Velocity SSH migration
Move administrative SSH onto Velocity while keeping audit trails intact.
Last updated October 8, 2025View on GitHub
Bring SSH along for the ride
Velocity can transport SSH sessions with lower handshake overhead and richer auditing. Follow this migration path to avoid surprises.
Components in play
vshd
: terminates Velocity connections and forwards them to OpenSSH.vsh-proxy
: a drop-inProxyCommand
helper for legacy clients and automation.- Velocity edge runtime: optional control plane enforcing policy and collecting observability data.
Migration steps
- Deploy
vshd
alongside your existing bastion and front it with Velocity. - Configure OpenSSH for certificate authentication so identities flow end-to-end.
- Distribute an SSH config snippet pointing at
vsh-proxy
, or ship a wrapper script for automated jobs. - Mirror Velocity logs (including
connection_id
andsession_reason
) into your SIEM for audit correlation.
Policy patterns
- Require mutual TLS for administrator access; treat client certificates as part of the MFA chain.
- Enforce per-command authorisation via PAM or your policy engine.
- Tag sessions with metadata (environment, workload, change ticket) to streamline compliance reporting.
Rollback mindset
Keep the classical SSH endpoint online until every client confirms Velocity support. If anything misbehaves, shift DNS or load-balancer weights back while you investigate.