Created and maintained infrastructure as code (IaC) solutions using Terraform, ensuring rapid and consistent provisioning of AWS resources.
  • Employed Terraform modules and templates to automate resource provisioning, scaling, and lifecycle management in AWS.
  • Implemented version control and Terraform best practices to guarantee infrastructure reliability and compliance.
  • Designed and deployed data clustering solutions spanning multiple data centres, bolstering data availability and resilience.
  • Utilized advanced clustering technologies to achieve load balancing and high availability.
  • Engineered robust data synchronization and failover mechanisms for seamless operation across geographically dispersed data centres.
  • Crafted Ansible playbooks and roles to orchestrate the configuration and maintenance of servers, applications, and services.
  • Streamlined software deployment and updates through the automation of intricate deployment workflows using Ansible.
  • Manage Ansible inventories, including dynamic inventories, for efficient infrastructure governance.
  • Successfully deployed, configured, and fine-tuned Apache Cassandra clusters, ensuring optimal performance for high-throughput, low-latency data storage.
  • Implemented infrastructure as code methodologies to automate provisioning and management tasks related to Cassandra clusters.
  • Led performance optimization efforts and adeptly resolved Cassandra-related challenges.
  • Actively collaborated with cross-functional teams, fostering a DevOps culture, and promoting best practices across development and operations.
  • Participated in regular knowledge-sharing sessions and meetings to facilitate the continuous improvement of processes and workflows.
  • Established robust monitoring and alerting solutions, including Prometheus and Grafana, to proactively identify and address infrastructure and application issues.
  • Demonstrated strong troubleshooting skills, conducted in-depth root cause analysis, and implemented remediation measures.
  • Maintained comprehensive documentation of infrastructure configurations, deployment procedures, and troubleshooting guidelines, ensuring seamless onboarding and knowledge transfer.
  • Facilitated knowledge sharing among team members through the organized documentation of best practices and lessons learned.

Environment: Java, AWS, Eclipse, Tomcat, Apache, Chef, Oracle 11g, Jenkins, Python, JIRA, Maven, Git, Windows, Ruby, Chef, Windows.

Linux Administrator

UPMC
02.2013 - 06.2017

Responsibilities:

  • Responsible for Software and application package administration and troubleshooting at the user level and deployment management.
  • Performed upgrades of Packages and Patches in Linux.
  • Configuring Redhat Linux Servers with Jumpstart and Kick Start.
  • Resolving production issues/tickets by using the ticketing tool.
  • Responsible for creating and maintaining Git branches and tagging activities.
  • Responsible for daily tasks such as user setup, group setup, installation and upgrading new machines on RHEL.
  • Manage all CM tools (SVN, Maven, Jenkins, Git, GitHub) and their usage process ensuring traceability, repeatability, quality, and support.
  • Patch Management, Package Management, RPM, and User Administration.
  • Written Chef Recipes to automate our build/deployment process and do an overall process improvement to any manual processes.
  • Experience with Setting up Chef Infrastructure, Chef-repo and Bootstrapping Chef nodes.
  • Experience with WebLogic, JBoss, WebSphere, and Tomcat application servers.
  • Experience in creating users, groups, Data Sources, and JMS Sources in WebLogic.
  • Troubleshooting and analysis of hardware and software failures for various Solaris servers (core dump and log file analysis).
  • Hands-on knowledge of Ruby and Python scripting.
  • Collecting Pre-Migration Data using Shell scripts for Solaris and Linux to handle Server Migration each weekend.
  • Performed automated jobs to do patching, selinux, FTP, Vulnerability, log rotate, Inventory backup, and post-build tasks using scripting.
  • Day-to-day duties involved Linux server maintenance and support to the developer's team for their issue’s application, tuning, troubleshooting, and software running.
  • Installed the latest patches for, Oracle on Red Hat Linux servers, Configured and administered Send mail, Samba, and Squid servers in the Linux environment.
  • Set up the Linux Cron jobs for automating various build-related jobs and application data synchronization jobs.
  • Responsible for building Linux OS servers using kick-start automation applications.
  • Updated previous LDAP tools to work with the version of Ruby Rails.
  • Involved in Installing, Configuring and Upgrading Red Hat Linux AS 4/5, and Solaris 9/10 operating systems.
  • Performed automated installations of Operating System using kick start for Red Hat Enterprise Linux5/6 and Jumpstart for Solaris 9/10 Linux.
  • Administered and supported distributions of Linux, including Linux Enterprise Desktop, SUSE Linux Enterprise Server, Red Hat, and Solaris.
  • Install, maintain, and upgrade Drupal and WordPress on the LAMP stack and configure the LAMP Stack on Unix/Linux servers.
  • Developed, customized, and built packages on Solaris and rpms on Linux for deployment on various servers through the Software Development Life Cycle.

Environment: Oracle on Red Hat Linux, Samba, Squid, Red Hat Linux AS 4/5, Solaris 9/10, Linux Enterprise Desktop, SUSE Linux Enterprise Server, Red Hat and Solaris, LDAP.  RHEL 5/6, CHEF, RPM, YUM, Selinux, NFS Shell & Ruby Script, Puppet, Networking's DNS, FTP, TCP/IP, HTTP, VMware, Oracle/ Sun Solaris, Windows, ESX host cluster, Apache web server, Kernel Virtual Machine, Samba, SSH keygen tool.

Education

Bachelors in - Computer Science

JNTU-H
06.2011

Skills

  • Cloud Technologies: AWS, AZURE, GCP
  • Containerization: Kubernetes, Docker, Docker Swarm
  • Configuration Management: Ansible, Terraform, and Chef
  • CI/CD: Jenkins/Hudson, Gitlab, Bamboo
  • Build Tools: Maven, NPM, Ant
  • Version Control Tools: GIT, GitHub, Bitbucket, SVN
  • Scripting Languages: Golang, Python, Java, Terraform, JSON, YAML, Bash, Shell, PowerShell
  • Web Servers: Apache Tomcat, Nginx
  • Monitoring Tools: AppDynamics, Prometheus, Splunk, Nagios, ELK, Grafana, Dynatrace, Cloud Watch, Azure Monitor
  • Repository Management: JFrog, Nexus
  • Bug Tracking Tools: JIRA, Bugzilla, IBM ClearQuest
  • Databases: MySQL, MS Access, NoSQL (MongoDB, DynamoDB)
  • Virtualization Technologies: VMware ESX/ESXi, Windows Hyper-V, Virtual box, Vagrant
  • Security: Firemon

CAREER OBJECTIVE

Overall, 10+ years of IT experience, of which 4 years as a Linux Administrator and 6+ years as a DevOps/Cloud Engineer dedicated to automation and optimization, Understanding and managing the space between operations and development to quickly deliver features to customers, having experience with the cloud as well as DevOps automation development for Linux systems and Windows, brings maturity, enthusiasm, and a drive to learn new technologies along with real-world experience.

Certification

  • Certified Microsoft Azure AZ-400
  • Certified Kubernetes Administrator
  • Certified Terraform Associate
  • AWS Certified Developer Associate
  • AWS Certified Solution Architect Associate

Timeline

Senior Cloud DevOps Engineer

Southern Company
08.2022 - Current

Senior DevOps Engineer

Vanguard
10.2020 - 07.2022

DevOps Engineer

Guideline
02.2019 - 09.2020

Cloud DevOps Engineer

Remco Auto Insurance
08.2017 - 01.2019

Linux Administrator

UPMC
02.2013 - 06.2017

Bachelors in - Computer Science

JNTU-H
Srikanth Reddy Etikala