SHRAVYA CH
**********@*****.*** • +1-682-***-**** • https://www.linkedin.com/in/shravyach/
Objective
Certified Azure Administrator, DevOps Engineer, and ServiceNow Administrator with 8+ years of IT experience with adept knowledge in containerization ecosystems like Docker and Kubernetes, and Configuration Management such as Ansible, Chef. Experienced in Continuous Integration and Continuous Delivery (CI/CD), Build and Release, Linux, and System Administration, with multi-cloud platforms like Amazon Web Services (AWS), Azure, OpenStack, Google Cloud Platform. Proficient in principles and best practices of Software Configuration Management in Agile, Scrum, and Waterfall methodologies.
Professional Summary
Hands-on experience on various Azure services like Compute, Caching, Azure SQL, ARM (Azure resource manager), Storage, and Network services, Azure Active Directory (AD), API Management, Scheduling, Azure Autoscaling, and PowerShell Automation.
Experienced on Azure Cloud and worked on Azure Resources like Virtual Networks, Azure Active Directory (AD), Subnets, Virtual Machines, Virtual Machine Scale Sets, Load Balancers, App Services and Azure Storage and in designing infrastructure, deploying using Azure Services and worked to provide Infrastructure as a Service (IAAS) support to client.
Experienced with Azure DevOps, including source control, Continuous Integration/Continuous Delivery (CI/CD), and Release Management, Azure Pipelines, Azure Boards, and Azure Repos to automate the build, test, and deployment of applications in the cloud, and Azure Monitor and Azure Log Analytics for monitoring and troubleshooting Azure resources.
Experienced in Integrating Spinnaker across AWS EC2 instances and in multiple Availability zones of the AWS VPC's to ensure Continuous Delivery, monitor application deployments.
Designed AWS Cloud Formation Templates to create custom sized Virtual Private Cloud (VPC), Subnets, and Network Address Translation (NAT) to ensure successful deployment of Web applications, Database templates and expertise in architecting secure Virtual Private Cloud (VPC) solutions in AWS with the help of Network Access Control Lists (ACL’s), Security groups, public and private Network Configurations.
Designed, implemented, and maintained highly scalable applications on Google Cloud Platform (GCP), orchestrating Google Cloud Build, and improved performance of containerized applications on Google Kubernetes Engine (GKE), Big Query, Cloud Spanner by ensuring cost efficiency.
Implemented Infrastructure as Code (IAC) practices on multiple cloud platforms, including AWS, Azure, and Google Cloud Platform (GCP), using tools like Terraform, CloudFormation, and Google Cloud Deployment Manager to automate cloud resource provisioning, configuration, and management, ensuring consistency, scalability, and efficiency across environments.
Expertise in Terraform to reliably version and create infrastructure on Azure/AWS. Created resources using Azure/AWS Terraform modules and automated infrastructure management and experienced with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation.
Implemented OpenStack-based solutions that use key components like Nova, Neutron, Cinder, and Keystone to orchestrate the provisioning and management of Compute, Networking, Block Storage, and Identity Services.
Experience in Orchestrating and provisioning Kubernetes, AWS Elastic Kubernetes Services (EKS) clusters on EC2's & AWS Fargate and Azure Kubernetes Service (AKS) using automation scripts/tools such as Docker, ECS, Ruby/Bash, and Terraform.
Experienced in automating deployment of microservices on Docker Swarm Cluster by pulling Docker images from the private Docker Registry, Docker Trusted Registry.
Implemented comprehensive monitoring solutions in cloud environments using both cloud-native tools like AWS CloudWatch, Azure Monitor, and Google Cloud Monitoring, as well as third-party tools like Grafana, Datadog.
Proficient in Configuration Management tool Ansible Tower by writing Playbooks and Inventory files to setup servers, deploying software, orchestrate fault-tolerance updates.
Integrated Git, GitHub, GitLab, Bitbucket, Perforce to implement advanced source code management techniques. Developed and maintained Branching plans, Merge policies, and Version Control Workflows to enhance cooperation, code quality, and release management procedures among heterogeneous development teams.
Managed Safes, policies, roles, and permissions for accessing diverse systems, including Windows servers, UNIX servers, databases, networking devices, and applications.
Extensive experience in installing, configuring, and administrating Jenkins CI tool on Linux machines. Worked on setting up the Jenkins CI/CD pipeline configurations for all the microservices build Docker Images and publish to the Docker Registry and then deployed to Kubernetes, Created Pods and managed using Kubernetes.
Implementing plugins like Blue Ocean and Docker, as well as comprehensive error handling and version control integration, we designed and developed Azure Pipelines that streamline Continuous Integration/Continuous Delivery (CI/CD) workflows to automate build, test, and deployment procedures and improve team productivity.
Integrated security scanning technologies like Snyk and Checkmarx, allowing for early vulnerability identification and mitigation throughout the Development Lifecycle.
Administered the development and implementation of Continuous Integration (CI) workflows using GitLab CI, and Jenkins CI, which effectively automated the build, test, and deployment processes.
Developed robust Jenkins pipelines and job configurations to automate Software delivery. These pipelines effectively orchestrate the build, test, and deployment phases and integrated with key plugins such as Artifactory, GitHub Integration, and SonarQube,
Automated infrastructure provisioning, configuration, and management tasks in cloud environments using scripting languages like Bash, Python, and PowerShell, cloud-specific libraries like AS CLI, Azure CLI, and Google Cloud SDK, and integrated configuration management tools like Ansible.
Installation, Configuration and Administration of RedHat Linux 5.x,6.x and worked on Windows Server 2003/2008/2012 R2 installation, deployments, troubleshooting and automation.
Experienced in Windows Server administration, including the setup, configuration, and upkeep of server roles like Dynamic Host Configuration Protocol (DHCP), Active Directory, and File Services. Also experienced in putting Windows security best practices and tools like Windows Defender, BitLocker, and Windows Firewall.
Experienced in Linux System Administration tasks, including installation, configuration, and maintenance of Linux-based operating systems such as Ubuntu, CentOS, and Red Hat Enterprise Linux (RHEL).
Expertise in Linux Networking concepts and protocols such as TCP/IP, DNS, iptables, and routing, ensuring the stability, security, and optimal performance of Linux servers and workstations by configuring Network Interfaces, Firewall Rules, and Network Services.
Experienced in all phases of the Software Development Life Cycle (SDLC) with specific focus on the build and release of quality software. Experienced in Waterfall, Agile/Scrum.
Technical Proficiencies
Cloud Technologies: AWS, Azure, GCP, OpenStack, PCF
Containerization: Docker, ECS, ACI
Orchestration: Kubernetes, AKS, EKS, GKE
Version Control Tools: Git, GitLab, Bitbucket, Perforce, Azure Repos, Visual SVN, Tortoise SVN.
Build Tools: MAVEN, ANT, Make, Gradle, MSBuild
Database: MySQL, MongoDB, Cassandra, Postgres SQL, SQL Server, No SQL, Amazon RDS
CI/CD Tools: Azure DevOps Pipelines, AWS Code Build, Jenkins, Cloud Build, Hudson.
Configuration Management: Ansible, Chef, Puppet
Bug/Issue Tracking: Azure Boards, JIRA, Rally, Fisheye, Remedy, ServiceNow,
Scripting/Programing Languages: Python, Perl, shell, Ruby, C, SQL, Java Script, PHP, HTML, Spring, .Net, Groovy
Web Services: SOAP, REST
Operating Systems: Linux, Unix, Windows Family, RHEL, Ubuntu, CentOS
Web Servers: Apache Tomcat, Web logic, Nginx
Monitoring Tools: Azure Monitor, AWS cloud watch, Grafana, Prometheus, ELK Stack, Datadog, Splunk
Career Experience
Sr. Azure Cloud Engineer American Express New York, NY January 2022 -- Present
Designed and deployed scalable and highly available SaaS applications on Azure, leveraging PaaS capabilities like Azure App Service, Azure SQL Database, and Azure Storage to improve performance and save costs.
Designed, configured, and deployed Azure Automation Scripts for a multitude of applications utilizing the Azure stack (Including Compute, Web, Blobs, Azure Data Factory, Azure SQL, Cloud Services, and Azure Resource Manager), Services and Utilities focusing on Automation.
Built an application environment to operate at high availability in different Azure regions by using Content Delivery Network (CDN), Azure Traffic Manager, App Services-Web Apps, Active Directory, Storage Queues, Cognitive Services, Azure Search, Storage Blobs, Redis Cache, and SQL Database.
Created and managed Azure Active Directory (AAD) tenants manage users and groups and configure application integration with Azure Active Directory (AAD). Integrate on-premises Windows Active Directory with Azure Active Directory, configure Multi-Factor Authentication (MFA) and federated Single Sign-On (SSO).
