Dipak Chavan

DevOps Engineer | Mumbai, India

40%

Reduction in Deployment Time

15%

Cloud Cost Optimization

30%

Improved Code Reliability

Professional Summary

Results-driven DevOps Engineer with 4+ years of experience in automating, optimizing, and managing cloud-native infrastructure on AWS. Specialized in Kubernetes (EKS), Terraform, and CI/CD pipeline engineering. Adept at bridging development and operations to enable faster and more reliable software delivery.

Interactive Shell

Type `help` to see available commands or try `ls`.

dipak-shell:~$

Production Telemetry

Live mock representation of system health and EKS cluster metrics.

Global Uptime
99.99%

All Systems Operational

EKS Cluster CPU Util
42%
Active Pods (Prod)
128
P99 Latency
124ms

Target: < 200ms

Technical Toolset

Skill Proficiency

AWS Cloud90%
Kubernetes (EKS)85%
Terraform (IaC)88%
Jenkins CI/CD92%
Docker90%

Cloud Platforms

EC2S3VPC IAMRoute 53CloudWatch SNSSQS

DevOps & Automation

HelmMavenSonarQube Git/GitHubPrometheusGrafana Linux (Ubuntu/CentOS)Bash Scripting

Professional Experience

Deegee Software Pvt. Ltd.

2020 – Present

DevOps Engineer | Mumbai, India

Containerization & Orchestration

  • Containerized 20+ microservices using Docker and deployed on Kubernetes (EKS).
  • Implemented Helm charts and Kubernetes manifests to standardize deployments.
  • Reduced server resource overhead by 25% through optimized pod scaling.

Infrastructure as Code (IaC)

  • Provisioned multi-environment AWS infrastructure using reusable Terraform modules.
  • Implemented remote state management using S3 backend with locking.
  • Achieved 100% environment consistency, reducing manual effort by 60%.

CI/CD & Monitoring

  • Designed Jenkins declarative pipelines for build, test, and deploy stages.
  • Increased deployment frequency from weekly to daily production releases.
  • Integrated SonarQube for code analysis, improving reliability by 30%.
  • Deployed Prometheus & Grafana for Kubernetes cluster monitoring.

Network & Security

  • Designed secure VPC architectures with public/private subnets and NAT Gateways.
  • Managed IAM roles and Kubernetes RBAC with least-privilege principles.
  • Optimized storage usage, reducing AWS monthly expenses by 15%.

Certifications & Badges

AWS Certified Solutions Architect – Associate

Active

Certified Kubernetes Administrator (CKA)

Active

HashiCorp Certified: Terraform Associate

Active

Key DevOps Projects

Click a project card to view architecture diagrams and details.

GitOps All-in-One Pipeline

End-to-End Automation

  • Built a complete CI/CD workflow using **Jenkins, Docker, and K3d**.
  • Implemented **Helm** for application packaging and **ArgoCD** for declarative GitOps deployments.
  • Ensured high availability and automated sync between GitHub and K8s clusters.
ArgoCDK3dHelmGitOps

Enterprise EKS Migration

Scalability & Efficiency

  • Migrated 20+ legacy microservices to **Amazon EKS** clusters.
  • Optimized resource utilization by 25% using **HPA (Horizontal Pod Autoscalers)**.
  • Standardized environment creation across Dev, QA, and Prod.
AWS EKSHPAMicroservices

IaC Infrastructure Suite

Automation & Consistency

  • Developed reusable **Terraform Modules** for VPC, EC2, and S3 provisioning.
  • Implemented **S3 Backend with DynamoDB locking** to prevent state corruption.
  • Reduced cloud provisioning time from hours to minutes.
TerraformS3 BackendIaC

Incident Response Playbook

How I approach and resolve high-severity production issues.

ALERT: High CPU Spikes on Prod EKS Cluster causing API Latency

Simulate my debugging process below.

Action: Check CloudWatch Alarms and Grafana Dashboards.

Finding: CPU on node group `worker-nodes-a` is at 95%. Specific pods for the `payment-service` are maxing out their limits.

Action: Run `kubectl logs` and `kubectl top pods` for the affected service. Temporarily scale up HPA `maxReplicas` to absorb traffic.

Finding: Logs reveal a runaway process loop in the latest deployment. Scaling HPA stabilizes API latency temporarily.

Action: Initiate an immediate ArgoCD rollback to the previous stable Helm chart version. Coordinate with dev team to patch the loop.

Result: System restored to 100% health in < 15 mins. Post-mortem document created to implement stricter SonarQube rules for loop complexity.

Incident Resolved

Code Snippet Toolbox

Actual configurations demonstrating syntax and best practices.

main.tf (VPC Module)
module "vpc" { source = "terraform-aws-modules/vpc/aws" version = "5.0.0" name = "production-vpc" cidr = "10.0.0.0/16" azs = ["ap-south-1a", "ap-south-1b"] private_subnets = ["10.0.1.0/24", "10.0.2.0/24"] public_subnets = ["10.0.101.0/24", "10.0.102.0/24"] enable_nat_gateway = true single_nat_gateway = false # High Availability tags = { Environment = "prod" ManagedBy = "terraform" } }
Jenkinsfile
pipeline { agent any stages { stage('Lint & Test') { steps { sh 'mvn clean test' } } stage('Docker Build & Push') { steps { script { docker.withRegistry('https://index.docker.io/v1/', 'docker-creds') { def app = docker.build("dipak/app:${env.BUILD_ID}") app.push() } } } } } }

GitHub Contribution Activity

Live Statistics

320+

Commits (2024)

18

Public Repos

5+

Top Contributions

Top Repositories

Connect With Me

LinkedIn GitHub Email

Phone

+91 9730787694

Location

Mumbai, India