Project Name: Teradata Migration (Birla soft Limited) Client: Paccar Role: DevOps Engineer Duration: 1.2 years Key Result Areas: Developer Commit Code changes from their local repo to the GitHub repository Only DB Objects (Tables, Views, Functions and Stored procedures) are in scope for the Project. Enable GitHub Actions on GitHub Server and use Amazon S3 Storage to store data generated by workflows runs and provide the required permission/access on S3 Object Define the role and create policies to provide the required access to S3. Get the credential created to access Postgres RDS Instance. configure the workflow token for OIDC token authentication and authorization management. Conflagration the AWS Lambda function to push and execute the code from S3 to AWS Aurora Postgres Instance. Need to Setup the authorization in Lambda Function with OIDC token. The Lambda function will not connect directly to the DB instance endpoint but to the RDS Proxy endpoint. Register the DB Instance is targeting group in the RDS Proxy so that it can Connect to the DB instance via the RDS proxy. Working with building/maintaining CI/CD pipelines with Git workflows, GitHub actions. Building and maintaining CI/CD pipelines in AWS environments with GitHub Actions. Involved in Release management like planning, scheduling, and deploying Releases. Working with AWS (IAM, S3, ELB, EC2, ALB, VPC, RDS, Route53, Lambda, Autoscaling, Develop Rest APIs using. GraphQL (Hasura) Perform unit testing using Postman. Cloud Engineer into architect design and configuration advisor for AWS. Project Name: Holcim Security Group Redesign (Birla soft Limited) Client: Holcim Role: Senior Analyst Duration: Since Dec 2023 to till date. Key Result Areas: Analyze the inbound traffic to the EC2 and RDS instances. Analyze VPC flow logs. S3 bucket to export VPC flow logs for analysis on all three accounts Using Aws Athena and run the query. Redesign security groups for each application component. Create all new security groups finalized as per the new design. Change request creation, review, approval. During change window, attach the new SGs to the App server as per the input. We are using in this project AWS Services like AWS EC2, AWS VPC, AWS CloudWatch S3, AWS Athen. Project Name: Proterra DevOps (Birla soft Limited) Client: Proterra Role: DevOps Engineer/Build & Release Engineer Duration: 6 Months Environment: Docker, Jenkins, Rancher, GIT, Linux, SonarQube, AWS services (EC2, IAM, EKS, Lambda, API GATEWAY, ALB, ROUTE53, RDS, S3, VPC, SNS, SQS, CloudWatch, ECR,) Key Result Areas: Collaborating with teams to streamline release management and ensure code integration. Monitoring and optimizing CI/CD tools for high availability and efficiency. Managing Docker and Kubernetes for microservices deployment and resource utilization. Integrating security scanning tools like SonarQube into CI/CD pipelines. Utilizing Maven and Gradle for code building and packaging into Jar files. Provisioning environments and initiating Jenkins builds and deployments. Designing AWS architecture and automating AWS resource launches with Jenkins. Maintaining security groups and IAM role access for AWS servers. Handling builds and environment provision issues and managing Digi Certs and MySQL databases in AWS. Using AWS ECR for Docker image storage and deploying into the EKS cluster. Managing Kubernetes clusters and providing on-call support for incident response.Top of Form Project Name: EAI (Enterprise API Integration) (Birla soft Limited) Client: HP (Hewlett-Packard) Role: Senior Software Developer Duration: 6 Months Key Result Areas: Automated environment creation in AWS using CloudFormation scripts, hosting Docker and Jenkins inside EC2 instances. Configured pipelines for 17 TMS interfaces integrated with Jenkins, SonarQube, and AWS for deployment. Administered Jenkins and AWS, managing user roles, permissions, and security groups. Managed AWS infrastructure (VPC, EC2, ECS, IAM Roles) and hosted Docker, Jenkins, etc., Wrote Docker files, created containers, and images, and pushed them to AWS ECR. Managed CICD pipelines and participated in Agile stand-up meetings. Monitored infrastructure, servers, middleware, databases, and batch jobs, responding to service requests, and troubleshooting issues. Automated processes using scripts and scheduling tools and consulted with application support teams and technical partners. Provided ad-hoc reports, escalated critical issues, conducted root cause analysis, and ensured compliance with change management policies. Supported resiliency, disaster recovery, and high availability events, coordinated incident management coverage, and facilitated communication during critical outages. Conducted impact analysis, and collaborated with onsite and offshore teams for requirements, development, deployment, and delivery.