About Me

Resume

Projects

Blog

Quick Reference Guide

A professional portrait of Krishnamurthy

Krishnamurthy

Cloud Solutions Architect

Bangalore, India

email

+91.973****771

LinkedIn

Projects


Key Benefits of Project Implementation
  • Increased learning horizon.
  • Hands-on experience with Cloud Architecture.
  • Experience with open-source Technology.
  • Overview of the Project
    This architecture is designed to leverage the strengths of both private and public clouds, enabling secure, scalable, and cost-effective hybrid cloud operations. The OpenStack-based private cloud provides flexibility, while AWS offers robust scalability and managed services. The VPN tunnel and network segmentation ensure secure communication and efficient workload management across environments.

    Home Lab Infrastructure - Openstack Image

    Key Benefits of Project Implementation
  • Single Sign-On (SSO).
  • Centralized Identity management.
  • Secure authentication and federated access.
  • Consistent access control policies.
  • Overview of the Project
    This illustrates an AWS SSO authentication flow using Active Directory Federation Services (AD FS) and SAML in a Home Lab Infrastructure setup. It details the steps involved when a user logs in to a portal and gains access to the AWS Management Console via federated authentication.

    This setup enables secure Single Sign-On (SSO) for AWS resources using Active Directory authentication mechanism hosted in a main AWS account, ensuring centralized user management, enhanced security, and compliance.

    Home Lab Infrastructure - Integrating-with-AD-FS Image

    Key Benefits of Project Implementation
  • Reduced Administrative Overhead: The introduction of an AI-based chatbot significantly decreases the time spent answering customer queries.
  • Cost Savings: Transitioning to open-source broadcasting software eliminates licensing costs.
  • Increased Revenue: A stronger online presence expands audience reach, leading to higher sales.
  • Optimized Facility Usage: Better scheduling and automation allows for effective utilization of studio space during off-peak hours.
  • Overview of the Project
    Todd is a dedicated Yoga instructor based in Florida and the CEO of Native Yoga, a company committed to providing high-quality Yoga classes and training. With over 17 years of experience in the industry, Todd has cultivated a loyal following, offering both in-person and virtual Yoga sessions to students worldwide. His passion for Yoga and holistic wellness drives him to continuously enhance the learning experience for his clients. However, as the business grew, he began facing several operational and technical challenges that required immediate attention.

    Challenges Faced by Todd

  • Rising Operational Costs: Increasing rent and insurance expenses were putting financial strain on the business.
  • Excessive Time Spent on Customer Queries: Todd was spending too much time addressing program inquiries and handling administrative tasks related to the in-house data center.
  • Limited Online Presence: A lack of a cohesive digital strategy resulted in missed opportunities for customer engagement and growth.
  • Manual Live Stream Invitations: Sending live stream invites manually was inefficient and time-consuming.
  • Outdated Booking System: Native Yoga has multiple websites with outdated booking features, leading to a frustrating user experience.
  • Inefficient Communication: Phone calls are highly time-consuming, disrupting both Todd’s workflow and that of his clients.

  • List of Todd's requirements
  • Automation of Repetitive Tasks: Implementing smart tools to reduce manual effort and increase efficiency.
  • Enhanced Customer Experience: Providing a seamless and user-friendly website experience for clients.
  • Business Growth & Free Time: Leveraging technology to automate administrative tasks, allowing Todd to focus on expanding the business.
  • Scalability: Engaging a larger audience by making live-streamed and recorded classes more accessible.

  • To fully understand Todd’s pain points, we went through RFP and conducted a detailed Q&A session with him. This helped us design a cost-effective, technology-driven solution tailored to his needs.

    Proposed Solution
  • Live Class Recording & Streaming: Implementing open-source recording software such as Open Broadcaster Software (OBS) to record live classes and distribute content via the website.
  • Website Overhaul: Redesigning the website with a modern, structured layout to enhance product and service visibility, streamline bookings, and improve user experience.
  • AI-Powered Customer Support: Deploying an AI-driven chatbot to handle basic customer inquiries via website and phone, reducing manual intervention.
  • Integration of Open-Source SaaS Tools: Implementing cost-effective solutions such as Calendly (for scheduling), Intercom (for customer engagement), and SEMRush (for SEO and marketing insights) to enhance business operations.

  • A case study was presented to the customer. This strategic transformation would empower Todd to reduce administrative burdens, scale Native Yoga’s digital presence, and ultimately drive higher sales while focusing on his passion for teaching Yoga.

    High Level DC Architecture
    Native Yoga - HLD

    Chatbot Architecture for Website and voice service Native Yoga Chatbot

    High Level Cloud Architecture Native Yoga Cloud - HLD
    Key Benefits of Project Implementation
  • Protection of data, reputation.
  • Increased profits by avoiding costs incurred by data breaches.
  • High availability of services.
  • Overview of the Project
    Our project aims to migrate the functionality of your on-prem data center to a well-designed secured cloud environment. It's in response to your recent cybersecurity event where sensitive and confidential data were stolen. Also to address the loss of skilled tech workers to maintain such an environment on your on-prem. This will benefit your business, both your internal and external stakeholders by protecting your data and reputation, preserving your competitive advantage, and avoiding lawsuits and compliance fines. Through meticulous planning and execution, we're confident in our ability to achieve the desired outcomes.

    Objectives
    The primary goal of our project is to design a secure cloud migration and secure future state cloud architecture that addresses your company needs to address the lack of tech skills and a more secure environment. In addition, we have specific objectives such as contracting cloud and migration skills for implementation and security operations. By accomplishing these goals, we'll create a positive impact and drive meaningful change.

    Approach
    Our proposed approach for this project is based on a thorough analysis of the situation and best practices. We'll adopt a structured methodology that includes a signed statement of work with capability matrices, architectural vision, business, data, and application mappings, the cloud architecture, opportunities, migration planning, implementation governance, and change management. All the while managing any requirement changes. This approach ensures efficient utilization of resources and maximizes project outcomes.

    Implementation timeline
    While the project is divided into distinct phases, as outlined in the approach phase, medium sized migrations in the industry takes about 2-4 months. Our plan ensures that tasks are executed in a timely manner, allowing us to stay on track and deliver results.

    Resource requirements
    To successfully execute this project, we've identified the key resources needed. This includes migration engineering, cloud engineering, and security monitoring and response .We're confident in our ability to secure the necessary resources and allocate them effectively to ensure project success.

    Budget
    A project of this nature requires a well-planned budget. Based on our analysis, we've estimated the required funding to be approximately 14 million over 3 years of operation. This budget encompasses all project-related costs, the cloud engineering for the cloud infrastructure and security monitoring and response and aligns with the anticipated benefits and outcomes.

    Conclusion
    Our project proposal is an exciting opportunity to address and create tangible value for internal and external stakeholders. With a clear vision, defined objectives, and a robust implementation plan, we're ready to embark on this journey. Join us as we bring this project to life and make a lasting impact.

    Existing architecture vulnerable to Security Attack

    WT-DC-M-Current-High-Level-Architecture Image

    Proposed Secure design with High Availability

    WT-DC-M-Current-High-Level-Architecture Image

    Security in Action

    WT-DC-M-Current-High-Level-Architecture Image

    Key Benefits of Project Implementation
  • Reduced manual efforts by 98%, from two days to just 30 minutes, enabling AD administrators to access the latest data for user migration.
  • Visibility into users' un-rotated keys over extended periods, including both unused and actively used keys.
  • Visibility into active keys of former employees, potentially raising security concerns.
  • Overview of the Project
    Designed an automated auditing solution to scan 75 AWS accounts, identifying IAM users and their associated policies. The solution cross-validated these users against Active Directory (AD), streamlining data collection to facilitate a migration from local AWS users to AD and prepare for Single Sign-On (SSO) enforcement. Solution also included an on-demand reporting of IAM users and their defined policies via email, providing continuous visibility into the readiness phase. Tech: Python, MS SQL, AD, Jenkins.

    ERD: Tables used to keep track of Access Keys of IAM users ERD-AccessKey-Usage Image
    Sample report on Access Key usage of IAM users ERD-AccessKey-Usage-Report Image

    Note: Sensitive data have been skipped/masked from being displayed.


    Key Benefits of Project Implementation (a demo was provided, but deployment in the production environment was not realized)
  • Enhanced security posture by proactively identifying and mitigating vulnerabilities caused by misconfigured policies.
  • Reduced exposure to risks through automated detection, reporting and resolution of policy violations in real-time.
  • Overview of the Project
    Architected an end-to-end solution to manage public cloud Security Groups. The solution included options to generate reports and automated initiation of actions on policy violations. Tech: Python, MS SQL, Jenkins

    ERD: Tables used to keep track of Security Group Vulnerabilities ERD-SecurityGroup Image
    DFD: Update Database DFD-Update-DB Image
    DFD: Query Database for Defaulters and Email the Report DFD-Query-DB Image DFD: Take Action on Defaulters of Security Group DFD-Take-Action Image Sample report on Security Groups ERD-SecurityGroup-Report Image

    Note: Sensitive data have been skipped from being displayed.


    Key Benefits of Project Implementation
  • Achieved 99.5% InfoSec compliance for the ECS cluster by enforcing automated security policies.
  • Optimized Chef DB performance, reducing load by 50% through automated de-registration of deleted nodes.
  • Overview of the Project
    Designed and implemented an end-to-end automation framework for seamless Chef node registration upon instance launch. EC2 instances, forming part of a secure cluster, required Chef compliance enforcement. Leveraging an existing remote bootstrap solution, I enhanced the AMI’s user data script to automatically register instances with Chef server upon startup.

    However, a critical issue arose - terminated instances left orphaned objects in the Chef DB, creating unnecessary overhead. To mitigate this, I engineered an automated de-registration mechanism by developing a Red Hat service that proactively removes nodes from Chef server upon instance shutdown or deletion. Given the ephemeral nature of these instances, this solution significantly optimized Chef DB performance, reducing redundant entries by at least 50%. Tech: Chef, Bash, PHP, Jenkins, curl, System services.

    Process to auto register and de-register ephemeral EC2 instances Automated-Registration-Deregistraion-EC2-Chef Image

    Key Benefits of Project Implementation
  • Overcame limitations of previous cloud infrastructure (Embotics).
  • Enhanced support for public cloud providers (AWS, Azure).
  • Empowered end-users with self-service capabilities.
  • Overview of the Project
    Leading this project was a dynamic and rewarding experience. I worked with a talented cross-functional team to develop comprehensive test cases, ensuring that the Morpheus cloud management platform met all intended use cases seamlessly. From the start, I focused on building a structured test plan that would not only validate system reliability, security, and performance but also set a strong foundation for future scalability.

    To streamline integration with our private cloud, we leveraged Chef staging environments, automating VM bootstrapping and software deployments with predefined cookbooks. This automation ensured consistency across deployments, reducing configuration drift and improving operational efficiency.

    Understanding that each team member brought unique strengths, I thoughtfully assigned tasks based on expertise, fostering a collaborative and high-performing environment. Regular stand-ups and checkpoints weren’t just about tracking progress - they provided an open space to troubleshoot challenges, exchange ideas, and ensure everyone had the support they needed.

    Security was a key focus throughout the project. I identified a critical vulnerability that could have exposed the system to potential risks. To mitigate this, I developed a custom solution that effectively circumvented the issue, strengthening our security posture without compromising functionality.

