Jan  8 14:44:53 ip-172-16-3-10 polkitd[825]: Loading rules from directory /etc/polkit-1/rules.d
Jan  8 14:44:53 ip-172-16-3-10 polkitd[825]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan  8 14:44:53 ip-172-16-3-10 polkitd[825]: Finished loading, compiling and executing 4 rules
Jan  8 14:44:53 ip-172-16-3-10 polkitd[825]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: new group: name=rocky, GID=1000
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: add 'rocky' to group 'adm'
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: add 'rocky' to group 'systemd-journal'
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: add 'rocky' to shadow group 'adm'
Jan  8 14:44:54 ip-172-16-3-10 useradd[911]: add 'rocky' to shadow group 'systemd-journal'
Jan  8 14:44:55 ip-172-16-3-10 sshd[931]: Server listening on 0.0.0.0 port 22.
Jan  8 14:44:55 ip-172-16-3-10 sshd[931]: Server listening on :: port 22.
Jan  8 14:44:56 ip-172-16-3-10 sshd[1009]: fatal: Access denied for user rocky by PAM account configuration [preauth]
Jan  8 14:45:18 ip-172-16-3-10 sshd[4555]: Accepted publickey for rocky from 172.16.0.143 port 52690 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  8 14:45:18 ip-172-16-3-10 systemd[4563]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan  8 14:45:18 ip-172-16-3-10 sshd[4555]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  8 14:45:21 ip-172-16-3-10 sshd[4607]: Accepted publickey for rocky from 172.16.0.143 port 52706 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  8 14:45:21 ip-172-16-3-10 sshd[4607]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  8 14:45:21 ip-172-16-3-10 sshd[4733]: Accepted publickey for rocky from 172.16.0.143 port 52716 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  8 14:45:21 ip-172-16-3-10 sshd[4733]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  8 14:45:22 ip-172-16-3-10 sudo[4812]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan  8 14:45:22 ip-172-16-3-10 sudo[4812]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  8 14:46:28 ip-172-16-3-10 sudo[4812]: pam_unix(sudo:session): session closed for user root
Jan  8 14:46:28 ip-172-16-3-10 sshd[4975]: Accepted publickey for rocky from 172.16.0.143 port 60860 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  8 14:46:28 ip-172-16-3-10 sshd[4975]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  8 14:46:28 ip-172-16-3-10 sudo[5051]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan  8 14:46:28 ip-172-16-3-10 sudo[5051]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  8 14:46:28 ip-172-16-3-10 sudo[5051]: pam_unix(sudo:session): session closed for user root
Jan  8 14:46:28 ip-172-16-3-10 sudo[5054]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan  8 14:46:28 ip-172-16-3-10 sudo[5054]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  8 14:46:28 ip-172-16-3-10 sudo[5054]: pam_unix(sudo:session): session closed for user root
Jan  8 14:46:28 ip-172-16-3-10 sudo[5057]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan  8 14:46:28 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  8 14:48:38 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session closed for user root
Jan  8 15:01:05 ip-172-16-3-10 sshd[4555]: pam_unix(sshd:session): session closed for user rocky
Jan  8 15:01:05 ip-172-16-3-10 sshd[4733]: pam_unix(sshd:session): session closed for user rocky
Jan  8 15:01:05 ip-172-16-3-10 sshd[4975]: pam_unix(sshd:session): session closed for user rocky
Jan  8 15:01:05 ip-172-16-3-10 sshd[4607]: pam_unix(sshd:session): session closed for user rocky
Jan  8 15:01:15 ip-172-16-3-10 systemd[4566]: pam_unix(systemd-user:session): session closed for user rocky
Jan  8 15:02:07 ip-172-16-3-10 sshd[5626]: Accepted publickey for root from 172.16.3.5 port 42554 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:07 ip-172-16-3-10 systemd[5631]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  8 15:02:07 ip-172-16-3-10 sshd[5626]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:07 ip-172-16-3-10 sshd[5626]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:07 ip-172-16-3-10 sshd[5658]: Accepted publickey for root from 172.16.3.5 port 42562 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:07 ip-172-16-3-10 sshd[5658]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:07 ip-172-16-3-10 sshd[5658]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:07 ip-172-16-3-10 sshd[5679]: Accepted publickey for root from 172.16.3.5 port 42566 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:07 ip-172-16-3-10 sshd[5679]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:07 ip-172-16-3-10 sshd[5679]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:07 ip-172-16-3-10 sshd[5700]: Accepted publickey for root from 172.16.3.5 port 42570 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:07 ip-172-16-3-10 sshd[5700]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:08 ip-172-16-3-10 sshd[5700]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:08 