Transforming Monolithic Systems to Microservices - An Analysis Toolkit for Legacy Code Evaluation

被引:4
|
作者
Bandara, Chamika [1 ]
Perera, Indika [1 ]
机构
[1] Univ Moratuwa, Dept Comp Sci & Engn, Moratuwa, Sri Lanka
关键词
microservices; monolithic; architecture revamp; legacy system transformation; service identification;
D O I
10.1109/ICTer51097.2020.9325443
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Microservices has become one of the mainstream approaches for system architecture; industry accept the importance of migrating existing monolithic systems into microservices-based architecture to gain benefits. Often it is a challenging task to achieve as the monolithic systems are tightly coupled from their implementation perspectives. To migrate existing monolithic systems, it may require the architecture diagrams, system artefacts and people who know the system well etc. yet not all the time we find these resources. With suitable tool support, we can get insight into the possible services which can be found in the existing monolithic system at code level without worrying about the existence of architecture diagrams, experts etc. It allows us to make efficient decisions on what to move as microservices from the monolithic system. This research introduced a toolkit to analyse monolithic systems and propose the best ways to decompose the functionality into a set of microservices. The evaluation shows accurate revamping of the system architecture with suitable microservices suite.
引用
收藏
页码:95 / 100
页数:6
相关论文
共 50 条
  • [31] An Evaluation of Methods to Port Legacy Code to SGX Enclaves
    Shanker, Kripa
    Joseph, Arun
    Ganapathy, Vinod
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 1077 - 1088
  • [32] CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture
    Nitin, Vikram
    Asthana, Shubhi
    Ray, Baishakhi
    Krishna, Rahul
    PROCEEDINGS OF THE 37TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2022, 2022,
  • [33] Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    Seshadri, Arvind
    Luk, Mark
    Perrig, Adrian
    van Doorn, Leendert
    Khosla, Pradeep
    MALWARE DETECTION, 2007, : 253 - +
  • [34] CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture
    Columbia University, New York, United States
    不详
    不详
    arXiv,
  • [35] Integration of Static and Dynamic Code Analysis for Understanding Legacy Source Code
    Kirchmayr, Wilhelm
    Moser, Michael
    Nocke, Ludwig
    Pichler, Josef
    Tober, Rudolf
    32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), 2016, : 543 - 552
  • [36] Transforming Legacy Systems into User-Centred Web Applications
    Guido, Anna L.
    Paiano, Roberto
    Pandurino, Andrea
    Mainetti, Luca
    MANAGEMENT OF THE INTERCONNECTED WORLD, 2010, : 395 - 401
  • [37] Transforming legacy network systems for use in the army future force
    Burbank, JL
    Kasch, WT
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1179 - 1185
  • [38] RGRecSys: A Toolkit for Robustness Evaluation of Recommender Systems
    Ovaisi, Zohreh
    Heinecke, Shelby
    Li, Jia
    Zhang, Yongfeng
    Zheleva, Elena
    Xiong, Calming
    WSDM'22: PROCEEDINGS OF THE FIFTEENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2022, : 1597 - 1600
  • [39] Evolving Software Architectures from Monolithic Systems to Resilient Microservices: Best Practices, Challenges and Future Trends
    Kaloudis, Martin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (09) : 1 - 10
  • [40] Conqueror Tamper-Proof Code Execution on Legacy Systems
    Martignoni, Lorenzo
    Paleari, Roberto
    Bruschi, Danilo
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 21 - +