このページは、お客様の言語ではご利用いただけません。Huawei Cloudは、より多くの言語バージョンを追加するために懸命に取り組んでいます。ご協力ありがとうございました。
- What's New
- Function Overview
- Service Overview
-
Billing
- Billing Overview
- Billing Modes
- Billing Items
- Billing Examples
- Changing the Billing Mode
- Renewing Your Subscription
- Bills
- About Arrears
- Billing Termination
- Cost Management
-
Billing FAQs
- How Is SecMaster Billed?
- Can I Use SecMaster for Free?
- How Do I Change or Disable Auto Renewal for SecMaster?
- Will SecMaster Be Billed After It Expires?
- How Do I Renew SecMaster?
- Where Can I Unsubscribe from SecMaster?
- Where Can I View the Remaining Quotas of Security Data Collection and Security Data Packages?
- Can I Change the Billing Mode for SecMaster?
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Checking Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threats
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Data Collection Process
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Verifying Log Collection
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- FAQs
- Change History
-
User Guide (Kuala Lumpur Region)
- Service Overview
- Authorizing SecMaster
- Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
-
Risk Prevention
-
Baseline Inspection
- Baseline Inspection Overview
- Creating a Custom Check Plan
- Starting an Immediate Baseline Check
- Viewing Check Results
- Handling Check Results
- Viewing Compliance Packs
- Creating a Custom Compliance Pack
- Importing and Exporting a Compliance Pack
- Viewing Check Items
- Creating a Custom Check Item
- Importing and Exporting Check Items
- Vulnerability Management
- Policy Management
-
Baseline Inspection
-
Threat Operations
- Incident Management
- Alert Management
- Indicator Management
- Intelligent Modeling
- Security Analysis
- Data Delivery
-
Security Orchestration
- Security Orchestration Overview
- Built-in Playbooks
- Security Orchestration Process
- (Optional) Configuring and Enabling a Workflow
- Configuring and Enabling a Playbook
- Operation Object Management
- Playbook Orchestration Management
- Layout Management
- Plug-in Management
- Settings
-
FAQs
-
Product Consulting
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Issues About Data Synchronization and Data Consistency
- About Data Collection Faults
-
Product Consulting
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Bills
You can view bills in the Billing Center to learn about the usage and billing details of the resource in a certain period.
Bill Generation
After you pay for a yearly/monthly resource, a bill is reported to the billing system in real time for settlement.
The usage of pay-per-use resources is reported to the billing system at a fixed interval. Pay-per-use products can be settled by the hour, day, or month based on the usage type. Pay-per-use SecMaster resources are settled by the hour.
You are not charged immediately after a billing record is generated. For example, if SecMaster (which is billed on an hourly basis) is disabled at 08:30, your expenditures for the hour from 08:00 to 09:00 will not likely be billed until about 10:00. On the Billing Center > Billing > Transactions and Detailed Bills > Transaction Bills page, Expenditure Time indicates the time when a pay-per-use product is used.
Viewing Bills of a Specific Resource
- Log in to the management console.
- In the upper right corner of the page, choose Billing & Costs > Bills.
- In the navigation tree on the left, choose Billing > Expenditure Details.
- In the Settings area, click
, select Service Type, and then select SecMaster(SecMaster) in the Service Type column. The system displays the bills of the service.
By default, expenditure details are displayed by usage and the statistical period is a billing cycle. You can also set other statistical dimensions and periods.
Checking the Consistency of the Actual Usage and Billed Usage
Assume that a customer purchased the professional edition pay-per-use SecMaster (ECS quota: 1) at 10:09:06 on April 8, 2024 and deleted it at 12:09:06 on April 8, 2024.
- SecMaster transaction bill
In pay-per-use billing mode, SecMaster is billed by the second and the bill is settled hourly. You can check the information about each billing period in the transaction bill. For details, see Table 1.
Table 1 SecMaster transaction bill Service Type
SecMaster
Resource Type
SecMaster Professional
Billing Mode
Pay-per-use billing
Expenditure Time
From 10:09:06 on April 08, 2024 to 12:09:06 on April 08, 2024, 3 transaction bills were generated:
- 2024/04/08 10:09:06 - 2024/04/08 11:00:00
- 2024/04/08 11:00:00 - 2024/04/08 12:00:00
- 2024/04/08 12:00:00 - 2024/04/08 12:09:06
List Price
List price = Usage x Unit price
In this example, the usage of SecMaster in the first billing period is 3,054 seconds. If the unit price is $0.05/ECS/hour, the list price is (3,054 ÷ 3,600) x 0.05 = $0.04241667. You can query the actual unit price in SecMaster Pricing Details. Similarly, you can calculate the SecMaster list price for other billing periods.
Discount
Discounts offered for cloud services, for example, commercial discounts, partner authorized discounts, and promotional discounts. Discounts are based on the list prices.
Truncated Amount
Huawei Cloud bills a resource with the price accurate to the eighth decimal place. However, the amount due is truncated to the second decimal place, while the third and later decimal places are referred to as the truncated amount.
Take the first billing period as an example. The truncated amount is $0.00241667 USD.
Amount Due
Amount due = List price – Discount amount – Truncated amount
Take the first period as an example. If the discount amount is 0, the amount due is $0.04 USD (0.04241667 - 0 - 0.00241667).
- SecMaster bill details
Bill details are displayed by multiple dimensions. By default, the bill details of a resource are displayed by usage and by billing cycle. You can check bill details by referring to Table 2.
Table 2 SecMaster bill details Service Type
SecMaster
Resource Type
SecMaster professional
Billing Mode
Pay-per-use
Resource Name/ID
SecMaster Edition and ID
Example: professional, f31d48c3-2613-44a2-a145-c82573e23967
Specifications
SecMaster edition
In this example, the SecMaster professional edition is purchased.
Usage Type
In pay-per-use billing, the usage type is Required Duration.
Unit Price
When pay-per-use billing is used, the unit price is only provided if the amount is equal to the usage multiplied by the unit price.
When pay-per-use billing is used, the unit price is only provided if the amount is equal to the usage multiplied by the unit price. You can query the unit price in SecMaster Pricing Details.
Unit
Unit price in SecMaster Pricing Details: USD/ECS/hour or USD/time/hour
Usage
The usage is displayed by the unit price, which is USD/ECS/hour for SecMaster. The SecMaster usage is measured by the hour. In this example, the total usage is 2 hours.
Usage Unit
Hour
List Price
List price = Usage x Unit price
In this example, the usage duration is 2 hours. If the unit price is $0.05/ECS/hour or $0.05/time/hour, the list price is $0.10 (2 x 0.05). You can query the real unit price on the SecMaster Pricing Details page.
Discount
Discounts offered for cloud services, for example, commercial discounts, partner authorized discounts, and promotional discounts. Discounts are based on the list prices.
Amount Due
Amount that should be paid for used cloud services after discounts are applied.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot