Skip to content

Commit 0a0cf4d

Browse files
authored
Merge branch 'master' into ocp46
2 parents 0b22ad4 + 3122ef0 commit 0a0cf4d

File tree

3 files changed

+41
-0
lines changed

3 files changed

+41
-0
lines changed

.DS_Store

-6 KB
Binary file not shown.

.gitignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,6 @@
99
*.tfvars
1010
openshift_pull_secret.json
1111
.terraform.lock.hcl
12+
13+
# OS X files
14+
.DS_Store

delocp.sh

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
#!/bin/bash
2+
3+
clusterId=$1
4+
5+
if [ -z $clusterId ]; then
6+
exit 99
7+
fi
8+
9+
terraform destroy -auto-approve &
10+
11+
sleep 10
12+
workers=$(aws ec2 describe-instances --filters Name="tag:kubernetes.io/cluster/${clusterId}",Values="owned" --query 'Reservations[].Instances[].[InstanceId, Tags[?Key==`Name`] | [0].Value]' --output text | grep worker | cut -d$'\t' -f1)
13+
14+
aws ec2 terminate-instances --instance-ids ${workers}
15+
16+
vpcid=$(grep vpc terraform.tfstate | grep vpc_id | grep vpc- | head -1 | cut -d"\"" -f4)
17+
elbname=$(aws elb describe-load-balancers --query 'LoadBalancerDescriptions[].[LoadBalancerName,VPCId]' --output text | cut -d$'\t' -f1)
18+
aws elb delete-load-balancer --load-balancer-name ${elbname}
19+
20+
sleep 300
21+
22+
sg=$(aws ec2 describe-security-groups --filters Name="tag:kubernetes.io/cluster/${clusterId}",Values="owned" --query 'SecurityGroups[].[GroupId,GroupName]' --output text | grep "k8s-elb" | cut -d$'\t' -f1)
23+
24+
aws ec2 delete-security-group --group-id ${sg}
25+
26+
sleep 60
27+
28+
aws s3 ls | grep ${clusterId} | awk '{print "aws s3 rb —force s3://"$3}' | bash
29+
30+
aws iam list-users --query 'Users[].[UserName,UserId]' --output text | grep ${clusterId}
31+
32+
aws iam list-users --query 'Users[].[UserName,UserId]' --output text | grep ${clusterId} | awk '{print "aws iam delete-user-policy --user-name "$1" --policy-name "$1"-policy"}' | bash
33+
34+
aws iam list-users --query 'Users[].[UserName,UserId]' --output text | grep ${clusterId} | awk '{print "aws iam delete-access-key --user-name "$1" --access-key-id $(aws iam list-access-keys --user-name "$1" --query 'AccessKeyMetadata[].AccessKeyId' --output text)"}' | bash
35+
36+
aws iam list-users --query 'Users[].[UserName,UserId]' --output text | grep ${clusterId} | awk '{print "aws iam delete-user --user-name "$1}' | bash
37+
38+
exit 0

0 commit comments

Comments
 (0)