Now you can Instantly Chat with Akhaya!
About Me
16+ years of Experience in Software Industries and Last 3+ years Learning and Propagating the cloud AWS, DevOps and Automation Culture. Amazon Web Services(AWS) and Devops. Major Service/Tools below. Compute (EC2,Elastic Beans Talk, Elastic Container...
Show MoreSkills
Portfolio Projects
Description
- Install and configure the puppet agents in N7k ,N5k and N9k Devices
- Configure the certificate of puppet agent with Puppet server.
- Written Python Script to Integrate with PyATS FrameWork.
- Jenkins build management, deployment, write Puppet cookbook
- Retrieve repository metadata (repomd.xml) for repository puppetlabs
- Created CI CD pipe line using Git,Jenkin , Puppet and TIMS
- Loaded plugins: downloadonly, importpubkey, localrpmDB, patchaction, patching, protect-packages
- Automated the devops test cases with Cisco N7k,N5k and N9k devices with PyAts Framework.
Description
Public key infrastructures (PKIs) are necessary to help ascertain the identity of different people, devices, and services. .PKI is used to digitally sign documents transactions, and software to prove the source as well as the integrity of those materials – an important task as Trojans and other malware proliferates.
I was responsible for looking Customer escalation and need to setup locally as like customer platform and reproduce the issue locally, Provide the solution and involved system testing for PKI product.
Show More Show LessDescription
Non-stop laptop Guardian (NLG) provides a secure, transparent, remote laptop management. An always-on laptop PCMCIA/USB card (NLG card) featuring a built-in CPU, hardened OS, storage, rechargeable battery, GPS capabilities, Connected to the NLG Enterprise gateway through VPN client via 3G/2G or WAN network
- FTP, Http, IPSec, Kerberos, DHCP, MIME, POP and SMTP.
- High Availability, Load balancing, Split tunneling, RSA secure ID, Truecrypt, Tamper proofing, Software upgrade,truecrypt,smart card,Asset Management,AFT,patchlink,exchange2003 & EMS
- Routers,Switches,BT-hotspot,HSDPA and Novatel(MIFI)
Description
Client: Devovate Gbhm,Tangent and MyAnatomy. Designation: AWS DevOps Consultant Key performance indicators: Responsible for the Search, Pricing and Catalog infrastructure . CI/CD pipeline by using GIT,Mavan,Jenkin and Ansible Creating servers, AMIs, storage blocks in S3,taking snapshots, VPCs, subnets, load balancing and auto-scaling in AWS Expert in Cloud Technologies like Amazon Web Services (AWS) VPC, EC2, Cloud formation, S3, IAM, RDS, Route 53, Cloud Watch, Dynamo DB and Elastic cache. Designing and implementing fully automated server build, management, monitoring and deployment solutions spanning multiple platforms, tools and technologies including Jenkins Nodes/Agents, Maven,Ansible, SSH, Amazon EC2 and packaging, deployment and testing. Installation and configuration of Git, merging code from develop branch to master branch and make it ready for deployment. Pushing Code from Git to Eclipse Maven make available for release through automation script using Jenkins. Knowledge on GIT and Jenkins Continuous Integration of Server–Installation, Configuration, Design and Administration, and integrating these tools with other systems. Handled cloud administration tools and management frameworks. Configured Cloud watch alerts. Created support case with AWS for any critical issues and follow-up. Deployed and monitor salable infrastructure on Amazon web services (AWS) & configuration management Launching and configuring of Amazon EC2(AWS) Cloud Servers using AMIs (Linux/Ubuntu) and configuring the servers for specified applications using Jenkins Make sure that the Score points for our EC2 instances is more than 90%. Setup and launch Amazon Linux and RHEL and Windows EC2 instances, network interface with Elastic IPs. Configured and managing security groups and VPC. Configured and managing ELBs. Created RDS database. Configured and managing S3 storage. Backup & Restoration. Created AMI images of the critical ec2 instance as backup using AWS CLI and GUI. Created support case with AWS for any critical issues and follow-up. Monitored and worked on alerts for Web server Application pool.
Show More Show LessDescription
Client: Cisco System Inc Designation: DevOps Automation Install and configure the puppet agents in N7k ,N5k and N9k Devices Configuration of certificates and puppet agent in N7k ,N5k and N9k Devices. Syncup the Puppet agents with Puppet Server N7k ,N5k and N9k Devices Written Python Script to Integrate with PyATS FrameWork Jenkins build management, deployment, write Puppet cookbook for all selected devices. Retrieve repository metadata (repomd.xml) for repository puppetlabs Created CI CD pipe line using Git,Jenkin , Puppet and integrated with Cisco TIMS Loaded plugins: downloadonly, importpubkey, localrpmDB, patchaction, patching, protect-packages Automated the devops test cases with Cisco N7k,N5k and N9k devices with PyAts Framework. Automated the fabricpath and devops scripts with PyAts.
