
Yogesh Patil
Associate DevOps Engineer
Infrastructure as Code, Automation & Cloud Architecture
Engineering secure and high-availability infrastructure with cutting-edge DevOps practices. Expertise in CI/CD, Kubernetes, ECS, Terraform, and cloud-native ecosystems.
About Me
I'm a DevOps engineer with a passion for automating infrastructure and streamlining development workflows. With expertise in cloud platforms, containerization, and CI/CD pipelines, I help teams deliver software faster and more reliably.
Infrastructure as Code
Designing and implementing infrastructure using Terraform, CloudFormation, and Ansible to ensure consistency and repeatability.
CI/CD Pipelines
Building automated pipelines with GitLab CI, GitHub Actions, and Jenkins to enable continuous integration and delivery.
Cloud Architecture
Designing scalable and resilient cloud architectures on AWS, Azure, and GCP with a focus on security and cost optimization.
Professional Experience
Sandbox of Experiments
Welcome to my Sandbox of Experiments—a place where I bring DevOps concepts to life through code, simulation, and a bit of chaos.
IaC Forge: Terraform Generator
Infrastructure as Code Generator
# AWS Infrastructure as Code
# Generated by DevOps Portfolio Terraform Generator
provider "aws" {
region = "us-west-2"
}
resource "aws_vpc" "main" {
cidr_block = "10.0.0.0/16"
tags = {
Name = "main-vpc"
Environment = "production"
}
}
resource "aws_subnet" "public" {
count = 2
vpc_id = aws_vpc.main.id
cidr_block = "10.0.${count.index}.0/24"
availability_zone = "us-west-2${["a", "b"][count.index]}"
tags = {
Name = "public-subnet-${count.index}"
}
}
resource "aws_security_group" "web" {
name = "web-sg"
description = "Allow web traffic"
vpc_id = aws_vpc.main.id
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 443
to_port = 443
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
}
resource "aws_instance" "web" {
count = 2
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t3.micro"
subnet_id = aws_subnet.public[${count.index % 2}].id
vpc_security_group_ids = [aws_security_group.web.id]
tags = {
Name = "web-server-${count.index}"
}
user_data = <<-EOF
#!/bin/bash
echo "Hello from Terraform!"
yum update -y
yum install -y httpd
systemctl start httpd
systemctl enable httpd
echo "<h1>Deployed with Terraform</h1>" > /var/www/html/index.html
EOF
}
resource "aws_lb" "web" {
name = "web-lb"
internal = false
load_balancer_type = "application"
security_groups = [aws_security_group.web.id]
subnets = aws_subnet.public[*].id
}
resource "aws_lb_target_group" "web" {
name = "web-target-group"
port = 80
protocol = "HTTP"
vpc_id = aws_vpc.main.id
health_check {
path = "/"
port = "traffic-port"
healthy_threshold = 3
unhealthy_threshold = 3
timeout = 5
interval = 30
}
}
resource "aws_lb_listener" "web" {
load_balancer_arn = aws_lb.web.arn
port = 80
protocol = "HTTP"
default_action {
type = "forward"
target_group_arn = aws_lb_target_group.web.arn
}
}
resource "aws_lb_target_group_attachment" "web" {
count = 2
target_group_arn = aws_lb_target_group.web.arn
target_id = aws_instance.web[count.index].id
port = 80
}
resource "aws_launch_template" "web" {
name_prefix = "web-"
image_id = "ami-0c55b159cbfafe1f0"
instance_type = "t3.micro"
vpc_security_group_ids = [aws_security_group.web.id]
user_data = base64encode(<<-EOF
#!/bin/bash
echo "Hello from Terraform!"
yum update -y
yum install -y httpd
systemctl start httpd
systemctl enable httpd
echo "<h1>Deployed with Terraform</h1>" > /var/www/html/index.html
EOF
)
}
resource "aws_autoscaling_group" "web" {
desired_capacity = 2
max_size = 4
min_size = 1
vpc_zone_identifier = aws_subnet.public[*].id
launch_template {
id = aws_launch_template.web.id
version = "$Latest"
}
tag {
key = "Name"
value = "web-server-asg"
propagate_at_launch = true
}
}
resource "aws_autoscaling_attachment" "web" {
autoscaling_group_name = aws_autoscaling_group.web.name
lb_target_group_arn = aws_lb_target_group.web.arn
}
resource "aws_autoscaling_policy" "scale_up" {
name = "scale-up"
autoscaling_group_name = aws_autoscaling_group.web.name
adjustment_type = "ChangeInCapacity"
scaling_adjustment = 1
cooldown = 300
}
resource "aws_autoscaling_policy" "scale_down" {
name = "scale-down"
autoscaling_group_name = aws_autoscaling_group.web.name
adjustment_type = "ChangeInCapacity"
scaling_adjustment = -1
cooldown = 300
}
resource "aws_cloudwatch_metric_alarm" "high_cpu" {
alarm_name = "high-cpu-utilization"
comparison_operator = "GreaterThanThreshold"
evaluation_periods = 2
metric_name = "CPUUtilization"
namespace = "AWS/EC2"
period = 120
statistic = "Average"
threshold = 80
alarm_description = "This metric monitors ec2 cpu utilization"
alarm_actions = [aws_autoscaling_policy.scale_up.arn]
dimensions = {
AutoScalingGroupName = aws_autoscaling_group.web.name
}
}
resource "aws_cloudwatch_metric_alarm" "low_cpu" {
alarm_name = "low-cpu-utilization"
comparison_operator = "LessThanThreshold"
evaluation_periods = 2
metric_name = "CPUUtilization"
namespace = "AWS/EC2"
period = 120
statistic = "Average"
threshold = 20
alarm_description = "This metric monitors ec2 cpu utilization"
alarm_actions = [aws_autoscaling_policy.scale_down.arn]
dimensions = {
AutoScalingGroupName = aws_autoscaling_group.web.name
}
}
output "instance_ips" {
value = aws_instance.web[*].public_ip
}
output "load_balancer_dns" {
value = aws_lb.web.dns_name
}
Craft Terraform configurations for any cloud, tailored to your exact infra needs. Build once, scale forever.
Technical Skills
My toolkit includes a wide range of technologies and platforms that enable me to build and maintain modern infrastructure.
Cloud Platforms
Infrastructure as Code
Containerization & Orchestration
CI/CD & Automation
Monitoring & Observability
Programming & Scripting
Featured Projects
A showcase of my work in DevOps, infrastructure automation, and cloud architecture.

ECS Monitoring Dashboard
Monitoring and alerting solution for AWS ECS using CloudWatch.
Latest Articles
Insights, tutorials, and thoughts on DevOps, cloud architecture, and infrastructure automation.

ECS Security in Action: A Lab for DevOps Enthusiasts
Learn how to secure your ECS clusters with this hands-on lab. Explore best practices and tools.
Get In Touch
Interested in working together? Feel free to reach out for collaborations or just a friendly chat.
Contact Information
Feel free to reach out through any of these channels. I'm always open to discussing new projects, opportunities, or partnerships.