The moment SSH stops working is when infrastructure gets real
Most of the time, server access feels straightforward. You open your terminal, connect over SSH, or log in with RDP, and get on with your work. The problem is that the most important access path on a cloud platform is not the one that works on a normal day. It is the one that still works when the normal path breaks.
That is exactly why we added a browser VNC console to Raff.
We did not build it because terminals in the browser look modern, or because every cloud platform needs a longer feature checklist. We built it because when a VM is locked out by a bad firewall rule, a broken SSH configuration, a failed network change, or an RDP issue on Windows, you need an out-of-band way back in. If access to your server depends entirely on the part you just misconfigured, recovery becomes much harder than it should be.
The problem VNC actually solves
When people hear “VNC console,” they often think of it as just another way to log in to a machine. That description is technically true, but it misses the important point.
A browser VNC console is not primarily a convenience feature. It is a recovery feature.
If your SSH daemon is down, your key configuration is broken, your sshd_config file has a mistake, your UFW or firewall rules are too aggressive, your network interface is misconfigured, or your Windows VM no longer accepts RDP, the question is no longer “What is the best way to access the server?” The question becomes “What path is left?”
That is the path this feature is meant to protect.
We have always taken the view that VM access should not collapse into a single dependency chain. If the network service on the guest breaks, or if you make a change that cuts off the management path you normally use, the control plane should still give you a way to intervene. That is the thinking behind the browser VNC console.
Why we chose a browser-based console
There are two different product philosophies you can take with a feature like this.
The first is to treat recovery access as something advanced users can figure out later with a stack of external tools, custom workflows, or manual rescue procedures. The second is to accept that mistakes, failed updates, and bad configuration changes are a normal part of operating infrastructure, and build the recovery path into the platform from the start.
We chose the second.
A browser-based console matters because it reduces friction exactly when the situation is already stressful. You do not want a recovery workflow that begins with “install another client,” “find the right machine,” or “hope your previous management path still works.” You want to open the dashboard, connect to the VM, and start fixing the problem.
That is also why this feature fits naturally alongside Raff’s core VM experience. We already care a lot about simplifying the operational path around Linux virtual machines and Windows virtual machines. Recovery access is part of that experience, not separate from it.
When VNC is better than SSH or RDP
The right way to think about VNC is not “replacement.” It is “fallback and recovery.”
SSH is still the best day-to-day access path for most Linux administration tasks. It is fast, scriptable, lightweight, and works cleanly with the rest of a terminal-driven workflow.
RDP is still the right primary access method for many Windows workflows where a full desktop session matters.
But there are moments where neither is the right tool, because neither is available.
That is where browser console access becomes more valuable than either one:
1. You changed the firewall and locked yourself out
This is one of the most common recovery scenarios. A rule was too strict, a port was closed unintentionally, or a policy changed before you verified the result. If your network path is broken from the outside, a browser console gives you a way back to the machine to fix it.
2. SSH or RDP configuration broke
Configuration drift is real. Service files get edited. Packages update. Authentication methods change. A typo in the wrong place can turn a normal login path into a dead end. Console access gives you a direct way to repair the service rather than rebuilding from scratch.
3. The VM boots, but not cleanly
Sometimes the issue is not remote access at all. It is what happens during boot. If the VM needs attention early in the startup process, direct console visibility is far more useful than waiting for a network service that may never come up properly.
4. You need direct intervention during troubleshooting
There are moments in infrastructure work where you want the simplest possible path between you and the machine. No extra assumptions. No dependency on the same guest network stack you are actively debugging. Just direct access so you can inspect and correct the problem.
What VNC is not meant to be
This is just as important as explaining what it is for.
The browser VNC console is not meant to replace a clean SSH workflow. It is not meant to become the main way you administer every Linux server. It is not meant to encourage teams to skip proper key management, security practices, or network design.
It is also not a substitute for deliberate recovery planning.
If a workload is critical, you still want backups, snapshots, careful change control, and clear rollback habits. Raff already treats that side of operations seriously through features like snapshots, backups, and the broader security model around running cloud infrastructure safely.
The VNC console should be understood as one layer in that broader resilience story. It is the “you still have a path in” layer.
Why this matters more on cloud infrastructure
The more cloud-native your workflow becomes, the easier it is to forget that a VM is still a machine with a boot process, a network stack, a filesystem, and services that can fail independently.
Cloud platforms are very good at making infrastructure feel abstract. That is useful right up until the abstraction cracks. When something breaks, operators need a control path that does not rely on the exact layer that is broken.
That is one reason we think features like this matter more than they first appear to. They are not flashy. They are not the kind of thing people tweet about on launch day for very long. But they reduce the time between “something is wrong” and “I can act on it.”
And in infrastructure, that gap matters.
A browser console also fits the way many Raff customers actually work. Not every team has a giant platform engineering function. Not every customer wants to string together separate access tooling just to recover a development box, staging system, or production VM after one bad config push. Sometimes you just need to get into the machine and fix the issue.
The product decision behind it
When we think about platform design at Raff, we generally ask a simple question:
“What happens when the normal path stops being normal?”
That question has shaped a lot of our decisions.
It shaped our view on instant resize, because over-provisioning is often a defensive response to painful migrations. It shaped our view on hourly billing, because short-lived infrastructure should not be punished with monthly rigidity. And it shaped this feature too, because access to a VM should not disappear the moment a customer makes one recoverable mistake inside the guest.
That is the operator perspective behind this update.
We are not trying to turn every infrastructure task into a one-click experience. Some things should stay explicit. But recovery paths should be easier, not harder. If the platform already knows which VM is yours, and the control plane already exists, it makes sense to give you a direct path to intervene when the guest’s normal access methods fail.
Where this fits in a mature VM workflow
The healthiest way to use this feature is inside a broader operating model:
- Use SSH as your normal Linux access path
- Use RDP as your normal Windows access path when needed
- Keep backups and snapshots current
- Treat firewall and network changes carefully
- Use the browser VNC console when the normal access layer fails or when direct intervention is the safest next step
That balance matters because good platforms should help users recover from mistakes without encouraging sloppy habits.
The goal is not to make recovery casual. The goal is to make it possible.
What this means for you
If you run development, staging, or production VMs on Raff, the practical takeaway is simple: you now have a more direct recovery path when standard remote access breaks.
That matters for individual developers, but it matters even more for small teams. The smaller the team, the more damaging a simple lockout can be. One misconfigured firewall or one broken SSH service can turn into a long interruption if the platform does not give you a way back in.
The browser VNC console reduces that risk. It gives you another control path when you need to inspect boot behavior, fix access configuration, or recover from a change that cut off the normal route.
It also fits the bigger product direction we have been building toward at Raff: infrastructure that is powerful enough for real workloads, but practical enough that recovery, scaling, and day-to-day operations do not become their own separate project. That same design philosophy is why we think so much about pricing clarity, resize simplicity, and predictable VM management in posts like Why We Designed Raff to Scale With You, Not Against You.
If your team has ever lost time to a locked-out VM, you already understand why this feature matters. And if you have not hit that moment yet, that is even better. It means the recovery path is there before you need it.
That is exactly when platform features are most useful.

