Built a production-style AWS environment using Infrastructure as Code and operational best practices. Provisioned a VPC with public subnet routing through an Internet Gateway, deployed an EC2 instance bootstrapped with NGINX via user data, and managed access securely using an IAM instance role and AWS Systems Manager (SSM) for remote administration (no persistent SSH dependency).
- Infrastructure as Code: Terraform-managed VPC, networking, security groups, EC2, and IAM role/profile.
- Secure Operations: SSM-based management and least-privilege IAM permissions for system access and automation.
- CI/CD Pipeline: GitHub Actions packages an artifact, uploads to S3, and triggers deployment via SSM Run Command.
- Observability: CloudWatch log groups with application/deploy logs shipping for troubleshooting and auditability; CloudTrail enabled.
- Incident-Driven Learning: Documented failure scenarios (e.g., IAM permission loss, service outage, deployment issues) with root cause, fix, and validation steps.
Tech: AWS (EC2, VPC, IAM, S3, SSM, CloudWatch, CloudTrail), Terraform, GitHub Actions, Bash, NGINX, Linux