ip-172-16-3-10 sshd[5721]: Accepted publickey for root from 172.16.3.5 port 42576 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:08 ip-172-16-3-10 sshd[5721]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:08 ip-172-16-3-10 sshd[5721]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:08 ip-172-16-3-10 sshd[5742]: Accepted publickey for root from 172.16.3.5 port 42590 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:08 ip-172-16-3-10 sshd[5742]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:08 ip-172-16-3-10 sshd[5742]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:08 ip-172-16-3-10 sshd[5763]: Accepted publickey for root from 172.16.3.5 port 42602 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:08 ip-172-16-3-10 sshd[5763]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:08 ip-172-16-3-10 sshd[5763]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:08 ip-172-16-3-10 sshd[5784]: Accepted publickey for root from 172.16.3.5 port 42614 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:08 ip-172-16-3-10 sshd[5784]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:08 ip-172-16-3-10 sshd[5784]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:08 ip-172-16-3-10 sshd[5809]: Accepted publickey for root from 172.16.3.5 port 42628 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:08 ip-172-16-3-10 sshd[5809]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:09 ip-172-16-3-10 sshd[5809]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:09 ip-172-16-3-10 sshd[5832]: Accepted publickey for root from 172.16.3.5 port 42632 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:09 ip-172-16-3-10 sshd[5832]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:09 ip-172-16-3-10 sshd[5832]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:09 ip-172-16-3-10 sshd[5856]: Accepted publickey for root from 172.16.3.5 port 42634 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:09 ip-172-16-3-10 sshd[5856]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:09 ip-172-16-3-10 sshd[5856]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:09 ip-172-16-3-10 sshd[5880]: Accepted publickey for root from 172.16.3.5 port 42648 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:09 ip-172-16-3-10 sshd[5880]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:09 ip-172-16-3-10 sshd[5880]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:10 ip-172-16-3-10 sshd[5902]: Accepted publickey for root from 172.16.3.5 port 42664 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 15:02:10 ip-172-16-3-10 sshd[5902]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 15:02:10 ip-172-16-3-10 sshd[5902]: pam_unix(sshd:session): session closed for user root
Jan  8 15:02:20 ip-172-16-3-10 systemd[5634]: pam_unix(systemd-user:session): session closed for user root
Jan  8 16:06:06 ip-172-16-3-10 sshd[5960]: Accepted publickey for root from 172.16.3.5 port 35084 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:06 ip-172-16-3-10 systemd[5965]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  8 16:06:06 ip-172-16-3-10 sshd[5960]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:07 ip-172-16-3-10 sshd[5960]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:07 ip-172-16-3-10 sshd[5994]: Accepted publickey for root from 172.16.3.5 port 35088 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:07 ip-172-16-3-10 sshd[5994]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:07 ip-172-16-3-10 sshd[5994]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:07 ip-172-16-3-10 sshd[6016]: Accepted publickey for root from 172.16.3.5 port 35092 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:07 ip-172-16-3-10 sshd[6016]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:07 ip-172-16-3-10 sshd[6016]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:07 ip-172-16-3-10 sshd[6037]: Accepted publickey for root from 172.16.3.5 port 35094 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:07 ip-172-16-3-10 sshd[6037]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:07 ip-172-16-3-10 sshd[6037]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:07 ip-172-16-3-10 sshd[6058]: Accepted publickey for root from 172.16.3.5 port 35102 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:07 ip-172-16-3-10 sshd[6058]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:07 ip-172-16-3-10 sshd[6058]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:07 ip-172-16-3-10 sshd[6079]: Accepted publickey for root from 172.16.3.5 port 35104 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:07 ip-172-16-3-10 sshd[6079]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:08 ip-172-16-3-10 sshd[6079]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:08 ip-172-16-3-10 sshd[6100]: Accepted publickey for root from 172.16.3.5 port 35116 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:08 ip-172-16-3-10 sshd[6100]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:08 