during migration of our log analysis from splunk to azure sentinel, we experienced significantly higher volume of logs on Sentinel then we did on splunk. We were actually sending logs to both and Sentinel showed more then twice the volume per day then splunk.
Only real difference is that we had to change to custom CEF log format that we configured according to the documentation from Palo Alto. Can this increase be caused by the different log type, or is it just splunk compressing the raw data before counting it against the license? Any ideas or experience welcome.. Thanks!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!