We provide IT Staff Augmentation Services!

Kubernetes And Infrastructure Engineer Resume

Lake Forest, CaliforniA

SUMMARY

  • Competitive IT Professional with 7+ of experience comprising of DevOps, Cloud Management, and Linux Servers Administration
  • Good experience with principles and best practices of Software Configuration Management (SCM) in Agile, Scrum, and Waterfall methodologies
  • Extensively worked with Version Control Systems like GIT, SVN (Subversion), CVS, Bitbucket
  • Strong CICD experience using Jenkins, Azure DevOps, for end - to-end build automation and deployments
  • Expertise in using tools like Maven, Ant, MS Build for building deployable artifacts from source code
  • Proficient in installing and configuring Open Source Artifact Repositories like Jfrog Artifactory, Nexus
  • Hands-on experience using Ansible, Chef for the configuration management of the infrastructure
  • Strong experience in managing the Kubernetes environment for scalability, availability and zero downtime
  • Experience in working on AWS and its services like VPC, EC2, IAM, ECS, EBS, RDS, S3, Lambda, ELB, Auto Scaling, Route 53, Cloud Front, Cloud Watch, Cloud Trail, SQS, and SNS
  • Experience in building Docker images using Docker files and container-based deployments on Kubernetes
  • Experience in dealing with Windows Azure IaaS - Virtual Networks (VNET’s), Virtual Machines, Cloud Services, Resource Groups, Express Route, VPN, Load Balancing, Application Gateways, Auto-Scaling
  • Efficient in writing Infrastructure as a code (IaC) in Terraform, Azure resource management (ARM), AWS Cloud formation. Created reusable Terraform modules in both Azure and AWS cloud platforms
  • Experience in developing Dockerfile to containerized applications to deploy on managed kubernetes service EKS and AKS
  • Experienced in infrastructure and application monitoring using Promethues-Grafana, Splunk, New Relic, AWS CloudWatch, and AppDynamics
  • Experienced in setting infra and application logging using EFK stack (Elastic, Fluentd, Kibana), Fluentbit
  • Strong experience in AWS, creating, importing, and launching volumes, EC2, RDS, Lambda, security to design cost-effective, fault-tolerant, and highly available systems
  • Good experience with Helm charts deployments, writing manifest files to deploy K8s objects/microservices
  • Configuring AWS resources for highly available, scalable, and flexible systems to handle load bursts
  • Provision Azure-based high-performance computing environment to support the massive computational requirements of client congressional redistricting Azure application
  • Experience in changing over existing AWS infrastructure to Serverless architecture (AWS Lambda, Kinesis) through the creation of a Serverless Architecture using Lambda, API gateway, Route53, S3
  • Experience in writing scripts using Python, Ruby, YAML, Groovy, and Shell scripts to automate tasks
  • Experience on web servers including Apache HTTP server, NGINX, Apache TOMCAT & application servers such as Oracle WebLogic 9.x/10.x, IBM WebSphere 6.x/7.x/8.x, JBOSS 4.1
  • Experienced with tracking tools like JIRA, Bugzilla, Confluence and Remedy
  • Experienced in DB’s like MySQL, MariaDB, MongoDB, DynamoDB
  • Good understanding of OSI Model, TCP/IP protocol suite (IP, ARP, TCP, UDP, SMTP, FTP, and TFTP)

TECHNICAL SKILLS

Build Tools: Maven, Ant, Gradle

Version Tools: Git, Bitbucket, Subversion, Github

CI-CD Tools: Jenkins, Azure DevOps (VSTS)

Configuration Management Tools: Ansible, Chef

Provisioning Tools: Terraform, CloudFormation, Azure Resource Manager (ARM) templates

Containers Deployments: Docker, Kubernetes, K3s, EKS, AKS, Containerd, MESOS

Monitoring: Nagios, CloudWatch, Splunk, Jira, New Relic, Prometheus-Grafana

Logging: Fluentd, Logstash, Fluentbit, Elasticsearch, Kibana, Promtail-Loki

Cloud Technologies: Amazon Web Services (AWS), Azure

Scripting Languages: Bash Scripting, Python, Ruby, Pearl, JSON, YAML, PowerShell, Groovy

Database: MySQL, DYNAMODB, Amazon Aurora, MariaDB, MongoDB

Networking/ Protocols: DNS, Telnet, LDAP, TCP/IP, FTP, HTTP, HTTPS, SSH, SFTP, SCP, SSL

