Independent reference. Not affiliated with Splunk, Microsoft, IBM, Elastic, Sumo Logic, LogRhythm, or any SIEM vendor.
Reference / Conversion

EPS to GB conversion for SIEM pricing: 2026 tables and worked examples

Independent reference for converting between Events Per Second and gigabytes per day across SIEM vendor pricing models. Per-source conversion tables, three worked examples, and the discipline that prevents wrong vendor decisions. Updated May 2026.

Mixed enterprise
~70-100 EPS / GB
Typical baseline
Network-heavy
~200-400 EPS / GB
Firewall, NetFlow, DNS
Cloud-native
~30-50 EPS / GB
CloudTrail, MS365 audit
Sample period
30-60 days
Before any vendor sizing

The conversion problem

SIEM vendors split into two pricing camps based on the underlying cost driver of their architecture. Per-GB-priced SIEMs (Splunk, Microsoft Sentinel, Datadog, Sumo Logic, Devo, CrowdStrike LogScale) meter on data volume because their analytics engines scale with bytes processed. Per-EPS-priced SIEMs (IBM QRadar, Securonix, LogRhythm via MPS) meter on event rate because their correlation engines scale with events per second. Both models are honest reflections of what costs money on the vendor side, but they make cross-shop comparisons require a conversion step.

The conversion is not a constant. EPS measures the rate of events per second; GB measures the volume of bytes ingested. The two correlate loosely but not tightly because event size varies enormously by source. A Windows security event log entry runs 1-2 KB on average; an AWS CloudTrail JSON event runs 5-15 KB; a firewall log entry runs 200-500 bytes; a NetFlow record runs 100-300 bytes. The same data volume in gigabytes produces wildly different event counts depending on which sources dominate the mix.

The practical effect is that customers comparing vendors based on assumed conversion ratios routinely get wrong answers by 30-50 percent in either direction. A network-heavy environment shopping per-EPS QRadar against per-GB Splunk based on a 100 EPS-per-GB conversion (the rough mixed-enterprise average) will materially under-buy QRadar capacity and over-buy Splunk capacity. The reverse profile (cloud-native, JSON-heavy) will produce the inverse error. The conversion discipline matters because the vendor decision frequently turns on it.

Per-source EPS-to-GB conversion table

Log sourceEPS per GBNotes
Windows Event Log (security)60-80 EPS / GBIncludes login, audit, system events
Windows Event Log (verbose / debug)200-350 EPS / GBService Control Manager spam, debug
Linux syslog (production)70-120 EPS / GBStandard syslog facility output
Firewall (perimeter)200-400 EPS / GBPer-rule logging, allow + deny
NetFlow / sFlow / IPFIX300-600 EPS / GBPer-flow records, very high event rate
Cloud-trail (AWS CloudTrail)40-80 EPS / GBVerbose JSON, low EPS, high GB
Azure Activity Log40-70 EPS / GBSimilar verbose JSON pattern
Microsoft 365 audit30-50 EPS / GBDetailed audit records, low EPS
EDR telemetry (CrowdStrike, SentinelOne)100-150 EPS / GBProcess trees, file events
DNS query logs400-700 EPS / GBVery high event rate, small per-event
Web proxy / SWG150-250 EPS / GBPer-request logging
Database audit (SQL Server, Oracle)80-140 EPS / GBPer-transaction audit records

Typical observed ratios across enterprise environments. Real-world variance of 30-50 percent in either direction is common. Use as first-pass reference, not as substitute for actual sampling.

Three worked examples

Mid-market with mixed sources

Source mix: 60% Windows event (~70 EPS/GB), 20% firewall (~300 EPS/GB), 10% MS365 (~40 EPS/GB), 10% EDR (~125 EPS/GB)

Weighted ratio: ~120 EPS / GB total

A 50 GB-per-day environment ingests roughly 6,000 EPS sustained. QRadar at 6,000 EPS lists at $185K-$270K. Splunk at 50 GB-per-day plus ES lists at $175K-$215K. Roughly even.

Cloud-native engineering team

Source mix: 70% AWS CloudTrail (~60 EPS/GB), 15% MS365 (~40 EPS/GB), 10% EDR (~125 EPS/GB), 5% Linux syslog (~95 EPS/GB)

Weighted ratio: ~70 EPS / GB total

A 50 GB-per-day environment ingests roughly 3,500 EPS sustained. QRadar at 3,500 EPS lists at $115K-$170K. Splunk at 50 GB-per-day plus ES lists at $175K-$215K. QRadar looks 25-30% cheaper, until you factor Splunk's deeper cloud content library.

Network-heavy / regulated finance

Source mix: 50% firewall (~300 EPS/GB), 25% NetFlow (~450 EPS/GB), 15% Windows event (~70 EPS/GB), 10% DNS (~550 EPS/GB)

Weighted ratio: ~315 EPS / GB total

A 50 GB-per-day environment ingests roughly 15,750 EPS sustained. QRadar at 15,750 EPS lists at $440K-$650K. Splunk at 50 GB/day plus ES lists at $175K-$215K. Splunk wins decisively because the network-heavy mix punishes per-EPS billing.

The discipline that prevents wrong vendor decisions

Sample your environment for 30-60 days before any vendor sizing conversation. Modern SIEMs (any of the vendors listed in our pricing pages) provide native EPS and GB-per-day metering at the source level, free of charge during evaluation. Many environments already have this data available from an existing log management tool, even if the SIEM purchasing decision is brand-new. Without 30-60 days of source-level data, every vendor sizing conversation is based on assumption rather than measurement, and assumptions in this domain routinely produce wrong vendor decisions.

Calculate the weighted-average EPS-to-GB ratio across your real source mix. The math is straightforward once the sampling exists: for each major source, multiply its observed EPS by its observed GB-per-day, sum the products, divide by total GB-per-day. The resulting ratio applies to your specific environment and replaces the rough mixed-enterprise average that vendor pre-sales materials routinely use.

Apply the ratio in both directions when cross-shopping. Per-EPS vendor quotes get converted to per-GB equivalents using your environment's actual ratio; per-GB vendor quotes get converted to per-EPS equivalents using the inverse. The honest comparison shows where each vendor sits on cost in your specific environment, not in a generic environment that does not exist. Vendors that claim to be cheapest at the headline rate frequently are not cheapest in your specific source mix; vendors that look uncompetitive at the headline rate frequently win once the conversion is applied honestly.

Finally, never accept a vendor's own conversion ratio without sourcing it back to your actual environment data. Splunk pre-sales materials assume per-EPS conversion rates that overstate Splunk's competitive position; QRadar pre-sales materials assume rates that overstate QRadar's. The conflict of interest is real and unavoidable. The honest conversion is the one calculated from your data, not from any vendor's marketing.

FAQ

Common questions

How do I convert EPS to GB for SIEM vendor comparisons?

The conversion ratio depends entirely on your log source mix. Mixed enterprise log volumes average roughly 70-100 EPS per GB; network-heavy environments run 200-400 EPS per GB; verbose JSON cloud logs run 30-50 EPS per GB. To convert your environment, sample EPS and GB-per-day for each major log source over 30-60 days, calculate the weighted average ratio, and apply to compare per-EPS QRadar pricing against per-GB Splunk pricing. Assumed conversions routinely produce wrong vendor comparisons by 30-50 percent in either direction.

Why does the EPS-to-GB ratio vary so much by source?

EPS measures the rate of events per second; GB measures the volume of bytes ingested. The two correlate loosely but not tightly because event size varies enormously by source. A Windows security event log entry runs 1-2 KB on average. An AWS CloudTrail JSON event runs 5-15 KB. A firewall log entry runs 200-500 bytes. A NetFlow record runs 100-300 bytes. The same data volume in gigabytes produces wildly different event counts depending on which sources dominate the mix. Per-EPS pricing models (QRadar, Securonix, LogRhythm via MPS) reward small-event sources; per-GB pricing models (Splunk, Sentinel) reward large-event sources.

Which pricing model is cheaper for a network-heavy environment?

Per-GB pricing wins decisively for network-heavy environments where firewall, NetFlow, and DNS sources dominate the mix. The high-EPS, low-bytes-per-event characteristic of network logs punishes per-EPS billing structurally. A 50 GB-per-day environment that is 75 percent network-source ingest produces roughly 15,000 EPS sustained, where QRadar lists at $440K-$650K versus Splunk at $175K-$215K. The conversion math is the difference between a wrong vendor decision and a right one for this profile.

Which pricing model is cheaper for a cloud-native environment?

Per-EPS pricing wins for cloud-native environments dominated by verbose JSON audit logs (AWS CloudTrail, Azure Activity Log, Microsoft 365 audit). The low-EPS, high-bytes-per-event characteristic of cloud audit logs rewards per-EPS billing structurally. A 50 GB-per-day environment that is 70 percent cloud-audit-log ingest produces roughly 3,500 EPS sustained, where QRadar lists at $115K-$170K versus Splunk at $175K-$215K. QRadar's structural advantage at this profile is roughly 25-30 percent.

How accurate are the per-source EPS-to-GB ratios in your tables?

The ratios in our tables represent typical enterprise observations averaged across multiple environments and source configurations. Real-world ratios for any specific environment can vary by 30-50 percent in either direction depending on logging verbosity settings, event filtering at the source, message format compression, and similar implementation choices. The tables are useful for first-pass vendor comparisons and budget sanity checks; final vendor sizing should always be based on 30-60 day sampling of the actual environment, not assumed ratios.

Updated 2 May 2026