This website uses cookies essential to its operation, for analytics, and for personalized content. By continuing to browse this site, you acknowledge the use of cookies. For details on cookie usage on our site, read our Privacy Policy
Hi everyone,
during migration of our log analysis from splunk to azure sentinel, we experienced significantly higher volume of logs on Sentinel then we did on splunk. We were actually sending logs to both and Sentinel showed more then twice the volume per day then splunk.
Only real difference is that we had to change to custom CEF log format that we configured according to the documentation from Palo Alto. Can this increase be caused by the different log type, or is it just splunk compressing the raw data before counting it against the license? Any ideas or experience welcome.. Thanks!
... View more