diff --git a/ansible/monitoring-fed.yml b/ansible/monitoring-fed.yml
new file mode 100644
index 0000000000000000000000000000000000000000..a247a8218769f9f3f5512c077879c34359b6736c
--- /dev/null
+++ b/ansible/monitoring-fed.yml
@@ -0,0 +1,6 @@
+- hosts: swarm-dashboard
+  become: yes
+  vars_files:
+    - ['{{ inventory_dir }}/secrets.yml']
+  roles:
+    - prometheus-fed
diff --git a/ansible/roles/kong-api/defaults/main.yml b/ansible/roles/kong-api/defaults/main.yml
index e35a1c489afd3232a0eb2c2dca028db934cbe753..9fa21be7539ef02c9dfaac8d67e225b03e9acf76 100644
--- a/ansible/roles/kong-api/defaults/main.yml
+++ b/ansible/roles/kong-api/defaults/main.yml
@@ -1393,6 +1393,22 @@ kong_apis:
       config.limit_by: credential
     - name: request-size-limiting
       config.allowed_payload_size: "{{ small_request_size_limit }}"
+  - name: removeUserFromBatch
+    uris: "{{ course_service_prefix }}/v1/batch/user/remove"
+    upstream_url: "{{ lms_service_url }}/v1/course/batch/users/remove"
+    strip_uri: true
+    plugins:
+    - name: jwt
+    - name: cors
+    - "{{ statsd_pulgin }}"
+    - name: acl
+      config.whitelist: courseUpdate
+    - name: rate-limiting
+      config.policy: local
+      config.hour: "{{ medium_rate_limit_per_hour }}"
+      config.limit_by: credential
+    - name: request-size-limiting
+      config.allowed_payload_size: "{{ small_request_size_limit }}"
   - name: getBatch
     uris: "{{ course_service_prefix }}/v1/batch/read"
     upstream_url: "{{ lms_service_url }}/v1/course/batch/read"
@@ -1409,6 +1425,22 @@ kong_apis:
       config.limit_by: credential
     - name: request-size-limiting
       config.allowed_payload_size: "{{ small_request_size_limit }}"
+  - name: getParticipants
+    uris: "{{ course_service_prefix }}/v1/batch/participants/list"
+    upstream_url: "{{ lms_service_url }}/v1/batch/participants/list"
+    strip_uri: true
+    plugins:
+    - name: jwt
+    - name: cors
+    - "{{ statsd_pulgin }}"
+    - name: acl
+      config.whitelist: courseUser
+    - name: rate-limiting
+      config.policy: local
+      config.hour: "{{ medium_rate_limit_per_hour }}"
+      config.limit_by: credential
+    - name: request-size-limiting
+      config.allowed_payload_size: "{{ small_request_size_limit }}"
   - name: assignRole
     uris: "{{ user_service_prefix }}/v1/role/assign"
     upstream_url: "{{ learning_service_url }}/v1/user/assign/role"
@@ -1521,6 +1553,22 @@ kong_apis:
       config.limit_by: credential
     - name: request-size-limiting
       config.allowed_payload_size: "{{ small_request_size_limit }}"
+  - name: batchBulkUnEnrolment
+    uris: "{{ course_service_prefix }}/v1/batch/bulk/unenrollment"
+    upstream_url: "{{ lms_service_url }}/v1/batch/bulk/unenrollment"
+    strip_uri: true
+    plugins:
+    - name: jwt
+    - name: cors
+    - "{{ statsd_pulgin }}"
+    - name: acl
+      config.whitelist: orgAdmin
+    - name: rate-limiting
+      config.policy: local
+      config.hour: "{{ medium_rate_limit_per_hour }}"
+      config.limit_by: credential
+    - name: request-size-limiting
+      config.allowed_payload_size: "{{ small_request_size_limit }}"
   - name: getTenantInfo
     uris: "{{ org_service_prefix }}/v1/tenant/info"
     upstream_url: "{{ player_service_url }}/v1/tenant/info"
diff --git a/ansible/roles/kong-consumer/defaults/main.yml b/ansible/roles/kong-consumer/defaults/main.yml
