Close this

Gopal Pedda

Development
NC, United States

Skills

Cloud Computing

About

The candidate's skills align with Consultants and Specialists (Information and Communication Technology). The candidate also has skills associated with Programmers (Information and Communication Technology). The candidate has 8 years of work experience.
View more

Work Experience

DevOps Engineer

Florida Power & Light
October 2019 - December 2020
  • * Experienced in core AWS environment, involved in utilizing compute services like (EC2, ECS, EKS), Storage Services (S3, Glacier, Block Storage, Lifecycle Management policies), CloudFormation (JSON Templates), Elastic Beanstalk, SNS, IAM, Route53, Auto scaling, Lambda, Cognito, VPC, RDS, and CloudWatch. * Configured and maintained the AWS Lambda function to trigger via Jenkins build, which internally gets stored on AWS S3 bucket. Created Route53 to route traffic between different regions. Worked with Security groups & Network ACLs. * Responsible for configuring and maintaining Amazon AWS IAM Service: IAM Policies, Roles, Users, Groups, AWS Access Keys and MFA. * Created CloudWatch alerts for instances and used them in Auto scaling launch configurations and monitoring the server alerts through Prometheus, CloudTrail, CloudWatch and troubleshooting the alerts. * Created an Amazon RDS and handled software installation, backups, and patches as well as routine administrative tasks and implemented popular networking services like Amazon Virtual Private Cloud (VPC). * Worked with security teams to enforce proactive controls. Created and configured AWS security groups as a part of VPC deployment. * Implemented end-to-end infrastructure automation using Terraform in a DevOps environment, leveraging AWS services and Python scripting, to optimize resource provisioning, enhance system scalability, and streamline deployment workflows. * Developed and maintained infrastructure as code using Terraform to provision and manage AWS resources. Implemented reusable Terraform modules for common infrastructure components, improving consistency and efficiency. * Orchestrated the provisioning of AWS resources, including EC2 instances, VPCs, RDS databases, and S3 buckets, using Terraform. Ensured adherence to AWS best practices and security standards in Terraform configurations. * Integrated Terraform with CI/CD pipelines, automating the deployment and updates of infrastructure in response to code changes. Implemented automated testing for Terraform configurations to validate infrastructure changes before deployment. * Managed multi-environment deployments (development, staging, production) using Terraform workspaces and variable configurations. Established consistent deployment processes across environments to reduce errors and improve reliability. * Configured and maintained AWS networking components, such as VPCs, subnets, route tables, and security groups, using Terraform. Implemented complex network topologies to support application requirements and improve security. * Implemented security controls and compliance requirements in Terraform scripts to meet organizational and industry standards. Conducted regular security audits of Terraform configurations to identify and address potential vulnerabilities. * Utilized Terraform to implement cost-effective solutions, including automated scaling policies and spot instance usage. Implemented tagging strategies to track and manage costs associated with AWS resources. * Integrated infrastructure monitoring and logging solutions with Terraform configurations to enable proactive issue identification. Utilized AWS CloudWatch, CloudTrail, and other monitoring tools to track infrastructure performance. * Implemented disaster recovery plans using Terraform to create backup infrastructure and facilitate quick recovery in case of failures. Configured automated backups for critical data storage solutions, ensuring data integrity and availability. * Created comprehensive documentation for Terraform configurations, including diagrams and usage guidelines. Conducted knowledge-sharing sessions to train team members on Terraform best practices and usage. * Configured Bitbucket with Jenkins & automated the build process through webhook. Resolved merging issues during rebasing & re-integrating branches. * Programmatically created Jenkins job using REST API to listen for changes in GIT and execute the sequence of targets including compile, JUnit, create jar and war file. * Migrating servers with the required configuration changes, testing, and deploying the machines using Ansible commands. * Created Ansible roles in YAML and defined tasks, variables, files, handlers and templates. Created inventory and configured the Ansible files for parallel development in Ansible for automating the continuous delivery process. * Automated various infrastructure activities like continuous deployment, application server setup, stack monitoring using Ansible playbooks and integrated Ansible with Jenkins. * Developed Ansible playbooks to install and configure Apache, Tomcat, Jenkins, WebLogic for deployment automation. Provisioned load balancer, auto-scaling group and launch configuration for applications running in cloud environments using Ansible. Developed end-to-end infrastructure and configuration automation via Ansible playbooks, roles, and configured application-sensitive data via Ansible vault in environments. * Added security layer on top of DevOps methodology and implemented security/vulnerability scans at every phase of the DevOps lifecycle starting from design to create DevSecOps Operational model. * Installed Ansible Tower, which provides an easy-to-use dashboard and role-based access control, so that it is easier to allow individual teams access to use Ansible for their deployments. * Collaborated with development support teams to setup a continuous delivery environment using the build platform tool Docker and virtualize the servers using Docker. * Created Kubernetes clusters using objects like Pods, Deployments, Services and Config Maps and created reproducible builds of the Kubernetes applications with network manifests like Calico, Flannel and Helm packages and implemented Kubernetes to deploy and manage Docker containers with multiple namespaces. * Worked with Kubernetes Replication controllers to allow multiple pods such as Jenkins Master server in multiple minions and managed with Kubernetes charts using Helm. Created reproducible builds of Kubernetes applications managed Kubernetes manifest files and managed releases of Helm packages. * Experienced in Kubernetes to manage the deployment rollouts and rollbacks and created service mesh Istio for traffic management in the production environment. * Created additional Docker Slave Nodes for Jenkins using custom Docker Images and pulled them to ECR. Worked on all major components of Docker like Docker Daemon, Hub, Images, and Registry. * Managed Kubernetes charts using Helm, created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages. * Implemented Docker -maven-plugin in Maven pom.xml files to build Docker images for all microservices and later used Docker file to build the Docker images from the Java jar files. * Built CI/CD pipeline with Jenkins on Kubernetes container environment, utilizing Kubernetes and Docker for the runtime environment for the CI/CD system to build test and deploy on DEV and PROD environments. * Performed all necessary day-to-day GIT support for different projects, Responsible for the design and maintenance of the GIT Repositories, and the access control strategies. * Determined ways to optimize/improve JIRA and JIRA Agile setup and process workflows, as well as identify where functionality can/cannot meet user requests. * Maintained the RedHat Satellite for infrastructure management to keep RedHat Enterprise Linux environments and other RedHat infrastructure running efficiently, properly secured, and compliant with various standards. * Performed installation, configuration and administration of system network components (Windows Server, Active Directory, VPN connectivity, DHCP, SMTP, LAN/WAN, NAT, IPsec VPN, FTP, POP, IMAP, NIC's, WIC's Environment: AWS Git, Jira, Ansible, Jenkins, Maven, Terraform, CloudFormation Kubernetes, Webhook, Docker, Python, CloudTrail, CloudWatch and shell Scripting, RedHat Linux 7.x.

Cloud DevOps Engineer

Caterpillar
January 2018 - October 2019
  • * Created AWS CloudFormation templates to create custom-sized VPC, subnets, EC2 instances, ELB, and security groups. Worked on tagging standards for proper identification and ownership of EC2 instances and other AWS Services like CloudFront, CloudWatch, RDS, S3, Route 53, SNS, SQS, and CloudTrail and worked on Simple Storage Service (S3), Simple Notification Service (SNS) and CloudWatch * Involved in Architect, build and maintain Highly Available secure multi-zone AWS cloud infrastructure utilizing Chef with AWS CloudFormation and Jenkins for continuous integration. Migrated services from a managed hosting environment to AWS including service design, network layout, data migration, automation, monitoring, deployments and cutover, documentation, overall plan, cost analysis, and timeline. Created Chef Cookbooks and Recipes to deploy new software and plug-ins. * Used API's, Chef, python and AWS CloudFormation Templates, migrated and automated cloud deployments. Converted existing AWS infrastructure to server-less architecture (AWS Lambda) and deployed it. Migrated data from data centers and on-premises to the Cloud using AWS Import/Export Snowball service. Maintained multiple cookbooks in Chef by converting production support scripts to Chef Recipes to automate the configuration and management of servers. * Created repositories, branches, tags in Git and assisted the developers to fix merging issues and to implement the parallel development process. Established a branching and merging strategy for multiple branches, utilizing Git as a source code management repository to track version changes. * Installed, tested and deployed monitoring solutions with Splunk services and deployment Server Topologies in Splunk. Worked on setting up Splunk to capture and analyze data from various layers, including Load Balancers and Webservers. * I wrote Terraform templates and Chef Cookbooks to configure EC2 Instances and pushed them onto Chef. Additionally, I resolved gateway timeout issues on ELB and migrated all logs to an S3 Bucket using Terraform. * I was responsible for the installation & configuration of Jenkins to support various Java builds and Jenkins plug-ins to automate continuous builds and publishing Docker images to the Nexus repository. Maintained Jenkins continuous integration tool using shell/Perl and ruby scripts for automating releases to different environments. Worked in all areas of Jenkins setting up CI for new branches, build automation, plug-in management and securing Jenkins and setting up master/slave configurations. Created Jenkins jobs to listen for changes in GIT and execute the sequence of targets including compile, Junit, create jar and war files and created Jenkins Pipelines with Jenkins File. Triggering the Remote Jenkins Jobs. * Developed Build-related scripts in Maven, modified configuration files such as Maven's Pom.xml, and did the build. Developed and maintained the continuous integration and deployment systems using Jenkins, Maven, JBoss and Jfrog Artifactory. Environment: AWS, Lambda, Jenkins, Web logic, Nexus, JIRA, Oracle, Terraform, Python, Maven, Java, Linux, Apache TOMCAT, ELK, GIT, LDAP, NFS, NAS, MS Share point, XML, Fedora, Windows, Splunk, Perl Scripts, Shell Scripts, Chef, Ansible, OpenStack, Docker, Kubernetes, OpenShift.

