{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:26:12Z","timestamp":1773933972138,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05750-x","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T20:32:59Z","timestamp":1762893179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Resilient microservices: an investigation into Istio effectiveness in Kubernetes"],"prefix":"10.1007","volume":"29","author":[{"given":"Shubham","family":"Singh","sequence":"first","affiliation":[]},{"given":"Cristina Hava","family":"Muntean","sequence":"additional","affiliation":[]},{"given":"Shaguna","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"5750_CR1","doi-asserted-by":"publisher","unstructured":"Singh, S., Muntean, C.H., Gupta, S.: Boosting microservice resilience: An evaluation of istio\u2019s impact on kubernetes clusters under chaos, 245\u2013252 (2024).\u00a0https:\/\/doi.org\/10.1109\/FMEC62297.2024.10710237","DOI":"10.1109\/FMEC62297.2024.10710237"},{"key":"5750_CR2","unstructured":"Kamil: Why you should choose the microservices architecture? Accessed: 27 Jan. 2025 (2019). https:\/\/pretius.com\/blog\/benefits-of-microservices\/"},{"issue":"3","key":"5750_CR3","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TLA.2023.10068850","volume":"21","author":"JG Almaraz-Rivera","year":"2023","unstructured":"Almaraz-Rivera, J.G.: An anomaly-based detection system for monitoring kubernetes infrastructures. IEEE Lat. Am. Trans 21(3), 457\u2013465 (2023). https:\/\/doi.org\/10.1109\/TLA.2023.10068850","journal-title":"IEEE Lat. Am. Trans"},{"key":"5750_CR4","doi-asserted-by":"crossref","unstructured":"Camilli, M., Guerriero, A., Janes, A., Russo, B., Russo, S.: Microservices integrated performance and reliability testing. Journal Name x(x), 41\u201369 (2022).\u00a0https:\/\/doi.org\/x","DOI":"10.1145\/3524481.3527233"},{"key":"5750_CR5","doi-asserted-by":"publisher","first-page":"123044","DOI":"10.1109\/ACCESS.2020.3007338","volume":"8","author":"AK Torkura","year":"2020","unstructured":"Torkura, A.K., Sukmana, M.I., Cheng, F., Christoph, M.: Cloudstrike: chaos engineering for security and resiliency in cloud infrastructure. IEEE Access 8, 123044\u2013123060 (2020)","journal-title":"IEEE Access"},{"key":"5750_CR6","first-page":"272","volume-title":"Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe","author":"L Calcote","year":"2019","unstructured":"Calcote, L., Butcher, Z.: Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe, p. 272. O\u2019Reilly Media, USA (2019)"},{"key":"5750_CR7","doi-asserted-by":"publisher","unstructured":"Ganguli, M., Sunku, R., Ravisundar, S., Layek, A., Ilangovan, D., Verplanke, E.: Challenges and opportunities in performance benchmarking of service mesh for the edge. In: Proceedings of the 2021 IEEE International Conference on Edge Computing (EDGE), pp. 78\u201385 (2021). https:\/\/doi.org\/10.1109\/EDGE53862.2021.00020","DOI":"10.1109\/EDGE53862.2021.00020"},{"issue":"2","key":"5750_CR8","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10664-021-10088-0","volume":"27","author":"M Camilli","year":"2021","unstructured":"Camilli, M., Russo, B.: Modeling performance of microservices systems with growth theory. Journal of Empirical Software Engineering 27(2), 505\u2013514 (2021). https:\/\/doi.org\/10.1007\/s10664-021-10088-0","journal-title":"Journal of Empirical Software Engineering"},{"key":"5750_CR9","doi-asserted-by":"publisher","unstructured":"Ponomarev, K.: Attribute-based access control in service mesh, pp. 1\u20134 (2019). https:\/\/doi.org\/10.1109\/Dynamics47113.2019.8944652","DOI":"10.1109\/Dynamics47113.2019.8944652"},{"key":"5750_CR10","doi-asserted-by":"publisher","unstructured":"Toffetti, G., Brunner, S., Bl\u00f6chlinger, M., Dudouet, F., Edmonds, A.: An architecture for self-managing microservices. Proceedings of the 1st International Workshop on Automated Incident Management in Cloud, 19\u201324 (2015).\u00a0https:\/\/doi.org\/10.1145\/2747470.2747474","DOI":"10.1145\/2747470.2747474"},{"key":"5750_CR11","doi-asserted-by":"publisher","unstructured":"Alhamazani, K., Ranjan, R., Mitra, K., Jayaraman, P.P., Huang, Z., Wang, L., Rabhi, F.: Clams: Cross-layer multi-cloud application monitoring-as-a-service framework. 2014 IEEE International Conference on Services Computing, 283\u2013290 (2014).\u00a0https:\/\/doi.org\/10.1109\/SCC.2014.45","DOI":"10.1109\/SCC.2014.45"},{"key":"5750_CR12","doi-asserted-by":"publisher","unstructured":"Gro\u00dfmann, M., Klug, C.: Monitoring container services at the network edge. 2017 29th International Teletraffic Congress (ITC 29) 1, 130\u2013133 (2017).\u00a0https:\/\/doi.org\/10.23919\/ITC.2017.8064348","DOI":"10.23919\/ITC.2017.8064348"},{"key":"5750_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10088-0","author":"M Camilli","year":"2022","unstructured":"Camilli, M., Russo, B.: Modeling performance of microservices systems with growth theory. Empirical Software Engineering (2022). https:\/\/doi.org\/10.1007\/s10664-021-10088-0","journal-title":"Empirical Software Engineering"},{"key":"5750_CR14","first-page":"328","volume-title":"The Kubernetes Operator Framework Book: Overcome Complex Kubernetes Cluster Management Challenges with Automation Toolkits","author":"M Dame","year":"2022","unstructured":"Dame, M.: The Kubernetes Operator Framework Book: Overcome Complex Kubernetes Cluster Management Challenges with Automation Toolkits, p. 328. Packt Publishing, UK (2022)"},{"key":"5750_CR15","first-page":"626","volume-title":"Mastering Service Mesh: Enhance, Secure, and Observe Cloud-native Applications with Istio, Linkerd, and Consul","author":"A Khatri","year":"2020","unstructured":"Khatri, A., Khatri, V.: Mastering Service Mesh: Enhance, Secure, and Observe Cloud-native Applications with Istio, Linkerd, and Consul, p. 626. Packt Publishing, UK (2020)"},{"key":"5750_CR16","doi-asserted-by":"publisher","unstructured":"El\u00a0Malki, A., Zdun, U.: Guiding Architectural Decision Making on Service Mesh Based Microservice Architectures, pp. 3\u201319 (2019). https:\/\/doi.org\/10.1007\/978-3-030-29983-5_1","DOI":"10.1007\/978-3-030-29983-5_1"},{"key":"5750_CR17","doi-asserted-by":"publisher","unstructured":"Malik, S., Naqvi, S.M., Moonen, L.: Chess: A framework for evaluation of self-adaptive systems based on chaos engineering. In: Proceedings of the 18th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 195\u2013201 (2023).\u00a0https:\/\/doi.org\/10.1109\/SEAMS59076.2023.00033","DOI":"10.1109\/SEAMS59076.2023.00033"},{"key":"5750_CR18","volume-title":"Chaos Engineering: System Resiliency in Practice","author":"C Rosenthal","year":"2020","unstructured":"Rosenthal, C., Jones, N.: Chaos Engineering: System Resiliency in Practice. O\u2019Reilly Media Inc, Sebastopol, CA (2020)"},{"key":"5750_CR19","doi-asserted-by":"publisher","unstructured":"Parikh, A., Kumar, P., Gandhi, P., Sisodia, J.: Monolithic to microservices architecture - a framework for design and implementation, 90\u201396 (2022).\u00a0https:\/\/doi.org\/10.1109\/ICCPC55978.2022.10072238","DOI":"10.1109\/ICCPC55978.2022.10072238"},{"key":"5750_CR20","doi-asserted-by":"publisher","unstructured":"Blinowski, G., Ojdowska, A., Przyby?ek, A.: Monolithic vs. microservice architecture: A performance and scalability evaluation. IEEE Access 10, 20357\u201320374 (2022).\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2022.3152803","DOI":"10.1109\/ACCESS.2022.3152803"},{"key":"5750_CR21","doi-asserted-by":"publisher","unstructured":"Meinke, K., Nycander, P.: Learning-based testing of distributed microservice architectures: Correctness and fault injection. Revised Selected Papers of the SEFM 2015 Collocated Workshops on Software Engineering and Formal Methods - Volume 9509, 3\u201310 (2015).\u00a0https:\/\/doi.org\/10.1007\/978-3-662-49224-6_1","DOI":"10.1007\/978-3-662-49224-6_1"},{"key":"5750_CR22","doi-asserted-by":"publisher","unstructured":"Karn, R., Das, R., Pant, D., Heikkonen, J., Kanth, R.: Automated testing and resilience of microservice\u2019s network-link using istio service mesh. Proceedings of the 31st Conference of Open Innovations Association FRUCT 31 (2022).\u00a0https:\/\/doi.org\/10.23919\/FRUCT54823.2022.9770890","DOI":"10.23919\/FRUCT54823.2022.9770890"},{"key":"5750_CR23","doi-asserted-by":"publisher","unstructured":"Faticanti, F., Santoro, D., Cretti, S., Siracusa, D.: An application of kubernetes cluster federation in fog computing. Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks (ICIN), 89\u201391 (2021).\u00a0https:\/\/doi.org\/10.1109\/ICIN51074.2021.9385548","DOI":"10.1109\/ICIN51074.2021.9385548"},{"key":"5750_CR24","doi-asserted-by":"publisher","unstructured":"Shamim, M.S.I., Gibson, J., Morrison, P., Rahman, A.: Benefits, challenges, and research topics: A multi-vocal literature review of kubernetes. arXiv preprint:\u00a0arXiv:2211.07032 (2022).\u00a0https:\/\/doi.org\/10.48550\/arXiv.2211.07032","DOI":"10.48550\/arXiv.2211.07032"},{"key":"5750_CR25","doi-asserted-by":"crossref","unstructured":"Li, W., Lemieux, Y., Gao, J., Zhao, Z., Han, Y.: Service mesh: Challenges, state of the art, and future research opportunities. 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), 122\u20131225 (2019)","DOI":"10.1109\/SOSE.2019.00026"},{"key":"5750_CR26","doi-asserted-by":"publisher","unstructured":"Chawla, V.: Exploring how service meshes can help to facilitate the development of microservices. IEEE 15th International Conference on Software Engineering and Service Science (ICSESS), 35\u201343 (2024).\u00a0https:\/\/doi.org\/10.1109\/ICSESS62520.2024.10719389","DOI":"10.1109\/ICSESS62520.2024.10719389"},{"key":"5750_CR27","doi-asserted-by":"publisher","unstructured":"Hasanth, K.M., Nadig, D.: Evaluating the performance of sidecar-based and sidecarless cloud-native service mesh solutions. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 1\u20136 (2024).\u00a0https:\/\/doi.org\/10.1109\/ANTS63515.2024.10897788","DOI":"10.1109\/ANTS63515.2024.10897788"},{"key":"5750_CR28","doi-asserted-by":"publisher","unstructured":"Farkiani, B., Jain, R.: Service mesh: Architectures, applications, and implementations. arXiv preprint:\u00a0arXiv:2405.13333 (2024).\u00a0https:\/\/doi.org\/10.48550\/arXiv.2405.13333","DOI":"10.48550\/arXiv.2405.13333"},{"key":"5750_CR29","unstructured":"Last9: Comparing Popular Service Mesh Offerings. https:\/\/last9.io\/blog\/comparing-popular-service-mesh-offerings\/. Accessed: 2024-03-20 (2024)"},{"key":"5750_CR30","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.future.2021.04.001","volume":"122","author":"J Simonsson","year":"2021","unstructured":"Simonsson, J., Zhang, L., Morin, B., Baudry, Benoit, Monperrus, M.: Observability and chaos engineering on the system calls for containerized applications in docker. Future Generation Computer Systems 122, 117\u2013129 (2021)","journal-title":"Future Generation Computer Systems"},{"key":"5750_CR31","unstructured":"Locust Authors: What is Locust? Locust. [Online; accessed 19-July-2023] (2023). https:\/\/docs.locust.io\/en\/stable\/what-is-locust.html"},{"key":"5750_CR32","doi-asserted-by":"publisher","unstructured":"Al-Masri, Z., Mohamed, N., Ouzzani, M.: Optimization of business process execution in services architecture: A systematic literature review. IEEE Access 9, 144245\u2013144269 (2021).\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2021.3102668","DOI":"10.1109\/ACCESS.2021.3102668"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05750-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:08:56Z","timestamp":1773925736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05750-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,11]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5750"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05750-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,11]]},"assertion":[{"value":"1 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"27"}}