If necessary, you can run a script to remove all NSX-T objects created by NCP.
The installation files include the following cleanup scripts:
- nsx_policy_cleanup.py - Use this script if NSX-T resources are created using Policy mode.
- nsx_cleanup.py - Use this script if NSX-T resources are created using Manager mode.
Before running the script, you must stop NCP.
Policy Mode
Usage: nsx_policy_cleanup.py [options]
Options:
-h, --help show this help message and exit
--mgr-ip=MGR_IP NSX Manager IP address
-u USERNAME, --username=USERNAME
NSX Manager username, ignored if nsx-cert is set
-p PASSWORD, --password=PASSWORD
NSX Manager password, ignored if nsx-cert is set
-n NSX_CERT, --nsx-cert=NSX_CERT
NSX certificate path
-k KEY, --key=KEY NSX client private key path
--vc-endpoint=VC_ENDPOINT
IpAddress or Hostname of VC, ignored if environment
variable VC_ENDPOINT is set
--vc-username=VC_USERNAME
Username for the VC ServiceAccount, ignored if
environment variable VC_USERNAME is set
--vc-password=VC_PASSWORD
Password for the VC ServiceAccount, ignored if
environment variable VC_PASSWORD is set
--vc-https-port=VC_HTTPS_PORT
HTTPS port of VC, ignored if environment variable
VC_HTTPS_PORT is set. If not present, 443 default
value will be used
--vc-sso-domain=VC_SSO_DOMAIN
SSO Domain of VC, ignored if environment variable
VC_SSO_DOMAIN is set. If not present, local default
value will be used
--vc-ca-cert=VC_CA_CERT
Specify a CA bundle to verify the VC server
certificate. It will be ignored if environment
VC_CA_CERT is set
--vc-insecure Not verify VC server certificate
-c CLUSTER, --cluster=CLUSTER
Cluster to be removed
-r, --remove CAVEAT: Removes NSX resources. If not set will do dry-
run.
--top-tier-router-id=TOP_TIER_ROUTER_ID
Specify the top tier router id. Must be specified if
top tier router does not have the cluster tag
--all-res Also clean up HA switching profile, ipblock, external
ippool. These resources could be created by TAS NSX-T
Tile
--no-warning Disable urllib's insecure request warning
--status Check the deletion status, the exit code can be
success(0), in progress(EXIT_CODE_IN_PROGRESS or
failure(other non-zerovalues)
--thumbprint=THUMBPRINT
Specify one or a list of thumbprint strings to use in
verifying the NSX Manager server certificate
For example:
python nsx_policy_cleanup.py --mgr-ip={nsx_mngr_ip} -u admin -p {password} -c {k8s_cluster_name} --no-warning -r
In some cases, the top-tier-router-id parameter must be be specified.
Manager Mode
Usage: nsx_cleanup.py [options]
Options:
-h, --help show this help message and exit
--mgr-ip=MGR_IP NSX Manager IP address
-u USERNAME, --username=USERNAME
NSX Manager username, ignored if nsx-cert is set
-p PASSWORD, --password=PASSWORD
NSX Manager password, ignored if nsx-cert is set
-n NSX_CERT, --nsx-cert=NSX_CERT
NSX certificate path
-k KEY, --key=KEY NSX client private key path
-c CLUSTER, --cluster=CLUSTER
Cluster to be removed
-r, --remove CAVEAT: Removes NSX resources. If not set will do dry-
run.
--top-tier-router-uuid=TOP_TIER_ROUTER_UUID
Specify the top tier router uuid. Must be specified if
top tier router does not have the cluster tag or for a
single-tier1 topology
--all-res Also clean up HA switching profile, ipblock, external
ippool. These resources could be created by TAS NSX-T
Tile
--no-warning Disable urllib's insecure request warning
For example:
python nsx_cleanup.py --mgr-ip={nsx_mngr_ip} -u admin -p {password} -c {k8s_cluster_name} --top-tier-router-uuid={top_tier_router_uuid} --no-warning -r