Build & Release Engineer

BNSF Railway
December 2016 - January 2018
  • * Carried automated Deployments and builds on various environments using the continuous integration (CI) tool Jenkins. Used Git for source code version control and integrated with Jenkins for CI/ CD pipeline, code quality tracking and user management with build tool ANT. * Proficient in building deployable artifacts (war, jar, ear, zip and tar) from source code and maintained by using ANT (build.xml) and Gradle (build.gradle) and worked with Groovy script to automate configuration in Jenkins. * Used version control system GIT to access the repositories and used in coordinating with CI tools and managed GitHub repositories for branching, merging, and tagging * Managed Artifactory and Nexus repositories to store ANT (EAR, WAR, JAR) snapshots and dependencies. * Installed and configured Nexus repository manager for sharing artifacts between internal teams and created proxy Nexus repositories to speed up the build process. * Developed & implemented Software Release Management strategies for various applications as per the Agile process. * Integration of Puppet with Apache and developed load testing and monitoring suites in Python. Maintained multiple modules in Puppet by converting production support scripts to Puppet Manifests to automate the configurations in servers. * Created a custom puppet module skeleton to use the same structure across all puppet modules. Developed Puppet scripts for automated server provisioning and reducing the time between provisioning and deployment from over 3 hours to less than 10 minutes. * Maintained the branching and build/release strategies utilizing Subversion and identifying Cross Functional Dependencies, Monitoring & tracking the release milestones.

Linux Administrator

Capital City Bank
September 2016 - December 2016
  • * Managed and executed hardware and software upgrades on Linux servers. Performed Windows and Linux patching and wrote Shell/Bash scripts for automated back-ups and Cron Jobs. * Extensively worked with Active Directory Services, IIS Servers, DNS, and DHCP. Configured Firewall and security using SSL, IP chains, IP tables, TCP Wrappers, Tripwire, and port scanners. * User account management, worked with shell scripting (BASH) to automate administration tasks. Analyzed security-based events, risks and reporting instances. * Performed server updates, patching, upgrade and package installations using RPM and YUM. Used NFS and FTP services for transferring files to various machines. * Extensively worked with the LAN/WAN, firewalls and routing for Internet and Intranet connectivity using different protocols like TCP/IP, DHCP, HTTP/s, FTP, SMTP & SSH. * Configuration and maintenance of common Linux services such as Tomcat, Apache, MySQL, NFS, FTP, Postfix, LDAP, DHCP, DNS BIND, HTTP, HTTPS, SSH, IP Tables and Firewalld etc. * Experienced in setting up and maintaining Load Balancers, such as F5. Possess strong TCP/IP fundamentals, DNS, FTP, LDAP, Remote Access, Security Management, and System Troubleshooting skills. Additionally, proficient in package management using RPM, YUM, and UP2DATE in Red Hat Linux.