    Vendor update calls became a crucial part of the process. I took an active role in identifying and reporting bugs, feature gaps, and performance limitations, ensuring that our concerns were addressed. By advocating for necessary enhancements, I helped refine the solution, ensuring it met our business objectives and delivered real value. I also developed a custom solution to circumvent a security vulnerability.


    Key Benefits of Project Implementation
  • Achieved over 95% InfoSec compliance with automated self-healing for Bronze-tier servers, reducing manual intervention and improving overall system reliability.
  • Overview of the Project
    Developed a tool that integrated with ServiceNow to fetch CMDB data and compared it against Chef’s database to identify unregistered servers or those failing to check in. Upon detection, it initiated the registration process for Gold, Silver, and Bronze-tier servers. A self-healing mechanism ensured compliance by running every 8 hours for Bronze servers. Failure reports were sent to the respective teams via email for remediation. The tool’s output was consolidated and published on Tableau for real-time visibility. Tech: Chef, Python, Bash

    InfoSec Compliance with Self-Healing InfoSec Compliance with self-healing Image

    InfoSec Compliance stack for Gold Servers
    InfoSec Compliance with self healing-support-matrix Image

    Key Benefits of Project Implementation
  • Achieved 99.5% security for newly launched VMs by rigorously enforcing InfoSec compliance standards.
  • Overview of the Project
    Designed and implemented a secure, custom workflow to replace an insecure process provided by the private cloud. The solution ensured full adherence to InfoSec compliance standards for newly launched VMs, including automated installation of required applications. Additionally, a bespoke cloud initialization solution was developed to extend support for legacy operating systems no longer maintained by vendors. This innovation enabled developers and QA engineers to continue delivering support to customers reliant on older versions of Informatica products, ensuring uninterrupted service and operational continuity. Tech: Chef, Bash, PowerShell

    Automated Deployment of Compliance Stack and Applications Enterprise-Private-Cloud-Morpheus Image

    Key Benefits of Project Implementation
  • Empowered developers and QA engineers to deliver emergency bug fixes efficiently, despite lack of support from the vendor.
  • Addressed the challenges of using an obsolete OS, providing a more sustainable and adaptable approach for future updates and bug fixes of Informatica products.

  • Supported platforms
  • SuSE 12 SP2, SP3, SP4 and SP5
  • SuSE 15 SP1 and 15 SP2
  • Overview of the Project
    The Cloud Management Platform (Morpheus) utilizes the cloud-init package to configure VM-specific parameters. The absence of a reliable cloud-init solution in the environment created significant challenges for the business. Furthermore, with the operating system being obsolete, vendors had ceased providing bug fixes and maintenance releases. Without proper VM configuration, it led to the following issues:

  • Operational Downtime: The failure to properly configure VMs resulted in delays and disruptions, leading to operational downtime that affected service delivery and project timelines.
  • Loss of VM Identity: As all VMs launched from a template appeared identical, tracking individual VM configurations became difficult. This led to problems with resource allocation and management, impacting the efficiency of cloud operations.
  • Inability to Scale or Adapt: Newly added disks could not be automatically configured, and existing partitions could not be extended, hindering system scalability and the ability to accommodate growing workloads or adapt to new business needs.
  • Impaired Customer Experience: The inability to quickly implement emergency fixes or provide timely updates created dissatisfaction among customers who relied on the platform for critical services. This put the company at risk of losing customer trust and impacting revenue.
  • Development and QA Delays: Developers and QA engineers were unable to efficiently address bugs or implement fixes, resulting in longer lead times for product development and delayed delivery of patches, which further compounded the impact on customer satisfaction.

  • These issues culminated in a strained environment where both internal teams and customers were affected, slowing down business growth and innovation. Recognizing the lack of expertise within the cloud management team and the severity of the situation, I took on the challenge of developing and implementing a custom cloud-init solution to address these problems within Morpheus, which significantly improved operational efficiency and restored system stability.