Created Azure Role-Based Access Control (RBAC) to segregate duties within our team and grant only the amount of access to users that they need to perform their jobs.
Created Cloud Modules for interacting with Azure Services which provides the tools to easily create and orchestrate infrastructure on Azure and automated cloud-native applications in Azure using Azure Microservices such as Azure Functions and Azure Kubernetes Services.
Provisioned Azure Resources of different providers Compute, Network, Service Fabric, using ARM template and implemented and maintained dev, test, staging, and production environments leveraging infrastructure as code using Azure ARM templates (Infrastructure as code, JSON / YAML config).
Created Network Security Groups (NSG) to filter the traffic to and from Azure Resources by configuring the Inbound and Outbound rules and associating them with Subnet and Network Interfaces.
Developed and deployed Azure disaster recovery strategies using Azure Site Recovery (ASR), including Replication, failover, and failback procedures to provide business continuity and data resilience in the face of disruptions or disasters.
Implemented Istio security policies such as mutual TLS (mTLS) authentication, RBAC (Role-Based Access Control), and secure service-to-service communication.
Maintained Azure Database Services such as Azure SQL Database, Cosmos DB, and MySQL Database, establishing backups, security policies, and performance tuning parameters to provide effective data management and access. Azure Data Lake Storage and Azure Data Factory were used to store and analyze data efficiently.
Implemented Commitizen in the Git workflow to enable enhanced traceability and efficiency, while seamlessly integrating Azure cognitive services for advanced capabilities such as Computer Vision.
Implemented extensive monitoring and logging solutions for Azure Kubernetes Services (AKS) clusters using Azure Monitor, Azure Log Analytics, and Azure Container Insights to track cluster health, performance metrics, and Container Logs, facilitating efficient issue troubleshooting and resource optimization.
Implemented Dynamic Autoscaling mechanisms to optimize Azure Kubernetes Service Cluster resources and to improve operational efficiency, resulting in significant cost savings, to streamline Azure Kubernetes Service deployments and operations, ensuring seamless integration and performance.
Established and managed Service Connections in Azure DevOps to securely connect to external services such as Azure Subscriptions, and Docker registries, and integrated Key Vault with Azure Services and applications to protect secrets and keys from unauthorized access.
Involved in Serverless Services (Azure Functions) where I created and configured HTTP Triggers in the Azure Functions with Application insights for monitoring and performing the load testing on the Applications using the Azure DevOps Test Plans, also configured Shared Dashboards with required metrics and logs.
Created Continuous Integration/ Continuous Delivery (CI/CD) pipelines for .NET, python apps in Azure DevOps by integrating source codes GitHub, VSTS, and Artifacts. Created deployment areas such as testing, pre-production, and production environment in Kubernetes Cluster.
Implemented end-to-end IoT solutions on Azure IoT Hub, utilizing Azure VPN Gateway for secure connectivity and Azure Sentinel for robust threat detection and response.
Utilized Azure Boards to streamline project management, sprint planning, and backlog management. Managed and collaborated source code using Azure Repos and Team Foundation Version Control (TFVC) effectively.
Led a critical initiative to Migrate a complex set of Git Repositories containing multiple projects and branches to Azure Repos, assessing existing workflows and configuring Azure Repos to align with established practices, ensuring minimal disruption to ongoing development efforts.
Created automation scripts using PACLI and REST API to streamline operations.
Managed Docker Containers, Kubernetes Clusters, Mesos and implemented a production ready, load balanced, highly available, fault tolerant Kubernetes Infrastructure and deployed applications to Kubernetes Cluster.
Deployed Kubernetes Cluster on Azure with Master Architecture and wrote many YAML files to create many services like Pods, deployments, Auto-Scaling, Load Balancers, labels, health checks, Namespaces, Config Map.
Worked on implementing the Kubernetes Cluster API to manage, create, scale, upgrade and destroy of the Kubernetes clusters using a declarative API on both on-premises and Azure Cloud using BareMetal operator and Azure providers from CAPI.
Deployed Azure Sentinel to centralize and analyze Security Logs and telemetry data from across the organization's Azure and on-premises environments and designed and implemented automated Release Pipelines in Azure DevOps to deploy applications and infrastructure changes across multiple environments.
Implemented High Availability (HA), Disaster Recovery (DR), backup, and retention policies on Azure using native options and third-party tools like Rubric.
