Home

Venkata Karthik Varma Sagi - Devops Engineer
[email protected]
Location: New Bedford, Massachusetts, USA
Relocation: Yes
Visa: GC
Venkata Karthik Varma Sagi
Sr. Cloud DevOps Engineer
Phone: +17743204999
Email: [email protected]
LinkedIn: https://www.linkedin.com/in/karthik-varma-sagi/

PROFESSIONAL SUMMARY:
Overall 10+ years of comprehensive experience in IT Industry in which 8 years of experience in the areas of DevOps, AWS/Azure Cloud, and CI/CD pipeline, Configuration Management Build/Release Management, and 2 years of experience in Linux/Windows Administration.
Involved in various stages of Software Development Life Cycle (SDLC) including analysis, requirement gathering, and Design, Development, Testing, Deployment and Maintenance of DevOps applications.
Managed architecting and building solutions leveraging DevOps tools such as GIT, Maven, Jenkins, Docker, Ansible, and Chef Etc.
Experience with AWS Cloud services like EC2, VPC, ELB, Auto-Scaling, Security Groups, ECR, EKS, Route53, IAM, EBS, AMI, EFS, RDS, S3, SNS, SQS, Cloud Watch, CloudFormation, and Lambda & Direct Connect.
Collaborated with development teams to create and maintain efficient CI/CD pipelines using AWS CodePipeline, CodeBuild, and CodeDeploy, resulting in accelerated software delivery.
Automated application deployments using Argo CD, leveraging blue/green deployment strategies and canary releases to minimize downtime and ensure smooth rollouts.
Experienced in building tools like Maven, Ant & Gradle for building deployable artifacts from source code.
Expertise in using Repository Managers like Nexus, Docker Hub and JFrog to store the Artifacts.
Experience in Administrating Microsoft Azure Services like Azure App Services, Azure SQL Database, Azure AD, Azure Blob storage, Azure Functions, Virtual machines, Azure Fabric controller, Azure Data Factory, Azure web applications, Azure Service Bus, and Notification hub.
Experience in designing Azure Resource Manager (ARM) Template to deploy multiple resources as well as in designing custom build steps using Power Shell and Developed PowerShell scripts and ARM templates to automate the provisioning and deployment process.
Implemented scalable, resilient, and cost-effective cloud architectures on Azure, leveraging services like Azure Virtual Machines, Azure Kubernetes Service, and Azure App Services.
Configured Azure Automation Desired State Configuration (DSC) configuration management to assign permissions through Role-Based Access Control (RBAC), assign nodes to proper automation accounts and DSC configurations, to get alerts on any changes made to nodes and their configuration.
Expertise in Designing and implementing Continuous Integration (CI) throughout many environments utilizing Azure DevOps tools to provide an agile development process that is automated and repeatable, allowing teams to safely deploy code several times per day while ensuring Azure Kubernetes Services (AKS) are supported.
Experience in working on several Docker components like Docker engine, Hub, Machine, Compose, and Docker registry. Worked on creation of custom Docker container images, tagging, and pushing the images to Docker Hub.
Managed Kubernetes charts using Helm charts, and created reproducible builds of the Kubernetes applications, managed Kubernetes deployment and services files and managed releases of Helm packages.
Used Azure Infrastructure as a Service (IaaS), Provisioning VMs, Virtual Networks, Deploying Web Apps, Microsoft SQL Server, using ARM Templates, and Azure DevOps CI/CD pipelines.
Conducted vulnerability assessments and security scans in various stages for early detection and mitigation of security threats through SonarQube and Aqua scans.
Worked on monitoring tools like Nagios, Splunk, CloudWatch to health check the various deployed resources and services.
Expertise in configuring the Monitoring and Alerting tools according to the requirements like Prometheus and Grafana, Splunk setting up alerts, and developing multiple dashboards for individual applications in Kubernetes.
Experience in Configuring VNet Peering using Terraform Modules and configuring Network Security Groups for two tiers and three-tier applications were set up to filter network traffic, to facilitate connectivity between resources across various Virtual Networks.
Used Dynatrace APM tool to monitor our Kubernetes workloads, applications, and cloud services by enabling full stack monitoring. Created dashboards to provide insights into application performance metrics, such as response time, throughput, and error rates.
Implemented Ansible to manage servers and automate the build and configuration of new servers.
Worked with Ansible playbooks for virtual and physical instance provisioning, configuration management, patching and software deployment.
Worked on Terraform key features such as Infrastructure as Code, Execution plans, Resource Graphs, and Change Automation.
Performed L2 & L3 level Full Life-cycle triage for all events on production servers including Incident logging and troubleshooting.
Integrated Kibana with Elasticsearch to seamlessly visualize and analyze data stored in Elasticsearch indices.
Created CI/CD pipelines for .NET, Java, and Python apps in Azure DevOps by integrating Bitbucket, SonarQube, and Nexus repository.
Utilized Groovy to build complex pipelines in Jenkins.
Created deployment areas such as testing, pre-production, and production environment in Azure Kubernetes Service.
Led the migration of legacy applications to Azure Kubernetes Service (AKS), improving scalability and resilience while reducing infrastructure costs.
Hands-on in using OpenShift for container orchestration with Kubernetes, container storage, and automation, to enhance container platform multi-tenancy.
Good exposure in managing various LINUX servers clustered environments.
Experience in building Docker images using GitLab CI/CD build automation runner.
Experience in Setting up the build and deployment automation for Terraform scripts using Jenkins.
Resolved production issues very quickly with an analytical bent of mind.
Excellent communication skills with experience in organizing meetings and gathering project requirements from multiple teams in large multi-functional organizations.

