1771851399786076 172.30.0.10 2026-02-23 12:56:39.785 UTC [1085189] supabase_read_only_user@postgres FATAL: password authentication failed for user "supabase_read_only_user"
event body
1771851399786115 172.30.0.10 2026-02-23 12:56:39.785 UTC [1085189] supabase_read_only_user@postgres DETAIL: User "supabase_read_only_user" has no password assigned.
event body
{
"appname": "supabase-db",
"event_message": "172.30.0.10 2026-02-23 12:56:39.785 UTC [1085189] supabase_read_only_user@postgres DETAIL: User \"supabase_read_only_user\" has no password assigned.",
"id": "10a267d8-3a3e-4864-9bf1-0c0406326214",
"project": "default",
"timestamp": 1771851399786115
}
1771851399786122 Connection matched pg_hba.conf line 89: "host all all 172.16.0.0/12 scram-sha-256"
event body
{
"appname": "supabase-db",
"event_message": "\tConnection matched pg_hba.conf line 89: \"host all all 172.16.0.0/12 scram-sha-256\"",
"id": "3c5cc13d-6b5c-44e2-aa8b-8e44da513258",
"project": "default",
"timestamp": 1771851399786122
}
1776087655234937 172.30.0.10 2026-04-13 13:40:55.234 UTC [401307] supabase_read_only_user@postgres FATAL: password authentication failed for user "supabase_read_only_user"
event body
1776087655235109 172.30.0.10 2026-04-13 13:40:55.234 UTC [401307] supabase_read_only_user@postgres DETAIL: User "supabase_read_only_user" has no password assigned.
event body
{
"appname": "supabase-db",
"event_message": "172.30.0.10 2026-04-13 13:40:55.234 UTC [401307] supabase_read_only_user@postgres DETAIL: User \"supabase_read_only_user\" has no password assigned.",
"id": "50aa0579-7ec2-4018-a389-d267f133e638",
"project": "default",
"timestamp": 1776087655235109
}
1776087655235116 Connection matched pg_hba.conf line 89: "host all all 172.16.0.0/12 scram-sha-256"
event body
{
"appname": "supabase-db",
"event_message": "\tConnection matched pg_hba.conf line 89: \"host all all 172.16.0.0/12 scram-sha-256\"",
"id": "95e98fb1-9c24-4ac8-9c4d-a2ec55ddb80e",
"project": "default",
"timestamp": 1776087655235116
}
random(tips): Integers support greater and less than symobols (e.g. `m.response.origin_time:<1000`).
Send Logs to this Source
Source ID
You'll need this source ID for some integrations or libraries.
4887d8ed-29e0-41d6-b47e-196d23434c0c
If you're hosted on Vercel setup our Vercel integration!
Set your Github webhook to this Logflare endpoint and we'll ingest Github webhooks for you. This endpoint drops all keys ending in _url so it keeps your Github payloads in check.
Watch log files on a server with this Fluent Bit output config.
[INPUT]
Name tail
Path /var/log/syslog
[OUTPUT]
Name http
Match *
tls On
Host api.logflare.app
Port 443
URI /logs/json?api_key=auyRBpKQbn-r&source=4887d8ed-29e0-41d6-b47e-196d23434c0c
Format json
Retry_Limit 5
json_date_format iso8601
json_date_key timestamp
Generic Webhook
Use the generic JSON ingest endpoint to generate log events from an external webhook.
e.g. you can set a Github webhook to send events to: