{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T01:22:14Z","timestamp":1776993734205,"version":"3.51.4"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2020,12,31]]},"abstract":"<jats:p>Microservices changed cloud computing by moving the applications\u2019 complexity from one monolithic executable to thousands of network interactions between small components. Given the increasing deployment sizes, the architectural exploitation challenges, and the impact on data-centers\u2019 power consumption, we need to efficiently track this complexity. Within this article, we propose a black-box monitoring approach to track microservices at scale, focusing on architectural metrics, power consumption, application performance, and network performance. The proposed approach is transparent w.r.t. the monitored applications, generates less overhead w.r.t. black-box approaches available in the state-of-the-art, and provides fine-grain accurate metrics.<\/jats:p>","DOI":"10.1145\/3418899","type":"journal-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T23:16:11Z","timestamp":1605050171000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["A Black-box Monitoring Approach to Measure Microservices Runtime Performance"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2085-0542","authenticated-orcid":false,"given":"Rolando","family":"Brondolin","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milano, ITA"}]},{"given":"Marco D.","family":"Santambrogio","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, ITA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Amedeo Asnaghi M. Ferroni and M. D. Santambrogio. 2016. DockerCap: A software-level power capping orchestrator for docker containers. In Proceedings of the Conference on Computational Science and Engineering (CSE\u201916) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC\u201916) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES\u201916). IEEE 90--97.  Amedeo Asnaghi M. Ferroni and M. D. Santambrogio. 2016. DockerCap: A software-level power capping orchestrator for docker containers. In Proceedings of the Conference on Computational Science and Engineering (CSE\u201916) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC\u201916) and 15th International Symposium on Distributed Computing and Applications for Business Engineering (DCABES\u201916). IEEE 90--97.","DOI":"10.1109\/CSE-EUC-DCABES.2016.166"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434209100500306"},{"key":"e_1_2_1_3_1","unstructured":"BCC. 2020. BPF Compiler Collection (BCC). Retrieved from https:\/\/www.iovisor.org\/technology\/bcc.  BCC. 2020. BPF Compiler Collection (BCC). Retrieved from https:\/\/www.iovisor.org\/technology\/bcc."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316214"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566736"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373400.3373404"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201918)","author":"Brondolin Rolando","unstructured":"Rolando Brondolin , Tommaso Sardelli , and Marco D. Santambrogio . 2018. DEEP-mon: Dynamic and energy efficient power monitoring for container-based infrastructures . In Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201918) . IEEE, 676--684. Rolando Brondolin, Tommaso Sardelli, and Marco D. Santambrogio. 2018. DEEP-mon: Dynamic and energy efficient power monitoring for container-based infrastructures. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201918). IEEE, 676--684."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898442.2898444"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254046"},{"key":"e_1_2_1_10_1","volume-title":"Raffaele Della Corte, and Antonio Pecchia","author":"Cinque Marcello","year":"2019","unstructured":"Marcello Cinque , Raffaele Della Corte, and Antonio Pecchia . 2019 . Microservices monitoring with event logs and black box execution tracing. IEEE Trans. Serv. Comput . (2019). Marcello Cinque, Raffaele Della Corte, and Antonio Pecchia. 2019. Microservices monitoring with event logs and black box execution tracing. IEEE Trans. Serv. Comput. (2019)."},{"key":"e_1_2_1_11_1","unstructured":"Cncflandscape. 2020. CNCF Cloud Native Landscape. Retrieved from https:\/\/landscape.cncf.io.  Cncflandscape. 2020. CNCF Cloud Native Landscape. Retrieved from https:\/\/landscape.cncf.io."},{"key":"e_1_2_1_12_1","volume-title":"Retrieved on","author":"Datadog Datadog","year":"2020","unstructured":"Datadog [n.d.]. Datadog . Retrieved on July 2020 from https:\/\/www.datadoghq.com. Datadog [n.d.]. Datadog. Retrieved on July 2020 from https:\/\/www.datadoghq.com."},{"key":"e_1_2_1_13_1","volume-title":"\u201cperf","author":"De Melo Arnaldo Carvalho","unstructured":"Arnaldo Carvalho De Melo . 2010. The new linux \u201cperf \u201d tools. In Slides from Linux Kongress , Vol. 18 . 1--42. Arnaldo Carvalho De Melo. 2010. The new linux \u201cperf\u201d tools. In Slides from Linux Kongress, Vol. 18. 1--42."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2717491.2717496"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the Italian Conference on Cybersecurity.","author":"Deri Luca","year":"2019","unstructured":"Luca Deri , Samuele Sabella , and Simone Mainardi . 2019 . Combining system visibility and security using eBPF . In Proceedings of the Italian Conference on Cybersecurity. Luca Deri, Samuele Sabella, and Simone Mainardi. 2019. Combining system visibility and security using eBPF. In Proceedings of the Italian Conference on Cybersecurity."},{"key":"e_1_2_1_16_1","unstructured":"Docker 2020. Docker. Retrieved from https:\/\/www.docker.com.  Docker 2020. Docker. Retrieved from https:\/\/www.docker.com."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3199610.3199615"},{"key":"e_1_2_1_18_1","unstructured":"Martin Fowler and James Lewis. 2014. Microservices\u2014A definition of this new architectural term. Retrieved from http:\/\/martinfowler. com\/articles\/microservices.html.  Martin Fowler and James Lewis. 2014. Microservices\u2014A definition of this new architectural term. Retrieved from http:\/\/martinfowler. com\/articles\/microservices.html."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304004"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272680.1272685"},{"key":"e_1_2_1_22_1","volume-title":"Sevcik","author":"Lazowska Edward D.","year":"1984","unstructured":"Edward D. Lazowska , John Zahorjan , G. Scott Graham , and Kenneth C . Sevcik . 1984 . Quantitative System Performance: Computer System Analysis Using Queueing Network Models. Prentice-Hall , Inc. Edward D. Lazowska, John Zahorjan, G. Scott Graham, and Kenneth C. Sevcik. 1984. Quantitative System Performance: Computer System Analysis Using Queueing Network Models. Prentice-Hall, Inc."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3013948"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2004.04.001"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352135"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.44"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the USENIX Winter Conference","volume":"93","author":"McCanne Steven","year":"1993","unstructured":"Steven McCanne and Van Jacobson . 1993 . The BSD packet filter: A new architecture for user-level packet capture . In Proceedings of the USENIX Winter Conference , Vol. 93 . Steven McCanne and Van Jacobson. 1993. The BSD packet filter: A new architecture for user-level packet capture. In Proceedings of the USENIX Winter Conference, Vol. 93."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987264"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the Department of Defense HPCMP Users Group Conference","volume":"710","author":"Mucci Philip J.","year":"1999","unstructured":"Philip J. Mucci , Shirley Browne , Christine Deane , and George Ho . 1999 . PAPI: A portable interface to hardware performance counters . In Proceedings of the Department of Defense HPCMP Users Group Conference , Vol. 710 . Philip J. Mucci, Shirley Browne, Christine Deane, and George Ho. 1999. PAPI: A portable interface to hardware performance counters. In Proceedings of the Department of Defense HPCMP Users Group Conference, Vol. 710."},{"key":"e_1_2_1_30_1","unstructured":"Barak Naveh et\u00a0al. 2008. JGraphT. Retrieved from http:\/\/jgrapht. sourceforge. net.  Barak Naveh et\u00a0al. 2008. JGraphT. Retrieved from http:\/\/jgrapht. sourceforge. net."},{"key":"e_1_2_1_31_1","volume-title":"Retrieved on","author":"NewRelic Newrelic","year":"2020","unstructured":"Newrelic [n.d.]. NewRelic . Retrieved on July 2020 from https:\/\/newrelic.com. Newrelic [n.d.]. NewRelic. Retrieved on July 2020 from https:\/\/newrelic.com."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00035"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548311"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.67"},{"key":"e_1_2_1_35_1","volume-title":"Retrieved on","author":"Prometheus Prometheus","year":"2020","unstructured":"Prometheus [n.d.]. Prometheus . Retrieved on July 2020 from https:\/\/prometheus.io. Prometheus [n.d.]. Prometheus. Retrieved on July 2020 from https:\/\/prometheus.io."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2012.12"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451124"},{"key":"e_1_2_1_38_1","volume-title":"Retrieved on","year":"2020","unstructured":"sysdig [n.d.]. Sysdig. Retrieved on July 2020 from https:\/\/sysdig.com. sysdig [n.d.]. Sysdig. Retrieved on July 2020 from https:\/\/sysdig.com."},{"key":"e_1_2_1_39_1","volume-title":"Retrieved on","year":"2020","unstructured":"tcpdump [n.d.]. Tcpdump. Retrieved on July 2020 from http:\/\/www.tcpdump.org. tcpdump [n.d.]. Tcpdump. Retrieved on July 2020 from http:\/\/www.tcpdump.org."},{"key":"e_1_2_1_40_1","volume-title":"Weave scope. Retrieved on","year":"2020","unstructured":"weavescope [n.d.]. Weave scope. Retrieved on July 2020 from https:\/\/www.weave.works\/oss\/scope\/. weavescope [n.d.]. Weave scope. Retrieved on July 2020 from https:\/\/www.weave.works\/oss\/scope\/."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. 211--217","author":"Zhai Yan","year":"2014","unstructured":"Yan Zhai , Xiao Zhang , Stephane Eranian , Lingjia Tang , and Jason Mars . 2014 . HaPPy: Hyperthread-aware power profiling dynamically . In Proceedings of the USENIX Annual Technical Conference. 211--217 . Yan Zhai, Xiao Zhang, Stephane Eranian, Lingjia Tang, and Jason Mars. 2014. HaPPy: Hyperthread-aware power profiling dynamically. In Proceedings of the USENIX Annual Technical Conference. 211--217."}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3418899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:28Z","timestamp":1750197748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3418899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,10]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,31]]}},"alternative-id":["10.1145\/3418899"],"URL":"https:\/\/doi.org\/10.1145\/3418899","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,10]]},"assertion":[{"value":"2020-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}