-
ID
#6098349 -
Job type
Contract -
Salary
Depends on Experience -
Source
Apolis -
Date
2020-11-24 -
Deadline
2021-01-23
Docker Admin
North Carolina, Greensboro, 27395 Greensboro USAContract
Vacancy expired!
- Engine patching in rolling fashion (L1 scope, Can be executed with minimal to zero Docker knowledge)
- Engine health verifications after OS/kernel patching cycles (L1 scope, Can be executed with minimal to zero Docker knowledge)
- VMWare ESX Host VMs hardware, CommValt snapshot backups, networking, DRS, CPU/Mem related issues troubleshooting and coordination
- FireWall requests for Worker node IPs per new Services access necessities based on Cluster DNS Grouping approach
- Splunk monitoring for overall Host VMs health in a search for CPU/Mem/Network spikes
- UCP patching with even coordination
- UCP Console checks for exhaustive abnormalities on node resources and services; capture UCP support dumps
- DTRpatching with event coordination
- UCP RBAC, new org/team creation support
- DTRVulnerabilities Scan check verifications and corrective actions
- DTRpromotion/mirroring policies adjustments assistance
- Container Images integrity and layers verifications with general access troubleshooting
- DTRNFS storage adjustments per necessities
- UCP/DTR backup cycle verification for completeness and associated File system checks
- Be able to run DTRscripts for gathering node info, job runner info, toggleScan
- Performing Upgrade procedures via Puppet dedicated module when new release arrives
- Periodic access to Traefikee console on all Clusters for Licensing check and overall backend services status
- Labels verifications for services running under Ingress Proxy umbrella
- Compose files inspection for networking completeness allowing Data Nodes operate in full router fashion
- Re-deploying Traefikee per operational needs using Puppet Task via Enterprise Console
- Production services validation via dedicated URL digging through Ingress Proxy
- Verifying periodically Data and Control node services logs to detect abnormalities
- Add a new network to Traefik cluster for new apps requirement
- Secrets creation and verification
- Networking inspection in coordination with Traewfikee Data nodes routing for endpoint services
- Troubleshooting services with unhealthy replicas via direct service logs reviews
- Remote shared Volume mounts verification and troubleshooting (both CIFS and NFS)
- Inspecting Docker compose yaml files in Projects Bitbucket repos for issues mappings to resources and container components
- Splunk monitoring for Deployed Services resource compliance: CPU, Mem, Replica limits, AppDynamics injection into app stack via specified parameters
- Developing familiarity with Bamboo/Gitlab pipeline logistics and code for efficient troubleshooting
- Services removal and/or inspection per operational necessity
- Performing Service upgrades to new release
- Restart collector for dockercollector for docker service per operational necessities
Vacancy expired!
Report job