EDUCATION:
Bachelor of Technology from Andra University, India. May 2012

TECHNICAL SKILLS:
Title Tools Used
Cloud Environments Microsoft Azure, Amazon Web Services (AWS)
AWS EC2, S3, Lambda, RDS, ECS, ECR, EKS, CloudFormation, IAM, VPC, CloudWatch, Kinesis, Elastic Beanstalk, Autoscaling, CloudTrail, AWS Direct Connect, Route53, SQS, SNS
Azure VM, App Services, Azure Repos, Azure Pipelines, Azure Boards, Azure Kubernetes Service (AKS), Azure Container Registry (ACR), Azure Functions, Azure Blob Storage, DevOps Services, Azure Monitor and Log Analytics, Networking Services
Configuration Management Ansible, Chef, Puppet
Build Tools ANT, Maven, Gradle
CI/CD Tools Jenkins, Argo CD, Azure Pipelines, GitLab, GitHub Actions
Monitoring Tools Splunk, Dynatrace APM, Cloud Watch, ELK, Grafana, Prometheus, Datadog
Container Tools Kubernetes (EKS, AKS), OpenShift, ECS, Docker
Scripting/Programming Languages Python, Java, Shell (Bash), Ruby, .NET, YAML, JSON, Golang, PowerShell, Groovy
Version Control Tools GIT, GitHub, Azure Repos, Bit Bucket, GitLab
Operating Systems UNIX, Linux, RHEL, Windows Server
Databases SQL Server, MYSQL, NoSQL, S3, MongoDB, Dynamo DB, Cassandra, Data Lake
Ticketing Tools Jira, ServiceNow, Bugzilla, Mingle
Testing / Code Quality Selenium, SonarQube, Veracode, X-Ray
Web/Application Servers Apache Tomcat, Nginx, IIS, httpd, Web logic, Kafka
Virtualization Tools Oracle Virtual Box, VMWare, vSphere, Vagrant
Infrastructure as Code Terraform, ARM Templates, CloudFormation

