هذه الصفحة غير متوفرة حاليًا بلغتك المحلية. نحن نعمل جاهدين على إضافة المزيد من اللغات. شاكرين تفهمك ودعمك المستمر لنا.
- What's New
- Function Overview
- Service Overview
-
Billing
- Billing Overview
- Billing Modes
- Billing Items
- Billing Examples
- Changing the Billing Mode
- Renewing Your Subscription
- Bills
- About Arrears
- Billing Termination
- Cost Management
-
Billing FAQs
- How Is SecMaster Billed?
- Can I Use SecMaster for Free?
- How Do I Change or Disable Auto Renewal for SecMaster?
- Will SecMaster Be Billed After It Expires?
- How Do I Renew SecMaster?
- Where Can I Unsubscribe from SecMaster?
- Where Can I View the Remaining Quotas of Security Data Collection and Security Data Packages?
- Can I Change the Billing Mode for SecMaster?
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Checking Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threats
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Data Collection Process
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Verifying Log Collection
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- FAQs
- Change History
-
User Guide (Kuala Lumpur Region)
- Service Overview
- Authorizing SecMaster
- Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
-
Risk Prevention
-
Baseline Inspection
- Baseline Inspection Overview
- Creating a Custom Check Plan
- Starting an Immediate Baseline Check
- Viewing Check Results
- Handling Check Results
- Viewing Compliance Packs
- Creating a Custom Compliance Pack
- Importing and Exporting a Compliance Pack
- Viewing Check Items
- Creating a Custom Check Item
- Importing and Exporting Check Items
- Vulnerability Management
- Policy Management
-
Baseline Inspection
-
Threat Operations
- Incident Management
- Alert Management
- Indicator Management
- Intelligent Modeling
- Security Analysis
- Data Delivery
-
Security Orchestration
- Security Orchestration Overview
- Built-in Playbooks
- Security Orchestration Process
- (Optional) Configuring and Enabling a Workflow
- Configuring and Enabling a Playbook
- Operation Object Management
- Playbook Orchestration Management
- Layout Management
- Plug-in Management
- Settings
-
FAQs
-
Product Consulting
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Issues About Data Synchronization and Data Consistency
- About Data Collection Faults
-
Product Consulting
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Yearly/Monthly Billing
Yearly/Monthly billing is a prepaid billing mode in which you pay before using resources. It is suitable when your resource requirements are fixed because you can pay less by using longer. In the yearly/monthly billing mode, we offer discounts to you. This topic describes the billing rules of yearly/monthly SecMaster resources.
Application Scenarios
In yearly/monthly billing mode, you need to pay for a required duration in advance. This mode is suitable for long-term and relatively fixed service requirements. The yearly/monthly billing mode is recommended for the following scenarios:
- Long-term workloads with stable resource requirements, such as official websites, online malls, and blogs.
- Long-term projects, such as scientific research projects and large-scale events
- Workloads with predictable traffic bursts, for example, e-commerce promotions or festivals.
- Workloads with high data security requirements
Billing Items
The following billing items support yearly/monthly billing:
Billing Item |
Description |
|
---|---|---|
Edition |
SecMaster edition, including basic, standard, and professional editions. |
|
Quota |
The quantity of the ECS quota. |
|
Value-added package |
Large screen |
If you have purchased a yearly/monthly SecMaster edition, the large screen service you buy separately is also billed on a yearly/monthly basis. |
Log audit |
If you have purchased a yearly/monthly SecMaster edition, the security data collection and retention services you buy separately are also billed on a yearly/monthly basis. |
|
Security analysis |
If you have purchased a yearly/monthly SecMaster edition, the security analysis package you buy separately is also billed on a yearly/monthly basis. |
|
Security orchestration |
If you have purchased a yearly/monthly SecMaster edition, the security orchestration service you buy separately is also billed on a yearly/monthly basis. |
If you plan to purchase the professional edition SecMaster with one quota, as well as the large screen, security data collection (5 GB/day), security data retention (100 GB/day), security analysis (1 GB/day), security orchestration (10,000 operations/day), and select the yearly/monthly billing mode (the required duration is one month), at the bottom of the SecMaster purchase page, you can view the fee details.

The price includes:
- Professional edition: the fees for the professional edition and the quota you specify.
