2022 IEEE International Conference on Service-Oriented System Engineering (SOSE) 2022
DOI: 10.1109/sose55356.2022.00027
|View full text |Cite
|
Sign up to set email alerts
|

Service Mesh and eBPF-Powered Microservices: A Survey and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 74 publications
0
4
0
Order By: Relevance
“…The entire CMX-GW can be statelessly containerized and managed in the cloud, difficulting compromising attacks thanks to available cloud technologies applicable at the orchestrator level. This contributes to reducing the surface attack compared to the one usually present in edge gateways and also increases scalability, availability, and resiliency [37].…”
Section: Secure Communication Path Establishment (P3)mentioning
confidence: 99%
“…The entire CMX-GW can be statelessly containerized and managed in the cloud, difficulting compromising attacks thanks to available cloud technologies applicable at the orchestrator level. This contributes to reducing the surface attack compared to the one usually present in edge gateways and also increases scalability, availability, and resiliency [37].…”
Section: Secure Communication Path Establishment (P3)mentioning
confidence: 99%
“… Networking: powerful packet processing programs can be developed at the kernel level, such as Cilium, to provide load balancing at the kernel level, to bring the service mesh to a deeper level, and to solve the performance problem of Sidecar [5];…”
Section: Features Of Ebpfmentioning
confidence: 99%
“…The term resilience can be defined as the ability of the system to regain its original condition after an unpredicted degradation [10]. Resilience characteristic is achieved in a microservice architecture by using the patterns such as circuit-breaker, retry, bulkhead, and rate limiter patterns [11]- [13]. Out of all the patterns, the circuit breaker is the most often used technique.…”
Section: Introductionmentioning
confidence: 99%