Virtualization: VMware, Vagrant, KVM, Elastic Container Service

Operating Systems: LINUX (RHEL 4/5/6/7), UNIX, Ubuntu, Centos, Windows

App/Web servers: Apache Tomcat 7/8/9.x, Ngnix, Apache Web Server, Oracle Web logic, IBM Web sphere

PROFESSIONAL EXPERIENCE

Confidential, Lake Forest, California

Kubernetes and Infrastructure Engineer

Responsibilities:

  • Setup and managed light weight Kubernetes K3s for self-healing and high availability
  • Containerized applications using Dockerfile best practices, and integrated with different microservices
  • Deployed Prometheus with Grafana to monitor the Kubernetes cluster and configured alerts firing when different conditions met
  • Integrated EFK (Elasticsearch, Fluentd, Kibana) stack as the logging solution for the deployed kubernetes cluster
  • Provided solution on container runtime by performing proof of concepts on CNCF runtimes
  • Enforced network policies as the security measure on K3s cluster using Callico CNI
  • Executed benchmarking on containers and orchestration platform performance check by using open-source tools Sysbench, JMeter, Apache bench
  • Provided solutions on new technologies based on the proof of concepts to deploy on Kubernetes cluster for edge/IOT environment
  • Deployed Fluent bit as the daemonset on each node and integrated with Fluentd as the aggregator to manage cluster logging
  • Setup Nginx Ingress controller to manage the ingress/egress routing rules for Kubernetes
  • Enforced best security practices to secure containerized environment using Seccomp, SeLinux, and security features of Kubernetes
  • Performed proof of concepts on various open-source CNCF graduated solutions to test and deploy with Kubernetes
  • Managed Kubernetes deployments, objects for high availability and scalability using horizontal pod scaler and resources management
  • Setup light-weight metrics and logs forwarding with Fluentbit, Telegraf, and Metricbeat to different output plugins
  • Ensured cluster security with image vulnerabilities scanning with Twistlock, container runtime security, orchestration platform security
  • Deployed Jaeger for the tracing across the containerized environment for the better observability
  • Developed Terraform modules for the K3s deployment on multi-nodes cluster
  • Proof of Concepts (POC) on cloud native technologies to integrate with light weight Kubernetes K3s
  • Integrated various exporters for Prometheus to scrap metrics for the visualization in Garafana
  • Worked with Ansible to manage the Redhat servers for any configuration changes and new installation/updates
  • Experienced in containerized application tuning with enforcing Cgroups on running pods
  • Managed microservices with analyzed resources allocation to avoid any OOM and CPU throttling events
  • Extensively used Helm to deploy any technology stack with the customized configuration
  • Benchmarked the containers and K3s performance in comparison to the host using Mysql database, Nginx webserver
  • Researched and help with the recommendation on the new technologies relevant to the edge environment
  • Experienced with Agile-Scrum methodologies, effectively involved in sprint backlog refinement, meetings to smooth user stories flow
  • Coordinated with product owner, scrum master to refine the backlog and understand the project requirement
  • Extensively used Bash and Python scripting for the tasks automation

Environment: Kubernetes, K3s, Prometheus, Grafana, Fluentd, Elastic, EFK, Containerd, Fluentbit, Metricbeat, Telegraf, Twistlock, Vault, Nginx Ingress, RedHat, Bash

Confidential, Newark, California

AWS/DevOps Engineer

Responsibilities:

