Yogesh Patil

Yogesh Patil

Associate DevOps Engineer

DevOps Engineer

Infrastructure as Code, Automation & Cloud Architecture

Engineering secure and high-availability infrastructure with cutting-edge DevOps practices. Expertise in CI/CD, Kubernetes, ECS, Terraform, and cloud-native ecosystems.

terminal
$kubectl get pods -n production
NAME READY STATUS RESTARTS AGE api-6d8f7b9c5-xj2vn 1/1 Running 0 2d web-5f7b8c9d6-rt4kl 1/1 Running 0 2d db-7c8b9d5f4-zx3pl 1/1 Running 0 2d
$

About Me

I'm a DevOps engineer with a passion for automating infrastructure and streamlining development workflows. With expertise in cloud platforms, containerization, and CI/CD pipelines, I help teams deliver software faster and more reliably.

  • Infrastructure as Code

    Designing and implementing infrastructure using Terraform, CloudFormation, and Ansible to ensure consistency and repeatability.

  • CI/CD Pipelines

    Building automated pipelines with GitLab CI, GitHub Actions, and Jenkins to enable continuous integration and delivery.

  • Cloud Architecture

    Designing scalable and resilient cloud architectures on AWS, Azure, and GCP with a focus on security and cost optimization.

Professional Experience

Associate DevOps Engineer 3
Wonderlendhubs Pvt Ltd. • 2024 - Present
Designed hands-on DevOps solutions for deployment, cost efficiency, and infrastructure automation using Terraform and AWS.
Associate Platform Engineer
Wonderlendhubs Pvt Ltd. • 2022 - 2024
Automated full environment replication using Terraform, reducing manual setup time and ensuring infrastructure consistency across stages.
Web Developer
Alpha Recruitment Ltd. • Aud 2021 - Dec 2021
Took a legacy VB.NET portal and rebuilt it from the ground up in ASP.NET Core—cleaner codebase, faster performance, and future-ready architecture.

Sandbox of Experiments

Welcome to my Sandbox of Experiments—a place where I bring DevOps concepts to life through code, simulation, and a bit of chaos.

IaC Forge: Terraform Generator

Infrastructure as Code Generator

# AWS Infrastructure as Code
# Generated by DevOps Portfolio Terraform Generator

provider "aws" {
  region = "us-west-2"
}

resource "aws_vpc" "main" {
  cidr_block = "10.0.0.0/16"
  
  tags = {
    Name = "main-vpc"
    Environment = "production"
  }
}

resource "aws_subnet" "public" {
  count = 2

  vpc_id            = aws_vpc.main.id
  cidr_block        = "10.0.${count.index}.0/24"
  availability_zone = "us-west-2${["a", "b"][count.index]}"
  tags = {
    Name = "public-subnet-${count.index}"
  }
}

resource "aws_security_group" "web" {
  name        = "web-sg"
  description = "Allow web traffic"
  vpc_id      = aws_vpc.main.id

  ingress {
    from_port   = 80
    to_port     = 80
    protocol    = "tcp"
    cidr_blocks = ["0.0.0.0/0"]
  }
  
  ingress {
    from_port   = 443
    to_port     = 443
    protocol    = "tcp"
    cidr_blocks = ["0.0.0.0/0"]
  }

  egress {
    from_port   = 0
    to_port     = 0
    protocol    = "-1"
    cidr_blocks = ["0.0.0.0/0"]
  }
}

resource "aws_instance" "web" {
  count = 2
  
  ami           = "ami-0c55b159cbfafe1f0"
  instance_type = "t3.micro"
  subnet_id     = aws_subnet.public[${count.index % 2}].id
  
  vpc_security_group_ids = [aws_security_group.web.id]
  
  tags = {
    Name = "web-server-${count.index}"
  }
  
  user_data = <<-EOF
              #!/bin/bash
              echo "Hello from Terraform!"
              yum update -y
              yum install -y httpd
              systemctl start httpd
              systemctl enable httpd
              echo "<h1>Deployed with Terraform</h1>" > /var/www/html/index.html
              EOF
}


resource "aws_lb" "web" {
  name               = "web-lb"
  internal           = false
  load_balancer_type = "application"
  security_groups    = [aws_security_group.web.id]
  subnets            = aws_subnet.public[*].id
}

resource "aws_lb_target_group" "web" {
  name     = "web-target-group"
  port     = 80
  protocol = "HTTP"
  vpc_id   = aws_vpc.main.id
  
  health_check {
    path                = "/"
    port                = "traffic-port"
    healthy_threshold   = 3
    unhealthy_threshold = 3
    timeout             = 5
    interval            = 30
  }
}

resource "aws_lb_listener" "web" {
  load_balancer_arn = aws_lb.web.arn
  port              = 80
  protocol          = "HTTP"
  
