VictorOps Is Gone
VictorOps had a longer identity crisis than most startups have a lifespan. Here's the timeline:
- 2012: VictorOps launches as an incident management and on-call platform for DevOps teams.
- 2018: Splunk acquires VictorOps for $120M and rebrands it to Splunk On-Call.
- 2023: Cisco acquires Splunk for $28B, absorbing the entire product portfolio.
- 2024-2025: Cisco begins consolidating and deprecating overlapping products. Splunk On-Call is officially sunset.
If you're still running Splunk On-Call, you already know the product has been frozen. No new features, dwindling support, and an end-of-life date that's either passed or approaching fast depending on your contract terms. Unlike some sunsetting announcements where "deprecated" means "we'll keep the lights on for years," Cisco has been clear: Splunk On-Call is done.
Migration isn't optional. The only question is where you're going.
The silver lining: VictorOps was built in 2012 and hadn't received meaningful investment since the Cisco acquisition. The on-call and incident management space has moved forward. Whatever you migrate to will almost certainly be better than what you're leaving behind.
What to Look for in a Replacement
VictorOps was a solid on-call tool in its prime. Before you evaluate alternatives, here's what your replacement needs to cover:
On-call scheduling and rotations. VictorOps handled weekly and daily rotations, shift overrides, and team-based schedules. Any replacement needs to manage this without falling back to spreadsheets or calendar invites.
Escalation policies. If the primary on-call doesn't acknowledge within a set window, escalate to the next person, then the next. Multi-tier escalation is non-negotiable in 2026.
Multi-channel alerting. VictorOps supported push notifications, email, SMS, and phone calls. Your replacement should reach on-call engineers through multiple channels, especially when the critical alert hits at 3 AM and push notifications alone won't cut it.
Integrations with your monitoring stack. VictorOps had native integrations with Datadog, Nagios, Prometheus, New Relic, and dozens of others. Verify that your replacement connects to the monitoring tools you actually use before committing.
Alert routing and deduplication. VictorOps could route alerts to specific teams based on rules and collapse duplicate alerts into a single incident. Without deduplication, a cascading failure turns your on-call engineer's phone into a vibrating brick.
Your migration checklist:
- On-call scheduling with rotation and override support
- Multi-tier escalation policies
- Multi-channel notifications (email, SMS, voice minimum)
- Alert deduplication or grouping
- Integration with your monitoring tools (Datadog, Prometheus, Grafana, etc.)
- Integration with your chat platform (Slack, Teams)
- API access for custom integrations
- Runbook or workflow automation (if you used VictorOps transmogrifier rules)
6 Best VictorOps (Splunk On-Call) Alternatives
1. PagerDuty -- Most Direct Replacement for Enterprise Teams
Where it wins: PagerDuty is the closest thing to a drop-in replacement for VictorOps, especially for larger organizations. If VictorOps had a feature, PagerDuty has it -- plus a decade of additional development. On-call scheduling, escalation policies, event intelligence (AI-powered alert grouping and noise reduction), service dependency mapping, and integrations with essentially every monitoring and ticketing tool in existence.
PagerDuty's event orchestration engine is where it really pulls ahead of what VictorOps offered. If you were using VictorOps transmogrifier rules to route and transform alerts, PagerDuty's event orchestration provides a more powerful equivalent. For teams with complex, multi-team on-call structures or follow-the-sun rotations, PagerDuty handles it without workarounds.
The ecosystem matters too. PagerDuty has the largest integration catalog in the space, and virtually every monitoring vendor builds a native PagerDuty integration first. You're unlikely to run into a "this tool doesn't connect to PagerDuty" situation.
Where it falls short: Pricing. PagerDuty's per-user model adds up quickly. A 20-person engineering team on the Business plan can easily spend $800-1,000/month, and that's before adding status pages or monitoring (which require separate tools). The platform has also accumulated years of features, and newer users sometimes describe the onboarding experience as overwhelming. If VictorOps felt like the right level of complexity for your team, PagerDuty might have more knobs than you'll ever touch.
Pricing: Starts at $21/user/month (Professional plan). Enterprise pricing is higher and requires a sales conversation.
Migration difficulty: Low to Medium. PagerDuty has solid documentation for migrating from other tools, and the breadth of integrations means reconnecting your monitoring stack is usually straightforward. Budget time for tuning -- there are a lot of configuration options.
2. Alert24 -- Consolidation Play for Small and Mid-Sized Teams
Where it wins: Alert24 replaces VictorOps AND your status page AND your uptime monitoring in a single platform. Instead of migrating to one tool and keeping three others, you consolidate. On-call scheduling, escalation policies, multi-channel alerting (email, SMS, voice), and auto-updating status pages are all built in.
The feature VictorOps never had: third-party dependency monitoring. Alert24 tracks the status of 2,000+ third-party services your application depends on -- AWS, Stripe, Twilio, GitHub, Cloudflare, and more -- and can trigger incidents automatically when a dependency goes down. If you've ever burned 30 minutes debugging a production issue that turned out to be a Cloudflare outage, this is the feature that pays for itself. AI-powered custom provider parsing lets you add any service with a public status page.
