If necessary, you can run a script to remove all NSX-T objects created by NCP.
The installation files include the following cleanup scripts:
- nsx_policy_cleanup.py - Use this script if NSX-T resources are created using Policy mode.
- nsx_cleanup.py - Use this script if NSX-T resources are created using Manager mode.
Before running the script, perform the following tasks:
- Stop NCP.
- Remove all resources that you created and are associated with the NCP-created objects. The script will fail if you do not delete those objects. For example, if NCP created a segment, and you created a distributed firewall (DFW) rule and group associated with the segment, you must delete the DFW rule and group, or remove the associations. Or if you attached VMs to the segment, you must delete the VMs or detach them from the segment.
Policy Mode
Usage: nsx_policy_cleanup.py [options] Options: -h, --help show this help message and exit --mgr-ip=MGR_IP NSX Manager IP address -u USERNAME, --username=USERNAME NSX Manager username, ignored if nsx-cert is set -p PASSWORD, --password=PASSWORD NSX Manager password, ignored if nsx-cert is set -n NSX_CERT, --nsx-cert=NSX_CERT NSX certificate path -k KEY, --key=KEY NSX client private key path --vc-endpoint=VC_ENDPOINT IpAddress or Hostname of VC, ignored if environment variable VC_ENDPOINT is set --vc-username=VC_USERNAME Username for the VC ServiceAccount, ignored if environment variable VC_USERNAME is set --vc-password=VC_PASSWORD Password for the VC ServiceAccount, ignored if environment variable VC_PASSWORD is set --vc-https-port=VC_HTTPS_PORT HTTPS port of VC, ignored if environment variable VC_HTTPS_PORT is set. If not present, 443 default value will be used --vc-sso-domain=VC_SSO_DOMAIN SSO Domain of VC, ignored if environment variable VC_SSO_DOMAIN is set. If not present, local default value will be used --vc-ca-cert=VC_CA_CERT Specify a CA bundle to verify the VC server certificate. It will be ignored if environment VC_CA_CERT is set --vc-insecure Not verify VC server certificate -c CLUSTER, --cluster=CLUSTER Cluster to be removed -r, --remove CAVEAT: Removes NSX resources. If not set will do dry- run. --top-tier-router-id=TOP_TIER_ROUTER_ID Specify the top tier router id. Must be specified if top tier router does not have the cluster tag --all-res Also clean up HA switching profile, ipblock, external ippool. These resources could be created by TAS NSX-T Tile --no-warning Disable urllib's insecure request warning --status Check the deletion status, the exit code can be success(0), in progress(EXIT_CODE_IN_PROGRESS or failure(other non-zerovalues) --thumbprint=THUMBPRINT Specify one or a list of thumbprint strings to use in verifying the NSX Manager server certificate
For example:
python nsx_policy_cleanup.py --mgr-ip={nsx_mngr_ip} -u admin -p {password} -c {k8s_cluster_name} --no-warning -r
In some cases, the top-tier-router-id parameter must be be specified.
Manager Mode
Usage: nsx_cleanup.py [options] Options: -h, --help show this help message and exit --mgr-ip=MGR_IP NSX Manager IP address -u USERNAME, --username=USERNAME NSX Manager username, ignored if nsx-cert is set -p PASSWORD, --password=PASSWORD NSX Manager password, ignored if nsx-cert is set -n NSX_CERT, --nsx-cert=NSX_CERT NSX certificate path -k KEY, --key=KEY NSX client private key path -c CLUSTER, --cluster=CLUSTER Cluster to be removed -r, --remove CAVEAT: Removes NSX resources. If not set will do dry- run. --top-tier-router-uuid=TOP_TIER_ROUTER_UUID Specify the top tier router uuid. Must be specified if top tier router does not have the cluster tag or for a single-tier1 topology --all-res Also clean up HA switching profile, ipblock, external ippool. These resources could be created by TAS NSX-T Tile --no-warning Disable urllib's insecure request warning
For example:
python nsx_cleanup.py --mgr-ip={nsx_mngr_ip} -u admin -p {password} -c {k8s_cluster_name} --top-tier-router-uuid={top_tier_router_uuid} --no-warning -r