The Evolution of Service Meshes: From Sidecars to Modern Architectures

As we approach 2025, the service mesh landscape is undergoing significant transformation. What started as a pattern to manage microservices communication has evolved into a more nuanced and efficient approach to cloud-native networking.

Three majors trends are on the radar in this blog, we will go a little bit deeper into these trends.

Koen De Waele
25 Feb 2025

The GAMMA Initiative: Standardizing Service Mesh APIs.

Standardization is the first emerging trend. Service meshes such as Istio and Linkerd started with proprietary models that introduced unnecessary complexity. The Gateway API Mesh Management API (GAMMA) initiative is a critical step in standardizing service mesh implementations by providing a vendor-neutral, consistent API framework.

Although initially focused on improvements for the Kubernetes ingress controller (north-south traffic), the scope has been expanded to include service mesh specific use cases (east-west traffic).

Key aspects of GAMMA include:

1. Standardized configuration: GAMMA provides common APIs for configuring traffic routing, security policies, and observability across different service mesh implementations.

2. Mesh-agnostic management: Organizations can switch between different service mesh implementations without completely rewriting their configuration code.

3. Advanced Kubernetes Integration: GAMMA is built on top of the Kubernetes Gateway API, providing seamless integration with existing Kubernetes networking concepts.

The Rise of Sidecar-less Service Meshes

While the sidecar proxy pattern is fundamental to the service mesh architecture, it comes with significant overhead in terms of resource consumption and operational complexity. This has led to the emergence of new sidecar-less approaches.

Istio’s ambient mesh

  • Uses lightweight shared proxies but at the node level, in stead of the container level.

  • Seperates the all-in-one data plane (e.g. the Envoy proxy) into two distinct agents:

    • ztunnel (Zero Trust tunnel)

      • usses SPIFFE-based X.509 certificates to authenticate workloads for mTLS connections and can run als a side car or a daemon agent on a host.

    • Waypoint proxy.

      • Is an L7 proxy (like Envoy). It runs in the network stack, not as a sidecar

      • proxy can be bypassed if your only requirement is mTLS.

eBPF-based Solutions

This basically means that the service mesh becomes a component of the network stack, the embedded service mesh.

The Extended Berkeley Packet Filter (eBPF) technology is enabling a new generation of service meshes that operate at the kernel level:

  • Cilium Service Mesh: Leverages eBPF to provide service mesh capabilities without sidecars, offering improved performance and reduced resource consumption.

  • Merbridge: Combines eBPF with existing service meshes to optimize data paths and reduce latency.

Platform-Native Approaches

Cloud providers and platforms are introducing built-in service mesh capabilities, thereby eliminating the need for sidecar proxies:

  • AWS App Mesh Controller for Kubernetes: Integrating mesh functionality directly into the platform’s networking layer. Lately, Amazon and solo.io, the people behind Istio, started offering Istio Ambient mesh on Amazon ECS.

  • Azure Service Mesh: Microsoft’s approach to embedding service mesh capabilities into their cloud platform.

Webassembly Extensions

WebAssembly (Wasm) is transforming service network architectures by providing a lightweight, secure, and language-agnostic way to extend proxy functionality. Unlike traditional plug-ins or sidecar extensions, Wasm provides the near-native execution speed critical for high performance and customization by extending proxy functionality without modifying core code.

The adoption of WebAssembly is enabling:

  • Custom extensions without recompiling the proxy with hot-reloading the extension

  • Language-agnostic plugin development. This enables polyglot development within a unified execution environment

  • Dynamic loading: extensions can be loaded, unloaded and updated without restarting the proxy

  • Sandbox security model: provides strict isolation between extensions and the host runtime

Major Service Mesh Implementations Supporting Wasm

  1. Istio

    • WebAssembly Hub for shared extensions

    • Native support for Envoy proxy Wasm extensions

    • Allows dynamic policy enforcement

  2. Linkerd

    • Experimental Wasm support

    • Focus on lightweight, performance-critical extensions

    • Enables custom network-level transformations

  3. Cilium

    • eBPF and Wasm integration

    • High-performance network policy extensions

    • Kernel-level programmability combined with Wasm flexibility

So it seems that WebAssembly is poised to become a critical technology in service mesh evolution.

Challenges and Considerations

Despite these advances, organizations face several challenges:

1. Architectural complexity: Handling the technical complexities introduced by service meshes. The lack of guidance, blue prints and best practices. Moving from traditional network or existing service mesh implementations to newer approaches requires careful planning and execution.

2. Performance trade-offs: While sidecar-less approaches promise better performance, they may currently lack some features available in traditional service meshes. However, it is only a matter of time before these capabilities are added.

3. Shortage of engineering expertise: Teams must develop expertise in new technologies such as eBPF and WebAssembly to take full advantage of modern service mesh capabilities. Not all organizations are ready or willing to do this.

Conclusion

Services meshes addressed initially network problems in distributed architectures and started as a new product category. The service mesh landscape however, is rapidly evolving beyond its sidecar proxy origins. The GAMMA initiative promises standardization, while sidecar-less approaches offer improved performance and reduced complexity.

The long-term evolution is likely to be the end of the service mesh data plane as a separate infrastructure component in favor of the embedded service mesh architecture, whether embedded in the network stack or embedded in the standard offerings of hyperscalers. Sidecar proxies are on their way out, it seems.

The centralized control plane will continue to evolve and will solve more specific needs for the more complex service mesh topology such as multi-location, multi-zone, multi-vendor. The way forward there is through further standardization, such as the GAMMA initiative.

But wherever distributed architectures are in use, there’s a need for service-to-service communication and service meshes are providing useful capabilities for handling these network management issues.

Organisations should carefully evaluate these trends against their specific needs and constraints when planning their service mesh strategy. The future of service meshes lies in simpler, more efficient implementations that maintain the robust features we’ve come to expect while reducing operational overhead.

Contact