Understanding the present environment, process, and client requirements.
Experience in migration Iam users to SSO.
Developing and maintaining custom Kubernetes controllers and operators to automate common tasks and workflows.
Experience in creating, configuring, and maintaining infrastructure on AWS Cloud services, including Virtual Private Cloud (VPC), EC2, RDS, S3, Route 53, SNS, CloudFront, CloudWatch, and IAM.
Set up and maintained highly available Kafka clusters, ensuring optimal performance and fault tolerance by configuring brokers, topics, partitions, and replication factors.
Developed and maintained Helm charts for deploying and managing Kubernetes applications, streamlining the deployment process.
Experience in migrating servers and databases from data centers to Amazon Web Services (AWS) and Azure.
Proficient in creating various dashboards, metrics, alarms, and notifications for servers using AWS CloudWatch.
Experienced in creating complex IAM policies, roles, and user management for delegated access within AWS.
Hands-on experience in setting up databases in AWS using RDS, storage using S3 buckets, and configuring instance backups to S3 buckets to ensure fault tolerance and high availability.
Utilized various services in Google Cloud Platform (GCP), such as Cloud Run, Cloud Build, and Artifact Registry, to deploy microservices.
Configured New Relic APM for Cloud Run services to monitor application performance and optimize latency.
Integrated New Relic Logs by forwarding Cloud Run logs using Fluentd/FireLens for centralized log management.
Set up custom alerts and dashboards in New Relic to track application health and key performance metrics in real time.
Deployed Datadog agents for collecting metrics and logs from Cloud Run instances via Google Cloud Operations Suite (formerly Stackdriver).
Configured custom metrics and tags in Datadog for detailed monitoring of Cloud Run services.
Established real-time dashboards and alerting in Datadog for error rates, latencies, and CPU/memory utilization of Cloud Run containers.
Deployed .NET APIs to Cloud Run using Cloud Build, with triggers set up to automate the building and pushing of Docker images.
Deployed containers to a Kubernetes (K8s) cluster using Helm charts.
Configured and optimized resource requests and limits for containers to ensure efficient utilization of cluster resources.
Experienced in managing Kubernetes clusters on cloud platforms (AWS EKS, Azure AKS, GCP GKE), including scaling, upgrades, and troubleshooting.
Implemented a CI/CD pipeline involving Git, Jenkins, Maven, Ansible, Docker, SonarQube, and JFrog Artifactory for complete automation.
Integrated Prometheus and Grafana with the Kubernetes cluster to monitor metrics and created multiple Grafana dashboards for visualization.
Experienced in creating pipelines and multibranch pipelines for our services in development, staging, and pre-production environments using integrated tools like Jenkins.
Developed a CI/CD pipeline for the deployment of all microservices.
Configured virtual machines using Ansible and created numerous playbooks and roles.
Used Python, particularly the Boto3 module, for Lambda automation.
Managed cloud environments and deployed applications across various cloud platforms, including Azure, AWS, and GCP.
Created Docker files for both Java and .NET applications.
Developed multiple Terraform modules to create AWS resources.
Deployed and configured Azure resources such as Virtual Machines (VMs), Virtual Networks (VNets), Storage Accounts, and Azure Kubernetes Service (AKS).
Implemented Azure security best practices, including role-based access control (RBAC), network security groups (NSGs), and encryption.
Configured and managed Azure networking components like Virtual Networks (VNets), subnets, Load Balancers, and ExpressRoute.
Provided technical support for Azure-related issues, including infrastructure failures, network issues, and service disruptions.
DevOps Engineer
Innova Solutions
Chennai, Tamil Nadu
05.2022 - 12.2023
Project1: FOXCONN
Project 2 : Change Health Care
Roles :
Managed and orchestrated containerized applications using Kubernetes, ensuring high availability and scalability across multiple environments.
Have configured the web application firewall with application load balancer.
Experience in working with Jenkins pipeline with terraform integration.
Experience in migration IAM users to SSO.
Experience in creating CloudFront origin distribution for s3 buckets hosting static website.
Setting up CICD pipelines for newly created repos in Gitlab as per the client requirement.
Provided technical guidance and support to internal stakeholders on AWS WAF-related issues.
Involved in production on-call support and production deployments.
Automate provisioning and repetitive tasks using Terraform and Python, Docker container, Service Orchestration.
.Experience in implementing AWS lambda to run servers without managing them and to trigger run code by S3 and SNS.
Created shell scripts to automate manual tasks in production, including user account management, log analysis, password generation, software installation, and CPU usage tracking.
Monitored application performance and infrastructure health, implementing automated alerts for potential issues.
Cloud engineer
HTC Global Service
Chennai, Tamil Nadu
02.2020 - 06.2021
Project Name: State Farm Insurance
Roles:
Understanding current environment, processes, and client requirements.
Helped developers with version control system tasks such as branching, merging, and cherry-pick changes. Worked on SCM tools like Git, Git Hub.
Hands on experience on JIRA for creating bug tickets, workflows, pulling reports from dashboard
Implemented the setup for master slave architecture to improve the performance of Jenkins
Configured Lifecycle Management for the files in the EFS
Coordinated with clients to set up new servers according to their specifications.
Deployed microservices in Kubernetes clusters using Jenkins.
Configured EKS clusters using Terraform scripts.
Created deployment files for microservices.
Created and configured Jenkins jobs.
Experienced in creating Jenkins declarative pipelines.
Troubleshot issues with Kubernetes clusters and applications running on them.
Developed and maintained custom Kubernetes controllers and operators to automate common tasks and workflows.
Possess strong communication and collaboration skills, enabling effective teamwork.
Experienced with incident management tools like ServiceNow.
Monitored migration progress, identified risks, and implemented mitigation strategies to resolve issues and minimize project delays.
Led successful migration of on-premises project management systems to Jira Cloud, ensuring seamless transition and minimal disruption to business operations.
Served as primary point of contact for technical support, troubleshooting, and ongoing maintenance of Jira Cloud environments post-migration.
Designed, built, and maintained Kubernetes clusters and related infrastructure.
AWS Engineer
Tata Consultancy Services
Chennai, Tamil Nadu
01.2017 - 02.2020
Project Name: British Telecom(OpenReach)
Roles:
Managed network security using Load balancer, Auto-scaling, security groups and NACL’s.
Used Terraform Cloud to create AWS resources across various environments and leveraged Terraform workspaces for multi-environment deployments.
Experienced in creating complex caching and routing policies with content delivery network (CDN) CloudFront to improve the page speed and TTFB values.
Created Snapshots and Amazon Machine Images (AMIs) for the instances based on the requirements for backup and clone instances.
Created Buckets in AWS and stored files. Enabled Versioning and security for files stored.
Troubleshooting the access related issues and Network related issues using the service now ticketing tool within the client SLA
Developed multiple Terraform modules for reusable infrastructure components.
Created and configured Git branching policies and gained experience in setting up branch protection rules in GitHub.
Worked with GitHub Actions for automating workflows and CI/CD processes.
Created SSL certificates using the OpenSSL tool, integrated them with load balancers, and created Route 53 record sets with routing policies.