DevOps/Terraform Engineer

AT&T
December 2020 - Present
  • * Designed and configured Azure Virtual Networks (VNets), subnets, Azure network settings, DHCP address blocks, DNS settings, security policies and routing tables using Terraform. * Deployed Cloud services (PaaS role instances) and Azure IaaS Virtual machines (VMs) into secure subnets and VNets and configured Network Security Groups (NSGs) to control inbound and outbound access to network Interfaces (NICs), subnets and VMs using Terraform. * Performed POCs (Proof of concepts) and POTs (Proof of technology) in Azure, implemented it in the organization, and involved in migrations from on-premises to Azure cloud. * Worked on various Azure services like Compute (Web Roles, Worker Roles), Azure Websites, Caching, SQL Azure NoSQL, Storage, Network services, Azure Active Directory, API Management, Scheduling, Auto Scaling, and PowerShell Automation. * Implemented various resources in Azure using Azure portal, and PowerShell on Azure Resources Manager deployment models. Experienced in deploying infrastructure as code applications using ARM Templates (JSON). * Provisioned the high availability of Azure VMs using Terraform and ARM templates (in non-prod), Utilized Azure Kubernetes Service to deploy a managed Kubernetes cluster in the Azure portal, with the Azure CLI, also used template-driven deployment options such as Resource Manager templates and Terraform. * Developed and maintained modular and reusable infrastructure components by creating and managing Terraform modules, streamlining the provisioning process, promoting consistency, and enhancing scalability across diverse projects within the organization. Extensive experience in utilizing Terraform Enterprise to orchestrate and manage infrastructure as code, ensuring streamlined deployment processes, version control, and collaboration across diverse cloud environments. * Led the configuration and deployment of headless, host-based application gateways using Terraform, ensuring seamless and secure traffic routing, optimizing resource utilization, and enhancing the overall performance of web applications. * Created Network Security Groups to filter the traffic to and from Azure Resources by configuring the Inbound and Outbound traffic rules and associating them with Subnet and Network Interfaces, created Azure Key Vault to store certificates and secrets. * Proficient in deploying and managing OpenShift clusters using Terraform, demonstrating expertise in infrastructure as code to automate the provisioning and configuration of containerized environments for efficient and scalable application deployments. * Successfully orchestrated the deployment and management of OpenShift clusters using Terraform, implementing scalable and resilient containerized environments, and contributing to streamlined operations and efficient resource utilization. * Orchestrated containerized applications using OpenShift, ensuring seamless deployment, scaling, and management. * Implemented and maintained Kubernetes-based clusters on OpenShift for container orchestration. * Managed the full application lifecycle on OpenShift, including application deployment, upgrades, and rollbacks. * Skilled in implementing secure and scalable solutions by integrating Azure Key Vault seamlessly into infrastructure deployments using Terraform, ensuring robust management of sensitive information and cryptographic keys across Azure environments. * Proficiently managed cloud infrastructure by deploying and maintaining resources on Azure using ARM templates and Terraform, ensuring efficient provisioning, scalability, and adherence to infrastructure as code principles. * Proficient in leveraging Packer for creating consistent machine images and seamlessly integrating with Terraform to automate infrastructure provisioning, ensuring efficient and reproducible deployment workflows. * Proficient in utilizing KQL for log analytics to extract valuable insights and perform efficient querying and analysis of log data, contributing to effective troubleshooting and optimization of system performance. * Configured and implemented storage blobs and Azure files - Created storage accounts, configured the Content Delivery Network (CDN), custom domain, managing access and storage access key. * Used Git as an SCM tool with Azure DevOps, created a local repo, cloned the repo, added, committed, and pushed the changes in the local repo, recovering files, creating tags, and viewing logs. * Led the implementation of robust DevOps pipelines, utilizing Azure DevOps and Terraform, to automate infrastructure provisioning, configuration, and deployment processes, resulting in increased efficiency, consistency, and collaboration within the development and operations teams. * Migrating servers with the required configuration changes, testing, and deploying the machines using Ansible commands. * Created Ansible roles in YAML and defined tasks, variables, files, handlers and templates. Created inventory and configured the Ansible files for parallel development in Ansible for automating the continuous delivery process. * Using Ansible created multiple playbooks for machine creations and SQL server, cluster server and my SQL installations. * Collaborated with development support teams to set up a continuous delivery environment using the build platform tool Docker and virtualize the servers using Docker. Created additional Docker Slave Nodes for Jenkins using custom Docker Images and pulled them to ECR. Worked on all major components of Docker like Docker Daemon, Hub, Images, and Registry. * Installed and configured ELK stack in both legacy and Docker swarm mode and pipelined application logs from App Server to Elastic search through LogStash. * Mentored developers in Kubernetes design and custom application implementation and created a mesh pod network between Kubernetes clusters. Created several pods and services using Master and Minion architecture of Kubernetes and developed microservice on-boarding tools leveraging Python allowing for easy creation and maintenance of build jobs and Kubernetes deploy and services. Managed Kubernetes charts using Helm, created reproducible builds of the Kubernetes applications, managed Kubernetes manifest files and managed releases of Helm packages. * Involved in migrating SQL Server databases to SQL Azure Database using SQL Azure Migration Wizard and used Python API to upload agent logs into Azure blob storage. * Worked with Terraform Templates to automate the Azure IaaS virtual machines using Terraform modules and deployed virtual machine scale sets in the production environment. * Implemented AWS CloudWatch for monitoring and logging of AWS resources. Configured CloudWatch Alarms to trigger automated responses to specific events. * Orchestrated the deployment of AWS resources using AWS CloudFormation templates. Ensured version control and consistency in infrastructure deployment through Infrastructure as Code. * Configured IAM roles and policies for secure access control to AWS resources. Conducted regular IAM audits to enforce the principle of least privilege. * Implemented security best practices, including encryption, AWS Key Management Service (KMS), and VPC security configurations. Conducted regular security assessments and audits using AWS Security Hub. * Configured and monitored AWS Backup solutions for data protection. Developed and tested backup and recovery strategies to ensure business continuity. Environment: Azure (Azure Storage, Azure AD, Web Roles, Worker Roles), Kubernetes, Docker, Kubernetes, Jenkins, Python and shell Scripting, RedHat Linux 7.x, Terraform, JIRA.

Education

Osmania University, HYD

Masters
January 2000 - January 2003