This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
I was a customer of VictorOps before the acquisition, and from the jump I have appreciated the product's flexibility. It was way ahead of other options at the time in the way you could catch and route incidents, organize oncall rotations, provide flexibility to the folks on call around how they are alerted, how escalations are handled and more.
What really put it over the top was the transmogrifier and the ability to have all sorts of data feed the timeline of events to aid in providing context to alerts. Being able to modify alerts in real time, change their severity, attach contextual information, provide links to key resources and more was a big improvement over what most oncall options were providing.
The integration with slack was also key, being able to capture conversations in the timeline, and then later to product a report from all of that for the postmortem is a valuable aspect to making a good after-action review easier to execute. Review collected by and hosted on G2.com.
Since its acquisition it has existed largely unchanged. It's just languishing without any notable improvements to the offering. To this day, SSO requires you to type in your company slug, because the system can't remember it reliably. And if you need to set it up or make changes to it you have to go through support because the user interface doesn't allow you to configure it directly. It has been this way since the acquisition, and that's unacceptable.
What it did well, it does well - but it has since been far surpassed by other products in the market. I do not understand why Splunk bought it if they had no intention of doing anything meaningful with it. Review collected by and hosted on G2.com.
Validated through a business email account
Invitation from G2. This reviewer was not provided any incentive by G2 for completing this review.





