Log Parser Lizard has been reviewed by software.informer.com editors and got "Editor's Pick Award"
Log Parser Lizard has been reviewed by Frederick Barton on 20 Jun 2012. Based on the user interface, features and complexity, Findmysoft has rated Log Parser Lizard 5 out of 5 stars, naming it Essential
Softpedia guarantees that Log Parser Lizard is 100% CLEAN, which means it does not contain any form of malware, including spyware, viruses, trojans and backdoors.
Now we are proud to call them our customers. You can join them too.
RSA Conference is a cryptography and information security-related conference, currently held annually in San Francisco, California, United States; London, England; and Chengdu, China. It is a forum for IT professionals to gather and share the latest knowledge and advancements in the area of Internet security.
Microsoft Tech-Ed is Microsoft's largest technical conference; it runs for four to five days in eight locations worldwide each year. There are opportunities to meet Microsoft experts, MVP's and community members.
Scott Hanselman: „What's this? Oh YES. It's intellisense and tooltips, baby! I can't say how much faster this tool made me once I had figured out LogParser. It's funny how you have to suffer at the command line before you can really appreciate a good GUI.“- Analyze your Web Server Data and be empowered with LogParser and Log Parser Lizard GUI
"LogParser is good, we know, but LogParserLizard is great." - Scott Hanselman's 2011 Ultimate Developer and Power Users Tool List for Windows
Scott Hanselman is a former professor, former Chief Architect in finance, now speaker, consultant and works for Microsoft as a Principal Program Manager, aiming to spread good information about developing software. Thay say Scott Hanselman is the Chuck Norris of .NET.
Russ McRee: "You’re probably familiar with Log Parser, but I’ll bet you didn’t there was a great GUI-based tool with which to leverage its raw power with ease. Log Parser Lizard is one of those indispensable tools that treads lightly on your system but offers a huge bang for the buck." - toolsmith: Log Parser Lizard
Russ McRee works for Microsoft's Online Services Security & Compliance team. He writes toolsmith, a monthly column in ISSA Journal. Russ has spoken infosec events such Defcon, Black Hat, RSA,and FIRST and has published in the likes of Information Security, Linux Magazine, (IN)SECURE, and SysAdmin. As an advocate of a holistic approach to information security, Russ' website is holisticinfosec.org. He also serves as a volunteer handler for the SANS Internet Storm Center.
Chad Tilbury: "Log Parser's command-line isn't particularly onerous, but when staring at logs all day, I'm not afraid to admit that I prefer a GUI. There are several free options available, but I find Log Parser Lizard to be head and shoulders above the competition." - Computer Forensics How-To: Microsoft Log Parser
Posted by Chad Tilbury. SANS is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security.
Dominic Batstone: "Microsoft released a command line tool way back in the mid 00's called Log Parser that used SQL style syntax to query text based log files. Log Parser Lizard takes this a step further by adding a really simple GUI. It's very cheap too. " - Lizarding About With Log Parser Lizard (Part 1) and Log Lizard Part 2 - Hints
Long-time developer, tinkerer and techie interested in lots of things. Security, business processes, efficiency, learning, team work and security (worth a double mention).
Doug Rathbone: "For extremely large files I prefer to use the command line client for speed, but using the GUI to build your queries makes like just so easy – all of a sudden your information overload becomes a high signal/noise ratio sweet symphony that can help you either get a better feel for how your site is being used, or in the worst case scenario help you track down an evil doer and how they got in." - Up Log Creek Without a Paddle
Doug has been building software commercially for over 12 years and writes a popular blog about Life, Code and Beating level 99 to brag to your mates... Diary of a Ninja.
"I must say that Log Parser Lizard has made my job truly simple not only helping me building specific or high level queries, but also reducing the effort to write it again and again and exporting it whenever required." - Log Parser Lizard
.Net, Sitecore and Automation. General Programming challenges faced and their Solutions.
Scott Forsyth: "Log parser is a tool that no web administrator should be without." - Scott Forsyth's Blog
Scott is co-founder and Chief Systems Engineer of Vaasnet and also Senior Systems Engineer at OrcsWeb, a premier hosting company in the .NET space.
Todd O. Klindt: "I know how much managers and bosses love pretty charts and graphs." - Todd Klindt's SharePoint Admin Blog: Using Log Parser with SharePoint
Todd has been a professional computer nerd for over 15 years, specializing in SharePoint for the last eight years. He is currently working his dream job as a SharePoint consultant at Rackspace.
