Cloud Engineer/devops Resume
Saint Louis, MissourI
SUMMARY
- Experience in using and configuring AWS services such as EC2, EBS, RDS, Cloud Watch, Auto - scaling, IAM, Dynamo, DB, Route 53, and S3.
- Expertise on working Jenkins, Git, maven, Docker, Nagios, and Linux/Unix system administrator on RHEL 4.x, 5.x, 6.x, Debian, CentOS 4.x,5.x, Suse, Oracle Enterprise Linux, FreeBSD and VMware, V-Sphere ESX/ESXI environment.
- Responsible for the creation of S3 buckets and policies and for the creation of IAM role-based policies. Configured S3 versioning and lifecycle policies to and backup files and archive files in Glacier.
- Experience with CI (Continuous Integration) and CD (Continuous Deployment) methodologies using Jenkins. Strong knowledge / experience in creating Jenkins CI/CD pipelines and good experience in automating deployment pipelines.
- Good experience in writing of Cloud Formation Templates (CFT) in JSON and YAML format to build the AWS services with the paradigm of Infrastructure as a Code.
- Implemented and designed AWS virtual servers by Ansible roles to ensure deployment of web applications. Quickly deploys critical applications, Environment configuration Files, Users, Mount points, Packages and proactively manages change.
- Experience in using Ansible to manage Web Applications, Config Files, Data Base, Commands, Users Mount Points, and Packages. Also, worked on integrating Ansible YAML Scripts.
- Built out Infrastructure as a Service (IAAS) private cloud OpenStack and managed deployment of Microservices using Kubernetes, Docker and etc to production environment. Performed server monitoring, Application monitoring, Capacity Planning and log monitoring using Nagios and Splunk.
- Knowledge on various Docker components like Docker Engine, Hub, Machine, Compose and Docker Registry. Experience with container-based deployments using Docker, working with Docker images, Docker hub and Docker registries.
- Experienced in working on Docker Hub, Docker Swarm, Docker Container network, creating Image files primarily for middleware installations & domain configurations.
- Experience in code deployment and orchestration with tools such Ansible, Bash and Terraform.
- Creating, validating, and reviewing solutions and effort estimate of converting existing workloads from classic to ARM based Azure Cloud Environment.
- Worked with Windows Azure portal to manage Virtual Network and Traffic Manager.
- Expertise in writing new plugins to support new functionality in Terraform. Setting up the build and deployment automation for Terraform scripts using Jenkins.
- Defined several Terraform modules such as compute, Network, Operations, Users to reuse in different environments. Involved in using Terraform and Ansible, migrate legacy and monolithic systems to Amazon Web Services.
- Configured and maintained Jenkins to implement the CI process and integrated the tool with Ant and maven to schedule the builds. Proficient with Shell, Python, JSON, YAML, Groovy scripting languages.
- Developed GIT hooks for the local repository, code commit and remote repository, code push functionality and worked on the GitHub. Configured GIT with Jenkins and schedule jobs using Poll SCM option.
TECHNICAL SKILLS
Operating System: Red Hat 5/6/7, SOLARIS 8/9/10, UBUNTU, FEDORA, WINDOWS 2008 R2
Cloud (AWS): VPC, EC-2, S3, IAM, RDS, ROUTE 53, ELB, Auto Scaling, LAMBDA, SNS, ELASTIC BEANSTALK, NAT
Virtualization/Container Technologies: DOCKER, VMWARE V-SPHERE 5.5, ORACLE VIRTUALBOX
Orchestration Tools: TERRAFORM, VAGRANT, KUBERNETES, CLOUD FORMATION
Build-Integration-Testing: JENKINS, ANT, MAVEN, NEXUS, SONARQUBE, JUNIT
Scripting Languages: PowerShell, BASH, PYTHON 2/3, GROOVY-DSL, RUBY-DSL
Configuration Management: ANSIBLE, CHEF, PUPPET
Structured Data Formats: JSON, YAML, XML
Web Technologies/Programming Languages: PYTHON, PHP, JAVA, MySQL, MARIADB, APACHE, HTML, CSS
Version Control: GIT, SVN
Process Management: SNOW, JIRA, REMEDY, SYSAID
Monitoring: NAGIOS, CLOUD WATCH, CLOUD TRAIL, ELASTIC STACK, SPLUNK, APPDYNAMICS, Dynatrace, Grafana
PROFESSIONAL EXPERIENCE
Confidential, Saint Louis, Missouri
Cloud Engineer/DevOps
Responsibilities:
- Setup AWS infrastructure by creating public, private subnets, Route Tables, NAT devices, VPC- Peering, Bastion hosts and defining ACL's for enhanced secured at subnet level.
- Worked on creation and managing IT infrastructure and application stack using AWS Cloud Formation and writing the template file using JSON.
- Enabled enhanced security at instance level by creating Security Groups, IAM Roles specific for EC-2 instances.
- Maintained high availability and elasticity in cloud by configuring ELB to route traffic to healthy instances in different availability zones and adding them to the Auto-Scaling group to spin up and down the EC-2 instances based on cloud watch alarms.