ip-172-16-3-10 sshd[6100]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:08 ip-172-16-3-10 sshd[6121]: Accepted publickey for root from 172.16.3.5 port 35128 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:08 ip-172-16-3-10 sshd[6121]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:08 ip-172-16-3-10 sshd[6121]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:08 ip-172-16-3-10 sshd[6146]: Accepted publickey for root from 172.16.3.5 port 35138 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:08 ip-172-16-3-10 sshd[6146]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:08 ip-172-16-3-10 sshd[6146]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:08 ip-172-16-3-10 sshd[6169]: Accepted publickey for root from 172.16.3.5 port 35150 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:06:08 ip-172-16-3-10 sshd[6169]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:06:08 ip-172-16-3-10 sshd[6169]: pam_unix(sshd:session): session closed for user root
Jan  8 16:06:18 ip-172-16-3-10 systemd[5970]: pam_unix(systemd-user:session): session closed for user root
Jan  8 16:14:20 ip-172-16-3-10 sshd[6200]: Accepted publickey for root from 172.16.3.5 port 39384 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:20 ip-172-16-3-10 systemd[6205]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  8 16:14:20 ip-172-16-3-10 sshd[6200]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:21 ip-172-16-3-10 sshd[6200]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:21 ip-172-16-3-10 sshd[6233]: Accepted publickey for root from 172.16.3.5 port 39394 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:21 ip-172-16-3-10 sshd[6233]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:21 ip-172-16-3-10 sshd[6233]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:21 ip-172-16-3-10 sshd[6256]: Accepted publickey for root from 172.16.3.5 port 39398 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:21 ip-172-16-3-10 sshd[6256]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:21 ip-172-16-3-10 sshd[6256]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:21 ip-172-16-3-10 sshd[6277]: Accepted publickey for root from 172.16.3.5 port 39412 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:21 ip-172-16-3-10 sshd[6277]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:21 ip-172-16-3-10 sshd[6277]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:21 ip-172-16-3-10 sshd[6298]: Accepted publickey for root from 172.16.3.5 port 39424 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:21 ip-172-16-3-10 sshd[6298]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:21 ip-172-16-3-10 sshd[6298]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:21 ip-172-16-3-10 sshd[6319]: Accepted publickey for root from 172.16.3.5 port 39428 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:21 ip-172-16-3-10 sshd[6319]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:22 ip-172-16-3-10 sshd[6319]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:22 ip-172-16-3-10 sshd[6340]: Accepted publickey for root from 172.16.3.5 port 39438 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:22 ip-172-16-3-10 sshd[6340]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:22 ip-172-16-3-10 sshd[6340]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:22 ip-172-16-3-10 sshd[6361]: Accepted publickey for root from 172.16.3.5 port 39446 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:22 ip-172-16-3-10 sshd[6361]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:22 ip-172-16-3-10 sshd[6361]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:22 ip-172-16-3-10 sshd[6386]: Accepted publickey for root from 172.16.3.5 port 39454 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:22 ip-172-16-3-10 sshd[6386]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:22 ip-172-16-3-10 sshd[6386]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:32 ip-172-16-3-10 systemd[6208]: pam_unix(systemd-user:session): session closed for user root
Jan  8 16:14:46 ip-172-16-3-10 sshd[6417]: Accepted publickey for root from 172.16.3.5 port 56674 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:46 ip-172-16-3-10 systemd[6422]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  8 16:14:46 ip-172-16-3-10 sshd[6417]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:46 ip-172-16-3-10 sshd[6417]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:46 ip-172-16-3-10 sshd[6449]: Accepted publickey for root from 172.16.3.5 port 56690 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:46 ip-172-16-3-10 sshd[6449]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  8 16:14:47 ip-172-16-3-10 sshd[6449]: pam_unix(sshd:session): session closed for user root
Jan  8 16:14:47 ip-172-16-3-10 sshd[6554]: Accepted publickey for root from 172.16.3.5 port 56698 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  8 16:14:47 ip-172-16-3-10 sshd[6554]: pam_unix(sshd:session): session opened for user root by (uid=0)