"Log Parser and Log Parser Lizard GUI combined give you a powerful tool set to extract data from several log formats." - The Client View: Log Parser Lizard GUI
The Will Will Web wrote something really cool too
SELECT DISTINCT src-ip FROM pfirewall.log WHERE action='DROP'
SELECT cs-uri-stem FROM c:\InetPub\Logs\ex*.log
GROUP BY cs-uri-stem HAVING COUNT(*) > 50
SELECT to_lowercase(extract_extension(cs-uri-stem)) AS PageType, SUM(sc-bytes)
FROM ex131118.log, ex131119.log GROUP BY PageType
Log Parser Lizard is a GUI for Microsoft Logparser, definitely the best one available on the market today. Log Parser is a very powerful and versatile query software tool that provides universal query access (using SQL) to text-based data, such as log files, XML files, and TSV/CSV text files, as well as key data sources on the Microsoft Windows operating system, such as the Windows Event Log, IIS log, the registry, the File System, the Active Directory services and much more.
Microsoft Logparser is an enhanced query software that digs through information in log files seamlessly and efficiently using SQL queries without storing log data into database.
Because the command-line interface is not very intuitive, we have created Log Parser Lizard, a FREE GUI tool for managing queries and exporting results to Excel, charts, dashboards and even design your own report.. In addition, we have added input filters for custom RegEx and log4net input log formats and also Android logs (with support for console input and regular expressions). You can also write and manage queries for Microsoft SQL Server (T-SQL), OLEDB queries, Facebook Query Language (FQL) and you can even analyze big data in the cloud using Google BigQuery services. There are some helpful examples included in the installation package to help you start using Log Parser Lizard as your query software,web log analyzer and system log analyzer.
Microsoft does funny things sometimes. They made incredible software package that is not supported and is difficult to use, namely Microsoft Log Parser 2.2. It is painful even for experienced IT administrators to use, due to its knotty command-line interface.
Enter Log Parser Lizard GUI. It leverages the existing technology stack provided by Microsoft, so you know that you know it is quality software. It allows you view the data in a consolidated format. Not just one format, though. Any format you like! It allows you to select what data you want to view with convenient buttons and you can fine-tune it via the easy SQL entry field. It is pre-populated with the most relevant query for your convenience.
MS Logparser and Log Parser Lizard together are essential tools for:
Log Parser Lizard has consistently been awarded top ratings by independent testing labs and recommended by reviewers worldwide. Today LPL has a user base of about 2000 installations each month, based on trend analysis for the last three years and approximately 100,000 users worldwide. Get your copy Now!
We utilize a modern Office 2010 tabbed multiple document interface with ribbons, to guarantee the best user experience. The query editor has syntax highlighting and code auto-completion, code snippets, query constants, inline VB.NET code, and more! The query management feature provides a nice way to organize Log Parser queries.
The results output in a default table view similar to Excel, but with more advanced features at your fingertips. Sorting, grouping, searching, filtering, conditional formatting, formula fields, column chooser, and split view. Additionally, you can transform the data in a Excel, HTML, MHT or PDF report, and consolidate the data into a chart for clearer readability. You can use command line to automate the process.
When it comes to data mining and multi-dimensional analysis, an advanced and feature complete pivot table provides business users unrivaled insights into daily operations.
If you are using (or planning to use) Google’s Big Data services (particularly Google BigQuery) to process your large data/log files (IIS or not – doesn't meter), with Google's servers doing all the big data heavy lifting, you can use Log Parser Lizard to be able to fly through vast data sets with all the visualization options they're accustomed to in the software. If you are Facebook developer, you may build, organize and test your for Facebook Query Language (FQL) queries in LPL too.
Building dashboards using the designer is a simple matter of selecting the appropriate UI element (Chart, Pivot Table, Data Card, Gauge, Map or Grid) and dropping data fields onto corresponding arguments, values, and series. It’s built so you can do everything inside Log Parser Lizard: from data-binding and dashboard design to filtering, drill down and server side query parameters. Available only in Professional edition.
WYSIWYG Report Designer is a Microsoft Word® inspired reporting platform, designed to simplify the way in which the users generate business reports. Report designer leverages the intuitive nature of a word processor and integrates the power of a banded report designer into one. Available only in Professional edition.
Purchase the fully featured licensed version of Log Parser Lizard tool (Standard or Professional edition)and enjoy browsing your log data. It will come with these advanced features available only in licensed version of Log Parser Lizard:
The free version has all the features enabled for a limited period of time (65 days). The licensed edition of the tool can be bought from our website once you are completely satisfied with working of the trial version. After making the payment (using PayPal, Mastercard, Visa, checks, etc) to purchase the software, you will receive the activation key and download link within 15 minutes.
