Jan  9 10:25:06 ip-172-16-3-10 polkitd[822]: Loading rules from directory /etc/polkit-1/rules.d
Jan  9 10:25:06 ip-172-16-3-10 polkitd[822]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan  9 10:25:06 ip-172-16-3-10 polkitd[822]: Finished loading, compiling and executing 4 rules
Jan  9 10:25:06 ip-172-16-3-10 polkitd[822]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: new group: name=rocky, GID=1000
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: add 'rocky' to group 'adm'
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: add 'rocky' to group 'systemd-journal'
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: add 'rocky' to shadow group 'adm'
Jan  9 10:25:07 ip-172-16-3-10 useradd[911]: add 'rocky' to shadow group 'systemd-journal'
Jan  9 10:25:08 ip-172-16-3-10 sshd[926]: Server listening on 0.0.0.0 port 22.
Jan  9 10:25:08 ip-172-16-3-10 sshd[926]: Server listening on :: port 22.
Jan  9 10:25:09 ip-172-16-3-10 sshd[1160]: fatal: Access denied for user rocky by PAM account configuration [preauth]
Jan  9 10:25:30 ip-172-16-3-10 sshd[4558]: Accepted publickey for rocky from 172.16.0.143 port 37810 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  9 10:25:31 ip-172-16-3-10 systemd[4562]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan  9 10:25:31 ip-172-16-3-10 sshd[4558]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  9 10:25:34 ip-172-16-3-10 sshd[4594]: Accepted publickey for rocky from 172.16.0.143 port 37826 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  9 10:25:34 ip-172-16-3-10 sshd[4594]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  9 10:25:35 ip-172-16-3-10 sshd[4704]: Accepted publickey for rocky from 172.16.0.143 port 37842 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  9 10:25:35 ip-172-16-3-10 sshd[4704]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  9 10:25:35 ip-172-16-3-10 sudo[4812]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan  9 10:25:35 ip-172-16-3-10 sudo[4812]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  9 10:26:41 ip-172-16-3-10 sudo[4812]: pam_unix(sudo:session): session closed for user root
Jan  9 10:26:42 ip-172-16-3-10 sshd[4981]: Accepted publickey for rocky from 172.16.0.143 port 46518 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan  9 10:26:42 ip-172-16-3-10 sshd[4981]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan  9 10:26:42 ip-172-16-3-10 sudo[5057]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan  9 10:26:42 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  9 10:26:42 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session closed for user root
Jan  9 10:26:42 ip-172-16-3-10 sudo[5060]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan  9 10:26:42 ip-172-16-3-10 sudo[5060]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  9 10:26:42 ip-172-16-3-10 sudo[5060]: pam_unix(sudo:session): session closed for user root
Jan  9 10:26:42 ip-172-16-3-10 sudo[5063]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan  9 10:26:42 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan  9 10:28:56 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session closed for user root
Jan  9 10:41:13 ip-172-16-3-10 sshd[4704]: pam_unix(sshd:session): session closed for user rocky
Jan  9 10:41:13 ip-172-16-3-10 sshd[4558]: pam_unix(sshd:session): session closed for user rocky
Jan  9 10:41:13 ip-172-16-3-10 sshd[4594]: pam_unix(sshd:session): session closed for user rocky
Jan  9 10:41:13 ip-172-16-3-10 sshd[4981]: pam_unix(sshd:session): session closed for user rocky
Jan  9 10:41:23 ip-172-16-3-10 systemd[4566]: pam_unix(systemd-user:session): session closed for user rocky
Jan  9 10:42:17 ip-172-16-3-10 sshd[5606]: Accepted publickey for root from 172.16.3.5 port 52826 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:17 ip-172-16-3-10 systemd[5611]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  9 10:42:17 ip-172-16-3-10 sshd[5606]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:17 ip-172-16-3-10 sshd[5606]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:17 ip-172-16-3-10 sshd[5638]: Accepted publickey for root from 172.16.3.5 port 52836 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:17 ip-172-16-3-10 sshd[5638]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:17 ip-172-16-3-10 sshd[5638]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5659]: Accepted publickey for root from 172.16.3.5 port 52848 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:18 ip-172-16-3-10 sshd[5659]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:18 ip-172-16-3-10 sshd[5659]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5680]: Accepted publickey for root from 172.16.3.5 port 52854 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:18 ip-172-16-3-10 sshd[5680]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:18 ip-172-16-3-10 sshd[5680]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5701]: Accepted publickey for root from 172.16.3.5 port 52866 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:18 ip-172-16-3-10 sshd[5701]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:18 ip-172-16-3-10 sshd[5701]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5722]: Accepted publickey for root from 172.16.3.5 port 52872 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:18 ip-172-16-3-10 sshd[5722]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:18 ip-172-16-3-10 sshd[5722]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5743]: Accepted publickey for root from 172.16.3.5 port 52884 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:18 ip-172-16-3-10 sshd[5743]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:18 ip-172-16-3-10 sshd[5743]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:18 ip-172-16-3-10 sshd[5764]: Accepted publickey for root from 172.16.3.5 port 52900 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:19 ip-172-16-3-10 sshd[5764]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:19 ip-172-16-3-10 sshd[5764]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:19 ip-172-16-3-10 sshd[5789]: Accepted publickey for root from 172.16.3.5 port 52914 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:19 ip-172-16-3-10 sshd[5789]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:19 ip-172-16-3-10 sshd[5789]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:19 ip-172-16-3-10 sshd[5812]: Accepted publickey for root from 172.16.3.5 port 52916 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:19 ip-172-16-3-10 sshd[5812]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:19 ip-172-16-3-10 sshd[5812]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:19 ip-172-16-3-10 sshd[5836]: Accepted publickey for root from 172.16.3.5 port 52918 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:19 ip-172-16-3-10 sshd[5836]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:19 ip-172-16-3-10 sshd[5836]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:19 ip-172-16-3-10 sshd[5860]: Accepted publickey for root from 172.16.3.5 port 52920 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:19 ip-172-16-3-10 sshd[5860]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:19 ip-172-16-3-10 sshd[5860]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:20 ip-172-16-3-10 sshd[5882]: Accepted publickey for root from 172.16.3.5 port 52932 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 10:42:20 ip-172-16-3-10 sshd[5882]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 10:42:20 ip-172-16-3-10 sshd[5882]: pam_unix(sshd:session): session closed for user root
Jan  9 10:42:30 ip-172-16-3-10 systemd[5614]: pam_unix(systemd-user:session): session closed for user root
Jan  9 11:44:40 ip-172-16-3-10 sshd[5954]: Accepted publickey for root from 172.16.3.5 port 34748 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:40 ip-172-16-3-10 systemd[5959]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  9 11:44:40 ip-172-16-3-10 sshd[5954]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:40 ip-172-16-3-10 sshd[5954]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:40 ip-172-16-3-10 sshd[5988]: Accepted publickey for root from 172.16.3.5 port 34756 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:40 ip-172-16-3-10 sshd[5988]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:40 ip-172-16-3-10 sshd[5988]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:40 ip-172-16-3-10 sshd[6011]: Accepted publickey for root from 172.16.3.5 port 34772 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:40 ip-172-16-3-10 sshd[6011]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:40 ip-172-16-3-10 sshd[6011]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:41 ip-172-16-3-10 sshd[6032]: Accepted publickey for root from 172.16.3.5 port 34774 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:41 ip-172-16-3-10 sshd[6032]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:41 ip-172-16-3-10 sshd[6032]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:41 ip-172-16-3-10 sshd[6053]: Accepted publickey for root from 172.16.3.5 port 34776 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:41 ip-172-16-3-10 sshd[6053]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:41 ip-172-16-3-10 sshd[6053]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:41 ip-172-16-3-10 sshd[6074]: Accepted publickey for root from 172.16.3.5 port 34778 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:41 ip-172-16-3-10 sshd[6074]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:41 ip-172-16-3-10 sshd[6074]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:41 ip-172-16-3-10 sshd[6095]: Accepted publickey for root from 172.16.3.5 port 34790 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:41 ip-172-16-3-10 sshd[6095]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:41 ip-172-16-3-10 sshd[6095]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:41 ip-172-16-3-10 sshd[6116]: Accepted publickey for root from 172.16.3.5 port 34806 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:41 ip-172-16-3-10 sshd[6116]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:42 ip-172-16-3-10 sshd[6116]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:42 ip-172-16-3-10 sshd[6141]: Accepted publickey for root from 172.16.3.5 port 34812 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:42 ip-172-16-3-10 sshd[6141]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:42 ip-172-16-3-10 sshd[6141]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:42 ip-172-16-3-10 sshd[6164]: Accepted publickey for root from 172.16.3.5 port 34814 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:44:42 ip-172-16-3-10 sshd[6164]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:44:42 ip-172-16-3-10 sshd[6164]: pam_unix(sshd:session): session closed for user root
Jan  9 11:44:52 ip-172-16-3-10 systemd[5962]: pam_unix(systemd-user:session): session closed for user root
Jan  9 11:58:12 ip-172-16-3-10 sshd[6195]: Accepted publickey for root from 172.16.3.5 port 37030 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:12 ip-172-16-3-10 systemd[6200]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  9 11:58:12 ip-172-16-3-10 sshd[6195]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:12 ip-172-16-3-10 sshd[6195]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:12 ip-172-16-3-10 sshd[6229]: Accepted publickey for root from 172.16.3.5 port 37044 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:12 ip-172-16-3-10 sshd[6229]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:12 ip-172-16-3-10 sshd[6229]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:12 ip-172-16-3-10 sshd[6251]: Accepted publickey for root from 172.16.3.5 port 37046 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:12 ip-172-16-3-10 sshd[6251]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:12 ip-172-16-3-10 sshd[6251]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:12 ip-172-16-3-10 sshd[6272]: Accepted publickey for root from 172.16.3.5 port 37048 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:12 ip-172-16-3-10 sshd[6272]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:12 ip-172-16-3-10 sshd[6272]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:12 ip-172-16-3-10 sshd[6293]: Accepted publickey for root from 172.16.3.5 port 37050 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:12 ip-172-16-3-10 sshd[6293]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:13 ip-172-16-3-10 sshd[6293]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:13 ip-172-16-3-10 sshd[6315]: Accepted publickey for root from 172.16.3.5 port 37058 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:13 ip-172-16-3-10 sshd[6315]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:13 ip-172-16-3-10 sshd[6315]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:13 ip-172-16-3-10 sshd[6336]: Accepted publickey for root from 172.16.3.5 port 37062 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:13 ip-172-16-3-10 sshd[6336]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:13 ip-172-16-3-10 sshd[6336]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:13 ip-172-16-3-10 sshd[6357]: Accepted publickey for root from 172.16.3.5 port 37070 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:13 ip-172-16-3-10 sshd[6357]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:13 ip-172-16-3-10 sshd[6357]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:13 ip-172-16-3-10 sshd[6382]: Accepted publickey for root from 172.16.3.5 port 37080 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:13 ip-172-16-3-10 sshd[6382]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:13 ip-172-16-3-10 sshd[6382]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:23 ip-172-16-3-10 systemd[6204]: pam_unix(systemd-user:session): session closed for user root
Jan  9 11:58:38 ip-172-16-3-10 sshd[6412]: Accepted publickey for root from 172.16.3.5 port 42910 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:38 ip-172-16-3-10 systemd[6417]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan  9 11:58:38 ip-172-16-3-10 sshd[6412]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:38 ip-172-16-3-10 sshd[6412]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:38 ip-172-16-3-10 sshd[6444]: Accepted publickey for root from 172.16.3.5 port 42922 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:38 ip-172-16-3-10 sshd[6444]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan  9 11:58:39 ip-172-16-3-10 sshd[6444]: pam_unix(sshd:session): session closed for user root
Jan  9 11:58:39 ip-172-16-3-10 sshd[6549]: Accepted publickey for root from 172.16.3.5 port 42934 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan  9 11:58:39 ip-172-16-3-10 sshd[6549]: pam_unix(sshd:session): session opened for user root by (uid=0)