WORK EXPERIENCE

Client: State of Nevada, Carson City, Nevada. April 2022 Till now
Role: Azure DevOps Engineer / Kubernetes Administrator
Responsibilities:
Creating and maintaining containerized microservices and configuring/maintaining a private container registry on Microsoft Azure for hosting images and using Azure Active Directory (AAD).
Created GIT and Azure Repos for version control management, branching strategies, and code reviews, ensuring collaboration and code quality within development teams.
Configured ArgoCD to synchronize application configurations stored in Git repositories with Kubernetes clusters, ensuring consistency and reliability.
Deployed and maintained Windows Phone applications on Azure cloud technologies. Converted .NET application to Microsoft Azure Cloud Service Project as part of cloud deployment.
Managed servers on the Microsoft Azure Platform Azure Virtual Machines instances using Ansible Configuration Management and created Ansible Playbooks, tasks, and roles to automate system operations.
Designed and implemented authentication solutions using Azure Active Directory, including the deployment of single sign-on (SSO), multi-factor authentication (MFA), and identity federation across diverse applications.
Developed reusable ARM templates for provisioning Azure resources such as virtual machines, virtual networks, storage accounts, and web applications, ensuring consistency and scalability across environments.
Created Azure Pipelines for Continuous Integration and Continuous Deployment (CI/CD) to build, test, and deploy applications and Configured Azure Artifacts for Package management for storing and managing software artifacts.
Configured a package feed in Azure Artifacts, defined feeds for specific package types (e.g., npm, Maven), set up permissions and access controls, and publish packages to the feed using your build pipelines. Deploying Cloud Native Functions (CNF) on Azure Kubernetes Service clusters using Helm charts.
Created Value files based on test deployments done on test clusters and elevated them to production clusters on Azure.
Set up Bugzilla on Azure Virtual Machine to keep track of bugs in the deployment cycle and environment issues.
Creation of CI/CD pipelines to integrate with Azure Key Vault and retrieve secrets to be used in pipeline jobs.
Worked on automating cron jobs which aid in scheduling dev, model, and prod jobs and disable the job after execution, as self-service to developers on Azure.
Provisioned Azure Kubernetes Service (AKS) to deploy, manage, and scale Kubernetes clusters on Azure. Deployed containerized applications to AKS clusters using Kubernetes manifests and helm charts.
Worked with AKS cluster configurations to define and customize cluster settings, including networking and security. Managed and scaled containerized workloads on Azure Kubernetes Service using Kubernetes constructs, such as deployments, services, and pods.
Developed and enforced Azure Policies across multiple environments, ensuring compliance with corporate security standards and regulatory requirements.
Implemented Azure Databricks for advanced analytics and big data processing, seamlessly integrating it with other Azure services such as Azure Data Lake Storage (ADLS), Azure Blob Storage, and Azure SQL Data Warehouse.
Strong experience in building data pipelines leveraging Azure Databricks and Azure Data Factory, integrating heterogeneous sources of data, and automating workflows.
Technical hands-on experience with programming languages such as Java, Scala, SQL, and Python for developing data solutions and pipeline automation.
In-depth knowledge of ADLS, Delta Lake, Unity Catalog, and performance tuning.
Skilled in troubleshooting and debugging .NET applications and Azure services, identifying performance bottlenecks, memory leaks, and other issues to ensure optimal application performance and reliability.
Used Terraform to migrate legacy and monolithic systems to Azure.
Created Terraform templates and modules for creation of various resources in Azure, Kubernetes, and deployment of various applications across multiple environments to manage infrastructure.
