Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is it possible to visualize data that was ingested from multiple AWS accounts that have connections? #34

Open
jokercygnus opened this issue Jul 19, 2020 · 3 comments
Labels
enhancement New feature or request

Comments

@jokercygnus
Copy link

Hi,
Im trying to visualize data that was ingested from multiple AWS accounts, with the same profile (using AssumeRole).
Unfortunately, it is only possible to load and visualize one DB at a time.
Is there any way that I am missing to do that?

@beatro0t
Copy link
Contributor

Hi @jokercygnus,

Thanks for the question. You're absolutely right, this is not yet something we have support for. Long story but currently data is loaded into the db by wrapping neo4j-admin import, which will recreate the database each time. While this approach is fast, there are quite a few limitations with it (not being able to visualize multiple accounts being one of them) and it something we are busy looking at changing.

For now, you can try unzipping the two zipped datasets you want to view and merging each CSV with the same name. Hopefully, if you zip it all up again, you can load it with awspx db --load-zip .

@beatro0t beatro0t added the enhancement New feature or request label Jul 20, 2020
@jokercygnus
Copy link
Author

Thank you for the reply.
Yes I also thought about appending the CSVs to each other while taking a look inside the ZIPs. Hope it will go smooth.

@beatro0t beatro0t mentioned this issue Sep 14, 2020
@beatro0t
Copy link
Contributor

I've added preliminary support for loading multiple ZIPs; however, it would be a bit of a cop out to say this feature has been added. The problem is that atm, resources are identified by their ARNs, as are generics and pseudo-nodes like Admin and CatchAll - which are not uniquely identifiable across zips. What you end up with is a single dataset that is misleading. Things like built-in managed policies do not include account numbers in their ARNs and so the actions they can perform in each account will be added together. It will appear as though users attached to them in one account can now perform actions affecting resources in both, which is incorrect. Things like attack paths do not consider accounts at all.

A fair amount of work needs to be done for this feature so for the time being the CLI will not accept more than one ZIP, although the function it calls takes a list. I'd prefer to add additional labels to each resource, rather than a property but need to do more investigation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants