02

Kubernetes & GitOps

Kubernetes is my core platform. I manage production clusters running 29+ microservices across dev, UAT, and prod environments. I've implemented ArgoCD App-of-Apps patterns, designed Helm umbrella charts for cohesive multi-service deploys, and built the GitOps workflows that eliminate configuration drift.

  • ArgoCD App-of-Apps pattern
  • Helm umbrella chart design
  • GitOps deployment workflows
  • Namespace & RBAC management
  • Persistent storage (PV/PVC/StorageClass)
  • HPA, resource quotas, pod policies
  • CNI: Canal → Cilium/eBPF migration
  • NetworkPolicy design
03

CI/CD & Automation

I build pipelines that teams trust. My GitLab CI/CD pipelines handle multi-chart Helm deployments with environment-aware promotion, parallel job safety via resource groups, Slack notifications with structured blocks, and artifact caching strategies that keep build times tight.

  • GitLab CI/CD pipeline architecture
  • GitHub Actions workflows
  • Parallel job race condition handling
  • Helm chart versioning & OCI registry
  • Blue-green & canary deployments
  • Slack notification integration
  • Environment-aware pipeline promotion
  • Pipeline performance optimization
04

DevSecOps & Secrets Management

Security is integrated into my engineering workflow, not layered on afterward. I work extensively with HashiCorp Vault for KV v2 secrets management, loading secrets at application startup via SDK rather than injecting into environment variables. mTLS with Istio, network security with Cilium eBPF, and shift-left testing in CI pipelines.

  • HashiCorp Vault KV v2 integration
  • Vault audit log analysis
  • Istio mTLS & service mesh
  • Cilium eBPF network security
  • SAST/DAST pipeline integration
  • Compliance automation (kube-bench)
  • .NET SDK Vault secret injection
  • Azure Key Vault CSI driver
05

Observability & Monitoring

I implement full-stack observability stacks that surface actionable signals. Prometheus and Grafana for metrics and alerting, Elastic Stack for log aggregation, and Elastic APM for distributed tracing across .NET microservices. Observability is the lens through which I validate every infrastructure change.

  • Prometheus + kube-prometheus-stack
  • Grafana dashboard design
  • Elastic Stack on Kubernetes
  • Elastic APM (.NET distributed tracing)
  • Alertmanager configuration
  • Log pipeline architecture
  • Hubble (Cilium) L3/L4/L7 visibility
  • SLO/SLI definition
06

Infrastructure as Code

All infrastructure is code. I use Terraform for declarative cloud resource provisioning and Ansible for configuration management and cluster bootstrapping (Kubespray). Treating infrastructure as versioned, reviewable, and testable code is not optional — it's the foundation of operational confidence.

  • Terraform multi-cloud provisioning
  • Ansible playbook development
  • Kubespray cluster bootstrapping
  • State management & remote backends
  • Module design patterns
  • IaC security scanning
  • Drift detection
  • WSL2 / Linux toolchain workflows
MK
Mehmet's AI Assistant
Online

Ask me anything about Mehmet's technical expertise and experience.