
Security News
NVD Concedes Inability to Keep Pace with Surging CVE Disclosures in 2025
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
@spinnaker/kayenta
Advanced tools
Make sure that node and yarn are installed on your
system. The minimum versions for each are listed in package.json
.
Run the following commands (in the root directory) to get all dependencies installed in Deck and to start the server:
yarn
yarn start
The app will start up on localhost:9000.
API_HOST
overrides the default Spinnaker API host.LIVE_CALLS
allows the UI to interact with the API host for canary config-related calls.METRIC_STORE
sets the default metric store that will be used when creating
new canary configs (e.g., atlas
, stackdriver
, prometheus
).REDUX_LOGGER
toggles browser logging for interactions with the Redux store.CANARY_REPORTS_ENABLED
: enables reporting UI (under development).CANARY_STAGES_ENABLED
enables Kayenta canary stages.For example, API_HOST=http://localhost:8084 LIVE_CALLS=true yarn start
will run Deck
with https://localhost:8084
as the API host.
To run the tests within the application, run yarn run test
.
Developing things locally? You will want to run gate locally (which runs on port 8084) and kayenta (which runs on port 8090).
You also will need to provide the following fields to your gate-local.yml
config:
services:
kayenta:
enabled: true
canaryConfigStore: true
baseUrl: http://localhost:8090
FAQs

We found that @spinnaker/kayenta demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 9 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Security experts warn that recent classification changes obscure the true scope of the NVD backlog as CVE volume hits all-time highs.
Security Fundamentals
Attackers use obfuscation to hide malware in open source packages. Learn how to spot these techniques across npm, PyPI, Maven, and more.
Security News
Join Socket for exclusive networking events, rooftop gatherings, and one-on-one meetings during BSidesSF and RSA 2025 in San Francisco.