Girmiti Bridge the gap between Development and IT Operation teams with proven DevOps practises
Girmiti team leverage the Google Cloud Platform Services to define the process to plan, test, compare and control the deliverables.
The GCP Services Reference Architecture is followed which are provided for all levels of the application infrastructure design and prepare the Low level design and High Level Design adhering to CIS and GCP Security Best Practices.
We provide basis of recommendations and justifications documents and Prepare plan for the clients across Globe
Documentation is part of GCP Services Support right from the Plan, HLD, LLD, Hardening, Configuration, RunBook Preparation across all the environments.
Use of the best practices tools in Google Cloud Platform
Virtual Private Cloud – Initial setup to isolate the environment
Compute / APP / Kubernetes Engine – Instance for Application Servers setup or for dockers
Cloud Memorystore – use of Redis cache for Database and oAuth tokens
Cloud Functions – to Automate the Deployment or Serverless Functions
Cloud Load Balancing – Use of Load balancer with Worldwide Autoscaling when required
Cloud Storage for storage of artifacts and logs and Backups and archival with encryption
Cloud Deployment Manager or Terraform for Templates driven with parallel deployment of Infrastructure resources on different region
Application Monitoring using Elastic Search and APM plugins, and Appdynamic or StackTrace or NewRelic
Log Management using Scripts for Elastic Search or Stackdriver logging and Monitoring
Security with regular check by Cloud Platform Security, Google Cloud Audit Logging, Firewall Rules to lock down the incoming and outgoing requests and PCI Check List and Full Managed Cloud KMS and HSM
OS – Choose of CIS Hardening operating system or use the custom CIS scripts to harden the OS and Application Server.
High Availability Testing considering all the components in the infrastructure
Health check per application and alerts using StackDrivers logging and Monitoring
VPN Gateway and two factor authentications using MPA for Console and Logins
Database high availability and Backup and restore
Full disk encryption and data encryption-at-rest and secure logs for sensitive data
Vulnerability Scan and Patch Management using Cloud Security Scanner, Container Security and use of Shielded VMs along with Cloud IAMs for authorization.
For detailed information visit Read more..
For more information please contact us at email@example.com