Other features relevant to a VictorOps migration:
- Email-to-incident parsing -- forward alert emails from any monitoring tool and Alert24 creates structured incidents automatically. Useful as a bridge during migration.
- 100+ pre-built webhook integrations -- covering Datadog, Grafana, Prometheus, PagerDuty, Jira, and more. Point your existing monitoring tools at Alert24's webhook endpoint and start receiving alerts immediately.
- Auto-updating status pages -- when monitoring detects an issue, the status page updates without manual intervention. Your customers find out through your status page, not through your support inbox. Alert24 is one of the few tools that both monitors third-party status pages and provides your own public status page -- so when a dependency goes down, your page reflects the impact automatically.
- Post-incident reviews with action items, metrics, and publishable summaries.
- Custom roles and permissions for controlling who can modify schedules, acknowledge incidents, and manage settings.
- Notification forwarding and vacation coverage -- on-call engineers can forward alerts to a backup without requiring schedule changes.
- Quiet hours with critical bypass -- suppress non-critical notifications outside business hours while ensuring critical alerts still page.
- Alert deduplication via alias-based dedup, so duplicate alerts collapse into a single incident.
Where it falls short: Alert24 is a newer, smaller platform, and honesty matters here. There is no native Jira integration with bidirectional sync (Jira is supported via webhooks but without the tight coupling VictorOps had). There is no SAML/SSO for enterprise identity providers -- Google OAuth and MFA enforcement are available, but if your org mandates SAML, this is a blocker. Slack and Microsoft Teams integration exists via webhooks for posting incident alerts and escalation notifications, but there is no interactive Slack app with slash commands. If your team coordinates incidents inside Slack threads, Alert24 won't replace that workflow. The community and ecosystem are still small compared to PagerDuty or Grafana OnCall -- fewer tutorials, fewer battle-tested configurations, and a faster-moving feature set that can be exciting or unsettling depending on your tolerance.
Pricing: Free tier available. Paid plans are usage-based, so you pay for what you use rather than per-seat. Keep an eye on costs during high-incident months, since usage-based pricing can be less predictable than fixed per-user pricing.
Migration difficulty: Low. Webhook receivers and email-to-incident parsing mean you can start routing alerts to Alert24 within minutes without reconfiguring every monitoring tool individually.
3. Grafana OnCall -- Best Free and Open-Source Option
Where it wins: If your monitoring stack already runs on Grafana, this is the natural home for your on-call management. Grafana OnCall is open source, available both as a self-hosted solution and through Grafana Cloud. On-call scheduling, escalation chains, and multi-channel notifications are all included.
The Grafana Cloud free tier includes OnCall at zero cost. For teams that were on VictorOps and don't want to increase their tooling spend, this is hard to beat. Your Grafana dashboards, alert rules, and on-call routing all live in the same ecosystem with no webhook gymnastics required to connect them.
Grafana OnCall's ChatOps integration is also worth noting. It integrates with Slack and Telegram for alert notifications and acknowledgments, which helps replace some of VictorOps' real-time collaboration features.
Where it falls short: If you self-host Grafana OnCall, you own the infrastructure. That means you're responsible for the availability of the tool that's supposed to alert you when things go down. Think carefully about that circular dependency.
Outside the Grafana ecosystem, the integration story is decent but not as broad as PagerDuty's. If you use Datadog or New Relic for monitoring (not Grafana), the value proposition weakens. The UI is functional but not as polished as commercial alternatives.
Pricing: Free (self-hosted). Grafana Cloud free tier includes OnCall. Paid Grafana Cloud plans start at $29/month.
Migration difficulty: Medium. You'll need to manually recreate schedules and escalation policies. No automated VictorOps/Splunk On-Call import tool exists.
4. Better Stack -- Best All-in-One Platform
Where it wins: Better Stack bundles uptime monitoring, on-call scheduling, incident management, status pages, and log management into one platform. If you were using Splunk On-Call alongside separate monitoring and status page tools, Better Stack can replace the entire stack.
On-call scheduling covers rotations, overrides, escalation policies, and multi-channel alerting. Status pages are some of the best-designed in the industry. The integrated log management means you can go from alert to relevant logs without switching tabs.
30-second monitoring intervals on all plans is aggressive, and when combined with their on-call routing, the time from "something broke" to "someone is looking at it" is minimal.
Where it falls short: Better Stack is an all-or-nothing proposition. If you already have a monitoring setup you're happy with (Datadog, Prometheus, New Relic) and just need on-call management as a VictorOps replacement, you're paying for monitoring capabilities you won't use.
The on-call features, while solid, aren't as deep as PagerDuty's. Complex multi-team routing and event orchestration are more limited. For large enterprise operations, it may feel too simple.
Pricing: Starts at $24/month. On-call features are included in higher tiers.
Migration difficulty: Medium. To get full value, you'll want to migrate monitoring as well, which expands the scope of your migration.
5. Rootly -- Best for Slack-Native Teams
Where it wins: If your incident response already happens in Slack, Rootly meets you there. Incident creation, role assignment, status updates, and post-incident reviews all happen inside Slack. Rootly adds structure to what most teams are already doing: scrambling in a Slack channel during an outage.
Rootly's workflow automation is where it shines. You can define runbooks that automatically create incident Slack channels, page responders, start Zoom bridges, and update status pages based on incident severity. VictorOps never had this level of workflow orchestration.
On-call scheduling integrates with PagerDuty and their own native scheduler. It's flexible enough to slot into your existing stack rather than replacing it wholesale.
Where it falls short: If your team doesn't live in Slack, Rootly loses most of its appeal. The tool is heavily opinionated about Slack as the primary interface.
Rootly is more of an incident response coordination layer than a pure on-call tool. You'll still need monitoring tools feeding alerts into Rootly. It's not a complete VictorOps replacement on its own -- think of it as a more capable replacement for the collaboration side of VictorOps, combined with whatever monitoring you're already running.
Pricing: Starts around $16/user/month. Enterprise plans available.
Migration difficulty: Medium to High. You're not just replacing VictorOps -- you're changing how your team does incident response. That's a bigger change-management project.
6. Spike.sh -- Best Budget Option
Where it wins: Spike.sh is simple and affordable. On-call scheduling, escalation policies, and multi-channel alerting (phone, SMS, email, Slack, Teams, Discord) at a fraction of PagerDuty's price. If VictorOps appealed to you because it was "good enough on-call management without enterprise pricing," Spike.sh carries that torch in 2026.
Setup takes minutes. The UI is clean and fast. For small to mid-sized teams that need reliable on-call routing without PagerDuty-level complexity, Spike.sh delivers. They also include status pages and basic incident management, making it a more complete VictorOps replacement than tools that focus solely on on-call.
Where it falls short: The integration catalog is shorter than PagerDuty's or Better Stack's. If you rely on niche monitoring tools, check that Spike.sh supports them before committing. Webhook support helps fill the gaps, but native integrations are always smoother.
Advanced features like event orchestration, AI-powered alert grouping, and service dependency mapping are not available. If you depended on VictorOps' transmogrifier for complex alert routing, Spike.sh won't replace that level of control.
Pricing: Starts at $7/user/month. One of the most affordable on-call tools on the market.
Migration difficulty: Low. Simple tool, simple migration. Recreate your schedules manually and point your integrations at Spike.sh's webhook endpoints.
Comparison Table
| Tool | On-Call Scheduling | Escalation Policies | Status Page | Monitoring | Starting Price |
|---|---|---|---|---|---|
| Splunk On-Call | Yes | Yes | No | No | Deprecated |
| PagerDuty | Yes | Yes (advanced) | No (add-on) | No | $21/user/mo |
| Alert24 | Yes | Yes | Yes (built-in) | Yes | Free tier |
| Grafana OnCall | Yes | Yes | No | Yes (Grafana) | Free |
| Better Stack | Yes | Yes | Yes (built-in) | Yes | $24/mo |
| Rootly | Yes | Yes | Yes | No | ~$16/user/mo |
| Spike.sh | Yes | Yes | Yes (basic) | No | $7/user/mo |
A few patterns emerge. If you want to consolidate tools (monitoring + on-call + status page in one platform), Alert24, Better Stack, and Grafana OnCall are worth evaluating. If you need the deepest on-call feature set with the widest integration catalog, PagerDuty is still the safe enterprise choice. If budget is the primary constraint, Grafana OnCall (free) and Spike.sh ($7/user/month) are the standouts. And if your team coordinates entirely in Slack, Rootly is built for that workflow.
The Bottom Line
VictorOps served a lot of teams well from 2012 through its various rebrands and acquisitions. But unlike some deprecation announcements where you can afford to wait and see, this one is final. Splunk On-Call is not coming back. Migration is mandatory.
The good news: you can use this forced migration as an opportunity to consolidate. Most teams running VictorOps also had separate tools for monitoring, status pages, and incident coordination. That's three to five tools doing a job that modern platforms handle in one. Every team needs the same three things -- monitor your dependencies, page the right person, and tell customers what's happening -- and VictorOps only ever covered the middle piece. Whether you choose PagerDuty for its depth, Alert24 or Better Stack for consolidation, Grafana OnCall for zero cost, or Spike.sh for simplicity, you'll almost certainly end up with a better setup than the frozen product you're leaving behind.
Start by auditing your current Splunk On-Call configuration: schedules, escalation policies, integrations, and any API usage. Export what you can while the platform still responds. Then trial one or two alternatives before committing. A deliberate migration beats a panicked one, and the clock is ticking. In a similar situation? See our guide on Opsgenie alternatives -- another product being sunset.