    Key Benefits of Project Implementation
  • Achieved savings of millions of dollars by eliminating unauthorized usage fee.
  • Successfully replaced over 4,000 commercial Java installations with open-source alternatives in just
    six weeks.
  • Overview of the Project
    This was a high-priority, CEO-monitored project with a tight deadline, requiring a flawless execution strategy. As the project lead, I managed a team of developers to design and implement a seamless migration solution that replaced commercial Java versions with open-source alternatives, specifically OpenJDK and Azul. Our approach involved building an intuitive frontend UI that allowed users to:

  • Choose the commercial Java versions installed.
  • Choose a suitable open-source replacement (OpenJDK or Azul) with a preferred version.
  • Initiate the replacement process seamlessly.

  • To automate the replacement process across diverse environments, we developed a Chef cookbook that handled the deployment and configuration of the selected Java version. This tool supported over 15 different Java versions and was designed to work across both Windows and Linux operating systems, ensuring a smooth and consistent transition across the enterprise.


    Key Benefits of Project Implementation
  • Enhanced Security Posture
  • Reduced Attack Surface
  • Improved Compliance
  • Strengthened Authentication Mechanisms
  • Audit and Monitoring

  • Supported platforms
  • Windows 2008
  • Windows 2012
  • RHEL 6
  • RHEL 7
  • Overview of the Project
    CIS Profiles provide a practical and effective approach to securing your IT environment, offering pre-configured, well-researched security settings tailored to a wide range of systems and applications. Developed by the Center for Internet Security (CIS), these profiles are based on the latest threat intelligence and industry best practices. They simplify the process of securing infrastructure across platforms such as Windows, Linux, macOS, and cloud services. By implementing these profiles, organizations can ensure their systems are configured to minimize vulnerabilities, protecting against common threats and attacks.

    The real value of CIS Profiles lies in the peace of mind they provide. By following these guidelines, organizations can stay ahead of potential security risks, reduce time spent on manual configurations, and ensure compliance with key industry regulations like HIPAA, PCI-DSS, and GDPR. Beyond just a set of recommendations, CIS Profiles help businesses lay a solid security foundation, safeguard sensitive data, streamline security processes, and foster a culture of proactive cybersecurity. With regular updates and a focus on actionable security, these profiles are a vital resource for organizations looking to strengthen their defenses and reduce risk.

    I was approached by the Information Security (InfoSec) team to implement CIS policy controls across enterprise-supported operating systems, including on-premises, AWS, and Azure cloud environments. After reviewing the standards, I worked closely with both the Operating Systems and InfoSec teams to ensure alignment. Together, we decided to implement 95% of the policy controls outlined in the CIS report, excluding the remaining 5% due to non-alignment with Informatica standards.

    I successfully designed and developed a cookbook to automate the implementation of the agreed standards, which was then audited and approved by a third-party cyber security agency.

    Additionally, I developed InSpec profiles to verify the applied CIS policy controls and generate reports in HTML format, ensuring that the implementation was both validated and easily accessible. Tech: Chef, CIS Profiles, Inspec Profiles, Jenkins


    Key Benefits of Project Implementation
  • Achieved 99.5% InfoSec compliance across the production environment, ensuring the security of critical infrastructure.
  • Empowered infrastructure owners to independently secure their environments without needing support team involvement, even surpassing capabilities of the commercial Chef solution.
  • The solution supported hybrid cloud environments including On-premises, AWS and Azure.
  • Overview of the Project
    Developed a custom solution to streamline the registration and management of servers on Chef, enabling the seamless application of InfoSec compliance standards. I modified the core bootstrap process to meet these specific requirements, addressing credential-sharing challenges.

