Remove Stale SRM Entries from PSC
Step 1. Find out from vCenter where is my PSC /usr/lib/vmware-vmafd/bin/vmafd-cli get-ls-location --server-name localhost C:\Program Files\VMware\vCenter Server\vmafdd\vmafd-cli get-site-name --server-name localhost /usr/lib/vmidentity/tools/scripts/lstool.py list --url http://localhost:7080/lookupservice/sdk > /tmp/psc_services.txt grep -i vrms -A1 -B2 psc_services.txt grep -i h5-dr -A1 -B2 psc_services.txt grep -i vrUi -A1 -B2 psc_services.txt grep -i vcdr -A1 -B2 psc_services.txt grep -i vrms -A1 -B2 psc_services.txt Step 2. /usr/lib/vmidentity/tools/scripts/lstool.py list --url http://localhost:7080/lookupservice/sdk --type VCDR "%VMWARE_PYTHON_BIN%" "%VMWARE_CIS_HOME%\VMware Identity Services\lstool\scripts\lstool.py" list --url http://localhost:7080/lookupservice/sdk --type VCDR Output to a text log if you prefer /usr/lib/vmidentity/tools/scripts/lstool.py list --url http://localhost:7080/lookupservice/sdk --type VCDR > VRPSC.txt "%VMWARE_PYTHON_BIN%" "%VMWARE_CIS_HOME%\VMware Identity Services\lstool\scripts\lstool.py" list --url http://localhost:7080/lookupservice/sdk type VCDR > c:\psc_services.txt Output should look like this. Name: vCenter DR service (vCenter-dr) Service Product: com.vmware.dr Service Type: vcDr Service ID: 47a38601-09dc-4b24-8c60-c80c93a90e31 Site ID: site-1 Node ID: 80b10878-ffb4-11e7-aa05-000c298c82ea Owner ID: SRM-47a38601-09dc-4b24-8c60-c80c93a90e31@vsphere.local Version: 6.5.1 Endpoints: Type: com.vmware.dr.extApi Protocol: vmomi URL: https://192.168.1.152:9086/vcdr/extapi/sdk SSL trust: MIIDVTCCAj2gAwIBAgIJAOwNcvFh5SwWMA0GCSqGSIb3DQEBCwUAMF4xLTArBgNVBAoMJFZNd2FyZSB2Q2VudGVyIFNpdGUgUmVjb3ZlcnkgTWFuYWdlcjEtMCsGA1UECwwkVk13YXJlIHZDZW50ZXIgU2l0ZSBSZWNvdmVyeSBNYW5hZ2VyMB4XDTE4MDEyNDEyNTYyN1oXDTIzMDEyMzEyNTYyN1owNDEMMAoGA1UECgwDdm13MQwwCgYDVQQLDAN2bXcxFjAUBgNVBAMMDTE5Mi4xNjguMS4xNTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDH+4hV/uqF892kMaNvBY36Py/VTF7vNOV7QpuQhfOzMjW0JMbSxRKuOLvc8UggEXAmqOi26s0Z3ZlDIXeCtJ9sk4YM3TsNRnkGWcgwBUR9LpSOyKFbiy4/WLnPM+Iw7w2oluPpvfSVvl7lH760ivqOdJ/o3UPI26T3SGDWhT8wtD9jeW1vbMhEke8ERuU8Y9yEICA/JEqhezf9KGKT/e4P6ZEAT7KzUKJvmRu+0L8OsdENyfpwgo/6nxTslcnf1JJG+R7sEOd3iUpppLiq2TX8ofb0Oq/epoJfgw2pFxifNZBgdbYZQjURWLCuO5ryiEirI5fRCnU8y1Da9nmfDzxzAgMBAAGjQDA+MAkGA1UdEwQCMAAwCwYDVR0PBAQDAgSwMBMGA1UdJQQMMAoGCCsGAQUFBwMBMA8GA1UdEQQIMAaHBMCoAZgwDQYJKoZIhvcNAQELBQADggEBAC5p5zsiVmIiu1bzzmt4M+RiqJm0rS6NEjIIts6u8a/pfsnIE8iHTwmG6UDwIVK6CVI+zPa7Ido0KVUXekDk456PT+3xblj5m++M9WFu4Yc0WRW9e5Y1BubZoyfeLgZhk2egCz+xtAR1UZvqUMNrrGF0mrm5TxXw1vqwlU2kiauBMgtrb7w7qS7VBtFXYFGGbXtoTCA8EuiPqZuAZMXCqsBl0y2niORL+PPa96RlYwF+8WpDtyfKwezcu6YeSGhFeG36VRuoDclga5hCUFAPRY6YAlgK7qmXyYcM7mPuY/Wvkz7G+hWTAbiu3wG1adXeAf0hR7JIYungF/AVIBVwUms= Type: com.vmware.dr.vcDr Protocol: vmomi URL: https://192.168.1.152:9086/vcdr/vmomi/sdk SSL trust: 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 Attributes: supportedVmodlVersions: /vcdr/vmomi/drserviceversions.xml vcInstanceUuid: 0275943f-0310-4db2-8af8-52a91886c61c vmodlVersion: /vcdr/vmomi/drversion.xml extensionKey: com.vmware.vcDr------------------------------------------------------- Name: vCenter DR service (vCenter-dr) Service Product: com.vmware.dr Service Type: vcDr Service ID: 19e3917f-7dd8-4c48-8fd0-403402a7a97d Site ID: site-1 Node ID: faa9b94a-0018-11e8-8667-000c29d9d620 Owner ID: SRM-19e3917f-7dd8-4c48-8fd0-403402a7a97d@vsphere.local Version: 6.5.1 Endpoints: Type: com.vmware.dr.vcDr Protocol: vmomi URL: https://192.168.2.57:9086/vcdr/vmomi/sdk SSL trust: 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 Type: com.vmware.dr.extApi Protocol: vmomi URL: https://192.168.2.57:9086/vcdr/extapi/sdk SSL trust: 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 Attributes: supportedVmodlVersions: /vcdr/vmomi/drserviceversions.xml vcInstanceUuid: 3523f7ee-7eca-4ae4-9b99-c51026056869 vmodlVersion: /vcdr/vmomi/drversion.xml extensionKey: com.vmware.vcDr Step 3. To remove the stale entries run this command with the Service ID you want remove. /usr/lib/vmidentity/tools/scripts/lstool.py unregister --url http://localhost:7080/lookupservice/sdk --id 47a38601-09dc-4b24-8c60-c80c93a90e31 --user 'administrator@vsphere.local' --password 'VMware123!' --no-check-cert "%VMWARE_PYTHON_BIN%" "%VMWARE_CIS_HOME%\VMware Identity Services\lstool\scripts\lstool.py" unregister --url http://localhost:7080/lookupservice/sdk --id Service_ID from Step 4--user "administrator@vsphere.local" --password "administrator_password"--no-check-cert For example: "%VMWARE_PYTHON_BIN%" "%VMWARE_CIS_HOME%\VMware Identity Services\lstool\scripts\lstool.py" unregister --url http://localhost:7080/lookupservice/sdk --id TMP:608BF497-A198-40C1-9866-545533A488BE --user "administrator@vsphere.local" --password "VMware123!" --no-check-cert Step 4. Check that it has removed. Go to step 2 Warning : Copy to notepad first and paste to command prompt. If commands fail type manually or copy from output. "%VMWARE_PYTHON_BIN%" lstool.py
Categories
One thought on “Remove Stale SRM Entries from PSC” Leave a comment ›