tencent cloud

Tencent Cloud EdgeOne

Release Notes and Announcements
Release Notes
Security Announcement
Announcements
Product Introduction
Overview
Strengths
Use Cases
Comparison Between EdgeOne and CDN Products
Use Limits
Purchase Guide
Description of Trial Plan Experience Benefits
Free Plan Guide
Billing Overview
Billing Items
Subscriptions
Renewals
Instructions for overdue and refunds
Comparison of EdgeOne Plans
About "clean traffic" billing instructions
DDoS Protection Capacity Description
Getting Started
Choose business scenario
Quick access to website security acceleration
Quick deploying a website with Pages
Domain Service&Origin Configuration
Domain Service
HTTPS Certificate
Origin Configuration
Site Acceleration
Overview
Access Control
Smart Acceleration
Cache Configuration
File Optimization
Network Optimization
URL Rewrite
Modifying Header
Modify the response content
Rule Engine
Image&Video Processing
Speed limit for single connection download
DDoS & Web Protection
Overview
DDoS Protection
Web Protection
Bot Management
API Discovery(Beta)
Edge Functions
Overview
Getting Started
Operation Guide
Runtime APIs
Sample Functions
Best Practices
Pages
L4 Proxy
Overview
Creating an L4 Proxy Instance
Modifying an L4 Proxy Instance
Disabling or Deleting an L4 Proxy Instance
Batch Configuring Forwarding Rules
Obtaining Real Client IPs
Data Analysis&Log Service
Log Service
Data Analysis
Alarm Service
Site and Billing Management
Billing Management
Site Management
Version Management
General Policy
General Reference
Configuration Syntax
Request and Response Actions
Country/region and Corresponding Codes
Terraform
Overview
Installing and Configuring Terraform
Practical Tutorial
EdgeOne Skill User Guide
Automatic Warm-up/Cache Purge
Resource Abuse/hotlinking Protection Practical
HTTPS Related Practices
Acceleration Optimization
Scheduling Traffic
Data Analysis and Alerting
Log Platform Integration Practices
Configuring Origin Servers for Cloud Object Storage (Such As COS)
CORS Response Configuration
API Documentation
History
Introduction
API Category
Making API Requests
Site APIs
Acceleration Domain Management APIs
Site Acceleration Configuration APIs
Edge Function APIs
Alias Domain APIs
Security Configuration APIs
Layer 4 Application Proxy APIs
Content Management APIs
Data Analysis APIs
Log Service APIs
Billing APIs
Certificate APIs
Origin Protection APIs
Load Balancing APIs
Diagnostic Tool APIs
Custom Response Page APIs
API Security APIs
DNS Record APIs
Content Identifier APIs
Legacy APIs
Ownership APIs
Image and Video Processing APIs
Multi-Channel Security Gateway APIs
Version Management APIs
Data Types
Error Codes
FAQs
Product Features FAQs
DNS Record FAQs
Domain Configuration FAQs
Site Acceleration FAQs
Data and Log FAQs
Security Protection-related Queries
Origin Configuration FAQs
Troubleshooting
Reference for Abnormal Status Codes
Troubleshooting Guide for EdgeOne 4XX/5XX Status Codes
520/524 Status Code Troubleshooting Guide
521/522 Status Code Troubleshooting Guide
Tool Guide
Agreements
Service Level Agreement
Origin Protection Enablement Conditions of Use
TEO Policy
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary
DocumentationTencent Cloud EdgeOne Purchase Guide About "clean traffic" billing instructions

About "clean traffic" billing instructions

PDF
Focus Mode
Font Size
Last updated: 2024-04-16 17:20:45
EdgeOne uses a "clean traffic" billing mode: requests intercepted by security protection features are not billed, and only the traffic and request usage after being processed by security protection features are billed. This method aims to provide users with a more transparent billing mode, help users better manage their budget, and pay for truly valuable business usage.




Definition

In the one-stop security acceleration service provided by EdgeOne, rich security features are included, such as network layer and application layer DDoS protection, rate limiting, vulnerability attack protection, and Bot management. These features help you identify and filter different types of malicious traffic. When requests or Layer 4 proxy traffic pass through EdgeOne, the security protection features will intercept or filter the requests or Layer 4 proxy traffic according to your configuration. In this process, the intercepted or filtered traffic will not be counted in the usage and will not generate billing fees. The remaining requests are "clean traffic", which will be further processed by content delivery and edge functions according to the configuration, counted in the "clean traffic" usage, and billed.

For example, the site www.example.com has accessed EdgeOne and configured a rate-limiting rule, which distinguishes and counts requests to the /login path based on the client IP and intercepts clients with more than 10 requests per second. During an operational event, some clients initiated a large number of high-frequency visits to the business and triggered the rate-limiting rule. This rule intercepted a total of 200,000 requests. According to EdgeOne's "clean traffic" billing mode, these 200,000 requests intercepted by the security rule will not be counted in the site's request usage.
Note:
If you have currently purchased the exclusive DDoS protection for the Chinese mainland availability zone, the attack exceeding the base protection bandwidth will still be measured and billed according to the elastic protection bandwidth.

Does "clean traffic" billing mean that all attacks and malicious requests will not be billed?

EdgeOne only bills for "clean traffic", which means that when the traffic is filtered or intercepted by the security policy, this part of the traffic will not be billed. When the traffic is not filtered or intercepted by the security policy, this part of the traffic and requests will still be billed. Therefore, in the following scenarios (including but not limited to), the traffic and requests generated by attacks or malicious visits will still be billed:

Scenario 1: Security policy configured in "observation" mode

To help you conveniently evaluate security policies, EdgeOne's Web Protection and Bot management features both provide an observation mode option. Please note that security modules and rules configured in observation mode only record logs for matched requests and do not intercept or dispose of them. Therefore, attack traffic that only hits the observation mode will still generate usage billing.

Usage suggestion: After completing the necessary evaluation, adjust the security policy to intercept or appropriate disposal actions as soon as possible to avoid attack traffic generating usage fees.


Scenario 2: Overly loose protection exception rules

EdgeOne provides protection exception rules to help you allow trusted clients. Requests that match the protection exception rules will skip one or more security modules and will not be scanned and processed. When attack traffic hits the protection exception rules, it may cause protection to pass through. This part of the pass-through attack traffic will generate usage billing.

Usage suggestion: When configuring protection exception rules, try to tighten and configure precise matching conditions (e.g., precise client IP list) to avoid overly loose protection exception rules causing attack traffic to pass through, resulting in business risks and usage fees.


Scenario 3: Pass-through caused by delayed protection effectiveness

In the security features provided by EdgeOne, some features need to be statistically analyzed before they can be triggered and take effect, so there is a certain delay in effectiveness, including (but not limited to) DDoS protection, CC attack defense, rate limiting, Bot intelligent analysis, etc. Before these features are triggered and take effect, they cannot effectively protect against attacks, and this part of the traffic will generate usage billing.

Usage suggestion: For known attack sources, you can use custom rules and other instantly effective protection strategies to reduce the security risks and usage billing caused by policy effectiveness delays.


Scenario 4: Need for more advanced security features and protection policies

As the offense and defense confrontation escalates, some attack modes cannot be intercepted and protected by basic security features and require more advanced security features to effectively identify. Such attacks may pose business risks and generate usage billing.

Usage suggestion: If you believe your business is under attack by unknown methods or you need to use more advanced security features to further strengthen your current policy, consider upgrading your plan or contacting EdgeOne technical support. We will assist you in improving your business security policy.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback