GitHub - alibaba/Sentinel: A lightweight flow-control library providing high-available protection and monitoring (高可用防护的流量管理框架)

Sentinel Logo

Travis Build Status Maven Central License Gitter

What Does It Do?

As distributed systems become increasingly popular, the stability between services is becoming more important than ever before. Sentinel takes "flow" as breakthrough point, and works on multiple fields including flow control, concurrency, circuit breaking and load protection, to protect service stability.

Sentinel has the following features:

  • Rich applicable scenarios: Sentinel has been wildly used in Alibaba, and has covered almost all the core-scenarios in Double-11 Shopping Festivals in the past 10 years, such as “Second Kill” which needs to limit burst flow traffic to meet the system capacity, message peak clipping and valley fills, degrading unreliable downstream applications, etc.

  • Integrated monitor module: Sentinel also provides real-time monitoring function. You can see the runtime information of a single machine in real-time, and the summary runtime info of a cluster with less than 500 nodes.

  • Easy extension point: Sentinel provides easy-to-use extension points that allow you to quickly customize your logic, for example, custom rule management, adapting data sources, and so on.


See the 中文文档 for Chinese readme.

See the Wiki for full documentation, examples, operational details and other information.

See the Javadoc for the API.

If you are using Sentinel, please leave a comment here to tell us your use scenario to make Sentinel better :-)

Quick Start

Below is a simple demo that guides new users to use Sentinel in just 3 steps. It also shows how to monitor this demo using the dashboard.

1.Download Library

Note: Sentinel requires Java 6 or later.

If your application is build in maven, just add the following code in pom.xml.


If not, you can download JAR in Maven Center Repository.

2.Define Resource

Wrap code snippet via Sentinel API: SphU.entry("RESOURCENAME") and entry.exit(). In below example, it is System.out.println("hello world");:

Entry entry = null;

try {   
  entry = SphU.entry("HelloWorld");
  // BIZ logic being protected
  System.out.println("hello world");
} catch (BlockException e) {
  // handle block logic
} finally {
  // make sure that the exit() logic is called
  if (entry != null) {

So far the code modification is done.

3.Define Rules

If we want to limit the access times of the resource, we can define rules. The following code defines a rule that limits access to the reource to 20 times per second at the maximum.

List<FlowRule> rules = new ArrayList<FlowRule>();
FlowRule rule = new FlowRule();
// set limit qps to 20

4. Check the Result

After running the demo for a while, you can see the following records in ~/logs/csp/${appName}

|--timestamp-|------date time----|--resource-|p |block|s |e|rt
1529998904000|2018-06-26 15:41:44|hello world|20|0    |20|0|0
1529998905000|2018-06-26 15:41:45|hello world|20|5579 |20|0|728
1529998906000|2018-06-26 15:41:46|hello world|20|15698|20|0|0
1529998907000|2018-06-26 15:41:47|hello world|20|19262|20|0|0
1529998908000|2018-06-26 15:41:48|hello world|20|19502|20|0|0
1529998909000|2018-06-26 15:41:49|hello world|20|18386|20|0|0

p stands for incoming request, block for intercepted by rules, success for success handled, e for exception, rt for average response time (ms)

This shows that the demo can print "hello world" 20 times per second.

More examples and information can be found in the How To Use section.

The working principles of Sentinel can be found in How it works section.

Samples can be found in the sentinel-demo module.

5.Start Dashboard

Sentinel also provides a simple dashboard application, on which you can monitor the clients and configure the rules in real time.

For details please refer to Dashboard.

Trouble Shooting and Logs

Sentinel will generate logs for troubleshooting. All the information can be found in logs.

Bugs and Feedback

For bug report, questions and discussions please submit GitHub Issues.

Contact us: [email protected]


Contributions are always welcomed! Please see CONTRIBUTING for detailed guidelines.


  1. Remote XSS Attack Using CSRF in PayPal's Partner Site to Gain Unauthorized access to Victim's Account
  2. sysdream/hershell
  3. zcgonvh/NTDSDumpEx: NTDS.dit offline dumper with non-elevated
  4. joarleymoraes/net_guard: A command line tool to detect new unknown device in your network using ARP protocol
  5. PHP CVE-2018-5711 - Hanging Websites by a Harmful GIF