Aditya Upasani
Linux Administrator
E-mail: - ***********.****@*****.***
SUMMARY:
Around 9+ Years of experience in Redhat Linux, SUSE Linux, Unix Administration on Cisco UCS, HP Servers, SUSE Manager, Salt Configuration Management for Mission Critical and Enterprise applications.
Experience in installation and implementation of Red hat Linux and SUSE Linux.
Experienced in system administration, System Engineering, System planning, co-ordination and group level and user level management.
Expertise in creating and managing Logical Volume Manager in Redhat Linux.
Expertise in Installation, Configuration of Package and Patch Management through Redhat Satellite Server.
Experience with Cloud stack such as Amazon Web Services, Verizon Terremark, Openstack, IaaS / PaaS.
Experience in configuration of NIS, NIS+, DNS, DHCP, NFS, LDAP, SAMBA, SQUID, postfix, sendmail, ftp, remote access, security management and Security trouble shooting skills.
Experience in Redhat directory server and Redhat identity management.
Experience in Disaster Recovery and Planning.
Experience on backup and recovery software like Net backup 5.0 and 6.0 on Linux environment.
Experience in Logging framework such as Elastic Search, Logstash, Kibana (ELK).
Experience with Veritas Volume Manager (VxVM), Veritas File System (VxFS), Veritas Net Backup, Veritas Clustering with SAN, NAS environment.
Experience working in SAN environment like EMC Symmetrix DMX3, DMX4 and Clariion CX3 series arrays.
Experience with Docker and Kubernetes on multiple cloud providers, from helping developers build and containerize their application (CI/CD) to deploying either on public or private cloud.
Experience in installing and configuring of OpenShift platform in managing Docker containers and Kubernetes Clusters.
DevOps Practice for Micro Services using Kubernetes as Orchestrator.
Experience with load balancing.
Installation, administration, implementation, testing and maintenance of complex and heterogeneous networks consisting of Linux (Red Hat)
Hardware configuration, installation and management on Cisco UCS, HP servers and Workstations.
Experience with Samba, autofs, Kerberos, LDAP, SSL certs, Apache HTTPD experience a plus.
Experience with Shell scripting, bash scripting, Perl, Python languages.
Experience with automation tools like Puppet.
Handling and generating tickets via the Remedy ticketing tool.
Configured ILOs and Console connections for HP and SUN servers.
Knowledge of Routers, Switches, Hubs, Firewalls, LAN, WAN Intranet, Internet and Load balancers.
Maintained high availability of data using Oracle Real Application cluster Server.
Excellent Project Management experience.
Systems and network Planning and Administration.
Backup and Restore Management like backup, Tape library and Disk library and EMC.
Excellent verbal communication skills and strong documentation skills.
Technical Skills / Tools:
Operating System: SLES 10, 11, Red Hat Linux (3/4/5/6),
Hardware: Cisco UCS C240 M3 and C240 M4, HP Gen 8 Blade and Rack mount Servers, Sun Fire 280R/V480/4800/3800/12K/15K, TSeries, MSeries Server, Sun Enterprise 6500/5000/450/420R,, HP 9000 K,L,N class server, rp8xxx/7xxx, IBM RS/6000, pSeries, Xseries, HP/IBM/Blade Servers, IBM BladeCenter Platform.
Storage: NetBackup, SAN EMC Symmetrix 800/ DMX1000, 2000 & 3000, EMC Clariion 500, 600, 700, NetApp NAS 2000/ 3000 series
Cluster: Oracle Real Application Cluster, MapR Hadoop Cluster.
Automation: Salt Configuration Management, SUSE Manager v2.1, SUSE Manager v3.2
Educational Qualification’s:
Degree: Master of Science 2010
College: State University of New York at Buffalo
Degree: Bachelors in Engineering 2006
College: University of Mumbai
Certifications:
Amazon Web Services (AWS) Certified 2018-Present
Validation Number 9MW1DVE1B2R112S1
Validate at: http://aws.amazon.com/verification
Work Experience:
GEICO Insurance, Chevy Chase, MD August 2016 – Present
Linux Systems Engineer
Enterprise Security Team
Responsibilities: -
Built, Configured, Administered, Maintained and Supported 2000+ servers of SUSE Linux, Redhat Linux on VMware Vcenter, Cisco UCS and HP hardware’s for Application and Oracle Databases.
Lead the effort to reduce downtime/outage of the Linux servers from 10980 mins recorded in year 2016 by reducing to 10 mins in the year 2017. Which recorded up to 99.99% uptime of the servers in the year 2017-2018.
Lead the effort to increase the security compliance of the Linux servers from the value of 50% recorded in the year 2016 to up to 99% consistently year-round in 2017 -2018.
SUSE Manager: Scheduled automated patching, reboot on group of servers utilizing the SUSE Manager tool. Patching was distributed across different groups of Application/Middleware and Oracle database servers.
SUSE Manager: Installed Security Patches on all the servers on monthly basis utilizing the tool SUSE Manager.
Documented Major/Minor Kernel version upgrade check for Redhat RHEL 5.x, 6.x and 7.x and SUSE SLES 11 SP4 and SUSE SLES 12 SP2.
L1TF - L1 Terminal Fault Attack - CVE-2018-3620 & CVE-2018-3646: Lead, informed and educated team about the new security advisories CVE-2018-3620 & CVE-2018-3646.
1.Educated team about the new computer microprocessor hardware implementation (microarchitecture) issue similar to Spectre and Meltdown which has been reported to affect x86 microprocessors manufactured by Intel. Unprivileged attackers can use this flaw to bypass memory security restrictions in order to gain access to data stored in memory that would otherwise be inaccessible.
2.CVE-2018-3620 is the CVE identifier assigned to the operating system vulnerability for this issue.
3.CVE-2018-3646 is the CVE identifier assigned to the virtualization aspect of the flaw. This issue is referred to as L1 Terminal Fault (L1TF) by the larger industry and as “Foreshadow” by the security researcher.
4.Performance impact: Mitigating L1TF in bare metal environments that do not use virtualization has negligible performance impact and does not require specific action beyond installing the updates.
5.On the basis of above comment educated the team that their will be no sugnificant performance impact on CISCO UCS servers after applying CISCO software upgades and OS upgrades
6.Also VMWare servers would be needing the specific product software upgrades from VMware in addition to OS upgrades.
Spectre & Meltdown Vulnerabilities - Processor Speculative Execution: Lead, informed and educated team about the three security advisories: CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754.
1.These advisories are based on research from Google Project Zero that identified new methods for side-channel analysis in modern computer processors. Because these methods target foundational technology, namely speculative execution, that is part of many manufacturers’ processors, this research has wide-reaching implications: from hypervisors to operating systems to web browsers, and from your phone to servers running in datacenters that make up the cloud.
2.Educated the team that RHEL 7, RHEL 6, SLES 12 kernel/microcode updates were to be available relatively fast than as compared to RHEL 5 and SLES 11; since as these kernel code was 10+ year old code and Redhat/SUSE support were very cautious about ensuring there are no unforeseen regressions the newer code could introduce.
3.Educated the team that Kernel updates were half of the solution. BIOS/Firmware updates must be paired with the kernel updates. Red Hat provided microcode updates for a small subset of tested processors.
4.Furthermore, informed the team that we would need to contact VMware, Cisco and HP support to provide us with the relevant firmware updates for applied to ESXi hypervisors and physical servers respectively.
5.Lead and coordinated the effort to get these Kernel updates and firmware updates applied to servers without causing downtime or outage to customers.
6.Successfully validated the updates and the users confirmed to us that they did not observe meaningful performance impact for majority of servers.
Identified, Resolved recurring issues occurring with the UCS Blade servers.
1.The recurring issue UCS servers won’t boot up after patching the servers and rebooting.
This issue was pending for last 5 years.
So worked with SUSE support in determining root cause which came to conclusion after testing is that issue was at /boot/grub/device.map where (hd0) was mapped to /dev/sda
The problem stemmed from incorrect map in the file. As the hd0 was mapped to /dev/sda; but the boot partition was actually on /dev/disk/by-id/scsi-36xx..xx which was mapped to sdex,sdks,sdek, sdke,sdku,sdez,sdkg and sdem.
While testing we removed /boot/grub/device.map which did not force the bootloader to automatically determine device map.
As in SLES 11 device.map is needed while in SLES 12 the toolset can determine the correct devices automatically.
2.Another recurring issue was of Cisco UCS server slow boot time.
Informed the team the cause of slow UCS boot time is according to https://supportforums.cisco.com/t5/unified-computing-system/ucs-boot-time/td-p/3027717
Which says There is currently no way to skip the memory test, scanning of all the devices on UCS servers while booting up. Cisco is working with development to push for this in future releases.
Worked on the script to monitor for OS filesystems utilization is beyond 90% and ran it as part of pre-patch verification on all the servers before start of patching cycle.
Resolved many issues arising from patching, major issue: once patched the servers were not able to boot into OS since root filesystem could not be found. Came up with resolution, to resolve this servers were booted into rescue mode, mounted filesystems, mkinitrd, install patches and reboot to resolve the issue.
Worked with the SUSE support about the various issues reported after patching by sending supportconfig files so that they can send new patch to be installed on all the reported servers to resolve the issue.
Documented Patching process which included following steps all the scripts were supplied by SUSE support:
1.Update the SUSE manager Geico Channels: This was done generally 1st of every month by executing patch_bydate_channels.sh script
2.Generate, edit and send patching E-mail: This steps was executed after updating the channels. The script run was patch_email_auto.sh with 2 date arguments start date and end date. Basically it will pull the patch updates between those 2 dates only.
3.Create monthly patch groups: This was done to generate Patch groups. In this infrastructure the servers were put in the different patch groups and batches.
Non production servers: They were divided into Day1 and Day2 and each day will have batches 1, 2, 3, 4, 5 and 6
Production servers: They were divided into Week1- day1, Week1- day2, Week2-day1 and Week2-day2.
The W1D1 & W1D2 consisted of batches 1 and 5 which were all database servers.
The W2D1 & W2D2 consisted of batches 2, 3, 4, 5 and 6 which were all Middleware servers.
4.Verify / Assign servers to Correct channels: There were four categories of Channels at Geico infrastructure namely: baseline_dr, prod, non-prod and sandbox. The script run was update_server_channels.sh which helped to assign servers correctly to their required channels w.r.t to their names: frup/plup=production servers, plun/frun=non-production server, plud=disaster recovery channels.
5.Restart SUSE Manager Database: This step was executed by script recycle_database.sh which would help update SUSE manager database if Spacewalk services lost their connections.
6.Schedule SUSE Manager Patch Groups:
Access SUSE manager webportal
Login with your AD account
Navigate to System Groups section under Systems Tab
Next to each group you wanting to schedule for check the tick box and then at the bottom of the page click “work with union”
From there you will see with the systems you have selected to work with the click the patches tab.
At bottom of page click “select all” and then click “Apply” button.
At the bottom of page select time you want the patches to applied and then click “confirm” button.
7.Create Production Patching Change Record: Created change records utilizing BMC Remedy ticketing system. Optimized this step with communicating with the Change management team and created change record templates which will helpful to deploy these change records in the future.
8.Patch Production Servers – W1D1 & W1D2 – Time 8.30 pm to 4 am
9.Patch Production Servers – W2D2 & W2D2 - Time 8.30 pm to 4 am
10.Run the Linux patch verification script.
Worked on and Created the Linux Patch verification script which gives information of servers after it is patched related to hostname, kernel name, patch level, NIC Speed, Link local, ulimit, Last reboot, whether it is oracle server and if yes then its ASM count.
Found and resolved issues while patching that few servers were not getting patched so listed of few solutions
1.Servers may be not checking in with SUSE manager: test by forcing server to check in with SUSE manager by running rhn_check& if that works then put rhn_check& in for loop for listed of servers.
2.Servers are not showing as patched on the done patching list and they don’t seem to have scheduled tasks in suse manager: test server by running zypper up –y, then put that command in for loop for on list of servers affected. For x in $(cat/list_location); do hot $x 2>/dev/null grep –v “not found”) ]] && echo –en $x”\t”; echo –en $(sshq $x “sudo /usr/bin/zipper up –y n”; done
3.Sometimes stuff broken in zipper cmd: then use “ldd /usr/bin/zypper” if related to missing library. Then download it from SUSE manger – pm –ivh-force <name of rpm>.rpm.
Came with a Patch status Report Generation process and scripts for giving us the exact number of servers in each patching groups/day with the kernel versions. Also for reporting for all the servers in the infrastructure showing kernel versions and respective number of servers.
Many servers had Boot start up issues after patching/reboot: So resolved this issue with documenting the steps to login into rescue mode and force kernel update and mkinitrd.
Documented the Downgrading/Rollback of SUSE kernel and Redhat Kernel w.r.t to SUSE Manager which was helpful in rolling back the kernel versions when required.
Resolved issue related to perforce startup issue.
As per Instructed by Team Manager listed Top 5 things to work in 2018 as per listed below:
1.Explore/Push for SUSE support to provide proper guidance/automation on removing exact servers from the patch scheduling whenever required.
Standardize the process and document it.
Explore options whether the customers can themselves remove servers from patch scheduling.
2.Continue to provide root cause analysis effort and troubleshoot issues as and when required.
Irrespective of the issues ranging from hardware, OS, database or Application.
3.Conduct a proof of Concept of Redhat 7 / SUSE 12 Live patching of Linux kernel using kGraft
Our users/customers will be benefited by the use of Live patching since it does not require reboot of the servers for at least 1 year.
As such they can continue their work without the requirement of an outage or downtime.
4.Coordinate, plan SUSE Manager 3 implementation with the Linux team.
Consider having discussion with SUSE support, Linux team on understanding the process of migration from SUSE manager 2.1 to SUSE manager 3.0
This is essential since we need to ask SUSE support how was migration of 2.1 to 3.0 carried out at their other customer location.
This should help us understand what challenges have been faced by others during the migration and which will help us not to replicate them.
5.Explore opportunities for conducting preventive measures, proactive monitoring and system self-healing capabilities to limit outages/performance issues which impact service levels.
Accessed the Puppet Enterprise (PE) console for quickly finding issues and diagnose their causes, also utilized the Puppet Enterprise (PE) console overview page as a tool for finding how many nodes puppet master is currently managing and whether any nodes are unresponsive.
Environment: Cisco UCS Servers B200 M4 Blade Server, B200 M5 Blade Server, C240 M3 and C240 M4, SUSE SLES 11 SP4 & SLES 12 SP2, Redhat Enterprise Linux 6.x, IBM servers, Patrol monitoring, BMC Remedy ticketing & Change management.
American Express, Phoenix, AZ Oct 2014 – July 2016
Linux Systems Engineer
Hadoop Infrastructure Support Team
Responsibilities: -
Built, Configured, Administered, Maintained and Supported 1800+ servers of Redhat Linux on Cisco UCS hardware for MapR Hadoop.
Utilizing the StackIQ/Salt configuration management tool for building huge number of servers at once to comply/fulfill with capacity requirement. It involves creating hosts and attributes excel sheet, checking out current hosts/attr file in SharePoint, updating the content, checking in the file on SharePoint server, saving locally in csv formats, loading the csv file into StackIQ FE, comparing existing hosts/attrs files with this new one, taking backup of old host/attrs file and finally loading the new file into the StackIQ FE database, then rebooting the servers from Cisco UCS KVM console of each server the for OS installation, validating the built server and for any issues and resolve them before handing built server to application team.
Corrected the Security Misconfigurations for the MapR Hadoop Big data Infrastructure which included directory permissions, openssl package upgrades, sshd configuration & apache configuration.
Hardware maintenance: Blacklisted Hadoop node, after running tasks were zero then put the node in maintenance in MapR Control System for 120 mins, stopped mapr-warden, shutdown the server, after replacing failed hardware part, start warden and wait till volume low data replication alarm goes away.
Submitted firewall requests to network team for opening up of ports for proper communication.
Salt & StackIQ configuration management tool: Involved in updating the /etc/issue file with proper contents and editing /etc/sshd/ssh_config with Banner /etc/issue and restarting the ssh service from the StackIQ front end server for all the servers in the existing environment.
Involved with the enabling sftp logging on edge and datatransfer Hadoop nodes.
Created Request for Change (RFC) & Incident Tickets on Service Now for hardware changes including replacing Failed HDDs, Failed Memory module, failed storage pools, Power pull server, Server builds, faulty LSI raid card replacement, firmware upgrades, link speed change for Cisco UCS production, Test & Dev servers.
Scheduled downtime for production servers before implementing or executing any changes to production, Test & Dev servers on Nagios monitoring tool.
Provided on-call production support on 12x7 on rotational basis for resolving Nagios alerts.
Establishing of corporate standard documentation for deployment and Testing.
Ensured the effective delivery of servers within the stipulated SLA.
Provided patching support & upgrading of RHEL OS on monthly basis for applying the security patches for Linux servers.
Coordinated & communicated patching effort for the Linux OS with application users/owners for the smooth transition from old kernel to new kernel of Linux OS.
Provided sudo access to application users on day to day basis for their continuous implementation of mission critical tasks.
Experience in configuration of NIS, NIS+, DNS, DHCP, NFS, LDAP, SAMBA, SQUID, postfix, sendmail, ftp, remote access, security management and Security trouble shooting skills.
Conducted and coordinated hardware replacements of hard drives on daily basis with datacenter team and MapR team on Cisco UCS hardware; finding slot numbers of faulty HDDs from faults summary tab in UCS central for the server in all the UCS environments.
Opened support tickets with Cisco TAC for providing replacement parts for the failed hardware components including hard drives, DIMMs, Raid controllers.
Experience working on Electronic Password Vault (EPV).
Successfully configured sftp logs in /var/log as per requirement for users sftp logging information as we were disabling ftp and sftp was enforced upon to be used as per the security team directives and so as to pass security audits.
Experience with Samba, autofs, Kerberos, LDAP, SSL certs, Apache HTTPD experience a plus.
Resolving MapR Hadoop Issues: Successfully resolved customer issues individually and/or working with the MapR support.
Experience with load balancing.
Experience with Shell scripting, bash scripting, Perl, Python languages; Involved with scripting tomcat auto start, auto unlock of user accounts and patching scripts.
Opened tickets with IBM support for replacing failed hardware including failed hard drive, failed DIMM; by providing the DSA information from the servers.
Attended team meetings, change control meetings to update installation progress and for upcoming changes in environment.
Expertise in Installation, Configuration of Package and Patch Management through Redhat Satellite Server.
Successfully configured secure logs on all the servers for finding duration of time it takes after user puts in his password to command prompt to appear; since users where complaining frequently about the slowness of the environment.
Environment: Cisco UCS Servers C240 M3 and C240 M4, MapR Hadoop, Redhat Enterprise Linux 6.x, IBM servers, Nagios monitoring, Service Now.