Setting up the build and deployment automation for Terraform scripts using Jenkins on Azure. Restricted user access/service accounts access over jobs on Jenkins using Assign and managing roles for security purposes in development and test environments.
Involved in Migration of on-premises data to Azure Data Lake using Azure Data Factory.
Implemented and configured HashiCorp Vault to securely store and manage sensitive information, including cryptographic keys, passwords, and API tokens.
Designed and implemented disaster recovery and high availability solutions for Azure Databricks environments, including data replication, backup, and failover mechanisms, ensuring business continuity and data resilience.
Creation of hooks on Bitbucket repositories in aiding automation of Jenkins jobs on Azure.
Creation of jobs to manage F5 balanced load environments deployments in dev environment on Azure.
Installing, integrating, and running Docker containers on Azure Container Instances or Azure Kubernetes Service.
Utilized Kubernetes and Docker for the runtime environment for the Continuous Integration/Continuous Deployment system to build, test, and deploy. Created Jenkins jobs to deploy applications to Azure Kubernetes Service.
Created the Docker containers, Docker images, tagging, and pushing the images and Azure Container Instances or Azure Kubernetes Service consoles for managing the application lifecycle and Deployed Docker Engines in Virtualized Platforms for containerization of multiple applications.
Leveraged ISTIO for streamlined microservices communication and seamless integration with Kubernetes deployments.
Installed, and Configured Ingress Nginx Controller in Kubernetes clusters to enable external access to services.
Implemented encryption and decryption mechanisms using HashiCorp Vault's transit secrets engine to protect sensitive data in transit and at rest, ensuring compliance with data security standards.
Used Jenkins and Azure pipelines to drive all microservices builds out to the Docker registry and then deployed to Azure Kubernetes Service.
Deployed the artifacts to staging and Production environments from artifact tools like Azure Container Registry. Built the Docker image, published it to Azure Container Registry repo.
Written Ansible playbooks to automate the deployments, restarting the servers and installation of new packages.
Monitored the deployed applications using performance monitoring tools like Grafana and Prometheus on Azure Monitor.
Implemented data onboarding strategies to ingest data from diverse sources into Splunk, including log files, databases, message queues, and APIs. Configured index-time and search-time field extractions, sourcetypes, and event types for efficient data indexing and search.
Configured alerting and monitoring rules in Splunk to proactively detect anomalies, security threats, and operational issues. Integrated Splunk with external notification systems (e.g., email, Slack, PagerDuty) to notify stakeholders of critical events.
Implementing and managing monitoring solutions using Datadog, including deploying agents, configuring monitors, and creating dashboards. Leveraged Datadog s Terraform provider and API to manage monitoring resources alongside infrastructure provisioning.
Experience in integrating Datadog monitoring into Infrastructure as Code (IaC) pipelines, ensuring that monitoring configurations are consistent across deployments.
Created alarms and trigger points in Azure Monitor based on thresholds and monitored the server s performance, CPU Utilization, disk usage in Dev and test environments.
Monitored the Azure Kubernetes Service Cluster jobs and performance.
Working on upgrading Azure Kubernetes Service cluster, commissioning & decommissioning of Nodes, Pods.
Tracked and managed tasks, defects, and project progress using Jira as a powerful project management and issue-tracking tool.
Created and maintained Azure Runbooks for automated provisioning, monitoring, and maintenance tasks, leveraging PowerShell and Python.
Collaborated with cross-functional teams to establish incident management procedures based on alerts, minimizing downtime and service disruption.
Experience in creating design documents and presentations for data pipeline architecture, project planning, and reporting.

Environment: Azure DevOps, Terraform, Azure SQL, Azure Active Directory, Jenkins, Python, GIT, Bitbucket, Ansible, Azure Services, Docker, Azure Databricks, Azure Key Vault, SonarQube, Argo CD, Azure Kubernetes Service (AKS), Azure Container Registry (ACR), CI/CD pipelines, Datadog, HashiCorp, OpenShift Container Platform, .NET, ISTIO, ELK stack, Azure Log Analytics, Azure Pipelines, Nginx, Prometheus & Grafana, Splunk, Kafka, Azure Cosmos DB, Migration, Jira.

Client: Union Bank of Switzerland, Jersey City, New Jersey March 2018 April 2022
Role: AWS DevOps Engineer / SRE (Site Reliability Engineering)
Responsibilities:
Installed and Administered Jenkins CI for ANT and Maven Builds and managed the installation, configuration, and administration of RDBMS and NoSQL tools such as DynamoDB.
Worked extensively on creating and managing Docker containers and Docker consoles for application lifecycle management.
Integrated Argo CD with CI/CD pipelines (e.g., Jenkins, GitLab CI) to trigger deployments automatically when changes are pushed to the Git repository, enabling seamless continuous integration and delivery.
Utilized Docker container snapshots, attaching to running containers, removing images, managing directory structures, and overseeing containers in AWS ECS.
Created and maintained S3 buckets, implemented policy management, and utilized Glacier for storage and backup on AWS.
Implemented and managed Red Hat Enterprise Linux (RHEL) OpenShift Container Platform for Docker and Kubernetes, leveraging Kubernetes for managing containerized applications using nodes, Config Maps, node-selector, Services, and deploying application containers as Pods.
Installed, configured, and administered VMware, and automated jobs through crontab and AutoSys.
Orchestrated deployments using Atlassian development repository tools, Jenkins as the build engine, and executed deployments to container orchestration tools, including OpenShift on EC2, AWS.
Configured health checks on Route53 and implemented various routing policies like Simple, Weighted, and Fail-over.
Developed and deployed Cron-Jobs, Argo workflows for security scans, compliance scans, and triggering builds for applications in a cluster.
Developed Groovy scripts for setting up LDAP configuration for Jenkins using security matrix.
Set up and maintained Logging and Monitoring subsystems utilizing tools such as Elasticsearch, Fluent, Kibana, Prometheus and Grafana.
Created dashboards, metrics, alarms, and notifications for servers using AWS CloudWatch, Grafana, Prometheus, and Nagios.
Proficient in UNIX shell/Bash scripting, Autosys scheduling experience, and batch processing in the production environment.
Designed and implemented end-to-end CI/CD pipelines using AWS CodePipeline, AWS CodeBuild, and AWS CodeDeploy also integrated source code repositories, such as AWS CodeCommit, with AWS CI/CD services to enable automated build, test, and deployment processes.
Wrote Ansible Playbooks for various applications and deployed them in AWS using Terraform.
Automated Kubernetes clusters with Ansible, writing playbooks for deployment.
Responsible for monitoring alerts from Prometheus about Kubernetes nodes, disk usage, memory, app restarts, and troubleshooting.
Developed and deployed Helm charts to Kubernetes using Helm file as a declarative configuration for deploying distributions of Helm charts while adhering to 12-factor application principles.
Proficient in writing Helm charts and Kubernetes YAML files for deploying microservices into Kubernetes clusters.
Configured JUnit coverage report and Integration Test cases as part of the build in GitLab Runner.
Developed build workflows using Gradle, Gitlab-CI, Docker, and OpenShift.
Acted as an AWS DevOps Engineer for a team overseeing multiple simultaneous software releases.
Migrated and maintained build and test environments into Cloud Infrastructure.
Configured AWS Identity Access Management (IAM) Group and users for improved login authentication.
Set up AWS Virtual Private Cloud (VPC) and Database Subnet Group for isolation of resources within the Amazon RDS Aurora DB cluster and created notifications and alarms for EC2 instances using CloudWatch.
Involved heavily in setting up the CI/CD pipeline using Jenkins, Maven, Nexus, GitHub, Ansible, and AWS.
Experienced with AWS services like Amazon S3, RDS, EC2, CloudFormation, Lambda, VPC, ELB, Glacier, Elastic Block Store, DynamoDB, Amazon RDS, CodeDeploy, CloudWatch, Amazon IAM, SES, SQS, Security Groups, and Route 53 in an Agile environment.
Implemented SonarQube for developer code quality checks, established quality gates, and designed gate thresholds by muting/unmuting rules through TeamCity.
Configured Groovy script, shared Jenkins libraries, and multi-branch pipelines to manage automated deployment for Dev, QA, UAT, and PROD environments.
Implemented Terraform modules for deployment of applications across multiple cloud providers and employed Git/GitHub, Ansible, Jenkins, and VMware software to build automated testing and delivery pipelines.
Automated various infrastructure activities like Continuous Deployment, Application Server setup, Stack monitoring using Ansible playbooks, and integrated Ansible with Jenkins.
Designed and built custom VPC setups, maintained and architected Cloud Formations for rapid deployment, set up High Availability Cloud architectures in AWS, and architected and set up AWS Customer Gateway via VPN.
Maintained AWS Cost Optimization, AWS Cloud Security, Operational Excellence, Performance, and Reliability for AWS Cloud architecture and deployments.
Customized existing playbooks downloaded from the Puppet supermarket using Python DSL and Handlers.
Deployed Java and .NET applications through WebLogic/WebSphere Application servers and build tools like Gradle.
Designed Auto-scaling Launch configurations templates using various modules like Key-pairs, Security groups, and block device mapping to configure EC2 instances within the Auto-scaling group.
Scheduling, deploying, and managing container replicas onto a node using Kubernetes and experienced in creating Kubernetes clusters, and deployments with the help of Helm charts as a package/version manager.
Configured ISTIO service mesh on Kubernetes cluster and implemented security protocols like mutual TLS for internal service-to-service communication.
Deployed Kubernetes clusters on top of Amazon EC2 Instances using KOPS and Managed local deployments in Kubernetes, creating local clusters, deploying application containers, and building/maintaining Docker container clusters managed by Kubernetes and deployed Kubernetes using HELM Charts.
Set up development and production data pipelines for ML teams on Mesos managed EC2 clusters with Marathon Docker Management and data stored in AWS S3, transformed with Python ETL scripts.
Designed and implemented ServiceNow solutions tailored to organizational needs, leveraging IT Service Management (ITSM) modules such as Incident, Change, Problem, and Service Catalog.
Expertise in using build tools like MAVEN and ANT for building deployable Artifacts such as War & Ear from Source Code.
Performed administrative tasks such as user management, role-based access control (RBAC), license management, and Splunk instance tuning. Scheduled backups, maintenance tasks, and upgrades to keep Splunk environments running smoothly.
Integrated Splunk with other IT operations tools and platforms (e.g., Nagios, ServiceNow, AWS CloudWatch) to streamline monitoring, troubleshooting, and incident management workflows.
Implemented Dynatrace for end-to-end application performance monitoring, enabling real-time visibility into application health and performance.
Implemented Real User Monitoring (RUM) with Dynatrace to analyze user interactions and optimize page load times.
Configured custom alerts in Dynatrace to receive real-time notifications for application and infrastructure anomalies, enabling swift incident response.
Defined and implemented SLOs and SLIs for critical services, establishing measurable targets for reliability and performance.
Managed SLAs to ensure the delivery of services met agreed-upon performance standards and availability targets.
Developed and tracked key SRE KPIs, including MTTR (Mean Time to Recovery), availability, incident frequency, and error rate.
Implemented KPI dashboards to provide real-time visibility into system performance and reliability metrics.

Environments: Ansible, Apache Tomcat, AWS, AWS CodePipeline, Argo CD, AWS Secret Manager, Chef, CI/CD Pipeline, CloudCheck, CloudFormation, CloudWatch, Confluence, Cost Explorer, Docker, Dynatrace, Elastic Container Registry (ECR), Elastic Kubernetes Service (EKS), ELK Stack, GitLab, GitHub, GIT, Helm Charts, IAM, Jenkins, JIRA, Migration, Nagios XI, OpenShift, Prometheus, Python, ServiceNow, SonarQube, Splunk, Terraform.

Client: Tele stream, San Francisco, CA March 2016 Mar 2018
Role: DevOps Engineer
Responsibilities:
Established a Continuous Delivery pipeline with Docker, Jenkins, GitHub, and Azure DevOps. Installed and configured Jenkins to support various Java builds, automated continuous builds using Jenkins plugins, and published Docker Images to the Nexus Repository.
Implemented SonarQube for continuous inspection of code quality and automated Nagios alerts and email notifications using Python scripts executed through Chef.
Installed, configured, and maintained web servers like Apache Web Server and WebSphere Application Server on Red Hat Enterprise Linux (RHEL).
Proficient with Red Hat Linux kernel, memory upgrades, and swap area management. Experienced in Linux Kickstart and Sun Solaris Jumpstart Installation. Configured DNS, DHCP, NIS, NFS in Sun Solaris 8/9, and other network services.
Leveraged multiple AWS EC2 instances and Azure Virtual Machines (VMs) simultaneously, ensuring exceptionally durable and available data using AWS S3, Azure Blob Storage, versioning, and lifecycle policies. Created AMIs and Azure Snapshots for mission-critical production server backups.
Automated deployments using AWS and Azure by creating IAM roles, Azure AD authentication, integrating Jenkins with AWS CodePipeline and Azure DevOps Pipelines, and provisioning EC2 instances and Azure Virtual Machines.
Implemented various concepts of Chef such as Roles, Environments, Data Bags, Knife, and Chef Server Admin/Organizations. Wrote Chef Recipes to automate build/deployment processes and utilized data bags in Chef for better environment management.
Evaluated Chef Cookbook modifications on cloud instances in AWS and Azure using Test Kitchen and ChefSpec.
Developed Chef Cookbooks for various database configurations to modularize and optimize product configuration, converting production support scripts to Chef Recipes, and provisioning AWS and Azure servers using Chef.
Worked with the Knife command-line tool for creating Recipes and Cookbooks and utilized the Chef Supermarket.
Implemented Docker-Maven plugin and Maven POM to build Docker Images for all microservices and utilized Dockerfile to build Docker Images from Java jar files.
Utilized Git for source code version control, integrated with Jenkins for CI/CD pipeline, and managed user management with Maven and Ant build tools.
Installed, configured, and managed Monitoring Tools such as Nagios, Prometheus, and Azure Monitor for resource and network monitoring.
Developed automated build and deployment processes for applications, re-engineered setups for better user experience, and built a continuous integration system for all products.
Managed infrastructure servers from SCM to GitHub, Azure Repos, and Chef.
Extensively worked with the distributed version control system Git.
Built and deployed consistently repeatable build/deployments to company production and non-production environments using Jenkins and Azure DevOps Pipelines.
Collaborated with the development team to generate deployment profiles (jar, war, ear) using Ant Scripts and Jenkins.
Used Maven dependency management system to deploy snapshot and release artifacts to Nexus and Azure Artifacts, facilitating artifact sharing across projects.
Implemented CI/CD automation processes using Jenkins, Azure DevOps, and Docker.
Installed, updated, diagnosed, and troubleshot issue tracking and project management applications, learning agile methodology via JIRA. Created and configured new JIRA projects and maintained existing JIRA projects.
Managed infrastructure servers built on Linux, Solaris, and Windows platforms using the Chef Configuration Management tool.
Created Deployment notes in collaboration with the Local SCM team and released Deployment instructions to Application Support.
Environments: Docker, Jenkins, GitHub, Nexus, SonarQube, Nagios, Python, CI/CD pipeline, Chef, Red Hat Enterprise Linux (RHEL), AWS (Amazon Web Services), Apache Web Server, WebSphere Application Server, Sun Solaris, EC2, S3, IAM, Test Kitchen, Chef Spec, Knife, Docker-Maven plugin, Maven, Git, Ant, Nagios, Maven, JIRA.