- Large screen - security situation metrics: the fee for SecMaster large screen.
- Security orchestration: the fee for the playbooks execution quota you specify.
- Security analysis package: the fee for security analysis data volume you specify.
- Security data collection: the fee for daily data collection volume you specify.
- Security data retention: the fee for daily log retention volume you specify.
Billing Period
The billing period of yearly/monthly SecMaster is determined by the required duration (UTC+8:00). The billing period starts from the time you activate or renew your subscription (precise to seconds), and ends at 23:59:59 on the expiration date.
For example, if you purchase the SecMaster professional edition with one quota for one month at 15:50:04 on June 30, 2024 (no value-added package is purchased), the billing period is from 15:50:04 on June 30, 2024 to 23:59:59 on July 30, 2024.
Billing Examples
Assume that you purchased a yearly/monthly SecMaster professional edition (Quota: 1) at 15:50:04 on June 30, 2024, as well as the value-added package, including large screen, security data collection (5 GB/day), security data retention (100 GB), security analysis (1 GB/day), and security orchestration (10,000 operations/day). Billing resources include the professional edition, quota, and value-added package. Your subscription is one month and you manually renew the subscription for another month before the subscription expires. The billing details are as follows:
- The first billing period is from 15:50:04 on June 30, 2024 to 23:59:59 on July 30, 2024.
- The second billing period is from 23:59:59 on July 30, 2024 to 23:59:59 on Aug. 30, 2024.
You must prepay for each billing period. Table 2 shows the billing formula.
Resource Type |
Billing Formula |
---|---|
Service edition + Quota |
(Service edition + Quota) x Required duration |
Security data collection |
Security data collection package price x Required duration |
Security data retention |
Security data retention package price x Required duration |
Large screen |
Large screen - Security situation metric price x Required duration |
Security analysis |
Price of security analysis data volume per day x Required duration |
Security orchestration |
Number of execution times of workflow nodes (including the start and end nodes, but excluding judgment nodes) per day during playbook execution x Required duration |
Figure 2 shows how the price is calculated.
Impact on Billing After Specification Changes
If you change the current specifications of your yearly/monthly SecMaster to meet your service changes, the following pricing rules are used:
Upgrading the edition or specifications: You need to pay the price difference.
Increasing the quota: You need to pay the price difference.
Currently, SecMaster does not support changing the edition in use to a one with lower specifications. If you want to use SecMaster of an earlier edition, unsubscribe from the one you are using first and subscribe to the one you want.
Assume that you purchased the standard yearly/monthly SecMaster (ECS quota: 1) edition for one month on June 8, 2024 without any discount and you changed SecMaster to the professional edition on June 18, 2024. The price of the old configuration is $2.2 USD/month, and that of the new configuration is $22 USD/month. The formula is as follows:
Specification upgrade fee = New specification price × Remaining period - Old specification price × Remaining period
The remaining period in the formula is the remaining days of each calendar month divided by the maximum days of corresponding calendar month. In this example, the remaining period = 12 (Remaining days in June)/30 (Maximum number of days in June) + 8 (Remaining days in July)/31 (Maximum number of days in July) = 0.6581. Price difference = 22 x 0.6581 – 2.2 x 0.6581 = $13.03 USD
For more information, see Pricing of a Changed Specification.
Impacts of Expiration
Figure 3 describes the status of yearly/monthly SecMaster resources in each phase. After purchasing a resource, it remains operational throughout the billing cycle. This can be referred to as the validity period. If the resource is not renewed after expiration, it enters the grace period and then the retention period.
Expiration reminder
From the seventh day before a yearly/monthly SecMaster edition expires, the system will send an expiration reminder to the creator of the account by email, SMS, and internal message.
Impact of expiration
If your yearly/monthly SecMaster resources expire and are not renewed, the resources enter the grace periods. During the grace period, you can use the SecMaster service.
If you do not renew your yearly/monthly SecMaster before the grace period ends, it goes into the retention period and its status turns to Frozen. You cannot perform any operations on such instances in the retention period.
For details, see Retention Period.
If the yearly/monthly SecMaster resources are still not renewed after the grace period ends, the SecMaster resources will be released, and data cannot be restored.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot