Required Skills

Ansible Microsoft Azure Terraform Apigee Azure Kubernetes Services YAML scripts

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 28th Nov 2023

JOB DETAIL

  • Used Ansible Tower, which provides an easy-to-use dashboard and role-based access control, so that it's easier to allow individual teams access to use Ansible for their deployments.
  • Managed servers on the Microsoft Azure Platform, Azure Virtual Machines instances using Ansible Configuration Management and created Ansible Playbooks, tasks, and roles to automate system operations.
  • Hands on experience on using Terraform for infrastructure provisioning.
  • Worked with Terraform for automating VNET, NSG, AKS, ACR, VMs, and Storage accounts to replace the rest of our infrastructure.
  • Designed and implemented CI/CD pipeline for Azure app services and responsible for monitoring the performance and availability of Azure App Services and troubleshooting any issues that arise.
  • Extended working knowledge in azure networking services, Configured VNETs and subnets as per the project requirement. created and maintained NSG rules.
  • Involved in design and integrating API’s using Apigee and AWS API gateway.
  • Created Ansible roles in YAML and defined tasks, variables, files, handlers, and templates.
  • Written the Ansible YAML scripts to configure the remote servers.
  • Developed and maintained Continuous Integration (CI) using tools in Azure DevOps (VSTS) spanning multiple environments, enabling teams to safely deploy code in Azure Kubernetes Services (AKS) using YAML scripts and HELM charts.
  • Configured Istio to enforce security policies, such as mutual TLS (mTLS) authentication and authorization, protecting service-to-service communication within the service mesh.
  • Worked on creating, configuring, and managing AKS clusters in Azure, including managing node pools, configuring networking, and setting up load balancing.
  • Managing the Azure Kubernetes Services (AKS) policies, providing access to different Azure resources and developing and improving the workflows that govern access.
  • Involved in designing, implementing, and maintaining infrastructure and deployment pipeline for containerized applications on AKS.
  • Integrated Datadog with existing infrastructure and deployment tools (e.g., Kubernetes, Docker, Jenkins) to automate monitoring and streamline the deployment process.
  • Implemented Terraform scripts for creating and managing Azure Kubernetes clusters.
  • Responsible for Azure Container Registry and Azure Active Directory to securely manage container images and access control for AKS clusters.
  • Administered Kubernetes Cluster for various environments like Dev, QA, UAT and Prod
  • Managed and configured JFrog Artifactory for artifact management, ensuring efficient storage, retrieval, and versioning of artifacts.
  • Implemented fine-grained access control policies in Artifactory to ensure secure and controlled access to artifacts by development and deployment teams.
  • Led the implementation of blue-green deployment strategy for an enterprise application, resulting in zero downtime and seamless updates for end-users.
  • Monitoring and troubleshooting Kubernetes clusters using Prometheus Grafana.
  • Integrated Istio with monitoring tools like Prometheus, Grafana, or ELK stack to collect metrics, logs, and traces from the service mesh, providing visibility into application performance and behavior.
  • Integrates with the OpenShift platform to put the ability to create, edit and deploy applications.
  • OpenShift provides an immutable, container-based platform based on Docker to deploy and run applications and microservices.
  • Created quality gates in SonarQube dashboard and enforced in the pipelines to fail the builds when conditions were not met.
  • Git administration: creating new branches, merging branches, maintaining code repositories, providing access to users.
  • Worked with KVM to provision Servers on bare metal instances and created guestvm to configure Kubernetes cluster.
  • Developed CI/CD system with Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for the CI/CD system to build, test, deploy and configured Kubernetes to deploy scale, load balance, scale and manage Docker containers with multiple names spaced versions.

Company Information