  • Managed GIT Configuration, Branching and Merging, resolved conflicts, Push changes, etc
  • Configure and Manage Amazon Web Services services like EC2, S3, EBS, RDS, VPC, and IAM
  • Configured and maintained Jenkins to implement the CI process and used Maven to schedule the builds
  • Build EC2 servers on AWS, imported volumes, created auto-scaling, load balancers, Route 53,and SNS, etc
  • Written reusable templates using Terraform to build staging and production environments on AWS
  • Configured Ansible to manage AWS and automate build process for AMIs used by all application deployments
  • Created Terraform templates to create custom VPC, NAT, S3, RDS to deploy of Web App’s and databases
  • Developed Python scripts to automate AWS services which include ELB, EC2, Security Groups, and S3
  • Managed deployments in EKS managed Kubernetes, setup multi nodes cluster and deployed containerized applications
  • Involved in setting up Jenkins master and multiple slaves as part of the CI/CD process
  • Created Python scripts for various application-level tasks to implement automation
  • Implemented Kubernetes manifests, helm charts for deployment of microservices into k8s clusters
  • Configured AWS IAM and Security Groups in public and private subnets in VPC
  • Managed IAM accounts (with MFA) and IAM policies to meet security audit & compliance requirements
  • Responsible for automated identification of application server and database server using Ansible scripts
  • Created a CI/CD pipeline to deploy Docker containerized applications in AWS for dynamic scaling features
  • Created several Terraform scripts to build AWS infrastructure and configured it using Ansible
  • Used Kubernetes to deploy scale, load balance, scale and manage Docker containers
  • Involved in Migrating workloads from any platform to AWS with minimal downtime
  • Setup infrastructure and application monitoring and alerts firing using Prometheus and Grafana
  • Worked on ELK architecture and its components like Elastic search, Log stash, and Kibana. Handled installation, administration, and configuration of ELK stack on AWS
  • Part of cloud migration plan and implementation of best practices using database migration service, AWS server migration service from On-Premises to cloud
  • Implemented a load-balanced, highly scalable, and available, fault-tolerant Kubernetes infrastructure
  • Developed environments on AWS by provisioning on EC2 instances using Docker, Bash, and Terraform
  • Installation, administration of CI/CD applications Jenkins, Artifactory, SonarQube, and Docker
  • Integrated Ansible with Terraform to configure and install packages on the newly created Infrastructure
  • Responsible for changing over existing AWS infrastructure to Serverless architecture (AWS Lambda)
  • Involved in writing or modifying Python/Bash/ scripts for process automation of systems, backups, etc.
  • Strong working experience with databases like MySQL, Dynamo DB, Mongo DB and involved in creating stored procedures, functions, triggers, and complex queries
  • Managed Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files & releases of Helm packages
  • Executed Ansible playbooks using various roles for applications and deployed on hosts servers
  • Performed installation and managed Grafana to visualize the metrics collected by Prometheus
  • Used AWS Beanstalk for deploying and scaling web applications and services developed with Java
  • As part of CICD, developed build scripts, maintain, and scale infrastructure for Dev, QA, and Production

Environment: AWS, Jenkins, CI/CD, Docker, EKS Kubernetes, Terraform, Ansible, Maven, Ruby, Python, Grafana, Prometheus, GIT, Github, JIRA, Apache, and MySQL, Groovy, Tomcat, Artifactory, Nginx, Red Hat

Confidential, Mundelein, Illinois

Azure DevOps / Cloud Engineer

Responsibilities:

  • Implemented CI/CD pipeline on Azure DevOps (VSTS, TFS) in both cloud with MS Build, Docker, Mvaen
  • Configured Windows Azure IaaS - Virtual Networks, Virtual Machines, Cloud Services, Resource Groups, Express Route, VPN, Load Balancing, Application Gateways
  • Helped teams to configure webhooks in Bitbucket to trigger automated builds in Jenkins
  • Build and Installed servers through Azure Resource Manager Templates (ARM)
  • Involved in test environment setup to test containerized application.
  • Performed automation and scaling of applications using Kubernetes best practices
  • Created Azure DevOps (VSTS) pipelines for build automation and deployment as part of CICD process
  • Automated environment for the DevOps services using Python and Shell scripts
  • Worked on Azure Storage, SQL Database, Key Vault, Traffic Manager, Auto Scaling using Power Shell
  • Developed Terraform modules to provision cloud infrastructure in different environments
  • Automated configuration management using Chef to quickly deploys critical applications, and updates
  • Used Kubernetes to cluster Docker containers in runtime environment throughout the CI/CD
  • Implemented Azure Infrastructure auto-provisioning, code deployments and software installation using Azure Resource Manager (ARM) templates
  • Configured and deploy services using VSTS (Azure DevOps) pipeline to manage IAC of all applications
  • Built and deployed a Chef Server in Azure for infrastructure automation
  • Enable the processing, management, storage and analysis of data using data fabric
  • Experienced in creating pods and clusters using templates in Kubernetes and deploy using helm chart
  • Designed Network Security Groups to control inbound and outbound access to NICs, VMs, and subnets
  • Created Docker images with Docker File, worked on creating an environment for Docker volumes
  • Configured Azure Active Directory and manage users and groups
  • Monitor alerts using Data Fabric Manager DFM and generate DFM reports on utilization, chargeback and growth trends and provide recommendations
  • Written PowerShell scripts to administrative tasks and management of the server infrastructure
  • Responsible for implementing containerized based applications by using Azure Kubernetes Service (AKS)
  • Developed Kubernetes Pod definitions, Deployments, Helm Charts to version control deployment strategies
  • Configured Load Balancer, Traffic Manager and worked on Application Gateway
  • Implemented New Relic based on the requirement and start using this tool for application monitoring
  • Worked on Power Shell scripts to automate the Azure cloud system creation of Resource groups
  • Worked on Azure ExpressRoute to create private connection between Azure datacenters and on-premises
  • Responsible for administrating SAN and NAS Environment using Data Fabric Manager Console
  • Wrote Chef Recipes to automate our build/deployment process and do an overall process improvement
  • Monitored live traffic, logs, Memory utilization, disk utilization using Azure Monitor and New Relic

