I wonder if you added complexity to the architecture when a simple log format change would have sufficed.
TCP proxying, in my experience, is typically only used for routing TLS or other non-HTTP TCP requests. In the former case, the proxy should not be able to observe the requests and responses.