Open to Work

I Build Infrastructure
That Doesn't Break
at 3AM

I'm a |

Architecting cloud-native systems on AWS  ·  Automating delivery with Terraform & GitHub Actions  ·  Running Kubernetes clusters that actually scale

0+
GitHub Repos
0+
Certifications
0
Followers
Scroll
// about.me

Who Am I?

I'm Suguresh (Sugu), a Cloud & DevOps Engineer who believes that great infrastructure is invisible — it just works. I specialize in building cloud-native systems on AWS, automating the entire delivery pipeline, and making Kubernetes clusters behave under real-world load.

Currently at Seabed2Crest, I architect and automate the infrastructure teams rely on every day. My engineering philosophy: automate it once, trust it always.

Currently studying: AWS Solutions Architect Associate
sugu@aws-cloud:~$
whoami
Cloud & DevOps Engineer

cat skills.yaml
cloud: AWS, GCP
containers: Docker, Kubernetes
iac: Terraform
cicd: GitHub Actions, ArgoCD
monitoring: Prometheus, Grafana

echo $STATUS
Open to full-time roles ✓
// tech.stack

My Arsenal

Tools I use to build, automate, and monitor cloud infrastructure at scale

Cloud Platforms
AWS
GCP
EC2
EKS
S3
VPC
CloudWatch
Route53
Containers & Orchestration
Docker
Kubernetes
Helm
ArgoCD
Infrastructure as Code
Terraform
Ansible
YAML
CI / CD
GitHub Actions
Jenkins
ArgoCD
Monitoring & Observability
Prometheus
Grafana
AlertManager
CloudWatch
Languages & OS
Python
Bash
Linux
Git
// system.architecture

How It All Connects

A live map of the infrastructure patterns I design, build, and operate daily.

CI / CD
GitHub Repo
push
GitHub Actions
build
Docker / ECR
sync
ArgoCD
deploy
EKS
Infra
Terraform
provision
VPC / Subnets
route
Route53 / ALB
traffic
EKS Cluster
persist
RDS / S3
Observability
EKS Metrics
scrape
Prometheus
visualise
Grafana
alert
AlertManager
page
PagerDuty
// ./projects

What I've Built

Real problems. Real infrastructure. Real impact.

Production EKS Cluster on AWS

Problem: Needed production-grade container orchestration with auto-scaling, zero-downtime deployments, and GitOps-driven delivery.

Architected a multi-AZ Amazon EKS cluster using Terraform modules. Integrated ArgoCD for GitOps continuous delivery, configured HPA/VPA for dynamic workload scaling, and set up AWS ALB Ingress Controller for intelligent traffic routing.

99.9% uptime · 40% cost reduction via right-sizing · Zero-downtime rolling updates
AWS EKSTerraformArgoCD HelmHPA/VPAALB

Zero-Downtime CI/CD Pipeline

Problem: Manual deployments taking 2+ hours, causing downtime windows and environment inconsistencies.

Built a fully automated CI/CD pipeline with GitHub Actions. Stages: lint → test → Docker build → ECR push → EKS rolling update → smoke test → Slack notification. Blue/Green deployment strategy eliminates all downtime windows.

Deploy time: 2 hrs → 8 min · 100% automated · Blue/Green strategy
GitHub ActionsDockerECR EKSBlue/Green

AWS Multi-Env Infrastructure as Code

Problem: Dev, staging, and prod were snowflake environments — manually built, inconsistent, impossible to reproduce reliably.

Designed reusable Terraform modules for VPC, EC2, RDS, IAM, ACM, and Route53. Remote state via S3 + DynamoDB locking, workspace-based environment separation, and Atlantis for PR-driven plan/apply approval workflow.

100% reproducible environments · 70% faster provisioning · Drift detection
TerraformVPCIAM Route53AtlantisS3 State

Full Observability Stack

Problem: Kubernetes cluster running blind — no metrics, no logs, no alerts. Issues discovered by users before ops team, with zero visibility into cluster health.

Prometheus + Grafana + Loki + AlertManager deployed on self-hosted k3s via GitOps (ArgoCD). Production-grade dashboards for Kubernetes API server, etcd, CoreDNS, kubelet, networking, and compute resources across cluster/namespace/pod/workload/node levels. Live at grafana.thesugu.com.

20+ dashboards live · Full cluster observability · GitOps-driven deployment
PrometheusGrafanaLoki AlertManagerArgoCDk3s
// terminal.sandbox

Interactive Terminal

A live DevOps playground. Type commands to explore my stack, projects, and credentials — or just try sudo hire sugu.

 sugu@aws-cloud:~ EKS: us-east-1  |  K8s: v1.28.5
sugu@cloud:~$
// credentials

Certifications

AWS Partner Technical Accredited

Amazon Web Services

2024

✓ Verified

DevOps & Software Engineering Fundamentals

IBM / Coursera

2023

✓ Verified

Google Cloud Fundamentals: Core Infrastructure

Google Cloud

2023

✓ Verified
// journey.log

My Journey

May 2025 – Present

Associate Cloud & DevOps Engineer

Seabed2Crest

  • Architecting and managing AWS infrastructure for production workloads
  • Building CI/CD pipelines with GitHub Actions + ArgoCD on EKS
  • Automating infrastructure provisioning with Terraform modules
  • Setting up full observability stack with Prometheus & Grafana
AWSEKS TerraformArgoCD
2023

AWS Cloud Intern

F13 Technologies

  • Configured and automated AWS EC2, S3, and IAM resources
  • Built CI/CD pipelines using Jenkins and automated deployment scripts
  • Containerized applications using Docker and managed on EC2
AWSDockerJenkins
2020 – 2024

B.E. Electronics & Computer Engineering

Reva University, Bangalore

  • Graduated with focus on computer systems and networking fundamentals
  • Self-studied cloud computing, Linux, and DevOps alongside coursework
  • Earned multiple cloud certifications during final year
LinuxNetworkingCloud
// get.in.touch

Let's Build Something
Reliable Together

Available for full-time & contract roles
Response < 24h Remote / Hybrid / Bangalore IST (UTC+5:30)