Devops Engineer/aws/azure Resume
Dallas, TX
SUMMARY
- 8 +years of experience as Development Operations (DevOps)/Build and Release Engineer in automating, building, deploying, managing and releasing of code from one environment to another environment.
- Extensive experience using MAVEN and ANT as build tools for the building of deployable artifacts (jar, war & ear) from source code.
- Experienced with CI/CD process with AzureDevOps build and release pipelines.
- Experienced with Azure Artifacts and JFROG artifactory.
- Experienced with automation tools like Terraform, Cloudformation and ARM templates.
- Experienced with configuration management tool like Ansible.
- Experience in automated builds using TFS team build and cruisecontrol.net build for .net applications and salesforce.
- Experience in Cloud Provisioning like Amazon Web Services (AWS), Azure administration.
- Experience in EC2, EBS, VPC, S3, Route 53, IAM, ELB, ALB, Autoscaling, Elastic Beanstalk
- Deployed and maintained Chef role - based application servers, including Apache, Resin, Nginx and Tomcat.
- Used to write an install script in Ruby using all of the extra helper functions from Chef.
- Used to setup the client-server setup using Puppet enterprise.
- Experience in working on source control tools like Tortoise SVN, CVS, IBM Clear case, Perforce, and GIT.
- Extensively worked on Hudson, Jenkins, Team City and Bamboo for continuous integration (CI) and for End to End automation for all build and deployments.
- Hands on experience in installing and administrating CI tools like Hudson/Jenkins, Sonar, Subversion/Accurev and Nexus/Artifactory.
- Experience in managing the Artifacts generated by MAVEN in the Nexus Repository.
- Performed integration of Code Quality Analysis Techniques like Check styles, Find Bugs, and PMD with CI tools like Hudson/Jenkins.
TECHNICAL SKILLS
Operating System: Ubuntu,UNIX, LINUX, Mac OS.
Build Tools: Ant, Maven, MS Build
Scripting Languages: PowerShell scripting, Perl scripting, Python.
Version Control Tools: Git, Github
Automation Tools: Terraform, Cloudformation, ARM Templates
Configuration management Tools: Ansible, Chef
Web/ Application Servers: Apache Tomcat, JBOSS, Web sphere, Web logic.
SCM Tools: AzureDevOps, Team Foundation Server (TFS), Clear Case.
SDLC: Agile, Scrum Methodologies, Waterfall
Platforms: Linux 4/5, Ubuntu
CI/CD tools: Jenkins, AzureDevOps
Monitoring Tools: Icinga, Newrelic, grafana
PROFESSIONAL EXPERIENCE
Confidential, Dallas, TX
DevOps Engineer/AWS/Azure
Responsibilities:
- Implemented Azure DevOps Pipelines for CI/CD setup, deployed applications automatically by enabling the triggers to deploy.
- Integrated SonarQube Enterprise into pipeline for checking for 80% code coverage and 0 code smells in the code. Also implemented PR analysis in pipeline where the build will be failed if code coverage is below 80% need to qualify the Sonar Way quality gate.
- Used Azure artifacts for storing the build artifacts where versioning is solid and accurate, also used JFROG artifactory for storing Docker images.
- Integrated Checkmarx CxSAST is an enterprise-grade flexible and accurate static analysis solution used to identify hundreds of security vulnerabilities in custom code. Security teams to scan source code early in the SDLC, identify vulnerabilities and provide actionable insights to remediate them.
- Deployed build artifacts automatically from JFROG using Terraform scripts to deploy to ECS clusters.
- Created multiple EBS volumes and attached to single EC2 instance.
- Setup security groups in VPC to manage the inbound and outbound traffic where all the rules get evaluated.
- Setup Network ACL’s on VPC which blocks the inbound and outbound explicitly.
- Setup VPC peering between 2 different VPC’s.
- Hosted a static website on S3 which is accessed by a web URL. Also wrote life cycle policies to archive the data into Amazon Glacier based on the usage.
- Enabled logging and versioning of the S3 buckets. Used Accelerated way to upload data to S3 using edge locations.
- Configured IAM policies to create users, roles and groups and gave access to users-based role in a team.
- Configured ELB to support routing and load balancing of HTTP, HTTPS, TCP and SSL traffic to EC2 instance.
- Configured Internet facing load balancers and Internal load balancers. Offloaded SSL certificates on ELB to improve the performance. Used ELB to health checks for EC2.