- Configured End-End CI-CD pipelines with Jenkins file using Ant, Git, Ansible, Docker by defining stages for Junit testing, Jar packaging, Functional testing on Docker containers, SonarQube code analysis, deployment through ansible playbook and triggering notifications post success all this automatically triggered by a git commit and promoting to other environments.
- Designing and implemented fully automated server build management, monitored and deployed using DevOps Technologies like Ansible.
- Designed a patch process and wrote ansible playbooks for patching OpenShift -RHEL, atomic OS and also for bug fix for OpenShift.
- Organized Ansible Playbooks as Roles for reuse such as created roles for Apache, MySQL, Docker, Jenkins, and Nagios for including them in other ansible playbooks instead of constructing from scratch.
- Installed, configured, managed, and monitoring tools such as Splunk, AppDynamics, Dynatrace for Resource monitoring, network monitoring, log trace monitoring.
- Create develop and test environments of different applications by provisioning Kubernetes clusters on AWS using Docker, Ansible, and Terraform. Responsible for creating Jenkins pipeline for deployment using Ansible.
- Configured IAM policies for IAM users and AWS resources with principle of least privilege approach using the policy generator to apply policies at granular level.
- Managed Kubernetes charts using Helm, and Created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages.
- Used Kubernetes to deploy scale, load balance, scale and manage Docker containers with multiple names spaced versions.
- Converted existing Terraform modules that had version conflicts to utilize CloudFormation during Terraform deployments to enable more control or missing capabilities.
- In production environment, using Terraform configured the AWS autoscaling policy resource and set the autoscaling group name parameter.
- Used AppDynamics for administrative activities like user management, application management and monitoring controller performance. Splunk used for monitoring system logs essential to finding problems and halting deployment pipelines.
- Created Docker containers by pulling docker files from GITHUB and using them as agents for functional tests in Jenkins pipeline.
Environment: AWS, Azure, Kubernets, Docker, Enterprise Docker registry, Jenkins, JIRA, Groovy, Active directory, Shell Scripts, Red Shift, Cloud Watch, Cloud Formation, Cloud Trail, Cloud Front, Ansible, Python, MySQL, PostgreSQL, MariaDB, Cassandra, Amazon RDS, DynamoDB, Elasticsearch, Log stash, Kibana, FluentD, kubernetes, VMware.
Confidential, Urbandale, Iowa
DevOps Engineer/Cloud
Responsibilities:
- Experienced in Cloud Technologies in infrastructure automation (Infrastructure as a Service-IaaS) like Amazon Web Services (AWS), VPC, EC2, Lambda, ELB, SNS, SQS, ALB, EIP, EBS, Auto Scaling, S3, Glacier, IAM, Route 53, Cloud Watch.
- Involved in Continuous Integration and Continuous Deployment (CI-CD) using various CI Tools like Drone and Jenkins.
- CI-CD pipeline is handled via Drone tool which runs on the base of Docker images. Migrated the Elastic Search Jobs from Jenkins To Drone.
- Use of docker containers to build artifacts via drone to deploy them on to EC2 linux instances in AWS.
- Worked on AWS CLI and AWS APIs through Ruby scripting.
- Wrote python scripts for implementing Lambda functions. Created API as a front door application to access data or functionality from backend services running on EC2 and code running on Lambda or any web application.
- Created Azure services using ARM templates (JSON) and ensured no changes in the present infrastructure while doing incremental deployment.
- Provided status to Business Level management and Technical and conducting Proof of Concept for Latest Azure cloud-based service.
- Acted as a subject matter expert for troubleshooting and resolving complex, multi-tier web problems.
- Used Ansible to run ad-hoc commands and playbooks to automate tasks and written playbooks and managed Ansible Playbooks with Ansible roles. Used file module in Ansible playbook to copy and remove files on remote systems.
- Wrote Puppet Manifest files to deploy automated tasks to many servers at once. Installed and configured Puppet that included the installation and configuration of the Puppet master, agent nodes and an admin control workstation.
- Created Puppet Manifests to provision Apache Web servers, Tomcat servers, Nginx, Apache Spark and other application.
- Automating day to day tasks through Bash and Python scripting wherever required.
- Effective in creating functions and assigning roles in AWS Lambda to run python scripts and used java to perform event driven processing.
- Maintain and trouble shoot systems performance and network monitoring using tools like Nagios, and AWS services such as Cloud watch, Cloud Trail.
- Good understanding of branching, build, deployment, CI/CD methodologies such as Octopus and Bamboo.
- Managed servers on the Amazon Web Services (AWS) platform instances using Chef Configuration management. Creating snapshots and amazon machine images (AMIs) of the instances for backup and creating clone instances.
Environment: AWS, Azure, Kubernets, Docker, Enterprise Docker registry, Jenkins, JIRA, Groovy, Active directory, Shell Scripts, Red Shift, Cloud Watch, Cloud Formation, Cloud Trail, Cloud Front, Ansible, Python, MySQL, PostgreSQL, MariaDB, Cassandra, Amazon RDS, DynamoDB, Elasticsearch, Log stash, Kibana, FluentD, kubernetes, VMware.