I don't think of DevOps as a toolchain. I think of it as a feedback loop β the shorter the loop between writing code and running it reliably in production, the better the engineering culture.
Most of my work lives in that gap:
- Infrastructure that's consistent and auditable, not click-ops and hope
- Pipelines that catch problems early, not after the on-call gets paged
- Observability that tells you why something broke, not just that it did
- Access patterns that follow least-privilege by design, not by afterthought
"The goal isn't automation for its own sake. It's reducing the cognitive load on engineers so they can focus on what actually matters."
current_role: Lead DevOps Engineer (Kavia AI)
primary_focus:
- Scaling EKS environments for AI workloads
- Hardening CI/CD pipelines for safer, faster releases
- Improving Terraform module structure and remote state management
exploring:
- GitOps patterns with ArgoCD
- eBPF-based observability tooling
- Cost attribution and FinOps practices on AWS
open_to:
- Platform engineering collaborations
- DevOps consulting on AWS and Kubernetes
- Open source contributions in the cloud-native spaceThese are the tools I reach for daily and the ones I've built production systems with:
Cloud & Platform
Delivery & Automation
Observability
Not a portfolio dump β just a few problems I found genuinely interesting to solve:
ποΈ Multi-AZ EKS from scratch with Terraform
Built the full stack: VPC, subnets, OIDC federation, managed node groups, autoscaling, and add-ons. The goal was a platform another team could onboard onto without needing to understand the underlying AWS plumbing.
β‘ Cut deployment cycle time by 40%
Replaced manual release steps with end-to-end Jenkins + GitHub Actions pipelines β Docker multi-stage builds, ECR image scanning, Helm rolling deploys, and automated rollback gates. Less toil, fewer incidents.
π Observability stack that teams actually used
Deployed Prometheus + Grafana + Loki on Kubernetes. The difference wasn't the tools β it was building dashboards around questions engineers actually asked, not metrics that were just available.
π IAM patterns that don't break things six months later
Designed least-privilege role structures with OIDC service accounts, audit logging via CloudTrail, and Security Hub compliance workflows. The real win was making it easy for developers to request access correctly, not just saying no.
- π± Started as a network engineer β that foundation shapes how I think about security, latency, and failure modes in ways that pure cloud engineers sometimes miss
- π§± I prefer boring, reliable infrastructure over clever infrastructure. Clever is a liability at 2am
- π I write notes on problems I've debugged β it's the fastest way I know to learn something properly
- π Based in Ahmedabad, India β open to remote-first roles globally
If something here resonates, feel free to reach out β always happy to talk platform engineering, Kubernetes war stories, or AWS cost surprises.