ABInBev aims to develop a Insights Copilot application for internal use, similar to ChatGPT, where users can ask questions, and the application retrieves relevant information from both internal databases and public social media across the internet to provide accurate responses.
Cloud Configuration: Setup the Azure resources for the Insights Copilot Application like Azure functions, Azure ServiceBus, Azure Kubernetes service, Azure Gateway, Azure Key Vault and Kubernetes Deployment files
Open Source Tools: Set up the Open-Source tool KEDA for event-driven workloads. Whenever a message comes to the Azure ServiceBus, the KEDA job will pick the message and process it to run the workloads.
Monitoring and Observability: Implemented Datadog Monitoring across all Azure Resources.
CI/CD Automation: Configured GitHub Action Pipelines for the continuous integration and deployment of applications, streamlining the development workflow.
Client Collaboration: Actively collaborated with clients to troubleshoot and resolve issues, ensuring a positive client experience and addressing challenges effectively.
Team Leadership: Oversaw the planning and organization of individual tasks and deliverables within the team, demonstrating leadership skills to ensure successful project outcomes.
Cloud Migration: Successfully migrated workloads from AWS, starting with S3 migration using Storage Transfer jobs. Lifted and shifted EC2 instances to Compute Engine using Migrate Virtual Machines. Migrated Kafka Clusters deployed on EC2 to Kafka Clusters on GKE. Transformed Elastic Cache for Redis and MongoDB to Redis and MongoDB clusters on GKE.
Data Migration: Configured DMS jobs to migrate RDS instances to Cloud SQL, ensuring a seamless transition of data between databases.
Monitoring and Observability: Implemented Prometheus and Grafana on GKE to monitor applications effectively, enhancing visibility into system performance.
Secrets Management: Migrated secrets stored in AWS Parameter Store to Google Secret Manager, improving security and centralizing secrets management.
DNS Migration: Successfully migrated DNS from Route 53 to Cloud DNS, ensuring efficient domain management within the Google Cloud environment.
Micro-Services Migration: Migrated micro-services running in ECS to GKE Deployments using Helm Charts and adhering to Google Cloud best practices.
CI/CD Automation: Configured GitHub Action Pipelines for the continuous integration and deployment of applications, streamlining the development workflow.
Load Balancing and Security: Configured Google Load Balancer Controller for ingress and implemented custom health checks for backend services. Set up CDN and Cloud Armor Policy to ensure applications can only be accessed with a client VPN connection, enhancing security.
Client Collaboration: Actively collaborated with clients to troubleshoot and resolve issues, ensuring a positive client experience and addressing challenges effectively.
Team Leadership: Oversaw the planning and organization of individual tasks and deliverables within the team, demonstrating leadership skills to ensure successful project outcomes.
Security Enhancement: Led the remediation efforts for vulnerabilities and recommendations identified by the Security Command Center, ensuring a robust security posture. Proactively suggested and implemented improvements in security practices on Google Cloud, aligning with industry best practices.
Terraform Expertise: Developed Custom Terraform modules for various Google Cloud Resources at the Project level, demonstrating a deep understanding of infrastructure as code. Created specialized Terraform modules for Pub/Sub topics & subscriptions, Load Balancer components, Cloud Run, Cloud Functions, Monitoring Alert Policies, Notification Channels, Cloud SQL, Redis, VPC & Network components, Compute Instances, Google Kubernetes Engine, BigQuery Datasets, IAM Service Accounts with role bindings, GCS buckets, and App Engine.
Project-Level Customization: Extended my contributions by designing Custom Terraform modules tailored for multiple projects, emphasizing a project-level approach to infrastructure provisioning.
Automation with Python: Engineered a Python script to facilitate the conversion of existing Google Cloud resources into Terraform Tfvars-based modules, streamlining the migration process.
Terraform State Management: Imported existing Google Cloud resources into the Terraform state file, ensuring centralized management and tracking of infrastructure changes.
Standardized Resource Creation: Contributed to the development of Terraform standard modules, establishing a consistent and efficient approach to resource creation across projects.