- Configured Sticky sessions on ELB where all the requests are served to single EC2 instance.
- Configured DNS with Route53 to route users to internet-based applications by using Hosted Zones. Restrict the users to route to there application with Private Hosted Zones.
- All infrastructure components for different environments (Dev/Test/Prod) are provisioned via Terraform scripts, CloudFormation with no manual intervention in AWS.
- Deployed application secrets and sensitive configuration data like tokens, passwords, certificates, encryption keys etc., into AWS Secrets Manager.
- Integrated JMeter Performance Testing into release pipeline so that every build after it is deployed into DEV, UAT, or PROD it will do a performance test automatically. Depends on the threshold that I setup it will check and break the release if the performance is below threshold value.
- Updated runbooks, tools and documentation to help prepare on-call teams for future incidents.
- I also have worked on System and application Monitoring setup with Icinga, Newrelic, grafana etc.
- Created Lambda Functions and triggered them based on events to deploy the AWS services that you have configured.
- Integrated Checkmarx into pipeline and reduce false positives and assist with remediation questions on findings. This scanning will be able to be performed as part of your teams’ regular commit cycle, rather than on the infrequent basis previously mandated by WhiteHat.
- Integrated Ansible Tower to our environment, non-administrative users can safely request and manage virtual resources using the Playbooks we provide them all without needing access to sensitive credentials.
Environment: Azure CI/CD, Azure artifacts, AWS, S3, Cloud Watch, Kibana, API Gateway, ECS, Fargate, Terraform, AKS, Ansible, Docker, Git, Jenkins, CI/CD, Azure Devops, Keyvault, AAD groups, Log analytics, Azure Monitor, ACS, Service principals, AWS, PowerShell, Python, Bash, Shell, Kubernetes, Docker Compose, Docker Swarm, Ansible Tower, Splunk, Sensu, SQL.
Confidential, Dallas, TX
DevOps Engineer/AWS/Azure
Responsibilities:
- Setup API gateway for services and included a load balancer and add an entry in F5 pointing to our API gateway since some of env’s are publicly accessible.
- Setup logs streaming into Kibana and setup indexes to search for application logs when there is an issue.
- Implemented CI/CD builds and releases of our software and infrastructure and Monitoring and alerting of our production environment.
- Enabled developers with good practices and Help with containerization efforts for production systems.
- Created docker images and stored under ACR and deployed the build artifacts and docker images onto AKS as a container service with ARM template where infrastructure is provisioned automatically with ARM template.
- Created AKS clusters with basic and advanced networking where Basic Networking Model Called Kubenet which is default configuration When creating an AKS cluster and k8s cluster is completely separate from Azure network and on-prem network Suitable if You are deploying in an Isolated Environment.
- Created AKS cluster with advanced networking where It makes Pods first class citizens in our network with Azure CNI, Every Pod will get an Ip address from the Virtual Network.
- Created external and internal ASE in azure which is a deployment of Azure App Service into a subnet in an Azure virtual network (VNet).
- Internal ASE is deployed into a private subnet within our private VNET will allow access to the app service internally.
- Moved app services from one service plan to other service plan without any service discerption to the app.
- Added Azure CDN to an Azure App Service web app and Accessed storage blobs using an Azure CDN custom domain over HTTPS.
- Integrated our ILB App Service Environment with the Azure Application Gateway.
- Enable customers to elastically scale throughput and storage based on demand, globally with Azure Cosmos DB.
- Azure Cosmos DB’s highly modular and fully resource governed approach to solve a variety of coordination problems including, cross region replication and transparent partition management.
- Help track and maintain uptime for production systems and Help and document Root Cause Analysis (RCA).
- Used Ansible to Remediate faster-automating actions like blacklisting attacking IP addresses or domains, whitelisting non-threatening traffic or isolating suspicious workloads for further investigation.
- Build effective monitoring, logging and auditing of production systems to ensure compliancy with mandated policies.
- Guide and support application teams with onboarding, troubleshoot and resolve implementation issues like Troubleshoot and identify performance, connectivity and other issues for the applications hosted in Azure platform.
- Writing custom gradle tasks, publishing pulgins to gradle pulgins portal.
- Created an event source mapping in Lambda that reads items from a stream or queue and invokes a function.
- Created AKS internal load balancers and external load balancers to communicate the traffic between the pods internally and externally.
- Migrated TFS CI/CD pipeline into AzureDevops pipeline and restored the artifacts into azureartifacts.