Implemented Terraform best practices and management policies, including Version Control, code review procedures, and infrastructure code testing using tools like Kitchen-Terraform.
Developed Versioning, State Locking, and collaboration for concurrent Terraform operations by remotely storing Terraform State Files in backend storage solutions such as Azure Blob Storage, HashiCorp Consul.
Implemented HashiCorp Vault to Terraform configurations for secure handling of private data, emphasizing data protection. Enhanced the resilience of vital infrastructure components by employing Terraform to automate backup and Disaster Recovery procedures.
Ensured Regulatory Compliance (GDPR, HIPAA, PCI DSS) through the implementation of robust security controls and monitoring mechanisms. Actively engaged in retrospectives to pinpoint areas for enhancing security posture and refining DevSecOps processes.
Developed security layer on top of DevOps methodology and implemented Security/Vulnerability scans at every phase of DevOps life cycle starting from design to monitoring like FOSS, Fortify DAST to create DevSecOps operational model.
Utilized Azure Active Directory’s (AAD) Privileged Identity Management (PIM) and Privileged Access Management (PAM) to prevent unauthorized sensitive resource access to minimize the risk of unwanted access.
Configured Azure Log Analytics workspaces to collect, analyze, and demonstrate logs and telemetry data from Azure Services, Virtual Machines, and custom applications was the first step in implementing centralized Log Management and proactive Monitoring in Azure.
Developed a reliable observability and Monitoring Framework in Azure by incorporating Datadog for analysis of logs, traces, and metrics in real time.
Developed Azure PowerShell script and Azure Command-Line Interface (CLI) capabilities to automate a variety of Azure-related infrastructure provisioning, configuration, and management tasks.
Created Custom Integrations that use the Azure Repos REST APIs to automate repetitive tasks like creating repositories and managing permissions and integrated Git Large File Storage (LFS) to version large binary files and multimedia assets in Bitbucket.
Sr. Azure DevOps Engineer Aqua Finance Wausau, WI April 2020 – October 2021
Managed Azure Infrastructure Azure Web Roles, Worker Roles, VM Role, Azure SQL, Azure Storage, Azure AD Licenses, Virtual Machine Backup and Recover from a Recovery Services Vault using Azure PowerShell and Azure Portal.
Extract Transform and Load (ETL) data from Sources Systems to Azure Data Storage services using a combination of Azure Data Factory, T-SQL, Spark SQL, and U-SQL Azure Data Lake Analytics.
Created recommendations on how to duplicate a subset of on-premises machines to the Azure Infrastructure as a Service (IAAS) offering which will be used for Disaster Recovery. This analysis included the specifics to synchronize on-premises data with SQL Server and SharePoint instances hosted in Virtual Machines (VMs).
Worked on Azure Site Recovery and Azure Backup Deployed Instances on Azure environments and in Data centers and migrating to Azure using Azure Site Recovery and collecting data from all Azure Resources using Log Analytics and analyzed the data to resolve issues.
Configured Azure Multi-Factor Authentication (MFA) as a part of Azure Active Directory Premium to securely authenticate users and worked on creating custom Azure Templates for quick deployments and advanced PowerShell Scripting.
Expertise in Azure Scalability and Azure Availability Build VMs availability sets using the Azure portal to provide resiliency for IaaS based solution and Virtual Machine Scale Sets (VMSS) using Azure Resource Manager (ARM) to manage network traffic.
Created and Managed Virtual Machines in Windows Azure and setting up communication with the help of Endpoints. Configured Shared Access Signature (SAS) tokens and Storage Access Policies in Azure Cloud Infrastructure.
Implemented Azure Machine Learning to build Machine Learning Models and set up Azure Application Gateway and Azure Load Balancer to split up incoming traffic among various Azure Resources, guaranteeing applications' scalability and high availability.
Leveraged Azure DevOps Analytics to derive data-driven insights, enabling informed decision-making and optimizing operational efficiency.
Implemented Azure DevOps APIs and SDKs, build custom Azure DevOps tasks, extensions, and plugins to increase productivity, automate workflows, Ideally, these features track and analyze Key Performance Indicators (KPIs).
Developed and implemented sophisticated Release Management Plans in Azure DevOps by utilizing Release Gates, approvals, and Automated Workflows in addition to industry-standard deployment patterns like Canary Releases and Blue-Green Deployments.