Show More Show LessDescription
Product: Symantec PKI Designation: Sr Software Engineer Public key infrastructures (PKIs) are necessary to help ascertain the identity of different people, devices, and services. .PKI is used to digitally sign documents transactions, and software to prove the source as well as the integrity of those materials – an important task as Trojans and other malware proliferates. I was responsible for looking Customer escalation and need to setup locally as like customer platform and reproduce the issue locally, Provide the solution and involved system testing for PKI product.
Show More Show LessDescription
Client: Alactel-Lucent Designation: Mindtree,Lead Engineer Non-stop laptop Guardian (NLG) provides a secure, transparent, remote laptop management. An always-on laptop PCMCIA/USB card (NLG card) featuring a built-in CPU, hardened OS, storage, rechargeable battery, GPS capabilities, Connected to the NLG Enterprise gateway through VPN client via 3G/2G or WAN network FTP, Http, IPSec, Kerberos, DHCP, MIME, POP and SMTP. High Availability, Load balancing, Split tunneling, RSA secure ID, Truecrypt, Tamper proofing, Software upgrade,truecrypt,smart card,Asset Management,AFT,patchlink,exchange2003 & EMS Routers,Switches,BT-hotspot,HSDPA and Novatel(MIFI)
Show More Show LessDescription
Client: Intel Designation: Mindtree,Lead Engineer Intel Anti Theft (May 2010-Till Now) The Snowy Peak software system provides the deterrence to the possible platform tampering/theft. It intelligently protects and manages 50000 laptops from theft and provides an intelligent protection of lost or stolen laptops. It gives the ability to disable the laptop using local or remote poison pill.
Show More Show LessDescription
Client: Qualcomm Designation:-Sr Software Engineer ,Mindtree The Bluetooth Qualification Process refers to the Qualification of a specific design of Bluetooth wireless technology by an individual member. The design applies and is limited to those specific portions of a product implementing and being compliant with a Bluetooth Specification, as declared in the implementation Conformance Statement (ICS) We use many different head sets, car kits, BT printers and HID devices of different makes to make sure that the whole product is stable and working fine. We test all the different profile such as AG, FTP, OPP, A2DP, AVRCP 1.0, HFP 1.5, HSP, BPP, BIP, PBAP, SAP etc and the protocol level such as HCI and GAP for making sure that the security standards and other behavior are as expected and not violating the 2.1 specification
Show More Show LessDescription
Client: Mcafee Designation: Lead Engineer,Mindtree The Bluetooth Qualification Process refers to the Qualification of a specific design of Bluetooth wireless technology by an individual member. The design applies and is limited to those specific portions of a product implementing and being compliant with a Bluetooth Specification, as declared in the implementation Conformance Statement (ICS) We use many different head sets, car kits, BT printers and HID devices of different makes to make sure that the whole product is stable and working fine. We test all the different profile such as AG, FTP, OPP, A2DP, AVRCP 1.0, HFP 1.5, HSP, BPP, BIP, PBAP, SAP etc and the protocol level such as HCI and GAP for making sure that the security standards and other behavior are as expected and not violating the 2.1 specification
Show More Show LessDescription
Client: Entrust,Canada Designation: Sr Software Engineer,Trainz Entrus Get Access, Entrust (Canada) Entrust GetAccess centralizes security management to provide a common infrastructure to manage user identities, and enable authentication and authorization across multiple applications. Entrust GetAccess delivers the performance and reliability necessary to secure the largest Enterprise Web portals without sacrificing security. Entrust GetAccess is a high performance, scalable Web access control solution. It centrally manages access to multiple applications through a single portal, providing users with single sign-on to the applications and content they are authorized to see. Develop the test beds and test cases for service, database, infrastructure failover and load balancing . LDAP: Sunone, Siemens e-directory ,Novell, ADAM and Active Directory, Webserver: IIS5.0,6.0,ApacheIPlanet6.0 and Sunone6.1. Security: SSL configuration,IdentityGuard, SSL, Clustering and load balancing OS : Solaris8, 9,10,SolarisContainer,Linux,windows, 2000/03/NT/98/95
Show More Show LessDescription
Client: DoubleClick,Google Designation: Software Engineer, Cyabage,Pune DART Enterprise 6.0 is the most robust and sophisticated ad management & Ad serving software solution supported with platform window, Unix and Solaris platform . Ad is serving through the web server like IIS, iplanet and Apache .We tested this application with real-time environment with support of windows and Unix torch System .DoubleClick has incorporated feedback from many clients and significantly improved the architecture of the DART Enterprise solution with this release. The new, exciting features are include Frequency Capping, same Page Ad Restriction & Inclusion , Simple & dynamic load-balance, Windows and unix Log Processing performance enhancement against Microsoft SQL Server and managed predication through inventory manager. Linux,Solrais,winrunner,shell script,unix torch and windows torch. Webserver (IIS,Apache and Iplanet),Oracle,Sql server and Runtime. Ownership of Inventory, Ad server and Ad insight module test cases Generating stressing and performance report in window and unix torch. Maintaining & monitoring window and unix torch sytem Validating and Reporting of bug.
Show More Show Less