Skip to content

[CLOUDS-7599] Remove default seclists from VCNs to prevent opening port 22 unnecessarily#99

Merged
cale-at-ddog merged 1 commit intomasterfrom
cale.pennington/remove-default-seclists-from-vcns
Mar 19, 2026
Merged

[CLOUDS-7599] Remove default seclists from VCNs to prevent opening port 22 unnecessarily#99
cale-at-ddog merged 1 commit intomasterfrom
cale.pennington/remove-default-seclists-from-vcns

Conversation

@cale-at-ddog
Copy link
Copy Markdown
Contributor

@cale-at-ddog cale-at-ddog commented Mar 11, 2026

What

Remove the default Seclist rules from the VCN (as described here: https://registry.terraform.io/modules/oracle-terraform-modules/vcn/oci/latest/examples/hub-spoke?tab=inputs)

Why

So that Quickstart doesn't leave port 22 open in the VCN

Testing

Validated in dddevintegration1 against staging

@cale-at-ddog cale-at-ddog force-pushed the cale.pennington/remove-default-seclists-from-vcns branch from 2e35b0f to c46e74f Compare March 12, 2026 19:11
nat_gateway_display_name = local.nat_gateway
create_service_gateway = true
service_gateway_display_name = local.service_gateway
}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we don't modify the datadog-oci-orm stuff anymore. Not sure if it's dead code (can ask Shallav when he's back), but for this PR we should remove the changes on this folder

service_gateway_display_name = local.service_gateway
}

resource "oci_core_default_security_list" "dd_default" {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just because terraform behavior can sometimes deviate from OCI (even though extremely unlikely), probably best to at least run a "terraform plan" with these changes locally to verify. You can use the module generated here: https://dd.datad0g.com/integrations/oracle-cloud-infrastructure/add

And just reroute it to point to your local version

@EamonBrady1
Copy link
Copy Markdown
Contributor

We'll also need to do a stack release for these changes which I believe is documented here: https://datadoghq.atlassian.net/wiki/spaces/ECI/pages/4486660723/ECI+Stack+deploy

After that, best to confirm that the new release contains your changes and works as intended

@bengillmandd
Copy link
Copy Markdown
Contributor

In a similar vein - it might be worth setting lockdown_default_seclist = true when we initialize the vcn module. This way the port isn't open for a short period of time during apply step. Not a blocker though. https://github.com/DataDog/oracle-cloud-integration/blob/master/datadog-oci-orm/metrics-setup/vcn.tf#L12

@cale-at-ddog cale-at-ddog changed the title [ECI] Remove default seclists from VCNs to prevent opening port 22 unnecessarily [CLOUDS-7599] Remove default seclists from VCNs to prevent opening port 22 unnecessarily Mar 13, 2026
@cale-at-ddog
Copy link
Copy Markdown
Contributor Author

@bengillmandd I can try that. Claude's analysis was that setting lockdown to true wouldn't create the default list at all, which would then make setting up the seclist fail, but there may be other ways around it.

@christianbagley-mke
Copy link
Copy Markdown

christianbagley-mke commented Mar 18, 2026

@cale-at-ddog Is this a duplicate of #86 (comment) ?

@cale-at-ddog
Copy link
Copy Markdown
Contributor Author

@christianbagley-mke Yes, I think they are closely related.

@cale-at-ddog cale-at-ddog force-pushed the cale.pennington/remove-default-seclists-from-vcns branch from c46e74f to d0f35cd Compare March 18, 2026 20:45
Copy link
Copy Markdown
Contributor

@EamonBrady1 EamonBrady1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@cale-at-ddog cale-at-ddog merged commit 833c340 into master Mar 19, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants