DevOps & Cloud
Our services within the DevOps and Cloud branch are designed to help our clients achieve stability, security, and high availability in their systems.
DevOps
Best practices for stability, security, maintainability, and high availability
Robust development with Infrastructure as Code (IaC), immutable infrastructure, and GitOps
Establishment of cross-functional teams for development and operation
Site Reliability Engineering (SRE)
Cloud
Expertise across cloud platforms such as Amazon Web Services, Microsoft Azure, and Google Cloud, as well as Telekom Cloud or STACKIT
Provisioning with tools such as Terraform, OpenTofu, Bicep, AWS CloudFormation, and AWS CDK
Coordination of cloud services such as Azure Cloud Computing, EC2, ECS, and AKS
Serverless architectures with e.g. AWS Lambda, StepFunctions, SageMaker, and AI Foundry
Close monitoring and optimization of cloud costs to prevent overspending
Continuous Integration and Continuous Delivery (CI/CD)
CI/CD platforms such as Jenkins, Argo CD, GitHub Actions, GitLab CI/CD, Azure DevOps Pipelines, and AWS CodePipeline
Containerization with Docker and Podman
Container orchestration with Kubernetes, OpenShift, Rancher, and Docker Swarm
Monitoring
Network and service monitoring with e.g. Grafana and Prometheus, Nagios, OMD, Munin, and Zabbix
Central logging systems and log analysis with e.g. Splunk, Graylog, Logcheck, Elasticsearch, and Kibana
Alerting using tools such as PagerDuty, Opsgenie, and Alertmanager
Chat Integration and ChatOps via Slack or Microsoft Teams
Monitoring services such as Datadog, Dynatrace, and AWS CloudWatch
Databases
SQL databases such as MS SQL, PostgreSQL, MySQL, MariaDB, and Amazon Aurora
NoSQL databases such as Elasticsearch, MongoDB, Amazon DynamoDB, and Azure Cosmos DB
Event and stream processing with e.g. Kafka, RabbitMQ, Amazon Kinesis, Azure Event Hubs, and Amazon EventBridge
Security
User authentication and authorization via Keycloak, Amazon Cognito, Microsoft Entra ID, and Okta
Penetration testing services
Network security implementation: firewalls, intrusion detection, and prevention
Configuration of Virtual Private Networks (VPNs) with e.g. IPsec, SSL VPN, or OpenVPN
Setup and operation of Public Key Infrastructures (PKI)
Enterprise Identity Management with e.g. LDAP, IAM, SSO, and SAML
Secret and key management with e.g. HashiCorp Vault, AWS KMS, Azure Key Vault, and Google Cloud KMS
Security audits and risk assessments
Implementation of cryptography best practices
Interested?
Contact us via info@tngtech.com or use one of the other contact options to learn more about our DevOps & Cloud services. We are happy to support you.