About this tool
This free online log explorer lets you parse, search, filter, and aggregate logs directly in your browser. Paste text or drop .log/.txt/.ndjson files to inspect events fast without uploading data to a server. It’s built for debugging production incidents, analyzing application output, and exploring structured or semi-structured logs with simple query syntax.
Common use cases
- Search logs with text queries, field:value, and AND/OR conditions
- Filter events by time range and severity (error/warn/info/debug)
- Review NDJSON / JSON lines from services, proxies, and cloud platforms
- Aggregate counts by level and spot spikes with per-minute buckets
- Export filtered results to JSON or CSV for tickets, reports, or follow-up analysis
How it works
Parsing and filtering run client-side. The tool streams file reads, tokenizes common formats (NDJSON, key=value, syslog-ish), and normalizes fields like time, level, source, and message. Queries support free text plus simple field matching. Results are sorted with recent events first, and aggregates (counts + buckets) are computed from the filtered set. Because everything executes in your browser, your log data stays on your machine.
FAQ
Does this tool upload my logs anywhere?
No. Parsing, searching, and exporting all happen locally in your browser.
What formats does it support?
It parses NDJSON/JSON lines, key=value logs, and common “syslog-like” lines, and still lets you search raw text when fields aren’t present.
How do I search specific fields?
Use field:value terms (for example level:error or source:nginx) combined with AND/OR.