Integration guide
Blend Velocity with existing gateways, APIs, and service meshes without disrupting users.
Last updated October 8, 2025View on GitHub
Bring Velocity into your stack
Velocity coexists with classical TLS. This guide shows how to introduce it gradually, keep fallbacks healthy, and expose metrics so product teams keep their visibility.
Integration playbook
Goal | Pattern | Notes |
---|---|---|
Validate in production quietly | Shadow mirror | Passively mirror a slice of traffic via UDP pass-through (Envoy, HAProxy). Analyse downgrades before sending real users. |
Roll out to a subset of users | Gradual cutover | Route 5–10% of authenticated sessions through Velocity, watch handshake p95 and success rate, then expand. |
Feed internal meshes | Mesh bridge | Terminate Velocity at the edge, forward HTTP/3 to Istio/Linkerd/Consul. Preserve mTLS between mesh workloads. |
Every pattern keeps HTTP/3 fallback alive. Make sure you can flip traffic back to the classical path by toggling weights or DNS.
Wire traffic safely
- Document entry points—decide which domains receive Velocity first and which stay on legacy HTTPS.
- Expose UDP pass-through on your load balancer. Envoy listeners, HAProxy
bind ... transport=quic
, or Cloud LB UDP forwarding all work. - Tag requests with
alpn
,profile
, andworkload
so observability matches what app teams expect. - Teach on-call responders how to trigger fallback-only mode (
velocity-cli admin policy --downgrade-all
) in case a client upgrade is delayed.
Automation touchpoints
- Admin API: script quiesce/resume for maintenance, ticket rotation, and config reloads.
- Edge runtime (
edge.yaml
): add rate limits, auth middleware, and templated health endpoints without redeploying binaries. - CI pipelines: run
velocity-cli config lint
and a subset of integration smoke tests before promoting changes.
Telemetry to forward
- Export metrics into Prometheus or your preferred backend. Focus on handshake latency, downgrade counters, and ticket churn.
- Stream structured logs to your data lake. Filter on
connection_id
,profile
, anddowngrade_reason
when debugging. - Feed Velocity’s tracing metadata into your existing span collectors so distributed traces remain intact.
Cutover checklist
- Pilot traffic mirror shows downgrade ratio < 5% and no fatal errors.
- Application latency budgets stay flat relative to the control group.
- Monitoring dashboards include Velocity metrics alongside app SLOs.
- Run incident drills: fail open to HTTP/3, revoke and rotate tickets, and restore normal service.
- Capture learnings and feed them into the Upgrade guide for future releases.