Jan 29 12:38:39 ip-172-16-3-10 polkitd[824]: Loading rules from directory /etc/polkit-1/rules.d
Jan 29 12:38:39 ip-172-16-3-10 polkitd[824]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 29 12:38:39 ip-172-16-3-10 polkitd[824]: Finished loading, compiling and executing 4 rules
Jan 29 12:38:39 ip-172-16-3-10 polkitd[824]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: new group: name=rocky, GID=1000
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: add 'rocky' to group 'adm'
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: add 'rocky' to group 'systemd-journal'
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: add 'rocky' to shadow group 'adm'
Jan 29 12:38:40 ip-172-16-3-10 useradd[913]: add 'rocky' to shadow group 'systemd-journal'
Jan 29 12:38:41 ip-172-16-3-10 sshd[932]: Server listening on 0.0.0.0 port 22.
Jan 29 12:38:41 ip-172-16-3-10 sshd[932]: Server listening on :: port 22.
Jan 29 12:38:49 ip-172-16-3-10 sshd[3369]: Accepted publickey for rocky from 172.16.0.143 port 51090 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 12:38:49 ip-172-16-3-10 systemd[3509]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 29 12:38:49 ip-172-16-3-10 sshd[3369]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 12:38:50 ip-172-16-3-10 sshd[4033]: Accepted publickey for rocky from 172.16.0.143 port 51102 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 12:38:50 ip-172-16-3-10 sshd[4033]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 12:38:51 ip-172-16-3-10 sshd[4212]: Accepted publickey for rocky from 172.16.0.143 port 51104 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 12:38:51 ip-172-16-3-10 sshd[4212]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 12:38:51 ip-172-16-3-10 sudo[4409]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 29 12:38:51 ip-172-16-3-10 sudo[4409]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 12:40:21 ip-172-16-3-10 sudo[4409]: pam_unix(sudo:session): session closed for user root
Jan 29 12:40:21 ip-172-16-3-10 sshd[4992]: Accepted publickey for rocky from 172.16.0.143 port 32870 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 12:40:21 ip-172-16-3-10 sshd[4992]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 12:40:21 ip-172-16-3-10 sudo[5068]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 29 12:40:21 ip-172-16-3-10 sudo[5068]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 12:40:21 ip-172-16-3-10 sudo[5068]: pam_unix(sudo:session): session closed for user root
Jan 29 12:40:21 ip-172-16-3-10 sudo[5071]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 29 12:40:21 ip-172-16-3-10 sudo[5071]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 12:40:21 ip-172-16-3-10 sudo[5071]: pam_unix(sudo:session): session closed for user root
Jan 29 12:40:21 ip-172-16-3-10 sudo[5074]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 29 12:40:21 ip-172-16-3-10 sudo[5074]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 12:42:35 ip-172-16-3-10 sudo[5074]: pam_unix(sudo:session): session closed for user root
Jan 29 12:53:48 ip-172-16-3-10 sshd[4033]: pam_unix(sshd:session): session closed for user rocky
Jan 29 12:53:48 ip-172-16-3-10 sshd[4212]: pam_unix(sshd:session): session closed for user rocky
Jan 29 12:53:48 ip-172-16-3-10 sshd[4992]: pam_unix(sshd:session): session closed for user rocky
Jan 29 12:53:48 ip-172-16-3-10 sshd[3369]: pam_unix(sshd:session): session closed for user rocky
Jan 29 12:53:58 ip-172-16-3-10 systemd[3527]: pam_unix(systemd-user:session): session closed for user rocky
Jan 29 12:54:50 ip-172-16-3-10 sshd[5620]: Accepted publickey for root from 172.16.3.5 port 51320 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:50 ip-172-16-3-10 systemd[5625]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5620]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5620]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:51 ip-172-16-3-10 sshd[5652]: Accepted publickey for root from 172.16.3.5 port 51330 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:51 ip-172-16-3-10 sshd[5652]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5652]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:51 ip-172-16-3-10 sshd[5673]: Accepted publickey for root from 172.16.3.5 port 51336 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:51 ip-172-16-3-10 sshd[5673]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5673]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:51 ip-172-16-3-10 sshd[5694]: Accepted publickey for root from 172.16.3.5 port 51340 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:51 ip-172-16-3-10 sshd[5694]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5694]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:51 ip-172-16-3-10 sshd[5715]: Accepted publickey for root from 172.16.3.5 port 51344 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:51 ip-172-16-3-10 sshd[5715]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:51 ip-172-16-3-10 sshd[5715]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:51 ip-172-16-3-10 sshd[5736]: Accepted publickey for root from 172.16.3.5 port 51348 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:51 ip-172-16-3-10 sshd[5736]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5736]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:52 ip-172-16-3-10 sshd[5757]: Accepted publickey for root from 172.16.3.5 port 51360 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:52 ip-172-16-3-10 sshd[5757]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5757]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:52 ip-172-16-3-10 sshd[5778]: Accepted publickey for root from 172.16.3.5 port 51364 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:52 ip-172-16-3-10 sshd[5778]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5778]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:52 ip-172-16-3-10 sshd[5803]: Accepted publickey for root from 172.16.3.5 port 51368 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:52 ip-172-16-3-10 sshd[5803]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5803]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:52 ip-172-16-3-10 sshd[5826]: Accepted publickey for root from 172.16.3.5 port 51376 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:52 ip-172-16-3-10 sshd[5826]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5826]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:52 ip-172-16-3-10 sshd[5850]: Accepted publickey for root from 172.16.3.5 port 51388 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:52 ip-172-16-3-10 sshd[5850]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:52 ip-172-16-3-10 sshd[5850]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:53 ip-172-16-3-10 sshd[5874]: Accepted publickey for root from 172.16.3.5 port 51396 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:53 ip-172-16-3-10 sshd[5874]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:53 ip-172-16-3-10 sshd[5874]: pam_unix(sshd:session): session closed for user root
Jan 29 12:54:53 ip-172-16-3-10 sshd[5896]: Accepted publickey for root from 172.16.3.5 port 60068 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 12:54:53 ip-172-16-3-10 sshd[5896]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 12:54:54 ip-172-16-3-10 sshd[5896]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:04 ip-172-16-3-10 sshd[5966]: Accepted publickey for root from 172.16.3.5 port 55824 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:04 ip-172-16-3-10 systemd[5972]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 13:49:04 ip-172-16-3-10 sshd[5966]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:04 ip-172-16-3-10 sshd[5966]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:04 ip-172-16-3-10 sshd[6001]: Accepted publickey for root from 172.16.3.5 port 55840 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:04 ip-172-16-3-10 sshd[6001]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:04 ip-172-16-3-10 sshd[6001]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:04 ip-172-16-3-10 sshd[6022]: Accepted publickey for root from 172.16.3.5 port 55856 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:04 ip-172-16-3-10 sshd[6022]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:04 ip-172-16-3-10 sshd[6022]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:04 ip-172-16-3-10 sshd[6043]: Accepted publickey for root from 172.16.3.5 port 55860 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:04 ip-172-16-3-10 sshd[6043]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:04 ip-172-16-3-10 sshd[6043]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:04 ip-172-16-3-10 sshd[6064]: Accepted publickey for root from 172.16.3.5 port 55868 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:04 ip-172-16-3-10 sshd[6064]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6064]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:05 ip-172-16-3-10 sshd[6085]: Accepted publickey for root from 172.16.3.5 port 55870 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:05 ip-172-16-3-10 sshd[6085]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6085]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:05 ip-172-16-3-10 sshd[6107]: Accepted publickey for root from 172.16.3.5 port 55876 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:05 ip-172-16-3-10 sshd[6107]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6107]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:05 ip-172-16-3-10 sshd[6128]: Accepted publickey for root from 172.16.3.5 port 55888 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:05 ip-172-16-3-10 sshd[6128]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6128]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:05 ip-172-16-3-10 sshd[6153]: Accepted publickey for root from 172.16.3.5 port 55892 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:05 ip-172-16-3-10 sshd[6153]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6153]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:05 ip-172-16-3-10 sshd[6176]: Accepted publickey for root from 172.16.3.5 port 55902 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:49:05 ip-172-16-3-10 sshd[6176]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:49:05 ip-172-16-3-10 sshd[6176]: pam_unix(sshd:session): session closed for user root
Jan 29 13:49:16 ip-172-16-3-10 systemd[5975]: pam_unix(systemd-user:session): session closed for user root
Jan 29 13:57:21 ip-172-16-3-10 sshd[6206]: Accepted publickey for root from 172.16.3.5 port 49922 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:21 ip-172-16-3-10 systemd[6211]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 13:57:21 ip-172-16-3-10 sshd[6206]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:21 ip-172-16-3-10 sshd[6206]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:21 ip-172-16-3-10 sshd[6239]: Accepted publickey for root from 172.16.3.5 port 49938 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:21 ip-172-16-3-10 sshd[6239]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:21 ip-172-16-3-10 sshd[6239]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:21 ip-172-16-3-10 sshd[6260]: Accepted publickey for root from 172.16.3.5 port 49946 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:21 ip-172-16-3-10 sshd[6260]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:21 ip-172-16-3-10 sshd[6260]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6282]: Accepted publickey for root from 172.16.3.5 port 49948 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6282]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:22 ip-172-16-3-10 sshd[6282]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6303]: Accepted publickey for root from 172.16.3.5 port 49958 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6303]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:22 ip-172-16-3-10 sshd[6303]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6324]: Accepted publickey for root from 172.16.3.5 port 49972 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6324]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:22 ip-172-16-3-10 sshd[6324]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6345]: Accepted publickey for root from 172.16.3.5 port 49982 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6345]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:22 ip-172-16-3-10 sshd[6345]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6366]: Accepted publickey for root from 172.16.3.5 port 49986 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6366]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:22 ip-172-16-3-10 sshd[6366]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:22 ip-172-16-3-10 sshd[6391]: Accepted publickey for root from 172.16.3.5 port 49990 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:22 ip-172-16-3-10 sshd[6391]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:23 ip-172-16-3-10 sshd[6391]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:33 ip-172-16-3-10 systemd[6214]: pam_unix(systemd-user:session): session closed for user root
Jan 29 13:57:46 ip-172-16-3-10 sshd[6421]: Accepted publickey for root from 172.16.3.5 port 42766 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:46 ip-172-16-3-10 systemd[6426]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 13:57:46 ip-172-16-3-10 sshd[6421]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:46 ip-172-16-3-10 sshd[6421]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:46 ip-172-16-3-10 sshd[6453]: Accepted publickey for root from 172.16.3.5 port 42782 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 13:57:46 ip-172-16-3-10 sshd[6453]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 13:57:47 ip-172-16-3-10 sshd[6453]: pam_unix(sshd:session): session closed for user root
Jan 29 13:57:48 ip-172-16-3-10 sshd[6558]: Accepted publickey for root from 172.16.3.5 port 42798 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
