Interactive Log Parser Explorer
See log parsing in action! Use the interactive explorer below to step through 6 stages of log parsing. Watch as raw log data from different sources is progressively detected, parsed, and enriched.
How to Use This Explorer
- Navigate using arrow keys (← →) or click the numbered stage buttons
- Compare the Input (left) and Output (right) at each stage
- Observe how fields are extracted (green highlight) or transformed (red strikethrough)
- Inspect the YAML code showing exactly what processor was added
- Learn from the stage description explaining the technique and benefits
Interactive Log Parser Explorer
Original Input
Raw log data from multiple sources in different formats
Use ← → arrow keys to navigate
📥Input
{
"timestamp": "2025-10-20T14:23:45.123Z",
"level": "error",
"service": "api",
"message": "Database connection failed"
}
📤Output
{
"timestamp": "2025-10-20T14:23:45.123Z",
"level": "error",
"service": "api",
"message": "Database connection failed"
}
Added/Changed
Removed
Completed Step
Current Step
Not Done Yet
📄New Pipeline Stepinput.jsonl
# Raw mixed-format log data
# No processing yet - this shows the heterogeneous inputTry It Yourself
Ready to build this parser? Follow the step-by-step tutorial:
Deep Dive into Each Step
Want to understand each parsing technique in depth?
- Step 1: Parse JSON Logs - Application log processing with validation
- Step 2: Parse CSV Data - Sensor data with type conversion
- Step 3: Parse Access Logs - Web traffic analysis patterns
- Step 4: Parse Syslog Messages - System event processing
- Step 5: Multi-Format Detection - Unified pipeline architecture
Next: Set up your environment to build this parser yourself