x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client#48866
Merged
chemamartinez merged 2 commits intoelastic:mainfrom Feb 16, 2026
Conversation
Contributor
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
Contributor
🤖 GitHub commentsJust comment with:
|
efd6
approved these changes
Feb 16, 2026
mergify bot
pushed a commit
that referenced
this pull request
Feb 16, 2026
…ured http client (#48866) x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client The OAuth2 authentication flow in the Okta entity analytics provider was ignoring the user-configured HTTP client. Instead, it was using Go's default HTTP client for all token-related requests (initial token exchange, token refresh, and API calls). This meant that any custom TLS/SSL or proxy settings configured by the user were silently discarded, causing connection failures in environments that rely on custom certificates or proxies. This fix ensures the configured HTTP client is propagated through all OAuth2 token operations, so that outgoing requests correctly use the user's transport configuration. (cherry picked from commit 5336ca2)
6 tasks
mergify bot
pushed a commit
that referenced
this pull request
Feb 16, 2026
…ured http client (#48866) x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client The OAuth2 authentication flow in the Okta entity analytics provider was ignoring the user-configured HTTP client. Instead, it was using Go's default HTTP client for all token-related requests (initial token exchange, token refresh, and API calls). This meant that any custom TLS/SSL or proxy settings configured by the user were silently discarded, causing connection failures in environments that rely on custom certificates or proxies. This fix ensures the configured HTTP client is propagated through all OAuth2 token operations, so that outgoing requests correctly use the user's transport configuration. (cherry picked from commit 5336ca2)
6 tasks
chemamartinez
added a commit
that referenced
this pull request
Feb 16, 2026
…ured http client (#48866) (#48869) x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client The OAuth2 authentication flow in the Okta entity analytics provider was ignoring the user-configured HTTP client. Instead, it was using Go's default HTTP client for all token-related requests (initial token exchange, token refresh, and API calls). This meant that any custom TLS/SSL or proxy settings configured by the user were silently discarded, causing connection failures in environments that rely on custom certificates or proxies. This fix ensures the configured HTTP client is propagated through all OAuth2 token operations, so that outgoing requests correctly use the user's transport configuration. (cherry picked from commit 5336ca2) Co-authored-by: Chema Martínez <chema.martinez@elastic.co>
chemamartinez
added a commit
that referenced
this pull request
Feb 16, 2026
…ured http client (#48866) (#48870) x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client The OAuth2 authentication flow in the Okta entity analytics provider was ignoring the user-configured HTTP client. Instead, it was using Go's default HTTP client for all token-related requests (initial token exchange, token refresh, and API calls). This meant that any custom TLS/SSL or proxy settings configured by the user were silently discarded, causing connection failures in environments that rely on custom certificates or proxies. This fix ensures the configured HTTP client is propagated through all OAuth2 token operations, so that outgoing requests correctly use the user's transport configuration. (cherry picked from commit 5336ca2) Co-authored-by: Chema Martínez <chema.martinez@elastic.co>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Proposed commit message
Checklist
stresstest.shscript to run them under stress conditions and race detector to verify their stability../changelog/fragmentsusing the changelog tool.Disruptive User Impact
Author's Checklist
How to test this PR locally
Related issues
Use cases
Screenshots
Logs