
Principal Security Engineer
mPokketSenior Security Engineer
mPokketDevOps Engineer - l
MediBuddyDevOps Intern
XenonStackAssociate DevOps Engineer
BootLabsDevOps Engineer - l
BootLabsPersonnel
Impact AppDevOps Intern
Click LabsMember
RISC.png)
AWS CloudFormation

AWS Lambda
AWS (Amazon Web Services)

DNS

Python
.png)
Jenkins

Kubernetes
Yeah. So my name is. I'm a 2020 person from lovely University. So, currently, I'm a dev sec ops in the end of pocket company. So I I work with DevOps on security related things here. So I'm only the responsible person for automation and everything. I'm AWS certified, Terraform certified, and CKI certified. So, yeah, I'm very passionate DevOps and security engineer. Looking forward for better opportunities. Yeah. So I have worked in a Fintech domain, pharma domain, Credit card business and everything. So I have worked with AstraZeneca, Bootlabs, Medibuddy. I'm currently working with Empockett throughout my Carrier. So I have a very good knowledge in AWS, Docker, Kubernetes, Terraform, Linux, shell scripting, Python, and etcetera. So I have outdone multiple things Throughout my career, like, cost optimization, building high dollar rent, available architectures. Not else. So so I have a knowledge and expertise to start or implement everything from scratch by myself. Uh, so all the experience I have here, uh, or I bring to US from the startups. So, yeah, I can do everything by myself from scratch.
So I would like to use Python scripting in EC 2 Or Linux servers because so it is a very old, and we have a lot of open source community around it. So if we face any issues or if we want some guidance, there is a lot of documents, a lot of people to help out there. It will be very easy for us. And and it is more flexible, and it is human friendly, readable, and easy to Understand for any other person who have not written the script as well. So, yeah, Python is so I'll go with Python. So ease of learning and readability, the versatility, you can say. So there are extensive libraries around Python, open source community, you can say. So there is a community support as well, and it it compacts with cross platform. So it comes with cross platform compatibility. So automation and scripting is very easy, and we can furthermore use it for web development purpose as well. It can be used for data analytics and visualization, machine learning AI, lot of things. So I'll go with
So yeah. So there are a lot of, Scenarios or lot of things we have to consider before going with Terraform or cloud formation. So one one is so it is, like, open source and multi cloud platform support. So multi cloud support. And it has a declarative syntax, so Terraform uses declarative syntax allowing you to describe and describe the design state of your infrastructure. This can be At more readable and compared to JSON or YAML languages offered by the CloudFormation. And you can you can say community and ecosystem. So Terraform has large and great community that contributes models and best practices over, Uh, CloudFormation. CloudFormation is just for AWS only. So provider abstraction. So Can so Terraform cloud provided details providing consistent interface across different platforms. This abstraction Section allows users to manage infrastructure with set of commands and guidance, a lot of things, an execution plan. So immutable infrastructure. So this HCL language is supported, By lot of, uh, code editors like Visual Studio Code, uh, Atom, and etcetera. So, yeah, state management, it easy for migration, it is easier than cloud formation.
So steps in the sense, the first, I ensure monitoring and logging is enabled for all all my applications on all the infrastructure. So once you have the monitoring and logging enabled, then we we can check at what time the error erased Or at what time the application started behaving unexpectedly, then we can pinpoint the particular point of time, and we can correlate it with other services if any other service impacted this particular service, or we can go and check the Infrastructure logs as well if something happened on the infra at at that particular time or if any maintenance happened from AWS end or if anyone deleted anything. So, yeah, we can check all these things. So starting from there, then So if it is something which have done by humans or, uh, engineers, so we will Have a strict access control over it, and we can prevent it, uh, from happening again and again. So we'll set up alerts If something is modified or changed in the infra end or in in the application end. So, yeah, having strict access controls, prevents a lot of errors and a lot of security breaches as well. So and So we should have IS infrastructure as code as well so that any change happening, Uh, where the infrastructure can be monitored by this and only set of people have access to it.
So, yeah, use print functions first. So in Python, do print statement test. And, uh, and Python, it's a function. So so use print functions and, uh, division behavior. There are a lot of things. So one is print function. So division behavior. So in Python 2, division between integrates and results. Division so in Python 3, division between integrated results and flow division. And so Unicode strings use Unicode strings and 6 library. So there are a lot of other things as well, like so underscore function, underscore imports, utilize these things and try expect expect blocks accept, like, exceptions. We have to Use exceptions, blocks for import any importer between 213. Uh, use range and x range, integers which are not available in few. So following these practices using tools like 6 or you can increase the likelihood that your code will run smoothly on both Python 2 and Python 3. However, keep in mind that Python 2 Uh, reached its end of life. So it is not recommended to use Python 2. Always go with Python 3.
So first, I'll I'll enable logs, CloudWatch logs. And So in in AWS, uh, Kubernetes offering is like EKS. So we can enable all the logs, control plain logs, node logs, port logs, logs on every logs there, and we can dump them into the, uh, CloudWatch. From there, we can send those logs to Open search, and we can create dashboard visualizations, alerts, and lot of things there. So this helps us to, understand what is happening inside the EKS cluster or EKS applications. So, yeah, So Elasticsearch is my primary, uh, way to monitor. And so, uh, I will send my alerts to Slack as well If any if there is any error or which something is unexpectedly happening, these things can be monitored there. So, yeah, the my go to a tool or monitoring tool, you can say, to monitor applications deployed in Kubernetes on AWS's, so CloudTrail sorry. CloudWatch and OpenSearch. Yeah. And integrate with to Slack or Microsoft Teams, whatever the company uses. Yeah. So there are some other custom monitoring solutions offered by some other companies as well. Yeah. So we can consider the cost and lot of other factors uh
And so it it looks like there are a couple of syntax errors in the Java code here. So first, the correct, The changes here to be done are, like, corrected the print in method name, and So we have to correct the printing method and use string dot value of string to handle the case if string might be null or prevent null point exception when calling the string. So these 2 things. So one is we have to correct the method, And we have to, uh, use string dot value of string to handle the case where string might be null. These 2 things.
So they we have to fix the labels here. So if you see the spec, there is a match label section, And under that, there is app NGINX, and there is some other label in the template. Right? So that is app NGINX. So both the labels should be the same. That is the first one. And, yeah, I think I only I think this so rest, everything looks fine. Yeah. So both the labels in the template and spec section should be same. So it should be either NGINX or NGINX 1.
Yeah. I think yes. There are multiple. So and as well, I was working with AstraZeneca. Right? So I was only the person who was working on that, and I was kind of fresh air. I was having this up to 1 year of experience there, so I have to explore lot of things, and I have to learn and implement on my own. So so there so there is a lot of pharma data, like TVS of pharma data, which is, uh, incoming into the project, and we have to process it by using step functions, uh, Lambda function, s three, and lot of AI ML, uh, tools. So it was very new to me, and I've learned and implemented on my own. And I have used AWS services like Step Function, SageMaker Studio, Amplify EKS, ECS, and lot of other AWS services to to set up all these things and process the data. And I've used Linux, uh, Linux from my local so, normally, I use Linux laptop only. So I've used shell scripting of and Python scripting to run the Lambda functions and step functions to process the huge amount of data. So yeah. So so data for data processing purpose, I've used these these things in AstraZeneca
So version control system, I'll be using, uh, Git repository, branching strategies, versioning, And then I'll be using, uh, infrastructure as a code, either Terraform or CloudFormation. Like, I'll go with Terraform because it is a multi cloud. Then, uh, multi cloud abstraction layers. Abstraction layers, uh, helps us to use a multi multiple public clouds such as GCP, AWS, and Azure, and configuration management tools like Ansible, Puppet, uh, to to have a uniform or consistent configurations across all the clouds. And the CICD, we can go with Jenkins. Cloud. It is open source and cheap. So, Yeah. So immutable infrastructures. Nothing should be muted again and again. Like, same should be not repeated. I'll I'll I'll choose better monitoring and logging tools there, uh, which again which are cloud diagnostic, Like, LK, Grafana, Prometheus, and etcetera. And I'll have proper documentation, how the things are set up, How the configuration management is working, how the release management is working, and and everything. Uh, security considerations. So, As a security engineer, I I'm very much concerned about the securities. I'll I'll go with cloud diagnostic security tools like Prisma Cloud or some other things. And then the periodic testing and penetration testings, all these things helps me to, um, do all these things in multiple clouds.