tencent cloud

Last updated: 2025-09-19 15:30:18
FAQs
Last updated: 2025-09-19 15:30:18

Billing

How Is BI Billed?

Business Intelligence (BI) is billed based on the number of users and usage duration, following a yearly/monthly subscription billing mode. For details, refer to the Purchase Guide.

Accounts and Authorization

What Is the Relationship Between Root and Sub-accounts and the Number of Users?

The number of users purchased refers to the total number of root accounts and sub-accounts that can access BI. The root account automatically occupies 1 user slot and is the administrator account responsible for enabling or disabling permissions for other sub-accounts. If you purchase only 1 user, only the root account will be able to log in to use the service.

How to Grant Sub-account the Login Permissions on Tencent Cloud?

1. When introducing collaborators or sub-users, ensure that the root account has already added the collaborators or sub-users to the Tencent Cloud platform.
2. Enable access permissions for the sub-accounts. After adding the collaborators or sub-users, grant the collaborators or sub-users the permission to access BI. You can perform permission configurations for collaborators or sub-accounts in Permission Management > Authorization Management.

Data Connection and Security

Methods for Connecting to Databases.

BI connects to the user databases through JDBC. You need to provide the database IP address, username, and password for the connection.

How to Connect to Private Network Databases and Public Network Databases?

Support 2 connection modes:
1. Public network direct connection mode: Connect to the user database through the public network. Users can configure and control the permissions to access public IP addresses based on requirements. Most database types can use the NAT public network connection mode, but some databases only support private network access.
2. Proxy connection: Some databases cannot connect directly to the public network. In such cases, a jump server can receive and filter requests from the public network and forward the requests to the private network database. This allows BI to connect to private network databases.

How to Ensure Database Connection Security?

BI does not store user data, so users do not need to worry about data leakage. Users can also create database accounts with limited permissions specifically for connecting to BI. Additionally, users can configure security groups to set up NAT Gateways for BI, allowing only the product to access the database. You can view the external NAT Gateways of BI under Project Details > Data > Data Source > Add.
Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback