<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rodrigo Menchio Faria</title>
    <description>The latest articles on DEV Community by Rodrigo Menchio Faria (@rodrigo_menchiofaria_f95).</description>
    <link>https://dev.to/rodrigo_menchiofaria_f95</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3806724%2F67900f68-c642-4dc6-b4e7-2b2afc509eb4.jpg</url>
      <title>DEV Community: Rodrigo Menchio Faria</title>
      <link>https://dev.to/rodrigo_menchiofaria_f95</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rodrigo_menchiofaria_f95"/>
    <language>en</language>
    <item>
      <title>How I built an AI system that generates connectors for any monitoring tool</title>
      <dc:creator>Rodrigo Menchio Faria</dc:creator>
      <pubDate>Wed, 04 Mar 2026 23:28:59 +0000</pubDate>
      <link>https://dev.to/rodrigo_menchiofaria_f95/how-i-built-an-ai-system-that-generates-connectors-for-any-monitoring-tool-3c33</link>
      <guid>https://dev.to/rodrigo_menchiofaria_f95/how-i-built-an-ai-system-that-generates-connectors-for-any-monitoring-tool-3c33</guid>
      <description>&lt;p&gt;For more than two decades working with infrastructure monitoring systems, I kept encountering the same problem.&lt;/p&gt;

&lt;p&gt;Every environment runs multiple tools.&lt;/p&gt;

&lt;p&gt;Nagios for infrastructure.&lt;br&gt;
Wazuh for SIEM alerts.&lt;br&gt;
Firewall logs from FortiGate.&lt;br&gt;
IDS alerts from Suricata.&lt;br&gt;
Automation pipelines with n8n.&lt;/p&gt;

&lt;p&gt;Each system produces logs and events in its &lt;strong&gt;own format&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;And connecting them together is always painful.&lt;/p&gt;

&lt;p&gt;Teams usually solve this by writing:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;custom scripts&lt;/li&gt;
&lt;li&gt;parsers&lt;/li&gt;
&lt;li&gt;ad-hoc integrations&lt;/li&gt;
&lt;li&gt;fragile pipelines&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Over time, these integrations become difficult to maintain.&lt;/p&gt;

&lt;p&gt;So I started thinking about a different approach.&lt;/p&gt;

&lt;p&gt;What if &lt;strong&gt;AI could generate the connectors automatically?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That idea eventually became &lt;strong&gt;Orbit-Core&lt;/strong&gt;.&lt;/p&gt;


&lt;h1&gt;
  
  
  The Observability Fragmentation Problem
&lt;/h1&gt;

&lt;p&gt;Most modern infrastructure stacks include multiple monitoring tools.&lt;/p&gt;

&lt;p&gt;A typical setup might include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;infrastructure monitoring&lt;/li&gt;
&lt;li&gt;security monitoring&lt;/li&gt;
&lt;li&gt;network telemetry&lt;/li&gt;
&lt;li&gt;application metrics&lt;/li&gt;
&lt;li&gt;automation platforms&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The challenge is that each of these tools emits events with completely different schemas.&lt;/p&gt;

&lt;p&gt;Example:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Firewall event&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"srcip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"10.0.0.4"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"dstip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"8.8.8.8"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"deny"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"severity"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"high"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;SIEM alert&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"agent"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"server01"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"rule_id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"5712"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"level"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"description"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Possible brute force"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;IDS alert&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"event_type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"alert"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"signature"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ET SCAN Nmap"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"src_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"192.168.1.10"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Each format is different.&lt;/p&gt;

&lt;p&gt;To correlate events, you must first &lt;strong&gt;normalize the data&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;That is where most integrations fail.&lt;/p&gt;




&lt;h1&gt;
  
  
  The Idea: A Universal Connector Layer
&lt;/h1&gt;

&lt;p&gt;Instead of building a specific parser for every tool, I designed a system that works differently.&lt;/p&gt;

&lt;p&gt;Orbit-Core introduces a &lt;strong&gt;Connector Specification (Connector DSL)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;A connector describes how a source event maps into a canonical model.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"source"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"suricata"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"event_type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"alert"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"mappings"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"source_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"src_ip"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"destination_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"dest_ip"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"severity"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"alert.severity"&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once normalized, all events share the same schema.&lt;/p&gt;

&lt;p&gt;This allows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;cross-tool correlation&lt;/li&gt;
&lt;li&gt;unified dashboards&lt;/li&gt;
&lt;li&gt;standardized analytics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But writing connectors manually is still tedious.&lt;/p&gt;

&lt;p&gt;So I introduced &lt;strong&gt;AI to generate them automatically&lt;/strong&gt;.&lt;/p&gt;




&lt;h1&gt;
  
  
  Using AI to Generate Connectors
&lt;/h1&gt;

&lt;p&gt;The key insight was simple:&lt;/p&gt;

&lt;p&gt;If you provide a &lt;strong&gt;sample JSON payload&lt;/strong&gt;, an LLM can infer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;field mappings&lt;/li&gt;
&lt;li&gt;event type&lt;/li&gt;
&lt;li&gt;severity translation&lt;/li&gt;
&lt;li&gt;metadata extraction&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So the process becomes:&lt;/p&gt;

&lt;p&gt;1️⃣ Paste a sample event&lt;br&gt;
2️⃣ AI analyzes the structure&lt;br&gt;
3️⃣ AI generates the connector spec&lt;/p&gt;

&lt;p&gt;Example input:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"timestamp"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"2026-02-10T12:00:00"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"src_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"10.1.1.4"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"dst_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"8.8.8.8"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"severity"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"medium"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;AI output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"connector"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"custom-firewall"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"event_type"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"network"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="nl"&gt;"mappings"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"source_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"src_ip"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"destination_ip"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"dst_ip"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
   &lt;/span&gt;&lt;span class="nl"&gt;"severity"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"severity"&lt;/span&gt;&lt;span class="w"&gt;
 &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;In seconds, a connector is ready.&lt;/p&gt;

&lt;p&gt;No manual integration work.&lt;/p&gt;




&lt;h1&gt;
  
  
  Architecture of the System
&lt;/h1&gt;

&lt;p&gt;Orbit-Core is built around three main components.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Event Ingestion Layer
&lt;/h3&gt;

&lt;p&gt;Responsible for receiving events from:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;APIs&lt;/li&gt;
&lt;li&gt;webhooks&lt;/li&gt;
&lt;li&gt;message queues&lt;/li&gt;
&lt;li&gt;log streams&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Events arrive in raw format.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. Connector Engine
&lt;/h3&gt;

&lt;p&gt;The connector engine transforms raw events using the connector specification.&lt;/p&gt;

&lt;p&gt;Steps:&lt;/p&gt;

&lt;p&gt;1️⃣ identify source&lt;br&gt;
2️⃣ apply mapping rules&lt;br&gt;
3️⃣ normalize event structure&lt;br&gt;
4️⃣ publish canonical event&lt;/p&gt;

&lt;p&gt;This creates a &lt;strong&gt;standardized event timeline&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  3. AI Connector Generator
&lt;/h3&gt;

&lt;p&gt;The AI generator analyzes example payloads and produces connector specifications automatically.&lt;/p&gt;

&lt;p&gt;It can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;infer field mappings&lt;/li&gt;
&lt;li&gt;classify event types&lt;/li&gt;
&lt;li&gt;normalize severity levels&lt;/li&gt;
&lt;li&gt;generate documentation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The output is a ready-to-use connector.&lt;/p&gt;




&lt;h1&gt;
  
  
  Why This Approach Is Different
&lt;/h1&gt;

&lt;p&gt;Most observability tools focus on &lt;strong&gt;collecting data&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Orbit-Core focuses on &lt;strong&gt;understanding it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Instead of forcing every integration to be built manually, the system lets AI handle the connector generation.&lt;/p&gt;

&lt;p&gt;This dramatically reduces integration effort.&lt;/p&gt;

&lt;p&gt;Adding a new system can take &lt;strong&gt;minutes instead of days&lt;/strong&gt;.&lt;/p&gt;




&lt;h1&gt;
  
  
  Real Example
&lt;/h1&gt;

&lt;p&gt;Recently I used the AI generator to create a connector for Suricata IDS.&lt;/p&gt;

&lt;p&gt;Process:&lt;/p&gt;

&lt;p&gt;1️⃣ captured a JSON alert sample&lt;br&gt;
2️⃣ pasted it into the generator&lt;br&gt;
3️⃣ AI produced the connector spec&lt;/p&gt;

&lt;p&gt;Result:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;parsed 400K+ events&lt;/li&gt;
&lt;li&gt;normalized alert severity&lt;/li&gt;
&lt;li&gt;mapped network attributes automatically&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No custom parser was required.&lt;/p&gt;




&lt;h1&gt;
  
  
  Why I Built It as Open Source
&lt;/h1&gt;

&lt;p&gt;I strongly believe observability infrastructure should be open.&lt;/p&gt;

&lt;p&gt;Monitoring ecosystems evolve constantly, and new tools appear every year.&lt;/p&gt;

&lt;p&gt;By making Orbit-Core open source:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;anyone can create connectors&lt;/li&gt;
&lt;li&gt;integrations can be shared&lt;/li&gt;
&lt;li&gt;the ecosystem grows organically&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal is to create a &lt;strong&gt;universal observability integration layer&lt;/strong&gt;.&lt;/p&gt;




&lt;h1&gt;
  
  
  What's Next
&lt;/h1&gt;

&lt;p&gt;The roadmap includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI-assisted connector validation&lt;/li&gt;
&lt;li&gt;automatic schema discovery&lt;/li&gt;
&lt;li&gt;event correlation engine&lt;/li&gt;
&lt;li&gt;real-time anomaly detection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The vision is simple:&lt;/p&gt;

&lt;p&gt;A system where &lt;strong&gt;any monitoring tool can connect instantly&lt;/strong&gt;.&lt;/p&gt;




&lt;h1&gt;
  
  
  Try It
&lt;/h1&gt;

&lt;p&gt;If you're interested in observability, DevOps, or security monitoring, check out the project:&lt;/p&gt;

&lt;p&gt;GitHub&lt;br&gt;
&lt;a href="https://github.com/rmfaria/orbit-core" rel="noopener noreferrer"&gt;https://github.com/rmfaria/orbit-core&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I'm always interested in feedback from the community.&lt;/p&gt;

&lt;p&gt;What monitoring systems would you like to see integrated next?&lt;/p&gt;

</description>
      <category>ai</category>
      <category>automation</category>
      <category>monitoring</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
