diff --git a/splunkplatform/scenarios/integration-scenario1.rst b/splunkplatform/scenarios/integration-scenario1.rst index 8e2cac269..a13a149ea 100644 --- a/splunkplatform/scenarios/integration-scenario1.rst +++ b/splunkplatform/scenarios/integration-scenario1.rst @@ -61,7 +61,7 @@ Examine synthetics tests in Splunk Synthetic Monitoring :alt: This screenshot shows a Synthetics view with video capture of user experience in upper right corner. -3. Kai selects the APM link next to the checkout element to open Splunk APM where they can see which procedure calls are slow, which are stalled, and which failed. Kai can use Splunk APM full fidelity tracing to pivot to a reconstructed application map from the exact time of this issue or view a live service dependency map. +3. Kai selects the APM link next to the long checkout request to open Splunk APM where they can see which procedure calls are slow, which are stalled, and which failed. Kai can use Splunk APM full fidelity tracing to pivot to a reconstructed application map from the exact time of this issue or view a live service dependency map. .. image:: /_images/splunkplatform/synthetics2apm.png :width: 100% @@ -85,4 +85,4 @@ Investigate service dependencies in Splunk APM After finding the source of the degraded revenue problem, Kai returns to the Splunk IT Service Intelligence glass table and is able to correlate the same application and business service with security notable events around the same time. Kai sees threat activity and some access and network activity right before that happened. They immediately report their findings to the Security team. - \ No newline at end of file +