{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:02:57Z","timestamp":1726851777280},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10664-023-10348-1","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T07:02:07Z","timestamp":1693292527000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On practitioners\u2019 concerns when adopting service mesh frameworks"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3317-1995","authenticated-orcid":false,"given":"Yihao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Fernandes","sequence":"additional","affiliation":[]},{"given":"Bram","family":"Adams","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"10348_CR1","doi-asserted-by":"crossref","unstructured":"Allamanis M, Sutton C (2013) Why, when, and what: analyzing stack overflow questions by topic, type, and code. In: Proceedings of the 10th Working Conference on Mining Software Repositories (MSR). pp 53\u201356","DOI":"10.1109\/MSR.2013.6624004"},{"key":"10348_CR2","doi-asserted-by":"crossref","unstructured":"Alshuqayran N, Ali N, Evans R (2016) A systematic mapping study in microservice architecture. In: Proceedings of the 9th International Conference on Service-Oriented Computing and Applications (SOCA). pp 44\u201351","DOI":"10.1109\/SOCA.2016.15"},{"key":"10348_CR3","doi-asserted-by":"crossref","unstructured":"Aly M, Khomh F, Yacout S (2021) What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions. Internet of Things 14:100364","DOI":"10.1016\/j.iot.2021.100364"},{"issue":"3","key":"10348_CR4","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s10664-012-9231-y","volume":"19","author":"A Barua","year":"2014","unstructured":"Barua A, Thomas SW, Hassan AE (2014) What are developers talking about? an analysis of topics and trends in stack overflow. Empir Softw Eng 19(3):619\u2013654","journal-title":"Empir Softw Eng"},{"issue":"6","key":"10348_CR5","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1109\/32.6156","volume":"14","author":"V Basili","year":"1988","unstructured":"Basili V, Rombach H (1988) The TAME project: Towards improvement-oriented software environments. IEEE Trans Softw Eng 14(6):758\u2013773","journal-title":"IEEE Trans Softw Eng"},{"key":"10348_CR6","unstructured":"Ben-Kiki O, Evans C, Ingerson B (2009) Yaml ain\u2019t markup language (yaml\u2122) version 1.1. Working Draft 2008 5:11"},{"key":"10348_CR7","unstructured":"Bevana N, Kirakowskib J, Maissela J (1991) What is usability? In: Proceedings of the 4th International Conference on Human-Computer Interaction (HCI International). pp 1\u20135"},{"key":"10348_CR8","doi-asserted-by":"crossref","unstructured":"Blei DM, Lafferty JD (2006) Dynamic topic models. In: Proceedings of the 23rd International Conference on Machine Learning (ICML). pp 113\u2013120","DOI":"10.1145\/1143844.1143859"},{"key":"10348_CR9","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. The Journal of Machine Learning Research 3:993\u20131022","journal-title":"The Journal of Machine Learning Research"},{"key":"10348_CR10","unstructured":"Bourne V (2022) Annual apis and integration report - 2022. Tech. rep., Software AG. URL https:\/\/www.softwareag.com\/en_corporate\/resources\/asset\/ar\/integrationapi\/apis-integration-microservices-report.html"},{"key":"10348_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436","volume":"110","author":"C Buck","year":"2021","unstructured":"Buck C, Olenberger C, Schweizer A, V\u00f6lter F, Eymann T (2021) Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zerotrust. Computers & Security 110:102436","journal-title":"Computers & Security"},{"issue":"5","key":"10348_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2890784","volume":"59","author":"B Burns","year":"2016","unstructured":"Burns B, Grant B, Oppenheimer D, Brewer E, Wilkes J (2016) Borg, omega, and kubernetes. Commun ACM 59(5):50\u201357","journal-title":"Commun ACM"},{"issue":"3","key":"10348_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/4236.769420","volume":"3","author":"V Cardellini","year":"1999","unstructured":"Cardellini V, Colajanni M, Yu PS (1999) Dynamic load balancing on web-server systems. IEEE Internet Computing 3(3):28\u201339","journal-title":"IEEE Internet Computing"},{"key":"10348_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106603","volume":"137","author":"P Chakraborty","year":"2021","unstructured":"Chakraborty P, Shahriyar R, Iqbal A, Uddin G (2021) How do developers discuss and support new programming languages in technical q &a site? an empirical study of go, swift, and rust in stack overflow. Inf Softw Technol 137:106603","journal-title":"Inf Softw Technol"},{"key":"10348_CR15","unstructured":"Chen Y, Fernandes E, Adams B, Hassan AE (2022) Replication package of the paper \u2019on practitioners\u2019 concerns when adopting service mesh frameworks\u2019. URL https:\/\/www.dropbox.com\/scl\/fo\/qrwbg9w9941xoowaoxyb0\/h?dl=0 &rlkey=lkumrmmc4eez4onu5lnodmz4x"},{"key":"10348_CR16","doi-asserted-by":"crossref","unstructured":"Chen Z, Cao Y, Liu Y, Wang H, Xie T, Liu X (2020) A comprehensive study on challenges in deploying deep learning based software. In: Proceedings of the 28th Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE). pp 750\u2013762","DOI":"10.1145\/3368089.3409759"},{"key":"10348_CR17","doi-asserted-by":"crossref","unstructured":"Cito J, Schermann G, Wittern JE, Leitner P, Zumberi S, Gall HC (2017) An empirical analysis of the docker container ecosystem on github. In: Proceedings of the 14th International Conference on Mining Software Repositories (MSR). pp 323\u2013333","DOI":"10.1109\/MSR.2017.67"},{"key":"10348_CR18","doi-asserted-by":"crossref","unstructured":"De Sanctis M, Muccini H, Vaidhyanathan K (2020) Data-driven adaptation in microservice-based iot architectures. In: Proceedings of the 3rd International Conference on Software Architecture Companion (ICSA-C). pp 59\u201362","DOI":"10.1109\/ICSA-C50368.2020.00019"},{"key":"10348_CR19","doi-asserted-by":"crossref","unstructured":"Dragoni N, Giallorenzo S, Lafuente AL, Mazzara M, Montesi F, Mustafin R, Safina L (2017) Microservices: yesterday, today, and tomorrow. Present and Ulterior Software Engineering. pp 195\u2013216","DOI":"10.1007\/978-3-319-67425-4_12"},{"issue":"5","key":"10348_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCC.2016.105","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito C, Castiglione A, Choo KKR (2016) Challenges in delivering software in the cloud as microservices. IEEE Cloud Computing 3(5):10\u201314","journal-title":"IEEE Cloud Computing"},{"key":"10348_CR21","unstructured":"Ferreira AP, Sinnott R (2019) A performance evaluation of containers running on managed kubernetes services. In: Proceedings of the 11th International Conference on Cloud Computing Technology and Science (CloudCom). pp 199\u2013208"},{"key":"10348_CR22","doi-asserted-by":"crossref","unstructured":"Ganguli M, Ranganath S, Ravisundar S, Layek A, Ilangovan D, Verplanke E (2021) Challenges and opportunities in performance benchmarking of service mesh for the edge. In: Proceedings of the 5th International Conference on Edge Computing (EDGE). pp 78\u201385","DOI":"10.1109\/EDGE53862.2021.00020"},{"key":"10348_CR23","doi-asserted-by":"crossref","unstructured":"Goethals T, Volckaert B, De Turck F (2020) Adaptive fog service placement for real-time topology changes in kubernetes clusters. In: Proceedings of the 10th International Conference on Cloud Computing and Services Science (CLOSER). pp 161\u2013170","DOI":"10.5220\/0009517401610170"},{"key":"10348_CR24","doi-asserted-by":"crossref","unstructured":"Hahn