    Faced a unique challenge while bootstrapping cloud instances where IP address of the instance is replaced by NAT Gateway IP for the outgoing traffic. I enhanced the tool to forward actual IP of the instance so it can be registered on Chef. This solution empowered infrastructure owners to secure their environments autonomously, ensuring operational security without compromising sensitive credentials. Notably, the implementation included a unique feature that even the commercial version lacked, which surprised the vendor and demonstrated significant technical innovation. Tech: Apache, PHP, Jenkins, Bash, Batch, PowerShell, curl

    Chef Self-Install
    Chef-Self-Install Image

    Key Benefits of Project Implementation
  • Empower Users to Automate Manual Tasks: By training users on Chef, the project enabled them to automate repetitive manual tasks, reducing errors and improving efficiency.
  • Reduce Dependency on the Automation Team: Through the training, users gained the skills to manage their own automation tasks, reducing the reliance on the automation team for routine requests and fostering a more self-sufficient user base.
  • Overview of the Project
    The project involved hosting a 2-day Chef Essentials training session designed to equip participants with the foundational knowledge of Chef automation. During the training, participants were encouraged to bootstrap their laptops to convert them into Chef workstations, which allowed them to practice hands-on automation tasks in real time.

    The training covered key concepts such as creating and managing Chef cookbooks, writing simple programs, and automating tasks that were previously performed manually. The goal was to ensure participants could independently use Chef to automate routine processes and improve their workflow efficiency.

    This training not only improved users’ technical skills but also fostered a culture of automation within the organization, empowering individuals to take charge of their own environments and reduce reliance on external teams for day-to-day tasks.


    Key Benefits of Project Implementation
  • Reduced testing and rollout time for tools in the production environment by 70%.
    • Seamless upgrade of applications under compliance stack.
    • Automated testing, verification of cookbooks.

    Overview of the Project
    Designed and developed an automated solution based on DevOps principles to streamline the testing and deployment of applications into production. This solution empowered teams to independently test and release applications such as Snow, Qualys, SEP and Cortex.

    Previously, these teams launched VMs, installed and tested applications manually, consuming significant time and resources. The new solution leveraged CI/CD pipelines to automatically deploy multiple versions of Linux and Windows VMs in the private cloud. Once the VMs were reachable over the network, the tool would install and configure the selected applications and the results would be emailed to users.

    Additionally, the solution enabled teams to use CI/CD pipelines to release applications into the production environment, with proper approval from the change management team. Tech: Chef, Jenkins, Morpheus REST API, curl.

    Automated Build Process Automated-Build-Process Image Self-service - CI/CD Pipelines to Build, Test, and Release Applications Self-service CI-CD - test and release the application Image

    Key Benefits of Project Implementation
  • Ensured 98% coverage of Linux infrastructure, addressing over 5,000 servers for data analytics and measuring InfoSec compliance.
  • Reported server issues, enabling administrators to take preemptive actions and resolve them in a timely manner.
  • Provided management with visibility into infrastructure health.
  • Overview of the Project
    Implemented a solution using Chef to forward syslog messages from all Linux servers to a central syslog server. A Sumo Logic collector was installed on the syslog server, which then forwarded all incoming messages to the cloud-hosted Sumo Logic infrastructure.
    An analytics dashboard was developed using Sumo Logic to monitor infrastructure status. Tech: Chef, Rsyslog, Sumo Logic.

    Data Analytics using Sumo Logic SumoLogic-Image

    Key Benefits of Project Implementation
  • Improved security along with new features.
  • Enhanced stability.
  • Overview of the Project
    While monitoring vendor releases, I identified that our environment was running Chef Client 12.15.19, whereas version 12.17.44 was available with critical security and feature improvements. Recognizing the potential benefits, I initiated a Proof of Concept (PoC) to validate the new version on a subset of servers. The PoC was successful, and I proactively updated leadership on the findings, proposing a structured upgrade plan.

    To ensure a smooth transition, I collaborated with key stakeholders, including the Infrastructure team, ITSM, and InfoSec, conducting meetings to communicate the necessity and impact of the upgrade. To automate and streamline the deployment, my team and I developed a Chef cookbook that seamlessly upgraded the Chef client across all existing 8000+ servers. Additionally, I worked closely with the VMware team to ensure Chef client updates were integrated into the VM templates, preventing version mismatches in newly provisioned servers.