- Stored the state of the files and configuration stored under S3 buckets.
- Setup metrics logs through CloudWatch and trigger an alert email when a threshold is meet.
Environment: Azure CI/CD, Jenkins, TFS, Bitbucket, Kafka, Fargate, Newrelic, Appdynamics, Azure artifacts, AWS, S3, Cloud Watch, Kibana, API Gateway, ECS, Fargate, Terraform, AKS, Ansible, Docker, Git, Jenkins, CI/CD, Azure Devops, Keyvault, AAD groups, Log analytics, Azure Monitor, ACS, Service principals, AWS, PowerShell, Python, Bash, Shell, Kubernetes, Docker Compose, Docker Swarm, Ansible Tower, Splunk, Sensu, SQL.
Confidential, Dallas, TX
Azure Admin/DevOps Engineer/AWS
Responsibilities:
- Perform general administration duties including permissions, upgrades, and patches on cloud systems (Azure, AWS).
- Implementing Azure Resource Groups, Resource Tags, AAD groups, and Role based access.
- Designing and implementing cloud network architecture using Azure virtual networks, VPN and express route to establish connectivity between on premise and cloud.
- Develop PowerShell scripts, Azure CLI, and ARM templates to automate the provisioning and deployment process.
- Created ARM template to join VM to existing domains, Create a sandbox setup of Azure Firewall with Zones.
- Setup Routing policies like Simple Routing, Weighted Routing, Latency-based Routing, Geolocation Routing, and Failover Routing with Route53.
- Configured Dynamic Autoscaling and defined parameters in such way that if CPU utilization is above 90% add more instances, if below 60% utilization remove extra instances.
- Setup Launch Configuration in Autoscaling to create new EC2 instances based on the configuration details you provide.
- Configured Autoscaling Groups which is the collections of EC2 instances so that we can add those groups to add more EC2 instances or to remove EC2 instances.
- Created Elastic Beanstalk where it auto provisions resources like ELB, EC2, S3, Security Groups, EB control Plane, Auto scaling and monitoring so that developers can simply upload their application code.
- Design and deploy applications utilizing AZURE stack (Including Azure VM’s, Blob Storage, SQL Database, Data Factory, Virtual Network, Traffic Manager, Load Balancer, AKS, Key Vault, Log Analytics) to achieve high-availability fault tolerance, and auto scaling in Azure Resource Manager.
- Implement Ansible to automate cloud provisioning, configuration management, and application deployments.
- Implement CI/CD Pipeline for DevOps environment. It bridges the gap between development and operations teams by automating the building, testing, and deployment of applications using Git, Docker, Jenkins, and Ansible.
- Managed Ansible user with K8’s module to manage applications on Kubernetes, on existing IT or across both with one simple language.
- Build API’s in Ansible for operational work to install software so that end users can call API’s from Ansible Tower and can easily install whatever software they want.
- Writing Docker files for Docker images. Spin up Docker containers for environments.
- Creating Clusters using Kubernetes and worked on creating many pods, replication controllers, services, deployments, labels, health checks and ingress by writing YAML files.
- Implemented a production ready, load balanced, highly available, fault-tolerant, auto scaling Kubernetes infrastructure and micro service container orchestration.
- Managed Kubernetes charts using Helm. Created reproducible builds of the kubernetes applications, template Kubernetes manifests, and provide a set of configuration parameters to customize the deployment and Managed releases of Helm packages.
- Terraform to build a Kubernetes cluster on AWS and bootstrap a kubernetes cluster using Kubeadm
- Maintained the user accounts (IAM), RDS, Route 53, VPC, RDB, Dynamo DB, SES, SQS and SNS services in AWS cloud.
- Utilized AWS Cloud Watch to monitor the performance environment instances for operational and performance metrics during load testing.
- Worked on AWS EC2, EBS, Trusted Advisor, S3, Cloud Watch, Cloud Front, IAM, Security Groups, Auto-Scaling.
- Set-up AWS infrastructure (using terraform and Ansible) required to run the application as per client’s standards (In HA, DR with Load balancing and DNS routing).
Environment: Azure, AWS, AKS, Ansible, Docker, Git, Jenkins, CI/CD, Azure Devops, Keyvault, AAD groups, Log analytics, Azure Monitor, ACS, Service principals, AWS, PowerShell, Python, Bash, Shell, Kubernetes, Docker Compose, Docker Swarm, Ansible Tower, Splunk, Sensu, SQL.