1764991622526626 info {"level":"info","msg":"Request received external host in X-Forwarded-Host or Host headers, but the values have not been added to GOTRUE_MAILER_EXTERNAL_HOSTS and will not be used. To suppress this message add the host, or sanitize the headers before the request reaches Auth.","time":"2025-12-06T03:27:02Z","x_forwarded_host":"api.smallerp.store","x_forwarded_proto":"http"}
event body
{
"appname": "supabase-auth",
"event_message": "{\"level\":\"info\",\"msg\":\"Request received external host in X-Forwarded-Host or Host headers, but the values have not been added to GOTRUE_MAILER_EXTERNAL_HOSTS and will not be used. To suppress this message add the host, or sanitize the headers before the request reaches Auth.\",\"time\":\"2025-12-06T03:27:02Z\",\"x_forwarded_host\":\"api.smallerp.store\",\"x_forwarded_proto\":\"http\"}",
"id": "afbbc379-f870-435e-b159-643c68782d45",
"level": "info",
"metadata": {
"level": "info",
"msg": "Request received external host in X-Forwarded-Host or Host headers, but the values have not been added to GOTRUE_MAILER_EXTERNAL_HOSTS and will not be used. To suppress this message add the host, or sanitize the headers before the request reaches Auth.",
"time": "2025-12-06T03:27:02Z",
"timestamp": "2025-12-06T03:27:02Z",
"x_forwarded_host": "api.smallerp.store",
"x_forwarded_proto": "http"
},
"project": "default",
"timestamp": 1764991622526626
}
1764991622634299 info {"auth_audit_event":{"action":"token_refreshed","actor_id":"3e2d812f-30d9-4037-b76e-f4906594241b","actor_username":"test@test.com","actor_via_sso":false,"audit_log_id":"f526dc51-943b-40af-8f5d-19ee40440c0d","created_at":"2025-12-06T03:27:02.632166186Z","ip_address":"","log_type":"token","request_id":"4c17f410-0aac-4e86-8efb-1d3c4609ab28","user_agent":"node"},"level":"info","msg":"audit_event","time":"2025-12-06T03:27:02Z"}
event body
1764991622634360 info {"auth_audit_event":{"action":"token_revoked","actor_id":"3e2d812f-30d9-4037-b76e-f4906594241b","actor_username":"test@test.com","actor_via_sso":false,"audit_log_id":"f050f5cc-4d8d-473c-9289-58a1d4484066","created_at":"2025-12-06T03:27:02.633163794Z","ip_address":"","log_type":"token","request_id":"4c17f410-0aac-4e86-8efb-1d3c4609ab28","user_agent":"node"},"level":"info","msg":"audit_event","time":"2025-12-06T03:27:02Z"}
event body
1764991622643276 info {"action":"login","instance_id":"00000000-0000-0000-0000-000000000000","level":"info","login_method":"token","metering":true,"msg":"Login","time":"2025-12-06T03:27:02Z","user_id":"3e2d812f-30d9-4037-b76e-f4906594241b"}
event body
1764991622643336 info {"auth_event":{"action":"token_revoked","actor_id":"3e2d812f-30d9-4037-b76e-f4906594241b","actor_username":"test@test.com","actor_via_sso":false,"log_type":"token"},"component":"api","duration":114355487,"grant_type":"refresh_token","level":"info","method":"POST","msg":"request completed","path":"/token","referer":"https://smallerp.store","remote_addr":"172.18.0.1","request_id":"4c17f410-0aac-4e86-8efb-1d3c4609ab28","status":200,"time":"2025-12-06T03:27:02Z"}
event body
Set your Github webhook to this Logflare endpoint and we'll ingest Github webhooks for you. This endpoint drops all keys ending in _url so it keeps your Github payloads in check.
Watch log files on a server with this Fluent Bit output config.
[INPUT]
Name tail
Path /var/log/syslog
[OUTPUT]
Name http
Match *
tls On
Host api.logflare.app
Port 443
URI /logs/json?api_key=your-super-secret-and-long-logflare-key-public&source=1e8f80d8-a75c-458a-bb7b-e8a749dedcd9
Format json
Retry_Limit 5
json_date_format iso8601
json_date_key timestamp
Generic Webhook
Use the generic JSON ingest endpoint to generate log events from an external webhook.
e.g. you can set a Github webhook to send events to: