1.Check whether the file exists in the corresponding path.
It is found that the file exists and the file permissions on each level is normal.
2.The problem occurs because configuration in the /etc/ssh/sshd_config file is incorrect. As a result, user omm mutual trust fails, or the SFTP
configuration in the /etc/ssh/sshd_config configuration file is
Log in to the active OMS node as user omm.
Run the ssh OMS floating IP address command to check whether a password is required.
If the password is required, the /etc/ssh/sshd_config file is incorrectly configured. As a result, the trust of user omm fails.
Run the sftp OMS floating IP
address command to check whether the SFTP connection is normal.
3. If the trust is abnormal, run the vi /etc/ssh/sshd_config command to check whether the configuration file contains DenyUsers, DenyGroups, AllowUsers, AllowGroups, and ListenAddress.
If the preceding parameters are configured in the file, comment out the configuration and run the service sshd restart command to restart the SSH service.
If the SFTP connection is
abnormal, run the vi /etc/ssh/sshd_config command to check whether Subsystem
sftp /usr/lib64/ssh/sftp-server is configured in the configuration file. If
it does not, add the configuration item and restart the SSH service.
4.Check the SSH service.
The service is normal.
However, the SFTP is faulty.
Check the controller log and an error reported indicating that the error is related to the SFTP.
5.Run the ll /usr/libexec/openssh/sftp-server command. The user of the default SFTP group is user root. Security hardening has been performed on site and the sftpgrp has been customized.
6. Run the usermod -G sftpgrp omm command to add user omm to sftpgrp, and then install the SFTP service to resolve the problem. (You only need to modify the active OMS node.)
Security hardening has been performed on the operating system, and the default owner group of sftp-server is changed. As a result, user omm does not have permissions of sftpgrp.