Jan 26 14:03:02 ip-172-16-3-10 polkitd[816]: Loading rules from directory /etc/polkit-1/rules.d
Jan 26 14:03:02 ip-172-16-3-10 polkitd[816]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 26 14:03:02 ip-172-16-3-10 polkitd[816]: Finished loading, compiling and executing 4 rules
Jan 26 14:03:02 ip-172-16-3-10 polkitd[816]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: new group: name=rocky, GID=1000
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: add 'rocky' to group 'adm'
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: add 'rocky' to group 'systemd-journal'
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: add 'rocky' to shadow group 'adm'
Jan 26 14:03:04 ip-172-16-3-10 useradd[902]: add 'rocky' to shadow group 'systemd-journal'
Jan 26 14:03:04 ip-172-16-3-10 sshd[917]: Server listening on 0.0.0.0 port 22.
Jan 26 14:03:04 ip-172-16-3-10 sshd[917]: Server listening on :: port 22.
Jan 26 14:03:12 ip-172-16-3-10 sshd[3521]: Accepted publickey for rocky from 172.16.0.143 port 50288 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 14:03:12 ip-172-16-3-10 systemd[3641]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 26 14:03:12 ip-172-16-3-10 sshd[3521]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 14:03:14 ip-172-16-3-10 sshd[4061]: Accepted publickey for rocky from 172.16.0.143 port 50300 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 14:03:14 ip-172-16-3-10 sshd[4061]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 14:03:14 ip-172-16-3-10 sshd[4226]: Accepted publickey for rocky from 172.16.0.143 port 50314 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 14:03:14 ip-172-16-3-10 sshd[4226]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 14:03:15 ip-172-16-3-10 sudo[4434]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 26 14:03:15 ip-172-16-3-10 sudo[4434]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 14:04:43 ip-172-16-3-10 sudo[4434]: pam_unix(sudo:session): session closed for user root
Jan 26 14:04:44 ip-172-16-3-10 sshd[4981]: Accepted publickey for rocky from 172.16.0.143 port 48666 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 26 14:04:44 ip-172-16-3-10 sshd[4981]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 26 14:04:44 ip-172-16-3-10 sudo[5057]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 26 14:04:44 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 14:04:44 ip-172-16-3-10 sudo[5057]: pam_unix(sudo:session): session closed for user root
Jan 26 14:04:44 ip-172-16-3-10 sudo[5060]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 26 14:04:44 ip-172-16-3-10 sudo[5060]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 14:04:44 ip-172-16-3-10 sudo[5060]: pam_unix(sudo:session): session closed for user root
Jan 26 14:04:44 ip-172-16-3-10 sudo[5063]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 26 14:04:44 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 26 14:06:56 ip-172-16-3-10 sudo[5063]: pam_unix(sudo:session): session closed for user root
Jan 26 14:19:02 ip-172-16-3-10 sshd[3521]: pam_unix(sshd:session): session closed for user rocky
Jan 26 14:19:02 ip-172-16-3-10 sshd[4981]: pam_unix(sshd:session): session closed for user rocky
Jan 26 14:19:02 ip-172-16-3-10 sshd[4226]: pam_unix(sshd:session): session closed for user rocky
Jan 26 14:19:02 ip-172-16-3-10 sshd[4061]: pam_unix(sshd:session): session closed for user rocky
Jan 26 14:19:12 ip-172-16-3-10 systemd[3657]: pam_unix(systemd-user:session): session closed for user rocky
Jan 26 14:20:18 ip-172-16-3-10 sshd[5611]: Accepted publickey for root from 172.16.3.5 port 51510 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:18 ip-172-16-3-10 systemd[5616]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 14:20:18 ip-172-16-3-10 sshd[5611]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:18 ip-172-16-3-10 sshd[5611]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:18 ip-172-16-3-10 sshd[5643]: Accepted publickey for root from 172.16.3.5 port 51524 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:18 ip-172-16-3-10 sshd[5643]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:18 ip-172-16-3-10 sshd[5643]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:18 ip-172-16-3-10 sshd[5664]: Accepted publickey for root from 172.16.3.5 port 51528 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:18 ip-172-16-3-10 sshd[5664]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:18 ip-172-16-3-10 sshd[5664]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:18 ip-172-16-3-10 sshd[5685]: Accepted publickey for root from 172.16.3.5 port 51544 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:18 ip-172-16-3-10 sshd[5685]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5685]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:19 ip-172-16-3-10 sshd[5706]: Accepted publickey for root from 172.16.3.5 port 51548 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:19 ip-172-16-3-10 sshd[5706]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5706]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:19 ip-172-16-3-10 sshd[5727]: Accepted publickey for root from 172.16.3.5 port 51556 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:19 ip-172-16-3-10 sshd[5727]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5727]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:19 ip-172-16-3-10 sshd[5748]: Accepted publickey for root from 172.16.3.5 port 51560 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:19 ip-172-16-3-10 sshd[5748]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5748]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:19 ip-172-16-3-10 sshd[5769]: Accepted publickey for root from 172.16.3.5 port 51576 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:19 ip-172-16-3-10 sshd[5769]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5769]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:19 ip-172-16-3-10 sshd[5794]: Accepted publickey for root from 172.16.3.5 port 51586 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:20:19 ip-172-16-3-10 sshd[5794]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:20:19 ip-172-16-3-10 sshd[5794]: pam_unix(sshd:session): session closed for user root
Jan 26 14:20:30 ip-172-16-3-10 systemd[5619]: pam_unix(systemd-user:session): session closed for user root
Jan 26 14:21:17 ip-172-16-3-10 sshd[5824]: Accepted publickey for root from 172.16.3.5 port 48086 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:21:17 ip-172-16-3-10 systemd[5829]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 26 14:21:17 ip-172-16-3-10 sshd[5824]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 26 14:21:17 ip-172-16-3-10 sshd[5824]: pam_unix(sshd:session): session closed for user root
Jan 26 14:21:17 ip-172-16-3-10 sshd[5856]: Accepted publickey for root from 172.16.3.5 port 48102 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 26 14:21:17 ip-172-16-3-10 sshd[5856]: pam_unix(sshd:session): session opened for user root by (uid=0)
