Jan 26 11:13:51 ip-172-16-3-10 polkitd[837]: Loading rules from directory /etc/polkit-1/rules.d
Jan 26 11:13:51 ip-172-16-3-10 polkitd[837]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 26 11:13:51 ip-172-16-3-10 polkitd[837]: Finished loading, compiling and executing 4 rules
Jan 26 11:13:51 ip-172-16-3-10 polkitd[837]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: new group: name=rocky, GID=1000
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: add 'rocky' to group 'adm'
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: add 'rocky' to group 'systemd-journal'
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: add 'rocky' to shadow group 'adm'
Jan 26 11:13:52 ip-172-16-3-10 useradd[923]: add 'rocky' to shadow group 'systemd-journal'
Jan 26 11:13:53 ip-172-16-3-10 sshd[938]: Server listening on 0.0.0.0 port 22.
Jan 26 11:13:53 ip-172-16-3-10 sshd[938]: Server listening on :: port 22.
Jan 26 11:14:14 ip-172-16-3-10 sshd[4562]: Accepted publickey for rocky from 172.16.0.143 port 38036 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 11:14:15 ip-172-16-3-10 systemd[4566]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 26 11:14:15 ip-172-16-3-10 sshd[4562]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 11:14:18 ip-172-16-3-10 sshd[4616]: Accepted publickey for rocky from 172.16.0.143 port 48554 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 11:14:18 ip-172-16-3-10 sshd[4616]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 11:14:19 ip-172-16-3-10 sshd[4742]: Accepted publickey for rocky from 172.16.0.143 port 48564 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 11:14:19 ip-172-16-3-10 sshd[4742]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 11:14:19 ip-172-16-3-10 sudo[4821]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 26 11:14:19 ip-172-16-3-10 sudo[4821]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 11:15:36 ip-172-16-3-10 sudo[4821]: pam_unix(sudo:session): session closed for user root
Jan 26 11:15:37 ip-172-16-3-10 sshd[4993]: Accepted publickey for rocky from 172.16.0.143 port 39152 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 11:15:37 ip-172-16-3-10 sshd[4993]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 11:15:37 ip-172-16-3-10 sudo[5069]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 26 11:15:37 ip-172-16-3-10 sudo[5069]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 11:15:37 ip-172-16-3-10 sudo[5069]: pam_unix(sudo:session): session closed for user root
Jan 26 11:15:37 ip-172-16-3-10 sudo[5072]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 26 11:15:37 ip-172-16-3-10 sudo[5072]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 11:15:37 ip-172-16-3-10 sudo[5072]: pam_unix(sudo:session): session closed for user root
Jan 26 11:15:37 ip-172-16-3-10 sudo[5075]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 26 11:15:37 ip-172-16-3-10 sudo[5075]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 11:17:54 ip-172-16-3-10 sudo[5075]: pam_unix(sudo:session): session closed for user root
Jan 26 11:28:48 ip-172-16-3-10 sshd[4562]: pam_unix(sshd:session): session closed for user rocky
Jan 26 11:28:48 ip-172-16-3-10 sshd[4742]: pam_unix(sshd:session): session closed for user rocky
Jan 26 11:28:48 ip-172-16-3-10 sshd[4616]: pam_unix(sshd:session): session closed for user rocky
Jan 26 11:28:48 ip-172-16-3-10 sshd[4993]: pam_unix(sshd:session): session closed for user rocky
Jan 26 11:28:58 ip-172-16-3-10 systemd[4570]: pam_unix(systemd-user:session): session closed for user rocky
Jan 26 11:30:05 ip-172-16-3-10 sshd[5623]: Accepted publickey for root from 172.16.3.5 port 58186 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:05 ip-172-16-3-10 systemd[5628]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 11:30:05 ip-172-16-3-10 sshd[5623]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:05 ip-172-16-3-10 sshd[5623]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:05 ip-172-16-3-10 sshd[5655]: Accepted publickey for root from 172.16.3.5 port 58196 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:05 ip-172-16-3-10 sshd[5655]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:05 ip-172-16-3-10 sshd[5655]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:05 ip-172-16-3-10 sshd[5676]: Accepted publickey for root from 172.16.3.5 port 58204 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:05 ip-172-16-3-10 sshd[5676]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:05 ip-172-16-3-10 sshd[5676]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:05 ip-172-16-3-10 sshd[5697]: Accepted publickey for root from 172.16.3.5 port 58214 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:05 ip-172-16-3-10 sshd[5697]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:05 ip-172-16-3-10 sshd[5697]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:06 ip-172-16-3-10 sshd[5718]: Accepted publickey for root from 172.16.3.5 port 58218 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:06 ip-172-16-3-10 sshd[5718]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:06 ip-172-16-3-10 sshd[5718]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:06 ip-172-16-3-10 sshd[5739]: Accepted publickey for root from 172.16.3.5 port 58232 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:06 ip-172-16-3-10 sshd[5739]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:06 ip-172-16-3-10 sshd[5739]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:06 ip-172-16-3-10 sshd[5760]: Accepted publickey for root from 172.16.3.5 port 58238 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:06 ip-172-16-3-10 sshd[5760]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:06 ip-172-16-3-10 sshd[5760]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:06 ip-172-16-3-10 sshd[5781]: Accepted publickey for root from 172.16.3.5 port 58248 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:06 ip-172-16-3-10 sshd[5781]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:06 ip-172-16-3-10 sshd[5781]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:06 ip-172-16-3-10 sshd[5806]: Accepted publickey for root from 172.16.3.5 port 58254 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:30:06 ip-172-16-3-10 sshd[5806]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:30:06 ip-172-16-3-10 sshd[5806]: pam_unix(sshd:session): session closed for user root
Jan 26 11:30:17 ip-172-16-3-10 systemd[5631]: pam_unix(systemd-user:session): session closed for user root
Jan 26 11:31:02 ip-172-16-3-10 sshd[5836]: Accepted publickey for root from 172.16.3.5 port 52770 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:31:02 ip-172-16-3-10 systemd[5841]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 11:31:02 ip-172-16-3-10 sshd[5836]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 11:31:02 ip-172-16-3-10 sshd[5836]: pam_unix(sshd:session): session closed for user root
Jan 26 11:31:02 ip-172-16-3-10 sshd[5868]: Accepted publickey for root from 172.16.3.5 port 52786 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 11:31:02 ip-172-16-3-10 sshd[5868]: pam_unix(sshd:session): session opened for user root by (uid=0)