Client: University of Pittsburgh Medical Center, Pittsburg, Pennsylvania Feb 2015 -Mar 2016 Role: Linux Administrator
Responsibilities:
Deployment and management through AWS cloud formation on EC2 instances and maintaining amazon S3 storage.
Knowledge on SaaS, PaaS, and IaaS concepts of cloud computing architecture.
Responsible for creating and managing a Docker deployment pipeline for custom application images in the cloud using Jenkins.
Implemented and maintained the branching and build/release strategies utilizing GIT Administration of Jenkins server- Includes Setup of Jenkins, Configure Nightly builds, and parameterized builds.
Wrote Python scripts for automating the deployments of applications.
Used Git as source code management tool and integrated it with Jenkins for CI/CD pipeline, code quality tracking and user management with build tool Maven.
Expertise in Installation and configuration of automated tool like Puppet which includes Puppet Master, Agent Nodes and an administration control workstation and tools like Hiera, Mcollective & Puppet Console. Used Bamboo and Octopus as CI (Continuous Integration) and CD (Continuous Deployment).
Using Puppet as a configuration management tool for environment more than 5000 servers which have Virtual machines and Physical machines.
Wrote modules from scratch and enhanced the existing modules as per the application requirements and wrote templates in ruby format and used Hiera to use template variables to configure the nodes.
Experience in using Atlassian tools such as JIRA (for work tracking) and Confluence as central repository for documentation.
Troubleshooting and performance tuning issues with applications like Oracle 10.x, 11.x and application servers like WebLogic.
Used Puppet to manage Web Applications, Config Files, and Data base, Commands, Users Mount Points, and Packages.
Also involved in Production support task including in troubleshooting and data issues for both divisional and national systems.

Environments: AWS CloudFormation, Amazon S3, Amazon EC2, CI/CD, Docker, Jenkins, GIT, Python, PowerShell, Maven, Puppet, Bamboo, Octopus, Atlassian JIRA, Atlassian Confluence, Oracle WebLogic, Hiera, Mcollective, Shell Scripting.

Client: Intel Corporation, Santa Clara, CA Feb 2014 Feb 2015
Role: Linux System Administrator
Responsibilities:
Installation, Configuration & Upgrade of Linux, Solaris, and HP-UX Operating System.
Proficient in the installation of patches and other software packages using RPM and YUM in Linux, pkgadd, pkginfo, pkgrm, patchadd, showrev p, patchadd p in Solaris, and swinstall, swremove, swlist in HP-UX.
Expert in creating depot for patches and installing packages using depot in HP-UX and Build RPM using RPMBuild in Linux.
Exceptional knowledge in Installation, Configuration and file system and RAID volume management through VXVM and Solaris Volume Manager (SVM) in Solaris and LVM in Linux and HP-UX.
Impressive knowledge of Linux/Unix kernel tuning, building customized kernels.
Experience in installing, configuring, and maintaining WebLogic Application Server and WebSphere Server with java Application tools on Linux and UNIX servers environment.
Created Zettabyte file system (ZFS) in Solaris 10. Created pools, snapshots, and clones.
Exported ZFS from local zones to local zones.
Worked on maintaining DNS & NTP, MySQL database servers.
Installed and configured system network monitoring tool used Nagios and troubleshooted virtual machine issues.
Compiled, Build & Installed PostgreSQL database 8.3.1 and written shell script for startup in SUSE Enterprise Linux 10sp1 Supermicro dedicated server 6015B-3R for Fortress platform development Lab, app, and QA team.
Expert in applying new patches and packages on Linux.

Environments: Linux, Solaris, HP-UX, RPM, YUM, pkgadd, pkginfo, pkgrm, patchadd, showrev, swinstall, swremove, swlist, VXVM, Solaris Volume Manager (SVM), LVM, WebLogic Application Server, WebSphere Server, ZFS, DNS, NTP, MySQL, Nagios, PostgreSQL, shell scripting.
Keywords: continuous integration continuous deployment quality analyst machine learning user experience sthree database active directory information technology ffive hewlett packard California

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];4935
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: