Jan 29 11:13:14 ip-172-16-3-10 polkitd[821]: Loading rules from directory /etc/polkit-1/rules.d
Jan 29 11:13:14 ip-172-16-3-10 polkitd[821]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 29 11:13:14 ip-172-16-3-10 polkitd[821]: Finished loading, compiling and executing 4 rules
Jan 29 11:13:14 ip-172-16-3-10 polkitd[821]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: new group: name=rocky, GID=1000
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: add 'rocky' to group 'adm'
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: add 'rocky' to group 'systemd-journal'
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: add 'rocky' to shadow group 'adm'
Jan 29 11:13:15 ip-172-16-3-10 useradd[909]: add 'rocky' to shadow group 'systemd-journal'
Jan 29 11:13:16 ip-172-16-3-10 sshd[924]: Server listening on 0.0.0.0 port 22.
Jan 29 11:13:16 ip-172-16-3-10 sshd[924]: Server listening on :: port 22.
Jan 29 11:13:24 ip-172-16-3-10 sshd[3589]: Accepted publickey for rocky from 172.16.0.143 port 58880 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 11:13:24 ip-172-16-3-10 systemd[3694]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 29 11:13:24 ip-172-16-3-10 sshd[3589]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 11:13:26 ip-172-16-3-10 sshd[4227]: Accepted publickey for rocky from 172.16.0.143 port 58882 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 11:13:26 ip-172-16-3-10 sshd[4227]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 11:13:26 ip-172-16-3-10 sshd[4437]: Accepted publickey for rocky from 172.16.0.143 port 58894 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 11:13:26 ip-172-16-3-10 sshd[4437]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 11:13:26 ip-172-16-3-10 sudo[4650]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 29 11:13:26 ip-172-16-3-10 sudo[4650]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 11:14:56 ip-172-16-3-10 sudo[4650]: pam_unix(sudo:session): session closed for user root
Jan 29 11:14:57 ip-172-16-3-10 sshd[4988]: Accepted publickey for rocky from 172.16.0.143 port 41282 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 11:14:57 ip-172-16-3-10 sshd[4988]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 11:14:57 ip-172-16-3-10 sudo[5064]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 29 11:14:57 ip-172-16-3-10 sudo[5064]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 11:14:57 ip-172-16-3-10 sudo[5064]: pam_unix(sudo:session): session closed for user root
Jan 29 11:14:57 ip-172-16-3-10 sudo[5067]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 29 11:14:57 ip-172-16-3-10 sudo[5067]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 11:14:57 ip-172-16-3-10 sudo[5067]: pam_unix(sudo:session): session closed for user root
Jan 29 11:14:57 ip-172-16-3-10 sudo[5070]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 29 11:14:57 ip-172-16-3-10 sudo[5070]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 11:17:11 ip-172-16-3-10 sudo[5070]: pam_unix(sudo:session): session closed for user root
Jan 29 11:29:02 ip-172-16-3-10 sshd[4437]: pam_unix(sshd:session): session closed for user rocky
Jan 29 11:29:02 ip-172-16-3-10 sshd[4988]: pam_unix(sshd:session): session closed for user rocky
Jan 29 11:29:02 ip-172-16-3-10 sshd[3589]: pam_unix(sshd:session): session closed for user rocky
Jan 29 11:29:02 ip-172-16-3-10 sshd[4227]: pam_unix(sshd:session): session closed for user rocky
Jan 29 11:29:12 ip-172-16-3-10 systemd[3697]: pam_unix(systemd-user:session): session closed for user rocky
Jan 29 11:30:08 ip-172-16-3-10 sshd[5616]: Accepted publickey for root from 172.16.3.5 port 55976 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:08 ip-172-16-3-10 systemd[5621]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 11:30:08 ip-172-16-3-10 sshd[5616]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:09 ip-172-16-3-10 sshd[5616]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:09 ip-172-16-3-10 sshd[5648]: Accepted publickey for root from 172.16.3.5 port 55990 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:09 ip-172-16-3-10 sshd[5648]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:09 ip-172-16-3-10 sshd[5648]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:09 ip-172-16-3-10 sshd[5669]: Accepted publickey for root from 172.16.3.5 port 56000 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:09 ip-172-16-3-10 sshd[5669]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:09 ip-172-16-3-10 sshd[5669]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:09 ip-172-16-3-10 sshd[5690]: Accepted publickey for root from 172.16.3.5 port 56010 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:09 ip-172-16-3-10 sshd[5690]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:09 ip-172-16-3-10 sshd[5690]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:09 ip-172-16-3-10 sshd[5711]: Accepted publickey for root from 172.16.3.5 port 49328 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:09 ip-172-16-3-10 sshd[5711]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:09 ip-172-16-3-10 sshd[5711]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:10 ip-172-16-3-10 sshd[5732]: Accepted publickey for root from 172.16.3.5 port 49344 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:10 ip-172-16-3-10 sshd[5732]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:10 ip-172-16-3-10 sshd[5732]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:10 ip-172-16-3-10 sshd[5753]: Accepted publickey for root from 172.16.3.5 port 49346 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:10 ip-172-16-3-10 sshd[5753]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:10 ip-172-16-3-10 sshd[5753]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:10 ip-172-16-3-10 sshd[5774]: Accepted publickey for root from 172.16.3.5 port 49354 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:10 ip-172-16-3-10 sshd[5774]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:10 ip-172-16-3-10 sshd[5774]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:10 ip-172-16-3-10 sshd[5799]: Accepted publickey for root from 172.16.3.5 port 49370 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:10 ip-172-16-3-10 sshd[5799]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:10 ip-172-16-3-10 sshd[5799]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:10 ip-172-16-3-10 sshd[5822]: Accepted publickey for root from 172.16.3.5 port 49382 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:10 ip-172-16-3-10 sshd[5822]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:11 ip-172-16-3-10 sshd[5822]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:11 ip-172-16-3-10 sshd[5846]: Accepted publickey for root from 172.16.3.5 port 49392 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:11 ip-172-16-3-10 sshd[5846]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:11 ip-172-16-3-10 sshd[5846]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:11 ip-172-16-3-10 sshd[5870]: Accepted publickey for root from 172.16.3.5 port 49408 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:11 ip-172-16-3-10 sshd[5870]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:11 ip-172-16-3-10 sshd[5870]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:12 ip-172-16-3-10 sshd[5892]: Accepted publickey for root from 172.16.3.5 port 49422 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 11:30:12 ip-172-16-3-10 sshd[5892]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 11:30:12 ip-172-16-3-10 sshd[5892]: pam_unix(sshd:session): session closed for user root
Jan 29 11:30:22 ip-172-16-3-10 systemd[5624]: pam_unix(systemd-user:session): session closed for user root
Jan 29 12:22:57 ip-172-16-3-10 sshd[5957]: Accepted publickey for root from 172.16.3.5 port 39680 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:57 ip-172-16-3-10 systemd[5962]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 12:22:57 ip-172-16-3-10 sshd[5957]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:57 ip-172-16-3-10 sshd[5957]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:57 ip-172-16-3-10 sshd[5990]: Accepted publickey for root from 172.16.3.5 port 39686 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:57 ip-172-16-3-10 sshd[5990]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:57 ip-172-16-3-10 sshd[5990]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:58 ip-172-16-3-10 sshd[6011]: Accepted publickey for root from 172.16.3.5 port 39690 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:58 ip-172-16-3-10 sshd[6011]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:58 ip-172-16-3-10 sshd[6011]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:58 ip-172-16-3-10 sshd[6032]: Accepted publickey for root from 172.16.3.5 port 39694 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:58 ip-172-16-3-10 sshd[6032]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:58 ip-172-16-3-10 sshd[6032]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:58 ip-172-16-3-10 sshd[6053]: Accepted publickey for root from 172.16.3.5 port 39698 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:58 ip-172-16-3-10 sshd[6053]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:58 ip-172-16-3-10 sshd[6053]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:58 ip-172-16-3-10 sshd[6074]: Accepted publickey for root from 172.16.3.5 port 39708 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:58 ip-172-16-3-10 sshd[6074]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:58 ip-172-16-3-10 sshd[6074]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:58 ip-172-16-3-10 sshd[6095]: Accepted publickey for root from 172.16.3.5 port 39724 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:58 ip-172-16-3-10 sshd[6095]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:58 ip-172-16-3-10 sshd[6095]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:59 ip-172-16-3-10 sshd[6116]: Accepted publickey for root from 172.16.3.5 port 39740 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:59 ip-172-16-3-10 sshd[6116]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:59 ip-172-16-3-10 sshd[6116]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:59 ip-172-16-3-10 sshd[6141]: Accepted publickey for root from 172.16.3.5 port 39756 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:59 ip-172-16-3-10 sshd[6141]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:59 ip-172-16-3-10 sshd[6141]: pam_unix(sshd:session): session closed for user root