Environment: Azure, Docker, Kubernetes, Ansible, Terraform, Azure ARM Templates, CI/CD, Azure DevOps, Chef, Bitbucket, Maven, Splunk, New Relic, Python, Power Shell, Azure Monitor

Confidential, Dallas, Texas

DevOps Engineer

Responsibilities:

  • Involved in managing and maintaining the CI/CD pipeline using GitHub, Jenkins, Artifactory and Ansible
  • Integrated GIT into Jenkins to automate the code check-out process and continuous integration system
  • Built Azure environments by deploying Azure IaaS Virtual machines (VMs) and Cloud services (PaaS)
  • Configured Maven POMs to automate the build process and integrated with third-party tools like SonarQube
  • Worked on various Azure services including Storage, Network services, Azure Active Directory, API Management, Scheduling, Auto Scaling, Caching, SQL Azure, NoSQL, and PowerShell Automation
  • Deployed new applications through Ansible and managed them in the production environment
  • Expertise in Docker images using Docker files and container-based deployments using Docker
  • Created Pods, deployments, services, and replication controller in Kubernetes
  • Used Power Shell for troubleshooting remote management of Azure Virtual Machines
  • Create documentation for Chef best practices to be used by developers as a guide to Chef Automation
  • Configured IAM roles for EC2 instances and assigns them policies granting specific level access to S3
  • Worked in Agile Methodology and followed practices like pair programming, TDD, Standups, retrospective
  • Prepared the REST and SOAP based service calls depending on the data passing to the web service
  • Worked on configuration of Internal load balancer, load-balanced sets, and Azure Traffic manager
  • Used Cloud Formation template for creating infrastructure like EC2, S3 buckets, and RDS, etc
  • Created Git repos and Jenkins jobs for the build and deployment of Microservices in Docker Container
  • Setup Amazon RDS Multi-AZ for automatic failover and high availability at the database tier for MySQL
  • Created Jenkins Pipelines with Jenkins Scripted File
  • Configured Ansible and wrote various playbooks to manage existing infrastructure
  • Monitored and tracked SPLUNK performance problems, administrations, and open tickets with SPLUNK
  • Involved in setting up and customizing AppDynamics for Servers
  • Used Jenkins pipelines to drive microservices builds to the Docker registry and deployed to Kubernetes
  • Installed Splunk in production servers for logging purposes. Setup Splunk dashboards for monitoring
  • Created dashboard in New Relic console for the monitoring purpose.
  • Hands-on experience in Azure practices, SQL Azure and in Azure web and database deployments
  • Automated the cloud deployments using Ansible and AWS Cloud Formation Templates
  • Integrated Docker orchestration framework using Kubernetes, created pods, config maps, deployments
  • Designed AWS Cloud Formation templates to create custom VPC’s, NACL’s, etc. as per requirement
  • Use Ansible playbooks to automate Kubernetes clusters
  • Configured NewRelic monitoring for performance metrics and to detect application problems automatically

Environment: CI/CD, AWS, Azure, Docker, Maven, Ant, Jenkins, Kubernetes, Ansible, Git, Terraform, Ruby, Linux, Cloud Formation, Bash, Power Shell, New Relic, Jfrog Artifactory, Microservices

Hire Now