Jan 15 16:07:33 ip-172-16-3-10 polkitd[839]: Loading rules from directory /etc/polkit-1/rules.d
Jan 15 16:07:33 ip-172-16-3-10 polkitd[839]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 15 16:07:33 ip-172-16-3-10 polkitd[839]: Finished loading, compiling and executing 4 rules
Jan 15 16:07:33 ip-172-16-3-10 polkitd[839]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: new group: name=rocky, GID=1000
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: add 'rocky' to group 'adm'
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: add 'rocky' to group 'systemd-journal'
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: add 'rocky' to shadow group 'adm'
Jan 15 16:07:34 ip-172-16-3-10 useradd[925]: add 'rocky' to shadow group 'systemd-journal'
Jan 15 16:07:35 ip-172-16-3-10 sshd[940]: Server listening on 0.0.0.0 port 22.
Jan 15 16:07:35 ip-172-16-3-10 sshd[940]: Server listening on :: port 22.
Jan 15 16:07:42 ip-172-16-3-10 sshd[3079]: Accepted publickey for rocky from 172.16.0.143 port 46782 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 15 16:07:42 ip-172-16-3-10 systemd[3166]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 15 16:07:42 ip-172-16-3-10 sshd[3079]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 15 16:07:44 ip-172-16-3-10 sshd[3710]: Accepted publickey for rocky from 172.16.0.143 port 46792 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 15 16:07:44 ip-172-16-3-10 sshd[3710]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 15 16:07:45 ip-172-16-3-10 sshd[3850]: Accepted publickey for rocky from 172.16.0.143 port 46802 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 15 16:07:45 ip-172-16-3-10 sshd[3850]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 15 16:07:45 ip-172-16-3-10 sudo[4095]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 15 16:07:45 ip-172-16-3-10 sudo[4095]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 15 16:09:26 ip-172-16-3-10 sudo[4095]: pam_unix(sudo:session): session closed for user root
Jan 15 16:09:26 ip-172-16-3-10 sshd[5013]: Accepted publickey for rocky from 172.16.0.143 port 42572 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 15 16:09:26 ip-172-16-3-10 sshd[5013]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 15 16:09:27 ip-172-16-3-10 sudo[5089]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 15 16:09:27 ip-172-16-3-10 sudo[5089]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 15 16:09:27 ip-172-16-3-10 sudo[5089]: pam_unix(sudo:session): session closed for user root
Jan 15 16:09:27 ip-172-16-3-10 sudo[5092]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 15 16:09:27 ip-172-16-3-10 sudo[5092]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 15 16:09:27 ip-172-16-3-10 sudo[5092]: pam_unix(sudo:session): session closed for user root
Jan 15 16:09:27 ip-172-16-3-10 sudo[5095]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 15 16:09:27 ip-172-16-3-10 sudo[5095]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 15 16:11:53 ip-172-16-3-10 sudo[5095]: pam_unix(sudo:session): session closed for user root
Jan 15 16:24:17 ip-172-16-3-10 sshd[3710]: pam_unix(sshd:session): session closed for user rocky
Jan 15 16:24:17 ip-172-16-3-10 sshd[3850]: pam_unix(sshd:session): session closed for user rocky
Jan 15 16:24:17 ip-172-16-3-10 sshd[3079]: pam_unix(sshd:session): session closed for user rocky
Jan 15 16:24:17 ip-172-16-3-10 sshd[5013]: pam_unix(sshd:session): session closed for user rocky
Jan 15 16:24:27 ip-172-16-3-10 systemd[3170]: pam_unix(systemd-user:session): session closed for user rocky
Jan 15 16:25:22 ip-172-16-3-10 sshd[5655]: Accepted publickey for root from 172.16.3.5 port 35928 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:23 ip-172-16-3-10 systemd[5660]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5655]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5655]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:23 ip-172-16-3-10 sshd[5687]: Accepted publickey for root from 172.16.3.5 port 35944 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:23 ip-172-16-3-10 sshd[5687]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5687]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:23 ip-172-16-3-10 sshd[5708]: Accepted publickey for root from 172.16.3.5 port 35960 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:23 ip-172-16-3-10 sshd[5708]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5708]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:23 ip-172-16-3-10 sshd[5729]: Accepted publickey for root from 172.16.3.5 port 35962 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:23 ip-172-16-3-10 sshd[5729]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5729]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:23 ip-172-16-3-10 sshd[5750]: Accepted publickey for root from 172.16.3.5 port 35972 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:23 ip-172-16-3-10 sshd[5750]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:23 ip-172-16-3-10 sshd[5750]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:24 ip-172-16-3-10 sshd[5771]: Accepted publickey for root from 172.16.3.5 port 35980 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:24 ip-172-16-3-10 sshd[5771]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:24 ip-172-16-3-10 sshd[5771]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:24 ip-172-16-3-10 sshd[5792]: Accepted publickey for root from 172.16.3.5 port 35986 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:24 ip-172-16-3-10 sshd[5792]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:24 ip-172-16-3-10 sshd[5792]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:24 ip-172-16-3-10 sshd[5813]: Accepted publickey for root from 172.16.3.5 port 35988 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:24 ip-172-16-3-10 sshd[5813]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:24 ip-172-16-3-10 sshd[5813]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:24 ip-172-16-3-10 sshd[5838]: Accepted publickey for root from 172.16.3.5 port 35992 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:24 ip-172-16-3-10 sshd[5838]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:24 ip-172-16-3-10 sshd[5838]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:24 ip-172-16-3-10 sshd[5861]: Accepted publickey for root from 172.16.3.5 port 35998 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:24 ip-172-16-3-10 sshd[5861]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:24 ip-172-16-3-10 sshd[5861]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:25 ip-172-16-3-10 sshd[5885]: Accepted publickey for root from 172.16.3.5 port 36008 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:25 ip-172-16-3-10 sshd[5885]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:25 ip-172-16-3-10 sshd[5885]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:25 ip-172-16-3-10 sshd[5909]: Accepted publickey for root from 172.16.3.5 port 36020 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:25 ip-172-16-3-10 sshd[5909]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:25 ip-172-16-3-10 sshd[5909]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:26 ip-172-16-3-10 sshd[5931]: Accepted publickey for root from 172.16.3.5 port 36024 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:25:26 ip-172-16-3-10 sshd[5931]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:25:26 ip-172-16-3-10 sshd[5931]: pam_unix(sshd:session): session closed for user root
Jan 15 16:25:36 ip-172-16-3-10 systemd[5663]: pam_unix(systemd-user:session): session closed for user root
Jan 15 16:32:15 ip-172-16-3-10 sshd[5960]: Accepted publickey for root from 172.16.3.5 port 35554 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:15 ip-172-16-3-10 systemd[5965]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[5960]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[5960]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:15 ip-172-16-3-10 sshd[5994]: Accepted publickey for root from 172.16.3.5 port 35558 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:15 ip-172-16-3-10 sshd[5994]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[5994]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:15 ip-172-16-3-10 sshd[6015]: Accepted publickey for root from 172.16.3.5 port 35564 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:15 ip-172-16-3-10 sshd[6015]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[6015]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:15 ip-172-16-3-10 sshd[6038]: Accepted publickey for root from 172.16.3.5 port 35580 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:15 ip-172-16-3-10 sshd[6038]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[6038]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:15 ip-172-16-3-10 sshd[6059]: Accepted publickey for root from 172.16.3.5 port 35588 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:15 ip-172-16-3-10 sshd[6059]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:15 ip-172-16-3-10 sshd[6059]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:16 ip-172-16-3-10 sshd[6080]: Accepted publickey for root from 172.16.3.5 port 35592 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:16 ip-172-16-3-10 sshd[6080]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:16 ip-172-16-3-10 sshd[6080]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:16 ip-172-16-3-10 sshd[6101]: Accepted publickey for root from 172.16.3.5 port 35604 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:16 ip-172-16-3-10 sshd[6101]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:16 ip-172-16-3-10 sshd[6101]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:16 ip-172-16-3-10 sshd[6122]: Accepted publickey for root from 172.16.3.5 port 35620 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:16 ip-172-16-3-10 sshd[6122]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:16 ip-172-16-3-10 sshd[6122]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:16 ip-172-16-3-10 sshd[6147]: Accepted publickey for root from 172.16.3.5 port 35634 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:32:16 ip-172-16-3-10 sshd[6147]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:32:16 ip-172-16-3-10 sshd[6147]: pam_unix(sshd:session): session closed for user root
Jan 15 16:32:26 ip-172-16-3-10 systemd[5969]: pam_unix(systemd-user:session): session closed for user root
Jan 15 16:33:11 ip-172-16-3-10 sshd[6177]: Accepted publickey for root from 172.16.3.5 port 51000 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:33:11 ip-172-16-3-10 systemd[6182]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 15 16:33:11 ip-172-16-3-10 sshd[6177]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:33:12 ip-172-16-3-10 sshd[6177]: pam_unix(sshd:session): session closed for user root
Jan 15 16:33:12 ip-172-16-3-10 sshd[6209]: Accepted publickey for root from 172.16.3.5 port 51010 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:33:12 ip-172-16-3-10 sshd[6209]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 15 16:33:13 ip-172-16-3-10 sshd[6209]: pam_unix(sshd:session): session closed for user root
Jan 15 16:33:13 ip-172-16-3-10 sshd[6314]: Accepted publickey for root from 172.16.3.5 port 51026 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 15 16:33:13 ip-172-16-3-10 sshd[6314]: pam_unix(sshd:session): session opened for user root by (uid=0)