Jan 29 12:22:59 ip-172-16-3-10 sshd[6164]: Accepted publickey for root from 172.16.3.5 port 39772 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:22:59 ip-172-16-3-10 sshd[6164]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:22:59 ip-172-16-3-10 sshd[6164]: pam_unix(sshd:session): session closed for user root
Jan 29 12:23:09 ip-172-16-3-10 systemd[5965]: pam_unix(systemd-user:session): session closed for user root
Jan 29 12:30:18 ip-172-16-3-10 sshd[6194]: Accepted publickey for root from 172.16.3.5 port 37994 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:18 ip-172-16-3-10 systemd[6199]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 12:30:18 ip-172-16-3-10 sshd[6194]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:18 ip-172-16-3-10 sshd[6194]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:19 ip-172-16-3-10 sshd[6228]: Accepted publickey for root from 172.16.3.5 port 37998 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:19 ip-172-16-3-10 sshd[6228]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:19 ip-172-16-3-10 sshd[6228]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:19 ip-172-16-3-10 sshd[6249]: Accepted publickey for root from 172.16.3.5 port 38000 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:19 ip-172-16-3-10 sshd[6249]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:19 ip-172-16-3-10 sshd[6249]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:19 ip-172-16-3-10 sshd[6270]: Accepted publickey for root from 172.16.3.5 port 38012 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:19 ip-172-16-3-10 sshd[6270]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:19 ip-172-16-3-10 sshd[6270]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:19 ip-172-16-3-10 sshd[6291]: Accepted publickey for root from 172.16.3.5 port 35066 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:19 ip-172-16-3-10 sshd[6291]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:19 ip-172-16-3-10 sshd[6291]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:19 ip-172-16-3-10 sshd[6312]: Accepted publickey for root from 172.16.3.5 port 35070 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:19 ip-172-16-3-10 sshd[6312]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:19 ip-172-16-3-10 sshd[6312]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:20 ip-172-16-3-10 sshd[6333]: Accepted publickey for root from 172.16.3.5 port 35084 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:20 ip-172-16-3-10 sshd[6333]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:20 ip-172-16-3-10 sshd[6333]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:20 ip-172-16-3-10 sshd[6355]: Accepted publickey for root from 172.16.3.5 port 35098 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:20 ip-172-16-3-10 sshd[6355]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:20 ip-172-16-3-10 sshd[6355]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:20 ip-172-16-3-10 sshd[6380]: Accepted publickey for root from 172.16.3.5 port 35112 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:20 ip-172-16-3-10 sshd[6380]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:20 ip-172-16-3-10 sshd[6380]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:30 ip-172-16-3-10 systemd[6204]: pam_unix(systemd-user:session): session closed for user root
Jan 29 12:30:44 ip-172-16-3-10 sshd[6411]: Accepted publickey for root from 172.16.3.5 port 49402 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:44 ip-172-16-3-10 systemd[6417]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 12:30:44 ip-172-16-3-10 sshd[6411]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:44 ip-172-16-3-10 sshd[6411]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:44 ip-172-16-3-10 sshd[6443]: Accepted publickey for root from 172.16.3.5 port 49408 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:44 ip-172-16-3-10 sshd[6443]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:30:45 ip-172-16-3-10 sshd[6443]: pam_unix(sshd:session): session closed for user root
Jan 29 12:30:46 ip-172-16-3-10 sshd[6548]: Accepted publickey for root from 172.16.3.5 port 49416 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:30:46 ip-172-16-3-10 sshd[6548]: pam_unix(sshd:session): session opened for user root by (uid=0)
