Jan 26 09:12:22 ip-172-16-3-10 polkitd[836]: Loading rules from directory /etc/polkit-1/rules.d
Jan 26 09:12:22 ip-172-16-3-10 polkitd[836]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 26 09:12:22 ip-172-16-3-10 polkitd[836]: Finished loading, compiling and executing 4 rules
Jan 26 09:12:22 ip-172-16-3-10 polkitd[836]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: new group: name=rocky, GID=1000
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: add 'rocky' to group 'adm'
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: add 'rocky' to group 'systemd-journal'
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: add 'rocky' to shadow group 'adm'
Jan 26 09:12:23 ip-172-16-3-10 useradd[923]: add 'rocky' to shadow group 'systemd-journal'
Jan 26 09:12:24 ip-172-16-3-10 sshd[938]: Server listening on 0.0.0.0 port 22.
Jan 26 09:12:24 ip-172-16-3-10 sshd[938]: Server listening on :: port 22.
Jan 26 09:12:25 ip-172-16-3-10 sshd[1036]: fatal: Access denied for user rocky by PAM account configuration [preauth]
Jan 26 09:12:46 ip-172-16-3-10 sshd[4565]: Accepted publickey for rocky from 172.16.0.143 port 56332 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 09:12:46 ip-172-16-3-10 systemd[4572]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 26 09:12:46 ip-172-16-3-10 sshd[4565]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 09:12:48 ip-172-16-3-10 sshd[4724]: Accepted publickey for rocky from 172.16.0.143 port 39662 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 09:12:48 ip-172-16-3-10 sshd[4724]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 09:12:48 ip-172-16-3-10 sshd[4748]: Accepted publickey for rocky from 172.16.0.143 port 39664 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 09:12:48 ip-172-16-3-10 sshd[4748]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 09:12:49 ip-172-16-3-10 sudo[4824]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 26 09:12:49 ip-172-16-3-10 sudo[4824]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 09:13:54 ip-172-16-3-10 sudo[4824]: pam_unix(sudo:session): session closed for user root
Jan 26 09:13:54 ip-172-16-3-10 sshd[4987]: Accepted publickey for rocky from 172.16.0.143 port 44496 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 09:13:54 ip-172-16-3-10 sshd[4987]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 09:13:55 ip-172-16-3-10 sudo[5063]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 26 09:13:55 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 09:13:55 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session closed for user root
Jan 26 09:13:55 ip-172-16-3-10 sudo[5066]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 26 09:13:55 ip-172-16-3-10 sudo[5066]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 09:13:55 ip-172-16-3-10 sudo[5066]: pam_unix(sudo:session): session closed for user root
Jan 26 09:13:55 ip-172-16-3-10 sudo[5069]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 26 09:13:55 ip-172-16-3-10 sudo[5069]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 09:16:01 ip-172-16-3-10 sudo[5069]: pam_unix(sudo:session): session closed for user root
Jan 26 09:25:46 ip-172-16-3-10 sshd[4987]: pam_unix(sshd:session): session closed for user rocky
Jan 26 09:25:46 ip-172-16-3-10 sshd[4748]: pam_unix(sshd:session): session closed for user rocky
Jan 26 09:25:46 ip-172-16-3-10 sshd[4724]: pam_unix(sshd:session): session closed for user rocky
Jan 26 09:25:46 ip-172-16-3-10 sshd[4565]: pam_unix(sshd:session): session closed for user rocky
Jan 26 09:27:03 ip-172-16-3-10 sshd[5615]: Accepted publickey for root from 172.16.3.5 port 38304 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:03 ip-172-16-3-10 systemd[5620]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 09:27:03 ip-172-16-3-10 sshd[5615]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:03 ip-172-16-3-10 sshd[5615]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:03 ip-172-16-3-10 sshd[5647]: Accepted publickey for root from 172.16.3.5 port 38316 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:03 ip-172-16-3-10 sshd[5647]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:03 ip-172-16-3-10 sshd[5647]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:03 ip-172-16-3-10 sshd[5668]: Accepted publickey for root from 172.16.3.5 port 38328 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:03 ip-172-16-3-10 sshd[5668]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:03 ip-172-16-3-10 sshd[5668]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:03 ip-172-16-3-10 sshd[5689]: Accepted publickey for root from 172.16.3.5 port 38330 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5689]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5689]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:04 ip-172-16-3-10 sshd[5710]: Accepted publickey for root from 172.16.3.5 port 38340 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5710]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5710]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:04 ip-172-16-3-10 sshd[5731]: Accepted publickey for root from 172.16.3.5 port 38346 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5731]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5731]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:04 ip-172-16-3-10 sshd[5752]: Accepted publickey for root from 172.16.3.5 port 38360 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5752]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5752]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:04 ip-172-16-3-10 sshd[5773]: Accepted publickey for root from 172.16.3.5 port 38366 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5773]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5773]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:04 ip-172-16-3-10 sshd[5798]: Accepted publickey for root from 172.16.3.5 port 38376 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:27:04 ip-172-16-3-10 sshd[5798]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:27:04 ip-172-16-3-10 sshd[5798]: pam_unix(sshd:session): session closed for user root
Jan 26 09:27:15 ip-172-16-3-10 systemd[5623]: pam_unix(systemd-user:session): session closed for user root
Jan 26 09:28:04 ip-172-16-3-10 sshd[5828]: Accepted publickey for root from 172.16.3.5 port 34160 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:28:04 ip-172-16-3-10 systemd[5833]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 09:28:04 ip-172-16-3-10 sshd[5828]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 09:28:05 ip-172-16-3-10 sshd[5828]: pam_unix(sshd:session): session closed for user root
Jan 26 09:28:05 ip-172-16-3-10 sshd[5860]: Accepted publickey for root from 172.16.3.5 port 33164 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 09:28:05 ip-172-16-3-10 sshd[5860]: pam_unix(sshd:session): session opened for user root by (uid=0)
