Skip to content

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client#48866

Merged
chemamartinez merged 2 commits intoelastic:mainfrom
chemamartinez:fix-entityanalytics_okta-oauth-ssl
Feb 16, 2026
Merged

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client#48866
chemamartinez merged 2 commits intoelastic:mainfrom
chemamartinez:fix-entityanalytics_okta-oauth-ssl

Conversation

@chemamartinez
Copy link
Contributor

Proposed commit message

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client

The OAuth2 authentication flow in the Okta entity analytics provider
was ignoring the user-configured HTTP client. Instead, it was using
Go's default HTTP client for all token-related requests
(initial token exchange, token refresh, and API calls).

This meant that any custom TLS/SSL or proxy settings configured by
the user were silently discarded, causing connection failures in
environments that rely on custom certificates or proxies.

This fix ensures the configured HTTP client is propagated through
all OAuth2 token operations, so that outgoing requests correctly
use the user's transport configuration.

Checklist

  • My code follows the style guidelines of this project
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have made corresponding change to the default configuration files
  • I have added tests that prove my fix is effective or that my feature works. Where relevant, I have used the stresstest.sh script to run them under stress conditions and race detector to verify their stability.
  • I have added an entry in ./changelog/fragments using the changelog tool.

Disruptive User Impact

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Use cases

Screenshots

Logs

@chemamartinez chemamartinez self-assigned this Feb 16, 2026
@chemamartinez chemamartinez requested a review from a team as a code owner February 16, 2026 07:58
@chemamartinez chemamartinez added Filebeat Filebeat bugfix Team:Security-Service Integrations Security Service Integrations Team backport-9.2 Automated backport to the 9.2 branch backport-9.3 Automated backport to the 9.3 branch labels Feb 16, 2026
@botelastic botelastic bot added the needs_team Indicates that the issue/PR needs a Team:* label label Feb 16, 2026
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@botelastic botelastic bot removed the needs_team Indicates that the issue/PR needs a Team:* label label Feb 16, 2026
@github-actions
Copy link
Contributor

🤖 GitHub comments

Just comment with:

  • run docs-build : Re-trigger the docs validation. (use unformatted text in the comment!)
@chemamartinez chemamartinez merged commit 5336ca2 into elastic:main Feb 16, 2026
30 checks passed
mergify bot pushed a commit that referenced this pull request Feb 16, 2026
…ured http client (#48866)

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client

The OAuth2 authentication flow in the Okta entity analytics provider
was ignoring the user-configured HTTP client. Instead, it was using
Go's default HTTP client for all token-related requests
(initial token exchange, token refresh, and API calls).

This meant that any custom TLS/SSL or proxy settings configured by
the user were silently discarded, causing connection failures in
environments that rely on custom certificates or proxies.

This fix ensures the configured HTTP client is propagated through
all OAuth2 token operations, so that outgoing requests correctly
use the user's transport configuration.

(cherry picked from commit 5336ca2)
mergify bot pushed a commit that referenced this pull request Feb 16, 2026
…ured http client (#48866)

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client

The OAuth2 authentication flow in the Okta entity analytics provider
was ignoring the user-configured HTTP client. Instead, it was using
Go's default HTTP client for all token-related requests
(initial token exchange, token refresh, and API calls).

This meant that any custom TLS/SSL or proxy settings configured by
the user were silently discarded, causing connection failures in
environments that rely on custom certificates or proxies.

This fix ensures the configured HTTP client is propagated through
all OAuth2 token operations, so that outgoing requests correctly
use the user's transport configuration.

(cherry picked from commit 5336ca2)
chemamartinez added a commit that referenced this pull request Feb 16, 2026
…ured http client (#48866) (#48869)

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client

The OAuth2 authentication flow in the Okta entity analytics provider
was ignoring the user-configured HTTP client. Instead, it was using
Go's default HTTP client for all token-related requests
(initial token exchange, token refresh, and API calls).

This meant that any custom TLS/SSL or proxy settings configured by
the user were silently discarded, causing connection failures in
environments that rely on custom certificates or proxies.

This fix ensures the configured HTTP client is propagated through
all OAuth2 token operations, so that outgoing requests correctly
use the user's transport configuration.

(cherry picked from commit 5336ca2)

Co-authored-by: Chema Martínez <chema.martinez@elastic.co>
chemamartinez added a commit that referenced this pull request Feb 16, 2026
…ured http client (#48866) (#48870)

x-pack/filebeat/input/entityanalytic/provider/okta: fix use of configured http client

The OAuth2 authentication flow in the Okta entity analytics provider
was ignoring the user-configured HTTP client. Instead, it was using
Go's default HTTP client for all token-related requests
(initial token exchange, token refresh, and API calls).

This meant that any custom TLS/SSL or proxy settings configured by
the user were silently discarded, causing connection failures in
environments that rely on custom certificates or proxies.

This fix ensures the configured HTTP client is propagated through
all OAuth2 token operations, so that outgoing requests correctly
use the user's transport configuration.

(cherry picked from commit 5336ca2)

Co-authored-by: Chema Martínez <chema.martinez@elastic.co>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport-9.2 Automated backport to the 9.2 branch backport-9.3 Automated backport to the 9.3 branch bugfix Filebeat Filebeat Team:Security-Service Integrations Security Service Integrations Team

3 participants