Perkin Elmer, Waltham, MA Jan 2014 – Sept 2014
Linux Systems Engineer
Responsibilities: -
Built, Configured, Administered, Maintained and Supported 1200+ servers of Redhat Linux on Verizon Terremark.
Worked on Proof of Concept for deploying Identity Management Services such as Redhat IDM for the Infrastructure.
Migrated several physical and virtual servers from existing datacenters to Cloud: Verizon Terremark.
Experience with Cloud stack such as Amazon Web Services, Verizon Terremark and Openstack.
Installed, Configured and Administered Oracle database, apache on servers.
Created Oracle database instances for Oracle database administrators.
Architected, Deployed and administered Redhat IDM into the infrastructure for user management.
Ordered, configured and administered 200TB storage appliance for copying data required for migrating the datacenter servers to Terremark.
Facilitated tasks associated with moving of the 200TB storage appliance from datacenter to Terremark.
Experience with Cloud stack such as Amazon Web Services, Verizon Terremark, Openstack, IaaS / PaaS .
Experience with Shell scripting, bash scripting, Perl, Python languages.
Worked on the AWS Vulnerability / Penetration Testing Request Form for security scanning of websites which were running on load balanced instances.
Worked on various Logical Volume Manager tasks that included adding disks to the volume groups, increasing the size of the logical volumes and creating new file systems on those logical volumes.
Preparing servers for Oracle RAC installation which includes tuning the kernel, agent, installation, adding NAS storage on 2,3, 4 node clusters.
Experience in configuration of NIS, NIS+, DNS, DHCP, NFS, LDAP, SAMBA, SQUID, postfix, sendmail, ftp, remote access, security management and Security trouble shooting skills.
Experience with automation tools like Chef/Puppet.
Expertise in Installation, Configuration of Package and Patch Management through Redhat Satellite Server.
Experience working in SAN environment like EMC Symmetrix DMX3, DMX4 and Clariion CX3 series arrays.
Experience with load balancing.
Build, scale and support Load testing environments.
Establishing of corporate standard documentation for deployment and Testing.
Ensuring the effective delivery of servers within the stipulated SLA.
Network administration and monitoring on Linux using native UNIX commands like netstat, ifconfig, ethtool, traceroute and tcpdump.
Acquired SAN storage and configured it under Logical volume manager in Linux environments.
Migrations of servers from physical to virtual.
Worked with Linux (DM) Multipathing.
Experience with Azure Configurations.
Experience with Samba, autofs, Kerberos, LDAP, SSL certs, Apache HTTPD experience a plus.
Documented various procedures for installation, upgrades, and bug fixes and troubleshooting for all types of Linux environments.
Perkin Elmer is into the health care business.
Worked on-call L3 Support 24x7 on a weekly basis.
Attended team meetings, change control meetings to update installation progress and for upcoming changes in environment.
Environment: Verizon Terremark, Amazon Web Services, Vmware Vsphere 4.x 5.x, Redhat 4.x 5.x 6.x, CentOS 4.x 5.x 6.x, Fedora 18 19, Ubuntu 10.x 12.x, Amazon VPC, Cloudfront, CloudWatch, RDS, S3, ELB.
GEICO Insurance, Chevy Chase, MD May 2012 – Dec 2013
Linux Systems Engineer
SOD Linux Team
Responsibilities: -
Provided system support for 1000+ servers of SUSE Linux and Redhat Linux including routine maintenance, patching, and system backups and restores, and software and hardware upgrades.
Install and configure RHEL 5.x and 6.x on virtual machines as well as physical server.
Worked on building new SUSE & Redhat Linux servers, support lease replacements and implementing system patches using the HP Server Automation tool.
Experience with VMware Virtualization using ESX hypervisor of VSphere 4.1.
Experience in installation and implementation of SLES 10, SLES 11 and Redhat Operating Systems.
Configuration, implementation and administration of Clustered servers on SUSE Linux environment.
