Skip to main content

Scan and visualize your AWS infrastructure as an interactive graph

Project description

CloudWire

AWS infrastructure visualization tool — scan your account and explore service dependencies as an interactive graph, directly in your browser.

PyPI version Python versions License: MIT Build

If CloudWire saves you time, a GitHub star helps others find it.

No data leaves your system. AWS credentials never leave your terminal. The graph is built locally using your existing credential chain (~/.aws/credentials, aws sso login, saml2aws, aws-vault — all work out of the box).

CloudWire — AWS infrastructure graph visualization


Quick start

# Install
pip install cloudwire

# Launch (opens http://localhost:8080 automatically)
cloudwire

# Target a specific profile and region
cloudwire --profile staging --region us-east-1

Tip: Prefer isolated installs? Use pipx install cloudwire instead.

Requirements: Python 3.9+ and valid AWS credentials configured locally.

On first load, select the services you want to scan from the top bar and click Scan. The graph populates in real time as resources are discovered.


Why CloudWire?

Tools like Rover, Terravision, and Inframap visualize infrastructure from Terraform state files. CloudWire takes a different approach:

  • Live scanning, not plan-file parsing — CloudWire queries your AWS account directly via boto3, discovering resources and relationships in real time. No Terraform required. You can also import .tfstate/.tf files if you prefer.
  • Relationship inference — edges aren't just "resource A references resource B." CloudWire resolves IAM policies, environment variable references, event triggers, and VPC containment to surface connections that don't appear in any state file.
  • Runs entirely local — single Python process, no database, no cloud backend, no signup. Your AWS credentials never leave your machine.

Key features

  • Interactive graph — dark-themed canvas with animated data flow, pan/zoom, and SVG export
  • 24 AWS services with dedicated scanners, icons, colors, and relationship inference
  • Real edges — API integrations, event triggers, IAM policy inference, env var references, VPC containment
  • VPC topology — subnets, security groups, IGWs, NAT GWs, route tables with AZ grouping and internet exposure detection
  • Tag-based scanning — discover and scan resources by AWS tags
  • Terraform import — upload .tfstate or .tf files to visualize without AWS credentials
  • Analysis tools — blast radius, shortest path, architecture summary, pattern detection
  • Three layout modes — Circular, Flow, Swimlane — switchable from the toolbar
  • Permission-aware — missing IAM policies surfaced clearly, never blocks the scan

Required IAM permissions

CloudWire is read-only. All operations use List*, Describe*, and Get* API actions only — no write access required.

A minimal IAM policy is documented in docs/USAGE.md. The recommended starting point:

arn:aws:iam::aws:policy/ReadOnlyAccess

If you use a more restrictive policy, CloudWire will scan what it can and clearly report which services were denied — it never fails silently.


Supported services

Service Scanner
API Gateway Dedicated — REST + HTTP APIs, multi-service integrations, Cognito authorizers
Lambda Dedicated — functions, event source mappings, env var references, IAM policy inference
SQS Dedicated — queues, attributes, dead letter queue edges
SNS Dedicated — topics and subscriptions
EventBridge Dedicated — rules and targets
DynamoDB Dedicated — tables, streams, global table replicas
EC2 Dedicated — instances, VPC, subnet, security group, instance profile edges
ECS Dedicated — clusters, services, task definitions, load balancer edges
S3 Dedicated — buckets and Lambda notification edges
RDS Dedicated — DB instances and clusters
Step Functions Dedicated
Kinesis Dedicated
IAM Dedicated — roles with full policy resolution
Cognito Dedicated — user pools
CloudFront Dedicated — distributions, S3/API GW/ELB origins, Lambda@Edge
Route 53 Dedicated — hosted zones, record sets, alias target edges
ElastiCache Dedicated — cache clusters
Redshift Dedicated — clusters
Glue Dedicated — jobs, crawlers, triggers
AppSync Dedicated — GraphQL APIs
Secrets Manager Dedicated
KMS Dedicated
VPC Network Dedicated — VPCs, subnets, security groups, IGWs, NAT GWs, route tables
ELB Discovered via CloudFront, Route 53, ECS edges
Everything else Generic (tagged resources only)

How it works

CloudWire is a Python CLI (FastAPI backend) that serves a pre-compiled React frontend. The backend scans AWS via boto3 and builds a networkx graph. The frontend visualizes it using a custom SVG canvas engine. No database, no cloud dependency — everything runs in a single process on your machine.


Contributing

We welcome contributions! See CONTRIBUTING.md for setup instructions, project structure, code style, and PR guidelines.

git clone https://github.com/Himanshu-370/cloudwire
cd cloudwire
make dev   # starts backend + frontend in parallel

Links

License

MIT — see LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloudwire-0.2.13.tar.gz (160.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cloudwire-0.2.13-py3-none-any.whl (179.8 kB view details)

Uploaded Python 3

File details

Details for the file cloudwire-0.2.13.tar.gz.

File metadata

  • Download URL: cloudwire-0.2.13.tar.gz
  • Upload date:
  • Size: 160.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.13

File hashes

Hashes for cloudwire-0.2.13.tar.gz
Algorithm Hash digest
SHA256 c7a21132b15c7e3e2556a94f0ca915e39b0802d1766fb6e67903dc771bf5725d
MD5 77440644e5fe2435b603659cc2a42d72
BLAKE2b-256 75a9dd1c574d9e33c223d67e819116bba0a258c0a2c1dae34f1a69f14fe35cb1

See more details on using hashes here.

File details

Details for the file cloudwire-0.2.13-py3-none-any.whl.

File metadata

  • Download URL: cloudwire-0.2.13-py3-none-any.whl
  • Upload date:
  • Size: 179.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/5.1.0 CPython/3.12.13

File hashes

Hashes for cloudwire-0.2.13-py3-none-any.whl
Algorithm Hash digest
SHA256 508ceddd43f280e3662ce281013af34120a9ebcc9bc7a840d78d274216c8c20a
MD5 a0473a4b87d5c5102fb949fe187480bd
BLAKE2b-256 7feffc32d3e1eae2a4c4137e23e5cbdadc1a6cf7a8d2596e685245b25e66640f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page