Access system event logs, text-based data or Active Directory information, and execute queries for the IIS web server and various databases. Log Parser Lizard is a log parsing tool designed to collect, transform and load log files in order to support security teams with effective SQL querying text-based data and also Web Server logs, Windows System Events, application log files, RDMBS, JSON, XML and many other data sources. Log Parser Lizard also provides a great Graphical User Interface (GUI) to Log parser 2.2, an advanced file parsing engine from Microsoft that runs on all versions of Windows OS. No cloud or web server needed. It is a versatile desktop tool that gives automated SQL query access to any system log or text-based data including Web Server Logs (IIS, Apache, W3C, SharePoint, MS Exchange, FTP, etc...), Windows System Events and even application log files (generated with log4net, Nlog, SeriLog, etc.). Also great for Data Visualization (dataviz), Business Intelligence (BI) and Extract Transform Load (ETL) tasks.
Run SQL queries against plain text files and other sources:
SELECT DISTINCT src-ip FROM firewall.log WHERE action='DROP'
SELECT TOP 100 * FROM c:/webserver.log WHERE sc-status 200
SELECT cs-uri-stem FROM c:/InetPub/Logs/ex*.logGROUP BY cs-uri-stem HAVING COUNT(*) > 50
SELECT to_lowercase(extract_extension(cs-uri-stem)) AS PageType, SUM(sc-bytes)FROM ex131118.log, ex131119.log GROUP BY PageType
Any file is a database with Log Parser Lizard.