Senior DevOps Engineer
PUBLICIS SAPIENTSenior Manager - Technology (DevOps)
CSCTechnical Lead
GIGLABZTechnical Developer
VScreen, IncSenior Web Consultant
ENSTRAPP IT SOLUTIONSDevelopment Lead
UTUProgrammer Analyst
IFMR CDFChef.io
Python
Jenkins
CI/CD
Ansible
Terraform
Docker
Kubernetes
Flutter
AWS (Amazon Web Services)
jQuery
WordPress
Javascript
Git
PHP
MySQL
JSON
REST API
MongoDB
HTML5
Spring MVC
Hi. Hi, myself. Working with, uh, Sari and SCC governance. Nearly, uh, police expressions were already. Um, and then, uh, I made a research for, for the certification of associate. Um, and then, uh, I have 5 to 6 of Experience with the cloud, uh, computer works operations, um, as well,
Yeah. If it is a resources, uh, uh, needed, um, if you wanted to scale the, Resources, uh, that's completely comes under with that, uh, horizontal up to your horizontal side. And then If you need, Um, scaling of, uh, um, the application, uh, microservices, that's a vertical
Yes. Actually, um, by using that, uh, HCL, So completely written the code, uh, with what are the resources we need, And then which provide based on the provider, uh, I we can able to to to the, uh, interested code, uh, we can make it. Um, so as per our complete requirement, uh, we can, Uh, get the access key and security within within our config, uh, telephone config file. Um, and then, So whatever the resources needed, we we have to be, uh, written in that HECL, uh, like, a HESI GOP, um, confirmation language. With that, we can able to, uh, by using that, uh, Terraform unit and then up play, um, or plan on up play. Uh, respectively, we can, Uh, do the dynamic and system elements. Um, at that Uh, so, uh, within that, uh, we can set up that, uh, bash. Uh, so what are the,
So commodities, if or parts has, uh, if any failures, It will be, uh, automatic, uh, failing system will be enabled, then it will be paused as created immediately. Even though if it is not that, then we can be go through with that that, uh, um, what the port exposes according to the port exposes, we can able to, I ping that stuff. I ping that you ping that's the system IP. Uh, if it is, uh, worse, then, Then, uh, we can, uh, next we have to be, uh, find out that, uh, the logs, What has to be? And then, um, that, uh, what's in what's in for? And then, Restly, we can able to find the issues, and then we can, Check the rep repeat account as well. Um, like this, we can able to
So here, End of the, uh, run the binary app. Uh, we supposed to, uh, change the run command, And then, uh, dot, um, dot slash app that's supposed to be here. And then copy the the product source has to be oh, no. From that's fine. Scratch images. Yeah. That's
So we we need to be, Yeah. We can, uh, services we can use to do that gRPC. So here, what the, um, you said it has supposed to has to be retired. We can process the multiple a single a single request in the multiple response. We can able to The command stream stream over there, we can, uh, get and get done with that, uh, implementing of
So end of the end of end of the line, uh, that greater decimal, uh, has to be
Yeah. Whenever, uh, we post to add the, um, updates of the application, uh, the whole system has to be has to be, uh, with the downtime, uh, we need to redo. So that is the only thing. So we're supposed to, That is only
Yeah. Sure. That, uh, and the the boost variable supposed to be, Defined with that exact, um, first dependent, That that need to be, uh, pass the values of of
So we can able to do with that data replication stuffs like s t n, then, uh, this so if you implement that, we can be,
So we can use to do, uh, the auto scaling, um, by using this feature. Um, we can make
Uh, tournament is security. The card duty was there, and then, um, in code level, we can able to follow that PC contention, then vulnerability checks those has to be implemented. Accordingly, we can able to I might practice with the