    By driving this initiative, I ensured our infrastructure remained secure, stable, and up to date, minimizing operational risks while enhancing system reliability.Tech: Chef.


    Key Benefits of Project Implementation
  • Standardize configuration management process.
  • Reduce time duration for customer's to have their application installed on VMs launched in private cloud as well as bare metal servers.
  • Overview of the Project
    The primary requirement for this project was to select a vendor that could automate the installation and configuration of applications using Chef cookbooks. The goal was to eliminate manual intervention, reduce errors, and improve overall deployment efficiency.

    As part of the process, I took the lead in preparing the RFP document that would outline the project’s requirements and expectations from potential vendors. Some key clauses included in the RFP were:

  • Vendor Quality Assurance: Ensure that the vendor adheres to the highest standards of quality, as set by Informatica. This included delivering work that met the organization’s specific quality benchmarks for automation.
  • Cross-Platform Support: The solution had to support a variety of operating systems (OS) and their respective versions, including but not limited to Red Hat, SuSE, Windows, and others. This ensured that the cloud automation solution would be versatile and capable of handling a broad range of environments, ensuring seamless integration into the existing infrastructure with multi-region support.
  • The automation had to support the installation and configuration of database servers and clients such as Oracle, DB2, Sybase, and others, various third party applications such as Process Explorer, Notepad as well as key Informatica products including PowerCenter, MDM, and ILM. This flexibility was critical for ensuring the solution could scale and adapt to different database and application configurations.
  • By implementing the RFP process, the goal was not only to choose a reliable vendor but also to lay the foundation for a scalable and future-proof cloud automation solution that could handle various operating system versions and configurations, driving greater operational agility.

  • Key Benefits of Project Implementation
  • Overcame limitations of previous cloud infrastructure - Dell Multi-cloud manager.
  • Automated application deployment using Chef cookbooks.
  • Improved stability and vendor support.
  • Overview of the Project
    Recognizing the critical limitations of Dell Multi-Cloud Manager, I played a key role in identifying and implementing a more effective private cloud solution. As a member of the selection committee, I was actively involved in the vendor evaluation process, attending multiple demo sessions from different cloud management vendors, carefully assessing their capabilities, and analyzing their responses to the Request for Proposal (RFP). This rigorous evaluation process allowed us to compare key factors such as feature set, automation capabilities, integration with existing infrastructure, scalability, and vendor support.

    After thorough assessment, we selected Embotics for the Proof of Concept (PoC) phase, ensuring it addressed the pain points of the previous solution. Dell’s system had proven unreliable due to recurring bugs, a complicated three-tier architecture, and a failure to execute Chef cookbooks, which significantly impacted our automation efforts. Moreover, its lack of adequate vendor support made troubleshooting and patching a constant challenge.

    Once the PoC was approved, I led the initiative to integrate Chef with the new platform, enabling seamless infrastructure automation and improving deployment efficiency. I collaborated with cross-functional teams to develop and execute rigorous test cases, ensuring the solution was robust, scalable, and secure. Additionally, I maintained an open feedback loop with stakeholders and vendors, proactively addressing issues and ensuring the new system aligned with business and technical objectives.

    By replacing a problematic cloud management system with a well-evaluated, vendor-supported, and automation-driven two-tier solution, we significantly enhanced operational efficiency, reduced long-term maintenance overhead, and empowered teams with a more stable and scalable infrastructure.


    Key Benefits of Project Implementation
  • Structured evaluation process
  • Cost Transparency
  • Selection of vendors
  • Risk mitigation
  • Improved decision making
  • Overview of the Project
    The Dell Multi-Cloud Manager was failing to meet the customer's evolving needs due to its reliance on a complex three-tier architecture, which consisted of:

  • Orchestration
  • Cloud Stack
  • VMware infrastructure

  • This architecture proved to be unstable and challenging to manage due to the numerous interdependent components, which often led to disruptions. Despite multiple escalations to the leadership team, the solution continued to under perform and struggle with scalability and reliability issues.

