๐Ÿš€ Professional Journey Overview

Infrastructure as Code | Cloud Native Solutions | Continuous Delivery

With 8+ years in DevOps engineering, I specialize in building scalable, resilient infrastructure and automating complex deployment pipelines. My expertise spans across multi-cloud environments, container orchestration, and implementing robust DevOps practices.


๐Ÿ”ฅ Current Active Projects

Project: Hetzner Cloud Microservices Platform

Timeline: 2024 - Present
Type: Personal
Technologies: Ansible, Terraform, Hetzner Cloud, GitLab CI, Podman, Packer, Devbox tool, Task framework

Infrastructure Highlights:

  • Managed 5 microservices
  • 99.9% uptime SLA
  • Automation for Host Pactching and container version updates by Podman Quadlet

Project: Multi-Cloud Security Framework

Timeline: 2024 - Present
Technologies: AWS, Azure, Terraform, Docker, Jenkins

Architecture Overview:

graph TB A[CI/CD Pipeline] –> B[Security Scanning] B –> C[Multi-Cloud Deployment] C –> D[AWS] C –> E[Azure] D –> F[Monitoring] E –> F F –> G[Alerting & Logging]

Features:

  • ๐Ÿ›ก๏ธ Automated security compliance checks
  • ๐Ÿ”’ Secrets management with HashiCorp Vault
  • ๐Ÿ“Š Real-time security monitoring
  • ๐Ÿ”„ Cross-cloud disaster recovery

Key Achievements:

  • โœ… Reduced deployment time from 2 hours to 15 minutes
  • โœ… Implemented GitOps workflow with ArgoCD
  • โœ… Achieved zero-downtime deployments
  • โœ… Reduced cloud costs by 35% through optimization

๐Ÿ† Completed Projects

Project: Automation Mock-API for remote Developers

Timeline: 2024
Technologies: Jenkins, AWS ECS, Go, Github Actions, Terraform

Implementation for frontend testing purposes, by using air.

Results Dashboard:

Metric Before After Improvement
Deployment Frequency Weekly Daily 7x
Lead Time 2 days 1 hour 94%
Failure Rate 30% 10% 87%
Recovery Time 2 hours 15 minutes 88%

Project: AWS RDS Migration & Rollback

Timeline: 2023 - 2024
Technologies: AWS RDS Aurora, Blue-Green, SQL, Bash

Aurora Version Upgrade via Blue/Green Deployment:

  • Approach: Executed a zero-downtime major version upgrade using AWS Aurora’s Blue/reen Deployment.

  • Process: Created a synchronized “Green” environment on the new Aurora version. Thoroughly validated the new environment with application testing before switching production traffic.

  • Rollback: Maintained the original “Blue” environment on standby, enabling an immediate rollback via a single switchover action in case of post-migration issues, ensuring minimal business risk.

Technical Highlights:

  • ๐ŸŽฏ Executed zero-downtime upgrade via AWS Blue/Green Deployment.
  • โšก Validated new version in isolated green environment before cutover.
  • ๐Ÿ“ˆ Enabled immediate rollback by maintaining original blue instance.
  • ๐Ÿ”ง Automated sync and switchover via RDS console for reliability.

I made a HowTo documentation for the organization and for myself

Rollback Aurora RDS

๐ŸŽฏ Project Methodology

DevOps Lifecycle Implementation

graph LR A[Plan] –> B[Code] B –> C[Build] C –> D[Test] D –> E[Release] E –> F[Deploy] F –> G[Operate] G –> H[Monitor] H –> A

Core Principles:

  1. Infrastructure as Code - Everything versioned and automated
  2. Continuous Everything - Integration, delivery, deployment
  3. Monitoring-Driven Development - Data-informed decisions
  4. Security First - Shift-left security practices
  5. Collaboration - Breaking down silos between teams

๐Ÿ“ž Let’s Collaborate

Interested in discussing DevOps solutions or potential collaborations?

Schedule a Call Gitlab Profile


“Automation applied to an inefficient operation will magnify the inefficiency.” โ€” Bill Gates

Last Updated: October 2025
Active Projects: 3
Technologies Mastered: 25+