๐ Professional Journey Overview
Infrastructure as Code | Cloud Native Solutions | Continuous Delivery
With 8+ years in DevOps engineering, I specialize in building scalable, resilient infrastructure and automating complex deployment pipelines. My expertise spans across multi-cloud environments, container orchestration, and implementing robust DevOps practices.
๐ผ Featured Projects
๐ฅ Current Active Projects
Project: Hetzner Cloud Microservices Platform
Timeline: 2024 - Present
Type: Personal
Technologies: Ansible, Terraform, Hetzner Cloud, GitLab CI, Podman, Packer, Devbox tool, Task framework
Infrastructure Highlights:
- Managed 5 microservices
- 99.9% uptime SLA
- Automation for Host Pactching and container version updates by Podman Quadlet
Project: Multi-Cloud Security Framework
Timeline: 2024 - Present
Technologies: AWS, Azure, Terraform, Docker, Jenkins
Architecture Overview:
graph TB A[CI/CD Pipeline] –> B[Security Scanning] B –> C[Multi-Cloud Deployment] C –> D[AWS] C –> E[Azure] D –> F[Monitoring] E –> F F –> G[Alerting & Logging]
Features:
- ๐ก๏ธ Automated security compliance checks
- ๐ Secrets management with HashiCorp Vault
- ๐ Real-time security monitoring
- ๐ Cross-cloud disaster recovery
Key Achievements:
- โ Reduced deployment time from 2 hours to 15 minutes
- โ Implemented GitOps workflow with ArgoCD
- โ Achieved zero-downtime deployments
- โ Reduced cloud costs by 35% through optimization
๐ Completed Projects
Project: Automation Mock-API for remote Developers
Timeline: 2024
Technologies: Jenkins, AWS ECS, Go, Github Actions, Terraform
Implementation for frontend testing purposes, by using air.
Results Dashboard:
Metric | Before | After | Improvement |
---|---|---|---|
Deployment Frequency | Weekly | Daily | 7x |
Lead Time | 2 days | 1 hour | 94% |
Failure Rate | 30% | 10% | 87% |
Recovery Time | 2 hours | 15 minutes | 88% |
Project: AWS RDS Migration & Rollback
Timeline: 2023 - 2024
Technologies: AWS RDS Aurora, Blue-Green, SQL, Bash
Aurora Version Upgrade via Blue/Green Deployment:
-
Approach: Executed a zero-downtime major version upgrade using AWS Aurora’s Blue/reen Deployment.
-
Process: Created a synchronized “Green” environment on the new Aurora version. Thoroughly validated the new environment with application testing before switching production traffic.
-
Rollback: Maintained the original “Blue” environment on standby, enabling an immediate rollback via a single switchover action in case of post-migration issues, ensuring minimal business risk.
Technical Highlights:
- ๐ฏ Executed zero-downtime upgrade via AWS Blue/Green Deployment.
- โก Validated new version in isolated green environment before cutover.
- ๐ Enabled immediate rollback by maintaining original blue instance.
- ๐ง Automated sync and switchover via RDS console for reliability.
I made a HowTo documentation for the organization and for myself
Rollback Aurora RDS๐ฏ Project Methodology
DevOps Lifecycle Implementation
graph LR A[Plan] –> B[Code] B –> C[Build] C –> D[Test] D –> E[Release] E –> F[Deploy] F –> G[Operate] G –> H[Monitor] H –> A
Core Principles:
- Infrastructure as Code - Everything versioned and automated
- Continuous Everything - Integration, delivery, deployment
- Monitoring-Driven Development - Data-informed decisions
- Security First - Shift-left security practices
- Collaboration - Breaking down silos between teams
๐ Let’s Collaborate
Interested in discussing DevOps solutions or potential collaborations?
Schedule a Call Gitlab Profile
“Automation applied to an inefficient operation will magnify the inefficiency.” โ Bill Gates
Last Updated: October 2025
Active Projects: 3
Technologies Mastered: 25+