  default_action {
    type             = "forward"
    target_group_arn = aws_lb_target_group.web.arn
  }
}

resource "aws_lb_target_group_attachment" "web" {
  count            = 2
  target_group_arn = aws_lb_target_group.web.arn
  target_id        = aws_instance.web[count.index].id
  port             = 80
}


resource "aws_launch_template" "web" {
  name_prefix   = "web-"
  image_id      = "ami-0c55b159cbfafe1f0"
  instance_type = "t3.micro"
  
  vpc_security_group_ids = [aws_security_group.web.id]
  
  user_data = base64encode(<<-EOF
              #!/bin/bash
              echo "Hello from Terraform!"
              yum update -y
              yum install -y httpd
              systemctl start httpd
              systemctl enable httpd
              echo "<h1>Deployed with Terraform</h1>" > /var/www/html/index.html
              EOF
  )
}

resource "aws_autoscaling_group" "web" {
  desired_capacity    = 2
  max_size            = 4
  min_size            = 1
  vpc_zone_identifier = aws_subnet.public[*].id
  
  launch_template {
    id      = aws_launch_template.web.id
    version = "$Latest"
  }
  
  tag {
    key                 = "Name"
    value               = "web-server-asg"
    propagate_at_launch = true
  }
}

resource "aws_autoscaling_attachment" "web" {
  autoscaling_group_name = aws_autoscaling_group.web.name
  lb_target_group_arn    = aws_lb_target_group.web.arn
}

resource "aws_autoscaling_policy" "scale_up" {
  name                   = "scale-up"
  autoscaling_group_name = aws_autoscaling_group.web.name
  adjustment_type        = "ChangeInCapacity"
  scaling_adjustment     = 1
  cooldown               = 300
}

resource "aws_autoscaling_policy" "scale_down" {
  name                   = "scale-down"
  autoscaling_group_name = aws_autoscaling_group.web.name
  adjustment_type        = "ChangeInCapacity"
  scaling_adjustment     = -1
  cooldown               = 300
}

resource "aws_cloudwatch_metric_alarm" "high_cpu" {
  alarm_name          = "high-cpu-utilization"
  comparison_operator = "GreaterThanThreshold"
  evaluation_periods  = 2
  metric_name         = "CPUUtilization"
  namespace           = "AWS/EC2"
  period              = 120
  statistic           = "Average"
  threshold           = 80
  alarm_description   = "This metric monitors ec2 cpu utilization"
  alarm_actions       = [aws_autoscaling_policy.scale_up.arn]
  dimensions = {
    AutoScalingGroupName = aws_autoscaling_group.web.name
  }
}

resource "aws_cloudwatch_metric_alarm" "low_cpu" {
  alarm_name          = "low-cpu-utilization"
  comparison_operator = "LessThanThreshold"
  evaluation_periods  = 2
  metric_name         = "CPUUtilization"
  namespace           = "AWS/EC2"
  period              = 120
  statistic           = "Average"
  threshold           = 20
  alarm_description   = "This metric monitors ec2 cpu utilization"
  alarm_actions       = [aws_autoscaling_policy.scale_down.arn]
  dimensions = {
    AutoScalingGroupName = aws_autoscaling_group.web.name
  }
}

output "instance_ips" {
  value = aws_instance.web[*].public_ip
}


output "load_balancer_dns" {
  value = aws_lb.web.dns_name
}

Craft Terraform configurations for any cloud, tailored to your exact infra needs. Build once, scale forever.

Technical Skills

My toolkit includes a wide range of technologies and platforms that enable me to build and maintain modern infrastructure.

Cloud Platforms

AWS

Infrastructure as Code

Terraform
CloudFormation
Ansible

Containerization & Orchestration

Docker
Kubernetes
Helm
Docker Compose

CI/CD & Automation

GitLab CI
Jenkins
GitHub Actions
CircleCI

Monitoring & Observability

Prometheus
Grafana

Programming & Scripting

Java
C#
Python
Bash
Go
JavaScript
PowerShell

Featured Projects

A showcase of my work in DevOps, infrastructure automation, and cloud architecture.

ECS Monitoring Dashboard

ECS Monitoring Dashboard

Monitoring and alerting solution for AWS ECS using CloudWatch.

ECS
Monitoring

Latest Articles

Insights, tutorials, and thoughts on DevOps, cloud architecture, and infrastructure automation.

Blog post thumbnail
Security

ECS Security in Action: A Lab for DevOps Enthusiasts

Learn how to secure your ECS clusters with this hands-on lab. Explore best practices and tools.

Get In Touch

Interested in working together? Feel free to reach out for collaborations or just a friendly chat.

Contact Information

Feel free to reach out through any of these channels. I'm always open to discussing new projects, opportunities, or partnerships.