Latest version: v0.2.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
An opinionated way of deploying docker-compose to kubernetes clusters by managing them with a helm chart.
No known vulnerabilities found