Worked on OpenShift for container orchestration with Kubernetes Container Storage, automation to enhance container platform multi-tenancy also worked on with Kubernetes architecture and design troubleshooting issues and multi-regional deployment models and patterns for large-scale applications.
Familiar with all objects and components in Kubernetes like Istio-system, Ingress and Egress controller, Kube-System and deploying Pods in selected nodes without any downtime for Dev and Prod Kubernetes Clusters.
Worked with Kubernetes deployment strategies like Deployments, StatefulSets, DaemonSets, and Jobs to effectively manage the application lifecycle, scaling, and fault tolerance requirements, ensuring high availability and resilience of Containerized Applications.
Configured Docker Networking features such as Bridge Networks, Overlay Networks, and Macvlan Networks to allow containers to communicate with external networks while maintaining secure and reliable connectivity within Dockerized environments.
Implemented advanced Docker Enterprise features such as Docker Swarm Mode, Docker Universal Control Plane (UCP), Docker Content Trust, and Docker Secrets Management to streamline Container Management, security, and governance in enterprise-scale deployments.
Utilized Sentinel Policy as a code Framework along with other Terraform Enterprise features to enforce security controls, governance policies, and compliance standards across infrastructure deployments, guaranteeing compliance with organizational and legal requirements.
Implemented and thoroughly tested infrastructure using Terratest to confirm the dependability and consistency of Terraform configurations.
Develop custom Terraform providers using the Terraform SDK to extend Terraform's capabilities and integrate with niche cloud services, enabling infrastructure provisioning and management for specialized environments or platforms.
Improved Terraform performance through Configuration Tuning, making use of Parallelism, Resource Targeting, and State Caching to reduce execution time and Resource Usage, guaranteeing scalable and effective infrastructure deployments.
Automated the tasks with Ansible Playbooks by using YAML functions and migrating the servers with the required configuration changes and testing and deploying the machines using Ansible Commands.
Performed job scheduling using Ansible Tower. Automated various infrastructure activities like Continuous Deployment, Application Server setup, Stack monitoring using Ansible playbooks and has Integrated Ansible with Azure DevOps.
Utilized Ansible to Setup/teardown of ELK stack (Elasticsearch, Log stash, Kibana) and troubleshoot the build issues with ELK. Used Ansible to document all infrastructure into version control and used Ansible tower to deploy the projects into different environment, push their project by using Export/Import assets through Octopus deploy.
Developed an Ansible Role for Zabbix-Agent which will be integrated into the to the Continuous Integration/Continuous Delivery CI/CD pipeline. Used Ansible Control server to deploy plays and playbooks to the machines and systems in the inventory.
Implemented Pod Security Policies (PSP) in Azure Kubernetes Services (AKS) for required best practices and the ability to control what Pods to be controlled, scheduled in Azure Kubernetes Services (AKS) cluster prevents some possible security vulnerabilities or privilege Escalations.
Worked on Azure Kubernetes Services (AKS) for creating new Projects, Services for Load Balancing, and adding them to Routes by accessing from outside, created Pods through new application and controlling, scaling, and troubleshooting pods through SSH, managed manifest files and releases of Helm charts.
Utilizing Azure Security Center to continuously monitor, assess, and remediate security vulnerabilities and threats across Azure resources, as well as Azure Sentinel for cloud-native Security Information and Event Management (SIEM).
Protected Endpoints, Workloads, and sensitive data while adhering to data protection regulations by deploying and managing endpoint protection solutions (CrowdStrike, Carbon Black) in conjunction with Data Loss Prevention (DLP) solutions (Symantec Data Loss Prevention, Microsoft Information Protection) in Azure environments.
Managed user access and permissions within Grafana to control dashboard visibility and editing capabilities, while configuring LDAP for centralized user authentication.
Integrated Azure Log Analytics with Azure VMs for monitoring the log files, store them and track metrics and used Terraform as a tool, Managed different infrastructure resources Cloud, VMware, and Docker containers.
Developed Bash shell scripts to automate resource, job monitoring and alerting and deploying the scripts to be executed as checks by Nagios for execution in both Windows and Linux environments.
Implemented GIT feature branch methodology for build process and applied Semantic Versioning concepts in creating tags and release process of an application and automated the development life cycles by using Webhooks and Remote triggers through Secure Tokens.
Utilized Azure Repos Wiki for Centralized and Versioned documentation to improve knowledge sharing and onboarding processes, as well as Configuring Pull Request Policies in Azure Repos to enforce code review requirements and ensure high-quality contributions, Automated Version Tagging based on Semantic Versioning has been implemented in Git to improve release management and traceability.
AWS Solutions Engineer Citigroup New York, NY November 2018 – March 2020
Setup and build AWS infrastructure various resources, VPC EC2, S3, IAM, EBS, Security Group, Auto Scaling, and RDS in Cloud Formation JSON templates. Developed strategy to migrate Dev/Test/Production from an enterprise VMware infrastructure to the Amazon Web Services (AWS) Cloud environment including Runbook processes and procedures.
Utilized multiple AWS EC2 instances at the same time and provided highly durable and available data by using S3 data store, versioning, lifecycle policies, & create AMIs for mission-critical production server's backup.
Implemented AWS Lambda functions to run scripts in response to events in Amazon Dynamo DB table, S3 buckets, and HTTP requests using Amazon API Gateway. Also wrote AWS Lambda functions in python for AWS Lambda which invokes python scripts to perform various analytics on large data sets in Elastic MapReduce (EMR) clusters.
Worked on the Amazon Aurora database service on the AWS cloud and implemented automatic machine Disaster recovery on AWS cloud and setting up databases using Amazon Relational database Service (RDS), storage using S3 bucket, Amazon Glacier by configuring instance backups to the S3 bucket.
Improved the security posture of AWS by carefully implementing IAM policies, Web Application Firewall (WAF), and Shield. Developed and managed Serverless APIs by integrating AWS Lambda and API Gateway.
I led the implementation of advanced DevOps practices on AWS, optimizing Continuous Integration/Continuous Delivery (CI/CD) pipelines with AWS CodePipeline and CodeDeploy. I also streamlined application deployment using AWS Elastic Beanstalk and managed data transfer and storage with services like Snowball and Glacier.
Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation, and Implemented Terraform modules for the deployment of applications across AWS.
Developed Infrastructure as Code (IaaC) with a fully modularized approach, utilizing Terragrunt/Terraform to ensure code reusability and following the DRY (Don't Repeat Yourself) principle. Installed a Terraform operator and adjusted the code as necessary to enable the coordinated deployment of application components.
Configured Terraform to manage dev, test, staging, and production environments with environment-specific variable files, state files, and Terraform workspaces, guaranteeing environment isolation and consistency.
Worked on AWS to Azure Migration, Jira to Azure DevOps Migration, GitHub to Azure DevOps Migration along with Experience in configuring and using PaaS offerings (like Azure Database services, Azure Kubernetes, Azure Containers, DNS, Application gateway rerouting, Application Insights, Azure Container Monitors).
Created and managed Terraform Configuration files (HCL) to describe desired infrastructure states, utilizing Terraform modules and variables for modularization and parameterization of infrastructure components.
Automated Jenkins pipeline rollbacks through Git Version Control integration, swiftly reverting to stable releases. Implemented Jenkins Shared Pipeline Libraries for standardized and modular pipeline development. Collaborated with infrastructure teams to implement Jenkinsfile Runner, optimizing Jenkinsfile execution.
Connected Jenkins with multiple testing frameworks and tools, including JUnit, Selenium, and SonarQube, to automate unit tests, integration tests, and code quality checks within Continuous Integration/Continuous Delivery (CI/CD) pipelines.
Utilized Jenkins to implement Canary Releases and Blue-Green Deployments, also improved pipelines by adding conditional logic to execute jobs based on environment variables and provided working support for critical Jenkins-related issues during deployment cycles.
Established build and deployment Metrics Visualization using custom Dashboards for Jenkins. Worked with Release Management Teams to use Jenkins to automate release procedures. systematically evaluated the security of Jenkins plugins and configurations.
Automated Jenkins Pipeline documentation generation using tools like Jenkins Job DSL and AsciiDoc. Integrated Jenkins with SonarQube for continuous code quality monitoring and feedback. Configured Jenkins to deploy applications to Serverless Architectures, optimizing resource utilization.
Experienced in Building and deploying the application code using CLI of Kubernetes called Kubectl, Kubelet, Kubeadm, Kubespray and Schedule the jobs using Kube-scheduler.
Managed Kubernetes charts using Helm and created reproducible builds of the Kubernetes applications.
Configuring and managing of Chef Master server: updating and creating modules and pushing them to Chef Clients and deploying application operational scripts to webservers like Apache Tomcat and JBoss using manifests.
Expertise in