index f98eec6c82b29427e5e5dd9e07d7934363ae2506..2f2d88b41fd17d9bc065028847ee3554728e4a46 100644
--- a/ansible/roles/kong-consumer/defaults/main.yml
+++ b/ansible/roles/kong-consumer/defaults/main.yml
@@ -18,6 +18,7 @@ mobile_device_groups:
   - domainUser
   - dataUpdate
   - dialcodeUser
+  - echoUser
 
 integration_partner_groups:
   - echoUser
diff --git a/ansible/roles/prometheus-fed/defaults/main.yml b/ansible/roles/prometheus-fed/defaults/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..870313d517c4d022fba820671a8931c4582dd99b
--- /dev/null
+++ b/ansible/roles/prometheus-fed/defaults/main.yml
@@ -0,0 +1,19 @@
+prometheus_reservation_memory: 1G
+prometheus_limit_memory: 1G
+prometheus_storage_retention_time: 90d
+
+enable_scraping_docker_metrics: false
+docker_metrics_port: "2377"
+monitor_stack_files_dest_dir: /opt/docker/stacks/prom_fed/stacks
+monitor_config_files_dest_dir: /opt/docker/stacks/prom_fed/config
+
+monitor_config_templates:
+  - prometheus.yml
+
+prometheus_route_prefix: prometheus
+prometheus_web_external_url: "{{proto}}://{{api__host}}:29090/{{ prometheus_route_prefix }}"
+
+root_group: root
+root_owner: root
+backup_storage_name: prometheus_backup
+prometheus_storage_location: /root/dockerdata/prometheus_fed/data/
diff --git a/ansible/roles/prometheus-fed/tasks/main.yml b/ansible/roles/prometheus-fed/tasks/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..9962dafc0aa93681aeb5686bb64eb3c12fdf6a60
--- /dev/null
+++ b/ansible/roles/prometheus-fed/tasks/main.yml
@@ -0,0 +1,54 @@
+---
+- name: Create prometheus data dir
+  file:
+    path: "{{ prometheus_storage_location }}"
+    state: directory
+    mode: 0755
+    owner: 'nobody'
+    group: 'nogroup'
+
+- name: Ensure stack directory exists
+  file:
+    path: "{{ monitor_stack_files_dest_dir }}"
+    state: directory
+    owner: '{{ root_owner }}'
+    group: '{{ root_group }}'
+
+- name: Ensure config directory exists
+  file:
+    path: "{{ monitor_config_files_dest_dir }}"
+    state: directory
+    owner: '{{ root_owner }}'
+    group: '{{ root_group }}'
+
+- name: Save stack file
+  template:
+    src: stack-monitor.yml
+    dest: "{{ monitor_stack_files_dest_dir }}/monitor.yml"
+    mode: 0644
+
+- name: Save prometheus config fed_{{ item }}
+  template:
+    src="{{ item }}"
+    dest="{{ monitor_config_files_dest_dir }}/{{ item }}" 
+    mode=0644
+  with_items: 
+    - "{{ monitor_config_templates }}"
+
+- name: Remove monitor stack
+  shell: "docker stack rm prometheus_fed"
+  ignore_errors: yes
+
+- name: Remove old docker config fed_{{ item }}
+  shell: "docker config rm fed_{{ item }}"
+  with_items: "{{ monitor_config_templates }}"
+  ignore_errors: yes
+
+- name: Save docker config fed_{{ item }}
+  shell: "docker config create fed_{{ item }} {{ monitor_config_files_dest_dir }}/{{ item }}"
+  with_items: "{{ monitor_config_templates }}"
+
+- name: Deploy stack
+  shell: "docker stack deploy -c monitor.yml prometheus_fed"
+  args:
+    chdir: "{{ monitor_stack_files_dest_dir }}"
diff --git a/ansible/roles/prometheus-fed/templates/prometheus.yml b/ansible/roles/prometheus-fed/templates/prometheus.yml
new file mode 100644
index 0000000000000000000000000000000000000000..6857f3f4c1cb9877dbb7b2bf3ae0ba1fd790b3a1
--- /dev/null
+++ b/ansible/roles/prometheus-fed/templates/prometheus.yml
@@ -0,0 +1,45 @@
+global:
+  scrape_interval: 1m
+  scrape_timeout: 10s
+  evaluation_interval: 1m
+  # Clustername is defined for multi swarm cluster
+  # can name first cluster as DS1 and 2nd as DS2 ... DSn
+  # all metrics will have label as cluster: < value >
+  # This value won't be accessible from GUI but for external tools like
+  # federation or alertmanager
+  external_labels:
+    federation: fed1
+
+
+scrape_configs:
+
+  {% if enable_scraping_docker_metrics %}
+  # This empty line ensures indentation is correct after ansible jinja2 template is materialized
+  - job_name: 'docker'
+    static_configs:
+      - targets: {{ groups['swarm-manager'] | map('regex_replace', '^(.*)$', '\\1:' + docker_metrics_port ) | list | to_yaml }}
+    metric_relabel_configs:
+      - source_labels: [__name__]
+        regex: 'grpc_.*'
+        action: drop
+  {% endif %}
+
+
+  - job_name: 'federate'
+    metrics_path: /prometheus/federate
+    honor_labels: true
+    params:
+      match[]:
+        - '{__name__=~"nginx_.*"}'
+        - '{__name__=~"kong_.*"}'
+        - '{__name__=~"node_.*"}'
+    static_configs:
+      {# groups[alertmanager] and prometheus are same machines #}
+      {# and alertmanagers will be unique per swarm #}
+      # This empty line make sure the indentation is correct
+      - targets: [ '{{groups['alertmanager']|join(':9090\', \'')}}:9090', '{{groups['alertmanager_stateful']|join(':19090\', \'')}}:19090' ]
+
+  - job_name: 'vm-node-exporter'
+    static_configs:
+      - targets: ["{{ansible_host}}:9100"]
+
diff --git a/ansible/roles/prometheus-fed/templates/stack-monitor.yml b/ansible/roles/prometheus-fed/templates/stack-monitor.yml
new file mode 100644
index 0000000000000000000000000000000000000000..f9795b5ee2f925fe378441dcc94bfa1295ffcdbb
--- /dev/null
+++ b/ansible/roles/prometheus-fed/templates/stack-monitor.yml
@@ -0,0 +1,31 @@
+version: "3.3"
+
+services:
+    prometheus:
+        image: quay.io/prometheus/prometheus:v2.8.1
+        ports:
+            - "29090:9090"
+        networks:
+            - application_default
+        volumes:
+            - {{prometheus_storage_location}}:/prometheus
+        command: "--config.file=/etc/prometheus/prometheus.yml --storage.tsdb.path=/prometheus --web.console.libraries=/etc/prometheus/console_libraries  --storage.tsdb.retention.time={{prometheus_storage_retention_time}} --web.console.templates=/etc/prometheus/consoles --web.route-prefix={{prometheus_route_prefix}} --web.external-url={{prometheus_web_external_url}} --web.enable-admin-api"
+        configs:
+            - source: fed_prometheus.yml
+              target: /etc/prometheus/prometheus.yml
+        deploy:
+            replicas: 1
+            resources:
+              reservations:
+                memory: "{{ prometheus_reservation_memory }}"
+              limits:
+                memory: "{{ prometheus_limit_memory }}"
+
+configs:
+  fed_prometheus.yml:
+    external: true
+
+networks:
+    application_default:
+        external: true
+
diff --git a/ansible/roles/stack-proxy/templates/nginx.conf b/ansible/roles/stack-proxy/templates/nginx.conf
index 566be10a09d34e0c9f3631f6df4ea96464d563cb..ff5ee83d09534cf212f10531956deb7aad6e19a9 100644
--- a/ansible/roles/stack-proxy/templates/nginx.conf
+++ b/ansible/roles/stack-proxy/templates/nginx.conf
@@ -45,7 +45,7 @@ http {
     #tcp_nopush     on;
     client_max_body_size 60M;
 
-    keepalive_timeout  500s;
+    keepalive_timeout  65s;
     keepalive_requests 200;
 
     # Nginx connection limit per ip
diff --git a/ansible/roles/stack-proxy/templates/proxy-default.conf b/ansible/roles/stack-proxy/templates/proxy-default.conf
index bf750cedfe89556d30b87371ba2c675e0b372bcc..c489c283da8f7a323d7ad53c5c164a02a5547027 100644
--- a/ansible/roles/stack-proxy/templates/proxy-default.conf
+++ b/ansible/roles/stack-proxy/templates/proxy-default.conf
@@ -49,8 +49,18 @@ server {
   location ~* ^/auth/realms/(.+)/clients-registrations/ {
     return 301 {{proto}}://$host/api/auth/v1/realms/$1/clients-registrations/;
   }
+
   location ~* ^/auth/v1/refresh/token  {
-    return 301 {{proto}}://{{ proxy_server_name }};
+    set $target http://player:3000;
+    rewrite ^/auth/(.*) /auth/$1 break;
+    proxy_pass $target;
+    
+    proxy_set_header Host $host;
+    proxy_set_header X-Real-IP $remote_addr;
+    proxy_set_header X-Scheme $scheme;
+    proxy_set_header X-Forwarded-For   $proxy_add_x_forwarded_for;
+    proxy_set_header X-Forwarded-Proto $scheme;
+
   }
  
   location ~* ^/auth/admin/master/console/ {
diff --git a/deploy/gitOPS/README.md b/deploy/gitOPS/README.md
new file mode 100644
index 0000000000000000000000000000000000000000..65e8cdf33dcb97c528e60ae565895a68edbc944c
--- /dev/null
+++ b/deploy/gitOPS/README.md
@@ -0,0 +1,10 @@
+# Using scripts:
+
+- All the scripts are using the github api's.
+- All the scripts will take github.csv file as input and read each line to get the values of all variables
+- First udpate github.csv file row wise and run the scripts
+- In github.csv there are 4 variables with comma seperated 
+
+     REPO_NAME,BRANCH_NAME,MERGE_ACCESS_USERS(;),CHECKS
+     
+     MERGE_ACCESS_USERS and CHECKS: These variables are required only by disableBranchProtection.sh script.
diff --git a/deploy/gitOPS/deleteBranches.sh b/deploy/gitOPS/deleteBranches.sh
new file mode 100644
index 0000000000000000000000000000000000000000..b635d0388683ab2beb19f3ae64ac8b4acc013518
--- /dev/null
+++ b/deploy/gitOPS/deleteBranches.sh
@@ -0,0 +1,14 @@
+#!/bin/bash
+read -p "Enter Github Username: " user
+read -sp "Enter Github Password: " pass
+echo " "
+IFS=','
+grep -v -e '#' -e "^$" github.csv | while read -ra LINE
+do
+   repo_name="${LINE[0]}"
+   branch_name="${LINE[1]}"
+   echo "----------------------------------------------------"
+   echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m'
+   echo "----------------------------------------------------"
+   curl -u $user:$pass -XDELETE https://api.github.com/repos/project-sunbird/$repo_name/git/refs/heads/$branch_name
+done
diff --git a/deploy/gitOPS/disableBranchProtection.sh b/deploy/gitOPS/disableBranchProtection.sh
new file mode 100644
index 0000000000000000000000000000000000000000..1e4e040281f708cb64118693b66c3bb0cd71da29
--- /dev/null
+++ b/deploy/gitOPS/disableBranchProtection.sh
@@ -0,0 +1,24 @@
+#!/bin/bash
+read -p "Enter Github Username: " user
+read -sp "Enter Github Password: " pass
+echo " "   
+IFS=','
+grep -v -e '#' -e "^$" github.csv | while read -ra LINE
+do
+   repo_name="${LINE[0]}"
+   branch_name="${LINE[1]}"
+   echo "----------------------------------------------------"
+   echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m'
+   echo "----------------------------------------------------"
+   curl -u $user:$pass -XDELETE \
+      -H "Accept: application/vnd.github.loki-preview+json" \
+      -d '{
+      "protection": {
+        "enabled": null
+      },
+        "restrictions": null,
+        "required_status_checks": null,
+        "enforce_admins": null,
+        "required_pull_request_reviews": null
+    }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection"
+done
diff --git a/deploy/gitOPS/enableBranchProtection.sh b/deploy/gitOPS/enableBranchProtection.sh
new file mode 100644
index 0000000000000000000000000000000000000000..1eda8d728bc3b657258d7c63a1ca342fe08c0d2b
--- /dev/null
+++ b/deploy/gitOPS/enableBranchProtection.sh
@@ -0,0 +1,62 @@
+#!/bin/bash -xv
+read -p "Enter the github username: " user
+read -sp "Enter the password: " pass
+echo " "
+statusChecks=0
+IFS=','
+#read input from a file
+grep -v -e '#' -e "^$" github.csv | while read -ra LINE
+do
+   repo_name="${LINE[0]}"
+   branch_name="${LINE[1]}"
+   users="${LINE[2]}"
+   check="${LINE[3]}"
+unset IFS
+Users=\"$users\"
+githubUsers=$(echo $Users | sed 's/;/\",\"/g')
+echo "------------------------------------------------------------------"
+echo -e '\033[0;32m'$repo_name $branch_name $githubUsers $check'\033[0m'
+echo "------------------------------------------------------------------"
+IFS=','
+if [[ $check == "1" ]]; then
+        statusChecks='"Codacy/PR Quality Review"'
+elif [[ $check == "2" ]]; then
+        statusChecks='"ci/circleci: build"'
+elif [[ $check == "3" ]]; then
+        statusChecks='"Codacy/PR Quality Review",
+                      "ci/circleci: build"'
+else
+        echo "Provide correct value!"
+fi
+
+curl -u $user:$pass -XPUT \
+     -H 'Accept: application/vnd.github.luke-cage-preview+json' \
+     -d '{
+      "protection": {
+        "enabled": true
+      },
+
+      "enforce_admins": true,
+      "required_pull_request_reviews": {
+          "dismiss_stale_reviews": true,
+          "require_code_owner_reviews": false,
+          "required_approving_review_count": 1
+      },
+
+      "required_status_checks": {
+          "strict": true,
+            "contexts": [
+              '"$statusChecks"'
+            ]
+      },
+      
+      "restrictions": {
+          "users": [
+            '"$githubUsers"'
+          ],
+          "teams": [
+            "null"
+          ]
+      }
+    }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection"
+done
diff --git a/deploy/gitOPS/enableBranchProtection.sh_bak b/deploy/gitOPS/enableBranchProtection.sh_bak
new file mode 100644
index 0000000000000000000000000000000000000000..4073fea0742c17c4668c14e3940cacc5fe668669
--- /dev/null
+++ b/deploy/gitOPS/enableBranchProtection.sh_bak
@@ -0,0 +1,57 @@
+#!/bin/bash
+read -p "Enter the username: " user
+read -sp "Enter the password:" pass
+echo " "
+read -p "Enter the repo name:" repo_name
+read -p "Enter the branch name:" branch_name
+echo -e "status check: \n 1. codacy \n 2. circleci \n 3. both"
+read -p "enter number:" check
+check=${check:-3}
+statusChecks=0
+read -p "enter username for merge access:" users
+Users=\"$users\"
+githubUsers=$(echo $Users | sed 's/,/\",\"/g')
+
+if [[ $check == "1" ]]; then
+        statusChecks='"Codacy/PR Quality Review"'
+elif [[ $check == "2" ]]; then
+	statusChecks='"ci/circleci: build"'
+elif [[ $check == "3" ]]; then
+	statusChecks='"Codacy/PR Quality Review",
+                      "ci/circleci: build"'
+else
+	echo "Select correct option!"
