Girmiti Bridge the gap between Development and IT Operation teams with proven DevOps practises our team has experience in consulting our customers in this business by architecting, designing, executing solutions for our customers.
Leverage the Team Experience on Datacenter Support on Application Hosting to define the process to plan, test, compare and control the deliverable’s
The DCSAH Services Architecture design followed that are provided for the all level of the application infrastructure design and Prepare the Low level design and High Level Design adhering to CIS and PCI and OWASP Security Best Practices
We provide basis of recommendations and Justifications documents and Prepare plan for the clients across Globe
Documentation is part of Services Support right from the Plan, HLD, LLD, Hardening, Configuration, RunBook Preparation across all the environments.
Girmiti follows best practices and tools in DataCenter deployments-
Virtual Private Cloud – Initial setup to isolate the environment
Virtual Machines, Docker Container or Kubernetes Engine – Instance for Application Servers setup
Redis Sentinel or Cluster – use of Redis cache with HA for Database and oAuth tokens
OpenWhisk and Fission – to Automate the Deployment or Serverless Functions
Netscaler or HAProxy Load Balancing – Use of Load balancer with VIP’s when required
SAN or NAS or ISCSI for storage of artifacts and logs and Backups and archival’s with encryption
VMWare or CPanel tool or Terraform Templates driven with parallel deployment of Infrastructure resources on different regional datacenters or Hybrid connectivity to Cloud
Application Monitoring using Elastic Search and APM Plugins, and Appdynamic or StackTrace or NewRelic or nmon system monitoring
Log Management using firebeat Scripts for Elastic Search logging and Monitoring
Security with regular check by openVas Security Scanner, Nessus Security Audit, Firewall or Metaspoilt or Load Balancer Logging, Firewall Rules to lock down the incoming and outgoing requests and PCI Check List
OS – Choose of CIS Hardening operating system or use the custom CIS scripts to harden the OS and Application Server.
High Availability using Nginx, HAproxy and Apache Benchmark Testing considering all the components in the infrastructure
Health check per application and alerts using Nagios logging and Monitoring
KeyCloak with open-idconnect or SAML authentication with VPN Gateway and two factor authentications using MPA for Console and Logins
Database high availability using HAProxy or DataStream or DataGuard with Backup and restore and archival.
OS Level full disk encryption and data encryption-at-rest using TDE and secure logs for sensitive data
Patch Management using Security use of CIS hardening scripts and yum-cron
For detailed information visit Read more..
For more information please contact us at firstname.lastname@example.org