features
Custom Domains
Use your own domain for webhook endpoints instead of the default hooksense.com URL.
Custom domains let webhook URLs live on your own brand — webhooks.yourapp.com instead of hooksense.com/w/abc123. Useful for white-label B2B integrations, customer-facing setup pages, and stable URLs that survive even if you migrate off HookSense later.
Setup
- Pick a subdomain on a domain you control (recommended:
webhooks.yourapp.comorhooks.yourapp.com— apex domains aren't supported because of CNAME limitations). - Add a CNAME record in your DNS provider:
webhooks.yourapp.com. CNAME cname.hooksense.com. - In HookSense, open your endpoint and click Custom Domain in the toolbar.
- Enter the full domain (
webhooks.yourapp.com) and click Verify. - HookSense checks the CNAME and provisions a TLS certificate via Let's Encrypt. The domain becomes active when both succeed (usually 30–120 seconds).
How It Works
Once verified, any HTTPS request to webhooks.yourapp.com is routed to the bound endpoint. Headers and body are preserved exactly. Each domain is bound 1:1 to an endpoint — to point a domain at a different endpoint, unbind first.
TLS certificates auto-renew 30 days before expiration. No action required from you.
Multi-Path Routing
Want webhooks.yourapp.com/stripe and webhooks.yourapp.com/github to land on different endpoints? Bind the same custom domain to multiple endpoints; HookSense routes by the path segment after the host:
webhooks.yourapp.com/stripe → endpoint slug: stripe-prod
webhooks.yourapp.com/github → endpoint slug: github-prod
The path must match the endpoint slug exactly. Requests to unmatched paths return 404.
Troubleshooting
- "CNAME not found" — DNS hasn't propagated. Check with
dig CNAME webhooks.yourapp.comfrom a different network. Cloudflare proxied (orange cloud) records won't verify; set DNS-only (gray cloud) until verification, then re-enable proxy if desired. - "TLS provisioning failed" — your DNS provider blocks Let's Encrypt CAA records. Add
letsencrypt.orgto your CAA policy or remove CAA records. - "Certificate expired" — extremely rare; auto-renewal handles this. If it happens, click Re-verify.
- SNI failures from older clients — HookSense requires SNI (TLS 1.2+). Java 7 and pre-2018 IoT clients may fail.
Custom domains require the Sense plan.