+fi
+echo $statusChecks
+echo $githubUsers
+
+curl -u $user:$pass -XPUT \
+     -H 'Accept: application/vnd.github.luke-cage-preview+json' \
+     -d '{
+      "protection": {
+        "enabled": true
+      },
+
+      "enforce_admins": true,
+      "required_pull_request_reviews": {
+          "dismiss_stale_reviews": true,
+          "require_code_owner_reviews": false,
+          "required_approving_review_count": 1
+      },
+
+      "required_status_checks": {
+          "strict": true,
+            "contexts": [
+              '"$statusChecks"'
+            ]
+      },
+      
+      "restrictions": {
+          "users": [
+            '"$githubUsers"'
+          ],
+          "teams": [
+            "null"
+          ]
+      }
+    }' "https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection"
diff --git a/deploy/gitOPS/getBranchProtection.sh b/deploy/gitOPS/getBranchProtection.sh
new file mode 100644
index 0000000000000000000000000000000000000000..a9f0c206bb7a9a10dbc6750fcc409a5cf181c924
--- /dev/null
+++ b/deploy/gitOPS/getBranchProtection.sh
@@ -0,0 +1,14 @@
+#!/bin/bash
+read -p "Enter Github Username: " user
+read -sp "Enter Github Password: " pass
+echo " "
+IFS=','
+grep -v -e '#' -e "^$" github.csv | while read -ra LINE
+do
+   repo_name="${LINE[0]}"
+   branch_name="${LINE[1]}"
+   echo "----------------------------------------------------"
+   echo -e '\033[0;32m'$repo_name' '$branch_name'\033[0m'
+   echo "----------------------------------------------------"
+   curl -u $user:$pass -XGET https://api.github.com/repos/project-sunbird/$repo_name/branches/$branch_name/protection
+done
diff --git a/deploy/gitOPS/getBranches.sh b/deploy/gitOPS/getBranches.sh
new file mode 100644
index 0000000000000000000000000000000000000000..caffb6a1a4482ef1beecff588ff46c7d5729360f
--- /dev/null
+++ b/deploy/gitOPS/getBranches.sh
@@ -0,0 +1,13 @@
+#!/bin/bash
+read -p "Enter Github Username: " user
+read -sp "Enter Github Password: " pass
+echo " "
+IFS=','
+grep -v -e '#' -e "^$" github.csv | while read -ra LINE
+do
+   repo_name="${LINE[0]}"
+   echo "----------------------------------------------------"
+   echo -e '\033[0;32m'$repo_name'\033[0m'
+   echo "----------------------------------------------------"
+   curl -u $user:$pass -s -N https://api.github.com/repos/project-sunbird/$repo_name/branches | jq '.[].name' -r
+done
diff --git a/deploy/gitOPS/getRepos.sh b/deploy/gitOPS/getRepos.sh
new file mode 100644
index 0000000000000000000000000000000000000000..509400d7d6d763f0b20cec9c9054b3d9213591d9
--- /dev/null
+++ b/deploy/gitOPS/getRepos.sh
@@ -0,0 +1,9 @@
+#!/bin/bash
+read -p "Enter Github Username: " user
+read -sp "Enter Github Password: " pass
+echo " "
+read -p "Enter Github Account Name: " acc_name
+echo "---------------------------------------------"
+echo -e '\033[0;32m'$acc_name'\033[0m'
+echo "---------------------------------------------"
+curl -s -N https://api.github.com/users/$acc_name/repos\?per_page=100 | jq '.[].name' -r
diff --git a/deploy/gitOPS/github.csv b/deploy/gitOPS/github.csv
new file mode 100644
index 0000000000000000000000000000000000000000..64bf495ac6bda48ed71b3d6163cecaaa9fe8f2b8
--- /dev/null
+++ b/deploy/gitOPS/github.csv
@@ -0,0 +1,13 @@
+#REPO_NAME,BRANCH_NAME,MERGE_ACCESS_USERS(;),CHECKS
+sunbird-lms-service,jenkins-test,harshavardhanc;abcb,3
+
+
+
+
+
+
+
+
+#NOTE:
+#MERGE_ACCESS_USERS SHOULD BE (;) seperated
+#CHECKS: 1.codacy 2.cirleci 3.both
diff --git a/deploy/utilities/getEsData.sh b/deploy/utilities/getEsData.sh
new file mode 100644
index 0000000000000000000000000000000000000000..48041b2849258708194f5c8cbb45c5dc94c9b0fd
--- /dev/null
+++ b/deploy/utilities/getEsData.sh
@@ -0,0 +1,20 @@
+#!/bin/bash
+####################################################
+#  Author S M Y ALTAMASH <smy.altamash@gmail.com>  #
+# Script gets the Latest Logs of proxy from Log-es #
+####################################################
+# NOTE: Have jq installed before running this script
+for index in $(curl -s localhost:9200/_cat/indices | grep -v kibana | awk '{print $3}' | tr "\n" " ");
+do
+        echo "Index:$index"
+        # Get the Total Hits for the Proxy Container
+        hits=$(curl -s -X GET "http://localhost:9200/$index/_search?pretty" -H 'Content-Type: application/json' -d'{"query":{"match":{"program":"proxy_proxy*"}}}' | jq '.hits.total')
+
+        # Increase the query size
+        curl -XPUT "http://localhost:9200/$index/_settings" -d "{ \"index\" : { \"max_result_window\" : \"$hits\" } }" -H "Content-Type: application/json"
+
+        # Save the Logs in the file
+        curl -s -X GET "http://localhost:9200/$index/_search?size=$hits" -H 'Content-Type: application/json' -d'{"query":{"match":{"program":"proxy_proxy*"}}}' > $index.json
+        echo "################################"
+done
+
diff --git a/pipelines/deploy/monitor/prom-fed/Jenkinsfile b/pipelines/deploy/monitor/prom-fed/Jenkinsfile
new file mode 100644
index 0000000000000000000000000000000000000000..0294ea7c2127e02abc5ee26b1882e3d629ece38a
--- /dev/null
+++ b/pipelines/deploy/monitor/prom-fed/Jenkinsfile
@@ -0,0 +1,38 @@
+@Library('deploy-conf') _
+node() {
+    try {
+        String ANSI_GREEN = "\u001B[32m"
+        String ANSI_NORMAL = "\u001B[0m"
+        String ANSI_BOLD = "\u001B[1m"
+        String ANSI_RED = "\u001B[31m"
+        String ANSI_YELLOW = "\u001B[33m"
+
+        stage('checkout public repo') {
+            cleanWs()
+            checkout scm
+        }
+
+        ansiColor('xterm') {
+            stage('deploy'){
+                values = [:]
+                currentWs = sh(returnStdout: true, script: 'pwd').trim()
+                envDir = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-3].trim()
+                module = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-2].trim()
+                jobName = sh(returnStdout: true, script: "echo $JOB_NAME").split('/')[-1].trim()
+                ansiblePlaybook = "${currentWs}/ansible/monitoring-fed.yml"
+                ansibleExtraArgs = "--vault-password-file /var/lib/jenkins/secrets/vault-pass -v"
+		values.put('currentWs', currentWs)
+                values.put('env', envDir)
+                values.put('module', module)
+                values.put('jobName', jobName)
+                values.put('ansiblePlaybook', ansiblePlaybook)
+                values.put('ansibleExtraArgs', ansibleExtraArgs)
+                println values
+                ansible_playbook_run(values)
+            }
+        }
+    }
+    catch (err) {
+        throw err
+    }
+}
\ No newline at end of file