DA, Davidson D, Bardas AG (2020) Mismesh: Security issues and challenges in service meshes. In: Proceedings of the 13th International Conference on Security and Privacy in Communication Systems (SecureComm). pp 140\u2013151","DOI":"10.1007\/978-3-030-63086-7_9"},{"key":"10348_CR25","doi-asserted-by":"crossref","unstructured":"Hamidi S, Andritsos P, Liaskos S (2014) Constructing adaptive configuration dialogs using crowd data. In: Proceedings of the 29th international conference on Automated software engineering (ASE). pp 485\u2013490","DOI":"10.1145\/2642937.2642960"},{"key":"10348_CR26","doi-asserted-by":"crossref","unstructured":"Hindle A, Godfrey MW, Holt RC (2009) What\u2019s hot and what\u2019s not: Windowed developer topic analysis. In: Proceedings of the 25th International Conference on Software Maintenance (ICSM). pp 339\u2013348","DOI":"10.1109\/ICSM.2009.5306310"},{"key":"10348_CR27","doi-asserted-by":"crossref","unstructured":"Houmani Z, Balouek-Thomert D, Caron E, Parashar M (2020) Enhancing microservices architectures using data-driven service discovery and qos guarantees. In: Proceedings of the 20th International Symposium on Cluster, Cloud and Internet Computing (CCGRID). pp 290\u2013299","DOI":"10.1109\/CCGrid49817.2020.00-64"},{"key":"10348_CR28","unstructured":"Klein M (2017) Lyft\u2019s envoy: Experiences operating a large service mesh. URL https:\/\/www.usenix.org\/conference\/srecon17americas\/program\/presentation\/klein"},{"issue":"1","key":"10348_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10063-9","volume":"27","author":"B Li","year":"2022","unstructured":"Li B, Peng X, Xiang Q, Wang H, Xie T, Sun J, Liu X (2022) Enjoy your observability: an industrial survey of microservice tracing and analysis. Empir Softw Eng 27(1):1\u201328","journal-title":"Empir Softw Eng"},{"key":"10348_CR30","doi-asserted-by":"crossref","unstructured":"Li W, Lemieux Y, Gao J, Zhao Z, Han Y (2019) Service mesh: Challenges, state of the art, and future research opportunities. In: Proceedings of the 13th International Conference on Service-Oriented System Engineering (SOSE). pp 122\u20131225","DOI":"10.1109\/SOSE.2019.00026"},{"key":"10348_CR31","doi-asserted-by":"crossref","unstructured":"Lou Y, Chen Z, Cao Y, Hao D, Zhang L (2020) Understanding build issue resolution in practice: symptoms and fix patterns. In: Proceedings of the 28th Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE). pp 617\u2013628","DOI":"10.1145\/3368089.3409760"},{"issue":"2","key":"10348_CR32","doi-asserted-by":"publisher","first-page":"143","DOI":"10.11613\/BM.2013.018","volume":"23","author":"ML McHugh","year":"2013","unstructured":"McHugh ML (2013) The chi-square test of independence. Biochemia Medica 23(2):143\u2013149","journal-title":"Biochemia Medica"},{"key":"10348_CR33","doi-asserted-by":"crossref","unstructured":"Miano S, Bertrone M, Risso F, Tumolo M, Bernal MV (2018) Creating complex network services with ebpf: Experience and lessons learned. In: Proceedings of the 19th International Conference on High Performance Switching and Routing (HPSR). pp 1\u20138","DOI":"10.1109\/HPSR.2018.8850758"},{"key":"10348_CR34","doi-asserted-by":"crossref","unstructured":"Picoreti R, do Carmo AP, de Queiroz FM, Garcia AS, Vassallo RF, Simeonidou D (2018) Multilevel observability in cloud orchestration. In: Proceedings of the 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). pp 776\u2013784","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00134"},{"key":"10348_CR35","doi-asserted-by":"crossref","unstructured":"R\u00f6der M, Both A, Hinneburg A (2015) Exploring the space of topic coherence measures. In: Proceedings of the 9th International Conference on Web Search and Data Mining (WSDM). pp 399\u2013408","DOI":"10.1145\/2684822.2685324"},{"key":"10348_CR36","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207","volume-title":"Zero trust architecture","author":"S Rose","year":"2020","unstructured":"Rose S, Borchert O, Mitchell S, Connelly S (2020) Zero trust architecture. Tech. rep, National Institute of Standards and Technology"},{"key":"10348_CR37","doi-asserted-by":"crossref","unstructured":"Saleh Sedghpour MR, Klein C, Tordsson J (2022) An empirical study of service mesh traffic management policies for microservices. In: Proceedings of the 38th International Conference on Performance Engineering (ICPE). pp 17\u201327","DOI":"10.1145\/3489525.3511686"},{"issue":"6","key":"10348_CR38","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TSE.2018.2867847","volume":"46","author":"M Sayagh","year":"2018","unstructured":"Sayagh M, Kerzazi N, Adams B, Petrillo F (2018) Software configuration engineering in practice interviews, survey, and systematic literature review. IEEE Trans Softw Eng 46(6):646\u2013673","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10348_CR39","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1109\/TNSM.2021.3076503","volume":"18","author":"S Schneider","year":"2021","unstructured":"Schneider S, Khalili R, Manzoor A, Qarawlus H, Schellenberg R, Karl H, Hecker A (2021) Self-learning multi-objective service coordination using deep reinforcement learning. IEEE Trans Netw Serv Manag 18(3):3829\u20133842","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10348_CR40","doi-asserted-by":"crossref","unstructured":"Schneider S, Klenner LD, Karl H (2020) Every node for itself: Fully distributed service coordination. In: Proceedings of the 16th International Conference on Network and Service Management (CNSM). pp 1\u20139","DOI":"10.23919\/CNSM50824.2020.9269036"},{"key":"10348_CR41","doi-asserted-by":"crossref","unstructured":"Scoccia GL, Migliarini P, Autili M (2021) Challenges in developing desktop web apps: a study of stack overflow and github. In: Proceedings of the 18th International Conference on Mining Software Repositories (MSR). pp 271\u2013282","DOI":"10.1109\/MSR52588.2021.00039"},{"key":"10348_CR42","unstructured":"Sculley D, Holt G, Golovin D, Davydov E, Phillips T, Ebner D, Chaudhary V, Young M, Crespo JF, Dennison D (2015) Hidden technical debt in machine learning systems. Advances in Neural Information Processing Systems 28"},{"key":"10348_CR43","doi-asserted-by":"crossref","unstructured":"Sedghpour MRS, Klein C, Tordsson J (2021) Service mesh circuit breaker: From panic button to performance management tool. In: Proceedings of the 1st Workshop on High Availability and Observability of Cloud Systems (HAOC). pp 4\u201310","DOI":"10.1145\/3447851.3458740"},{"key":"10348_CR44","doi-asserted-by":"crossref","unstructured":"Shadija D, Rezai M, Hill R (2017) Towards an understanding of microservices. In: Proceedings of the 23rd International Conference on Automation and Computing (ICAC). pp 1\u20136","DOI":"10.23919\/IConAC.2017.8082018"},{"key":"10348_CR45","doi-asserted-by":"crossref","unstructured":"Squire M (2015) \u201cShould we move to stack overflow?\u201d measuring the utility of social media for developer support. In: Proceedings of the 37th International Conference on Software Engineering (ICSE), vol. 2. pp 219\u2013228","DOI":"10.1109\/ICSE.2015.150"},{"key":"10348_CR46","doi-asserted-by":"crossref","unstructured":"Syed S, Spruit M (2017) Full-text or abstract? examining topic coherence scores using latent dirichlet allocation. In: 2017 IEEE International conference on data science and advanced analytics (DSAA). pp 165\u2013174. IEEE","DOI":"10.1109\/DSAA.2017.61"},{"issue":"1","key":"10348_CR47","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MS.2015.11","volume":"32","author":"J Th\u00f6nes","year":"2015","unstructured":"Th\u00f6nes J (2015) Microservices. IEEE Software 32(1):116\u2013116","journal-title":"IEEE Software"},{"key":"10348_CR48","unstructured":"Vayghan LA, Saied MA, Toeroe M, Khendek F (2018) Deploying microservice based applications with kubernetes: Experiments and lessons learned. In: Proceedings of the 11th International Conference on Cloud Computing (CLOUD). pp 970\u2013973"},{"key":"10348_CR49","doi-asserted-by":"crossref","unstructured":"Venkatesh PK, Wang S, Zhang F, Zou Y, Hassan AE (2016) What do client developers concern when using web apis? an empirical study on developer forums and stack overflow. In: Proceedings of the 13th International Conference on Web Services (ICWS). pp 131\u2013138","DOI":"10.1109\/ICWS.2016.25"},{"key":"10348_CR50","doi-asserted-by":"crossref","unstructured":"Wang W, Godfrey MW (2013) Detecting api usage obstacles: A study of ios and android developer questions. In: Proceedings of the 10thWorking Conference on Mining Software Repositories (MSR). pp 61\u201364","DOI":"10.1109\/MSR.2013.6624006"},{"key":"10348_CR51","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson M, Regnell B, Wessl\u00e9n, A (2012) Experimentation in Software Engineering, 1st edn. Springer Science & Business Media","DOI":"10.1007\/978-3-642-29044-2"},{"key":"10348_CR52","doi-asserted-by":"crossref","unstructured":"Wojciechowski L, Opasiak K, Latusek J, Wereski M, Morales V, Kim T, Hong M (2021) Netmarks: Network metrics-aware kubernetes scheduler powered by service mesh. In: Proceedings of the 40th Conference on Computer Communications (INFOCOM). pp 1\u20139","DOI":"10.1109\/INFOCOM42981.2021.9488670"},{"issue":"1","key":"10348_CR53","first-page":"1","volume":"4","author":"JR Wood","year":"2008","unstructured":"Wood JR, Wood LE (2008) Card sorting: current practices and beyond. J Usability Stud 4(1):1\u20136","journal-title":"J Usability Stud"},{"key":"10348_CR54","doi-asserted-by":"crossref","unstructured":"Wu M, Zhang Y, Liu J, Wang S, Zhang Z, Xia X, Mao X (2022) On the way to microservices:Exploring problems and solutions from online q &a community. In: Proceedings of the 29th International Conference on Software Analysis, Evolution and Reengineering (SANER). pp 432\u2013443","DOI":"10.1109\/SANER53432.2022.00058"},{"key":"10348_CR55","doi-asserted-by":"crossref","unstructured":"Xu T, Jin L, Fan X, Zhou Y, Pasupathy S, Talwadker R (2015) Hey, you have given me too many knobs!: Understanding and dealing with over-designed configuration in system software. In: Proceedings of the 10th Joint Meeting on Foundations of Software Engineering (ESEC\/FSE). pp 307\u2013319","DOI":"10.1145\/2786805.2786852"},{"key":"10348_CR56","doi-asserted-by":"crossref","unstructured":"Zhang S, Ernst MD (2013) Automated diagnosis of software configuration errors. In: Proceedings of the 35th International Conference on Software Engineering (ICSE). pp 312\u2013321","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"10348_CR57","doi-asserted-by":"crossref","unstructured":"Zhang S, Ernst MD (2014) Which configuration option should i change? In: Proceedings of the 36th International Conference on Software Engineering (ICSE). pp 152\u2013163","DOI":"10.1145\/2568225.2568251"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10348-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10348-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10348-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T12:17:59Z","timestamp":1696421879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10348-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":57,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10348"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10348-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"23 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"113"}}