    As a result, the leadership team made the decision to replace the existing infrastructure with a more stable private cloud solution that could better align with the organization's goals. To facilitate this transition, I took the initiative to develop a comprehensive list of RFPs to help identify and evaluate cloud solutions that would meet the specific business requirements. The objective was to ensure that the selected solution would be more reliable, easier to manage, and capable of supporting the growing needs of the business while also addressing key pain points such as performance, stability, and cost-effectiveness.


    Key Benefits of Project Implementation
  • Reduced downtime of the customer-facing cloud application by 83%, decreasing the maintenance window from 3 hours to just 30 minutes.
  • Overview of the Project
    The newly architected solution enabled authorized staff to independently initiate application refreshes, eliminating the need for multiple teams to coordinate through a semi-automated tool. By fully automating the end-to-end process of publishing new application versions, the solution streamlined deployments, minimized human intervention, and ensured faster rollouts. This automation reduced the maintenance window for the customer-facing cloud application from three hours to just 30 minutes, significantly enhancing service availability and operational efficiency. Tech: Chef, AMI, EC2, RDS, F5

    Refresh REV application in AWS Refresh REV application in AWS Image Functions of the Management Node
  • Launch App & Web nodes in AWS according to the defined configuration.
  • Initiate bootstrap and cookbook execution on other nodes.
  • Pause further activity until all nodes complete their tasks.
  • Make changes to the environment to reflect new nodes.
  • Functions of Main REV Node 1
  • Clean up the DB.
  • Take snapshot of the DB.
  • Upgrade the DB.
  • Self-install and configure the REV application.
  • Functions of Nodes 2 & 3
  • Self-install and configure the REV application.
  • Highlights
  • Scales up Web/App nodes in the existing cluster.
  • Installs specific build.
  • Allows the application admins to choose the number of Web/App nodes at the time of the default install.
  • Implements parallel execution to reduce downtime and a locking mechanism to avoid race conditions.
  • Downloads the application RPMs from the AWS S3 bucket.


  • Awards and Recognition

    Recognized for swiftly implementing a Log4j vulnerability scanner across the on-premises infrastructure, covering over 8,000 servers in record time. Received special acknowledgment from the CEO during an all-hands meeting for this critical initiative.

    Received a commemorative gift for leading a team of developers for automating the replacement of commercial Java with open-source alternatives, earning recognition from the CEO during an all-hands meeting.

    The self-service solution, built with Jenkins and Chef, enabled rapid deployment of OpenJDK or Azul across Windows and multiple Linux distributions. Within six weeks, the tool facilitated over 4,000 replacements, mitigating the risk of vendor fines for unauthorized usage.

    Received a memento for automating the detection and reporting of MKS Toolkit errors that triggered production outages by crashing ESXi servers. Earned recognition from the VP during the IT kickoff meeting.

    The collaborative effort with various business and IT teams resulted in a cost reduction of 90%, from $1 million to $100k. Received a boundary-less behavior banner award on successfully achieving a first-of-its-kind milestone for migrating the Ab Initio application from an AIX environment to a Linux virtual environment..

    Honored for developing a web-based self-service password reset solution, leading to annual savings of £3,300. This unique solution received a souvenir during the Tesco Innovation conference and was highlighted in the Tesco Innovation Achievers magazine.

    Recognized for visiting onsite and successfully resolving a high-impact business issue reported by ZF-Sachs, Germany, pertaining to the HP OMS database and helped retain key client.

    Recognized for visiting onsite and successfully resolving multiple business-critical escalations related to the HP OMS application within three weeks, despite issues remaining unresolved for 18 months. This achievement garnered recognition from the Ministry of Social Policy, Government of New Zealand.