Dashboard designer (Professional edition):
WYSIWYG Report designer (Professional edition):
All available data sources: (IIS W3C Logs, Windows Event Log, Active Directory Services, Comma-separated values, Tab-separated and space-separated values, W3C Input Format (IIS, FTP, Apache, ISA, Exchange,...), IIS Log File Format, IIS Centralized Binary Log File, Enterprise Tracing for Windows (ETW), File System, HTTP Error log, IIS ODBC, NCSA Log File Format, NetMon Network Monitor, Registry values, TEXTLINE Input Format, TEXTWORD Input Format, URLScan IIS filter, XML Input Format, RegEx Input Format, Multiline RegEx (Log4Net) Input Format, SQL Server T-SQL Query, OLE DB SQL Query (MySQL, Oracle, Access, PostgreSQL, etc.), Facebook Query Language - FQL, Text file RegEx Input Format, Logparser COM Input Plugin, Google BigQuery, Ultimate Dates Table, HTML Table Reader, Excel File Reader, Visual Basic .Net Data Source, C-Sharp .Net Data Source, Regular Expression Enhanced, Powershell Script):
MDI user experience, organize queries, query editor with syntax highlighting and auto-complete, present data in tables and/or charts.
Log Parser Lizard Quick Look Video is provided by FindMySoft.com
Visualizations help people see things that were not obvious to them before. Even when data volumes are very large, patterns can be spotted quickly and easily. Visualizations convey information in a universal manner and make it simple to share ideas with others. It lets people ask others, “Do you see what I see?” And it can even answer questions like “What would happen if we made an adjustment to that area?”
Microsoft has produced its Log Parser as a query software and log analyzing command line tool. Its current release is version 2.2. It is available as a free download from Microsoft on their Log Parser page.
With LogParser you use queries written in a dialect of the SQL language to specify the operations that transform input records generated by an Input Format into output records that are delivered to an Output Format. While many GUI tools are out there that provide filters, even those that allow the user to build custom filters can't compare with the power of writing a custom SQL query in Log Parser. Log parser can accept most common log formats and output it into one of many formats of your choosing for analysis of relevant data.
Log Parser is made up of three components
View the Log Parser Forums for additional information and help on MS Logparser.
Simply click one of the tabs and you will see a group of queries that are most relevant to that particular set of log files. You can edit and save a new query in the query group as desired. There are a number of samples included in the package. Amazingly, the File System tab allows you to query the file system directly! And the others are great at number crunching as well. You can simply click through and see everything you want. Additional Log Parser input formats for parsing text files using regular expressions are also included.
Let's see an example of using Log Parser from a command line. Run Windows command prompt, set current directory path to the directory that contains the executable "logparser.exe" (default "C:\Program Files\Log Parser 2.2") and enter the following command line:
LogParser -i:EVT -fullText:OFF -o:CSV -tabs:OFF "SELECT * INTO output.csv FROM SYSTEM"
This will save all records from System Event Log on the local system in a comma separated text file “output.csv”. This example shows that the Log Parser command is made up of the SQL query and the Input and Output formats options. These kinds of commands are very powerful in scripts for automatic execution and monitoring of the servers. For more information about using Log Parser from a command line, please refer to the help file or look at resources paragraph on this page.
If you are comfortable and familiar with SQL queries and command prompt commands and switches, you will have no problem using the Log Parser, but if you aren't you will have to learn the basics of SQL to effectively work with this tool.
Although LogParser is fantastic, there are a few things that some users didn't like about it:
This is why we developed a new Log Parser GUI and have shared it with you in the hope of becoming your log reader of choice.
In short, if you keep and analyze any type of log this will make your life easier. By getting to know this tool and its capabilities you'll have better management of your systems, improved development process and have a forensic tool that you'll find new uses for every time you use it. This is a must-have for any systems engineer who needs to take a proactive approach to system monitoring.
A basic SQL query must have, at a minimum, two basic building blocks: the SELECT clause, and the FROM clause. For starters: start Log Parser Lizard, click on the “New Query” button on the toolbar, from a drop down list select “Windows Event Log” and in the Query text box in the bottom of the window write the following command:
SELECT * FROM System
The SELECT clause is used to specify which input record fields we want to appear in the output. The FROM clause is used to specify which specific data source we want the Input Format to process. Different Input Formats interpret the value of the FROM clause in different ways; for instance, the EVT Input Format requires the value of the FROM clause to be the name of a Windows Event Log, which in our example is the "System" Event Log.
The special "*" wildcard after a SELECT keyword means "all the fields" (like in standard SQL). Most of the time, an output of all of the fields of the log records might not be desired. You might only want to see only the fields that are of your interest. To accomplish this, instead of the "*" wildcard in the SELECT clause, you will have to write a comma-separated list of the names of the fields you wish to be displayed.
SELECT TimeGenerated, EventTypeName, SourceName FROM System
The Log Parser SQL-like language also supports a wide variety of functions, including arithmetical functions (e.g. ADD, SUB, MUL, DIV, MOD, QUANTIZE, etc.), string manipulation functions (e.g. SUBSTR, STRCAT, STRLEN, EXTRACT_TOKEN, etc.), and timestamp manipulation functions (e.g. TO_DATE, TO_TIME, TO_UTCTIME, etc.). Functions can also appear as arguments of other functions.
SELECT TO_DATE(TimeGenerated), TO_UPPERCASE( EXTRACT_TOKEN(EventTypeName, 0, ' ') ), SourceName FROM System
То change the name of a field-expression in the SELECT clause by using an alias you can use the AS keyword followed by the new name of the field.
SELECT TO_DATE(TimeGenerated) AS DateGenerated, TO_UPPERCASE( EXTRACT_TOKEN(EventTypeName, 0, ' ') ) AS TypeName, SourceName FROM System
When retrieving data from an Input Format, it is common to want to filter out unneeded records and only keep those that match specific criteria. To accomplish this task, you can use another basic building block of the Log Parser SQL language: the WHERE clause which is used to specify a Boolean expression that must be satisfied by an input record for that record to be listed in the output. Input records that do not satisfy the condition will be discarded. Conditions specified in the WHERE clause can be more complex, making use of comparison operators (such as ">", "<=", "<>", "LIKE", "BETWEEN", etc.) and boolean operators (such as "AND", "OR", "NOT"). The WHERE clause must immediately follow the FROM clause.
SELECT TimeGenerated, EventTypeName, SourceName FROM System WHERE ( SourceName = 'Service Control Manager' AND EventID >= 7024)
The ORDER BY clause can be used to specify that the output records should be sorted according to the values of selected fields. By default, output records are sorted according to ascending values. We can change the sort direction by appending the DESC (for descending) or ASC (for ascending) keywords to the ORDER BY clause.
SELECT SourceName, EventID, TimeGenerated FROM System ORDER BY TimeGenerated
Sometimes we might need to aggregate multiple input records together and perform some operation on groups of input records. To accomplish this, the Log Parser SQL like language has a set of aggregate functions (also referred to as "SQL functions") that can be used to perform basic calculations on multiple records. These functions include SUM, COUNT, MAX, MIN, and AVG. The GROUP BY clause is used to specify which fields we want the group subdivision to be based on. After the input records have been divided into these groups, all the aggregate functions in the SELECT clause will be calculated separately on each of these groups, and the query will return an output record for each group created.
SELECT EventTypeName, Count(*) FROM System GROUP BY EventTypeName
For filtering results from groups you can use the HAVING clause. The HAVING clause works just like the WHERE clause, with the only difference being that the HAVING clause is evaluated after groups have been created, which makes it possible for the HAVING clause to specify aggregate functions.
SELECT EventTypeName, Count(*) FROM System GROUP BY EventTypeName HAVING EventTypeName =’Error event'
The DISTINCT keyword is used to indicate that the output of a query should consist of unique records. Duplicate output records are discarded. It is also possible to use the DISTINCT keyword inside the COUNT aggregate function, in order to retrieve the total number of different values appearing in the data.
SELECT DISTINCT SourceName FROM System
SELECT COUNT( DISTINCT SourceName) FROM System
Use the TOP keyword in the SELECT clause to return only a few records at the top of the ordered output.
SELECT TOP 10 SourceName, Count(*) as Total FROM System GROUP BY SourceName ORDER BY Total DESC
These are simple queries, but they clearly show that this log tool is more powerful for analyzing syslog events than any other event log viewer. For more samples, you can always look at the examples provided with the program. They don’t all work out-of-the-box but can be very helpful.
Please check our Help Center and the following links for additional information:
Everyone loves to play with new software! It lets you browse the log files of your computer in new and interesting ways, at NO CHARGE!
Download previous version of Log Parser Lizard 4.0.9 (not supporetd anymore) here
Yes, the download of Log Parser Lizard GUI is completely free! It lets you perform many of the tasks that you want to do in the Microsoft Windows Operating system.
There are more advanced features in the Standard version that most people will find useful.
In the corporate environment, the IT Staff need to share information between computers. The additional feature allows this through a Microsoft SQL Server backend.
If you purchase Log Parser Lizard GUI and are dissatisfied for any reason, there is a Money Back Guarantee! Simply contact Lizard Labs within 15 days of your purchase and receive a no-hassle refund.
Log Parser Lizard can be uninstalled by:
Enjoy using Log Parser and Log Parser Lizard GUI. Note that by buying a license you not only become aregistered user, but help us to maintain and improve our software products.
If you like Log Parser Lizard, please consider helping to make Lizard Labs better.