Experienced in system administration, System planning, co-ordination and group level and user level management.
Experience in configuration of NIS, NIS+, DNS, DHCP, NFS, LDAP, SAMBA, SQUID, postfix, sendmail, ftp, remote access, security management and Security trouble shooting skills.
Expertise in Centrify Authentication services.
Expertise in creating and managing Logical Volumes in SLES Linux.
Performed automated installations of Operating systems SUSE Linux using autoyast.
Experience on backup and recovery software like Net backup on Linux environment.
Systems and network Planning and Administration.
Supported production systems 24 x 7 on a rotational basis.
Understanding of Microsoft System Center: Creating and Implemented Changes on servers and documented the change in the Microsoft System Center for future reference.
Resolved Security Access Requests via Peregrine Service center to provide the requested User access related requests.
Preparing servers for Oracle RAC installation which includes tuning the kernel, agent, installation, adding NAS storage on 2,3, 4 node clusters.
Expertise in Installation, Configuration of Package and Patch Management.
Handling and generating tickets via the BMC Remedy ticketing tool.
Experience with HP Gen 8 blade servers and rack mounted servers.
Coordinated Hardware configuration, installation and management as well as. Configuration of ILOs and Console connections for HP Gen 8 Blade and Rack mounted servers.
Experience with setting up Linux servers for Oracle Real Application Clusters and configuring SAN based mount points.
Excellent Project Management experience.
Expertise in Performance Monitoring and Performance Tuning using Top, prstat, sar, vmstat, ps, iostat etc.
Experience with load balancing.
Creating new file system, managing & checking data consistency of the file system.
Created new file systems using Raw Device Mapped lun’s, Virtual Disks and SAN storage as per required.
Experience working in SAN environment like EMC Symmetrix DMX3, DMX4 and Clariion CX3 series arrays.
Experience with Shell scripting, bash scripting, Perl, Python languages.
Successfully Migrated virtual machines from legacy Virtual environment Vmware Vsphere 4.1 to new Vmware Vsphere 5.1.
Successfully upgraded SUSE Linux 10 to SUSE Linux 11 on an Oracle production standby server without losing any of the database information.
Documented the procedure of Obsoleting servers resulting in considerable reduction in time and mistakes for this process as well streamlining the existing process.
Communicated and Coordinated with customers internal/external for resolving issues for reducing downtime.
Supported after-hours to meet deadlines as well as for operational support as required.
Proven experience in end-to-end problem determination/troubleshooting system issues.
Environment: SUSE Linux 10, 11; HP Gen 8 Blades and Rack mount Servers, HP Server Automation, Vmware Vsphere 4.1 and 5.1, Microsoft System Center, IBM Storage, and NetBackup Storage.
Chartis Insurance, Jersey City, NJ October 2010 - April 2012
LINUX Administrator
Responsibilities: -
Installation, Configuration and upgrade of Redhat Linux (2,3,4,5), CentOS, Oracle Linux, SUSE, Solaris, AIX, HP-UX & Windows 2000 / 2003/2008 Operating System.
User Administration, management and archiving.
Install and configure RHEL 5.x and 6.x on virtual machines as well as physical server.
Configuring NFS, NIS, NIS+, DNS, Auto Mount & Disk Space Management on SUN Servers.
Experience in Configuring and Managing Virtual Disks, Disk Mirrors & RAID Levels.
Data Center Migration support for CX, DMX attached hosts.
Worked with OVF "Open Virtual Machine Format" supported tools VirtualBox, Redhat Virtualization (XEN), and VMware Workstation.
Installation, Configuration and Maintenance of Samba, Apache Tomcat, Web Sphere, Weblogic and Jboss servers in Sun Solaris and Linux environment.
Experience with Puppet and Chef Configuration management tool.
Experience with VMware Virtualization using ESX hypervisor of Vsphere 4.0.
Installation, Configuration and Maintenance of Samba, Apache Tomcat, Web Sphere and