Girmiti Bridge the gap between Development and IT Operation teams with proven DevOps practises our team has experience in consulting our customers in this business by architecting, designing, executing solutions for our customers.

Scale up software development with DevOps Solutions and Services

Leverage the Team Experience on Datacenter Support on Application Hosting to define the process to plan, test, compare and control the deliverable’s

The DCSAH Services Architecture design followed that are provided for the all level of the application infrastructure design and Prepare the Low level design and High Level Design adhering to CIS and PCI and OWASP Security Best Practices

We provide basis of recommendations and Justifications documents and Prepare plan for the clients across Globe

Documentation is part of Services Support right from the Plan, HLD, LLD, Hardening, Configuration, RunBook Preparation across all the environments.

Girmiti follows best practices and tools in DataCenter deployments-

  • Virtual Private Cloud – Initial setup to isolate the environment

  • Virtual Machines, Docker Container or Kubernetes Engine – Instance for Application Servers setup

  • Redis Sentinel or Cluster – use of Redis cache with HA for Database and oAuth tokens

  • OpenWhisk and Fission – to Automate the Deployment or Serverless Functions

  • Netscaler or HAProxy Load Balancing – Use of Load balancer with VIP’s when required

  • SAN or NAS or ISCSI for storage of artifacts and logs and Backups and archival’s with encryption

  • VMWare or CPanel tool or Terraform Templates driven with parallel deployment of Infrastructure resources on different regional datacenters or Hybrid connectivity to Cloud

  • Application Monitoring using Elastic Search and APM Plugins, and Appdynamic or StackTrace or NewRelic or nmon system monitoring

  • Log Management using firebeat Scripts for Elastic Search logging and Monitoring

  • Security with regular check by openVas Security Scanner, Nessus Security Audit, Firewall or Metaspoilt or Load Balancer Logging, Firewall Rules to lock down the incoming and outgoing requests and PCI Check List

  • OS – Choose of CIS Hardening operating system or use the custom CIS scripts to harden the OS and Application Server.

  • High Availability using Nginx, HAproxy and Apache Benchmark Testing considering all the components in the infrastructure

  • Health check per application and alerts using Nagios logging and Monitoring

  • KeyCloak with open-idconnect or SAML authentication with VPN Gateway and two factor authentications using MPA for Console and Logins

  • Database high availability using HAProxy or DataStream or DataGuard with Backup and restore and archival.

  • OS Level full disk encryption and data encryption-at-rest using TDE and secure logs for sensitive data

  • Patch Management using Security use of CIS hardening scripts and yum-cron

For detailed information visit Read more..

For more information please contact us at




Contact Us