Mentorship and Collaboration: Played a pivotal role in troubleshooting issues faced by team members, providing guidance on Terraform modules, and conducting thorough Terraform code reviews and validations. Demonstrated leadership by effectively planning, organizing individual tasks, and overseeing deliverables as a Senior DevOps Engineer.
Pipeline Migration and Infrastructure Setup: Successfully migrated existing Bitbucket pipelines to Jenkins pipelines, optimizing the CI/CD workflow. Created robust infrastructure on Google Cloud Platform (GCP) using Terraform, including VPC Network, Google Kubernetes Engine (GKE), Compute Engine Instance as a Bastion host, and Cloud Storage Buckets. IAM Service Accounts were also set up to ensure secure access.
Jenkins Configuration on GKE: Configured and installed Jenkins on GKE using Helm Charts, adhering to Google best practices for optimal performance and scalability.
Secure Network Configuration: Implemented a secure network setup on GKE, utilizing a private network connected via a Bastion host with a tunnel through Identity Aware Proxy (IAP). This ensures enhanced security for the infrastructure.
Infrastructure as Code (IaC) Implementation: Utilized Infrastructure as Code (IaC) principles with Terraform to automate the infrastructure setup. Wrote Terraform modules for VPC, Google Kubernetes Engine, IAM Service Accounts, and Bastion-Host, ensuring consistency and repeatability.
Dynamic Jenkins Pipelines: Installed necessary plugins on Jenkins and configured pipelines with dynamic agents, allowing flexibility with different container images and custom spec resources.
Integration with Bitbucket Repositories: Created Jenkins pipelines and integrated web-hooks for Bitbucket repositories. Web-hooks trigger pipelines upon merging pull requests into the master branch, automating the CI/CD process.
Quality Gate Checks with SonarQube Scanner: Configured pipelines to integrate SonarQube Scanner for conducting quality gate checks on existing applications developed in NodeJs and Go languages.
Post-Build Actions and Notifications: Implemented post-build actions in Jenkins pipelines, including the configuration of Slack notifications. This ensures timely alerts for each stage, whether it succeeds or encounters failures.
Downstream Pipelines for Deployment: Configured downstream pipelines to facilitate the deployment of builds to higher environments such as Staging and Production, streamlining the release process.
Deployment Strategies: Implemented a Blue-Green Deployment approach for Kubernetes, ensuring seamless and controlled releases.
CI/CD Evolution: Successfully migrated Jenkins Pipelines to GitHub Actions, streamlining the CI/CD process.
Mobile App CI/CD: Spearheaded CI/CD pipelines for Android and iOS applications, as well as micro-services, leveraging GitHub Actions.
Production Environment Management: Managed production and higher environment releases efficiently using GitHub Actions.
Kubernetes Expertise: Created and monitored GKE Kubernetes Clusters, configuring alerting policies for proactive issue resolution.
Cloud Services Integration: Utilized GCP Cloud Run and Deployment Manager to set up marketplace Virtual Machines, Cloud SQL for databases, and monitoring service log explorer.
Security Measures: Implemented GCP Ingress Load Balancer and CloudArmor for the Production Kubernetes Cluster, managing SSL Certificates with Let's Encrypt and Google-managed services.
Authentication and Notifications: Managed Firebase for end-user authentication in specific environments, and integrated Pub/Sub for notifications to end-users.
Infrastructure as Code with Terraform: Deployed scalable Kubernetes Clusters using Terraform scripts, with a focus on secret management using Vault for Kubernetes Micro-services.
Logging and Monitoring: Implemented ELK stack for storing logs and visualizing dashboards, enhancing visibility into system activities.
Collaboration and Troubleshooting: Collaborated with teammates to efficiently debug and troubleshoot build and release issues with minimal downtime.
Access Management and Cost Optimization: Managed resource access in GCP using IAM and Admin, ensuring secure and efficient resource usage. Worked on cost optimization strategies for GCP resources.
Docker Image Lifecycle: Managed the build of Docker Images and facilitated the promotion of Docker images to higher environments.
Organizational Infrastructure: Created and managed organization-level infrastructure for GCP accounts, ensuring a structured and scalable setup.
Toolchain Familiarity: Worked seamlessly with tools such as Jira Service Management and Azure DevOps, showcasing a versatile skill set.