A standalone service center to allow services to register their instance information and to discover providers of a given service

Clone this repo:
  1. e1f79f7 Feature: Add authentication resource scope (#1098) by little-cui · 22 hours ago master
  2. a77c538 able to custom policy schema (#1097) by Shawn · 33 hours ago
  3. f3011a8 业务场景校验添加PATCH (#1100) by 朱程成 · 3 days ago
  4. 301d6c1 skip the illegal kie (#1094) by Sphairis · 8 days ago
  5. 131ccff [SCB-2294]Change: Modify schema without considering service environment (#1093) by little-cui · 11 days ago


Build Status Coverage Status Go Report Card GoDoc HitCount Gitter

Apache ServiceComb Service-Center is a Restful based service-registry that provides micro-services discovery and micro-service management. It is based on Open API format and provides features like service-discovery, fault-tolerance, dynamic routing, notify subscription and scalable by design. It has high performance cache design and separate entity management for micro-services and their instances. It provides out of box support for metrics and tracing. It has a web portal to manage the micro-services.


  • server: a http server which provide restful API
  • scctl: CLI of server
  • syncer: alpha feature. multiple cluster synchronization tool, designed for large microservice architectures


  • Open API: API doc(Open API format) management for microservice
  • Metadata: Metadata management for both microservice and microservice instance
  • Separated: Separated microservice and microservice instance entity management
  • Domains: Logical multiple domains management
  • Security: Role base access control for service discovery
  • Discovery: Support query instance by criteria
  • Subscribe: Use web socket to notify client about instance change events
  • Portal: Awesome web portal
  • Fault tolerance: Multiple fault tolerance mechanism and design in the architecture
  • Performance: Performance/Caching design
  • Metrics: Able to expose Prometheus metric API automatically, see
  • Tracing: Able to report tracing data to Zipkin server
  • Pluginable: Able to load custom authentication, tls and other dynamic libraries
  • CLI: Easy to control service center
  • Kubernetes: Embrace kubernetes ecosystem and support multi cluster service discovery
  • Datacenters: Additional layer of abstraction to clusters deployed in multiple datacenters
  • Aggregation: Able to aggregate microservices from multiple registry platforms and support platform registry and client side registry at the same time
  • FastRegister: Fast register instance to service center


Project documentation is available on the ServiceComb website. You can also find full document here.

Quick Start

Getting Service Center

The easiest way to get Service Center is to use one of the pre-built release binaries which are available for Linux, Windows and Docker.

Running Service Center using the Release

You can download our latest release from ServiceComb Website.When you get these release, you can execute the start script to run Service Center.






docker pull servicecomb/service-center
docker run -d -p 30100:30100 servicecomb/service-center

Note: The Releases of Service-Center uses emebeded etcd, if you want to use the seperate instance of etcd then you can deploy the etcd seperately and configure the etcd ip over here.

vi conf/app.conf

## Edit this file
# registry address
# 1. if registry_plugin equals to 'embedded_etcd'
# manager_name = "sc-0"
# manager_addr = ""
# manager_cluster = "sc-0="
# 2. if registry_plugin equals to 'etcd'
# manager_cluster = ""
manager_cluster = ""

By default the SC comes up on, however you can change the configuration of these address over here.

vi conf/app.conf

httpaddr =
httpport = 30100

Building & Running Service-Center from source


  • Go version 1.9+ is required to build the latest version of Service-Center.

Download the Code

git clone https://github.com/apache/servicecomb-service-center.git $GOPATH/src/github.com/apache/servicecomb-service-center
cd $GOPATH/src/github.com/apache/servicecomb-service-center


you can download dependencies directly using command go mod. Please follow below steps to download all the dependency.

# skip the checksum verifying if you use the private proxy
export GOSUMDB=off

# Download the modules
GO111MODULE=on go mod download
GO111MODULE=on go mod vendor

Build the Service-Center

go build -o service-center github.com/apache/servicecomb-service-center/cmd/scserver

First, you need to run a etcd(version: 3.x) as a database service and then modify the etcd IP and port in the Service Center configuration file (./etc/conf/app.conf : manager_cluster).

wget https://github.com/coreos/etcd/releases/download/v3.1.8/etcd-v3.1.8-linux-amd64.tar.gz
tar -xvf etcd-v3.1.8-linux-amd64.tar.gz
cd etcd-v3.1.8-linux-amd64

cd servicecomb-service-center
cp -r ./etc/conf .

This will bring up Service Center listening on ip/port for service communication.If you want to change the listening ip/port, you can modify it in the Service Center configuration file (./conf/app.conf : httpaddr,httpport).

Build docker image

sudo bash scripts/docker/build-image/build.sh

it builds a image servicecomb/service-center

Running Frontend using the Release

You can download our latest release from ServiceComb Website and then untar it and run start-frontend.sh/start-frontend.bat. This will bring up the Service-Center UI on





Note: By default frontend runs on, if you want to change this then you can change it in conf/app.conf.


You can follow the guide over here to run the Frontend from source.

Get The Latest Release

Download Service Center


Bugs: issues


See Contribution guide for details on submitting patches and the contribution workflow.

Reporting Issues

See reporting bugs for details about reporting any issues.


Licensed under an Apache 2.0 license.

Export Notice

This distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import, possession, or use, and re-export of encryption software, to see if this is permitted. See http://www.wassenaar.org/ for more information.

The Apache Software Foundation has classified this software as Export Commodity Control Number (ECCN) 5D002, which includes information security software using or performing cryptographic functions with asymmetric algorithms. The form and manner of this Apache Software Foundation distribution makes it eligible for export under the “publicly available” Section 742.15(b) exemption (see the BIS Export Administration Regulations, Section 742.15(b)) for both object code and source code.

The following provides more details on the included cryptographic software: