klaviyo-multi-env-setup

Configure Klaviyo across development, staging, and production environments. Use when setting up multi-environment deployments, configuring per-environment secrets, or implementing environment-specific Klaviyo configurations. Trigger with phrases like "klaviyo environments", "klaviyo staging", "klaviyo dev prod", "klaviyo environment setup", "klaviyo config by env".

claude-code
6 Tools
klaviyo-pack Plugin
saas packs Category

Allowed Tools

ReadWriteEditBash(aws:*)Bash(gcloud:*)Bash(vault:*)

Provided by Plugin

klaviyo-pack

Claude Code skill pack for Klaviyo (24 skills)

saas packs v1.0.0
View Plugin

Installation

This skill is included in the klaviyo-pack plugin:

/plugin install klaviyo-pack@claude-code-plugins-plus

Click to copy

Instructions

Klaviyo Multi-Environment Setup

Overview

Configure Klaviyo across development, staging, and production environments.

Prerequisites

  • Separate Klaviyo accounts or API keys per environment
  • Secret management solution (Vault, AWS Secrets Manager, etc.)
  • CI/CD pipeline with environment variables
  • Environment detection in application

Environment Strategy

Environment Purpose API Keys Data
Development Local dev Test keys Sandbox
Staging Pre-prod validation Staging keys Test data
Production Live traffic Production keys Real data

Configuration Structure


config/
├── klaviyo/
│   ├── base.json           # Shared config
│   ├── development.json    # Dev overrides
│   ├── staging.json        # Staging overrides
│   └── production.json     # Prod overrides

base.json


{
  "timeout": 30000,
  "retries": 3,
  "cache": {
    "enabled": true,
    "ttlSeconds": 60
  }
}

development.json


{
  "apiKey": "${KLAVIYO_API_KEY}",
  "baseUrl": "https://api-sandbox.klaviyo.com",
  "debug": true,
  "cache": {
    "enabled": false
  }
}

staging.json


{
  "apiKey": "${KLAVIYO_API_KEY_STAGING}",
  "baseUrl": "https://api-staging.klaviyo.com",
  "debug": false
}

production.json


{
  "apiKey": "${KLAVIYO_API_KEY_PROD}",
  "baseUrl": "https://api.klaviyo.com",
  "debug": false,
  "retries": 5
}

Environment Detection


// src/klaviyo/config.ts
import baseConfig from '../../config/klaviyo/base.json';

type Environment = 'development' | 'staging' | 'production';

function detectEnvironment(): Environment {
  const env = process.env.NODE_ENV || 'development';
  const validEnvs: Environment[] = ['development', 'staging', 'production'];
  return validEnvs.includes(env as Environment)
    ? (env as Environment)
    : 'development';
}

export function getKlaviyoConfig() {
  const env = detectEnvironment();
  const envConfig = require(`../../config/klaviyo/${env}.json`);

  return {
    ...baseConfig,
    ...envConfig,
    environment: env,
  };
}

Secret Management by Environment

Local Development


# .env.local (git-ignored)
KLAVIYO_API_KEY=sk_test_dev_***

CI/CD (GitHub Actions)


env:
  KLAVIYO_API_KEY: ${{ secrets.KLAVIYO_API_KEY_${{ matrix.environment }} }}

Production (Vault/Secrets Manager)


# AWS Secrets Manager
aws secretsmanager get-secret-value --secret-id klaviyo/production/api-key

# GCP Secret Manager
gcloud secrets versions access latest --secret=klaviyo-api-key

# HashiCorp Vault
vault kv get -field=api_key secret/klaviyo/production

Environment Isolation


// Prevent production operations in non-prod
function guardProductionOperation(operation: string): void {
  const config = getKlaviyoConfig();

  if (config.environment !== 'production') {
    console.warn(`[klaviyo] ${operation} blocked in ${config.environment}`);
    throw new Error(`${operation} only allowed in production`);
  }
}

// Usage
async function deleteAllData() {
  guardProductionOperation('deleteAllData');
  // Dangerous operation here
}

Feature Flags by Environment


const featureFlags: Record<Environment, Record<string, boolean>> = {
  development: {
    newFeature: true,
    betaApi: true,
  },
  staging: {
    newFeature: true,
    betaApi: false,
  },
  production: {
    newFeature: false,
    betaApi: false,
  },
};

Instructions

Step 1: Create Config Structure

Set up the base and per-environment configuration files.

Step 2: Implement Environment Detection

Add logic to detect and load environment-specific config.

Step 3: Configure Secrets

Store API keys securely using your secret management solution.

Step 4: Add Environment Guards

Implement safeguards for production-only operations.

Output

  • Multi-environment config structure
  • Environment detection logic
  • Secure secret management
  • Production safeguards enabled

Error Handling

Issue Cause Solution
Wrong environment Missing NODE_ENV Set environment variable
Secret not found Wrong secret path Verify secret manager config
Config merge fails Invalid JSON Validate config files
Production guard triggered Wrong environment Check NODE_ENV value

Examples

Quick Environment Check


const env = getKlaviyoConfig();
console.log(`Running in ${env.environment} with ${env.baseUrl}`);

Resources

Next Steps

For observability setup, see klaviyo-observability.

Ready to use klaviyo-pack?