Jan 29 14:17:37 ip-172-16-3-10 polkitd[837]: Loading rules from directory /etc/polkit-1/rules.d
Jan 29 14:17:37 ip-172-16-3-10 polkitd[837]: Loading rules from directory /usr/share/polkit-1/rules.d
Jan 29 14:17:37 ip-172-16-3-10 polkitd[837]: Finished loading, compiling and executing 4 rules
Jan 29 14:17:37 ip-172-16-3-10 polkitd[837]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: new group: name=rocky, GID=1000
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: new user: name=rocky, UID=1000, GID=1000, home=/home/rocky, shell=/bin/bash
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: add 'rocky' to group 'adm'
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: add 'rocky' to group 'systemd-journal'
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: add 'rocky' to shadow group 'adm'
Jan 29 14:17:38 ip-172-16-3-10 useradd[924]: add 'rocky' to shadow group 'systemd-journal'
Jan 29 14:17:39 ip-172-16-3-10 sshd[943]: Server listening on 0.0.0.0 port 22.
Jan 29 14:17:39 ip-172-16-3-10 sshd[943]: Server listening on :: port 22.
Jan 29 14:18:02 ip-172-16-3-10 sshd[4563]: Accepted publickey for rocky from 172.16.0.143 port 38600 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 14:18:02 ip-172-16-3-10 systemd[4568]: pam_unix(systemd-user:session): session opened for user rocky by (uid=0)
Jan 29 14:18:02 ip-172-16-3-10 sshd[4563]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 14:18:05 ip-172-16-3-10 sshd[4608]: Accepted publickey for rocky from 172.16.0.143 port 38608 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 14:18:06 ip-172-16-3-10 sshd[4608]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 14:18:06 ip-172-16-3-10 sshd[4656]: Accepted publickey for rocky from 172.16.0.143 port 38622 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 14:18:06 ip-172-16-3-10 sshd[4656]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 14:18:06 ip-172-16-3-10 sudo[4822]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /tmp/salt/wait_for_salt.sh
Jan 29 14:18:06 ip-172-16-3-10 sudo[4822]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 14:19:12 ip-172-16-3-10 sudo[4822]: pam_unix(sudo:session): session closed for user root
Jan 29 14:19:13 ip-172-16-3-10 sshd[4985]: Accepted publickey for rocky from 172.16.0.143 port 50684 ssh2: ED25519 SHA256:OBWBPoDNvbh4mbDy3i6fHnCrYINjEbKbR+Zz4TOtFIo
Jan 29 14:19:13 ip-172-16-3-10 sshd[4985]: pam_unix(sshd:session): session opened for user rocky by (uid=0)
Jan 29 14:19:13 ip-172-16-3-10 sudo[5061]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/rm -rf /root/salt
Jan 29 14:19:13 ip-172-16-3-10 sudo[5061]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 14:19:13 ip-172-16-3-10 sudo[5061]: pam_unix(sudo:session): session closed for user root
Jan 29 14:19:13 ip-172-16-3-10 sudo[5064]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/mv /tmp/salt /root
Jan 29 14:19:13 ip-172-16-3-10 sudo[5064]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 14:19:13 ip-172-16-3-10 sudo[5064]: pam_unix(sudo:session): session closed for user root
Jan 29 14:19:13 ip-172-16-3-10 sudo[5067]:   rocky : TTY=pts/0 ; PWD=/home/rocky ; USER=root ; COMMAND=/bin/bash /root/salt/first_deployment_highstate.sh
Jan 29 14:19:13 ip-172-16-3-10 sudo[5067]: pam_unix(sudo:session): session opened for user root by rocky(uid=1000)
Jan 29 14:21:25 ip-172-16-3-10 sudo[5067]: pam_unix(sudo:session): session closed for user root
Jan 29 14:34:27 ip-172-16-3-10 sshd[4563]: pam_unix(sshd:session): session closed for user rocky
Jan 29 14:34:27 ip-172-16-3-10 sshd[4656]: pam_unix(sshd:session): session closed for user rocky
Jan 29 14:34:27 ip-172-16-3-10 sshd[4985]: pam_unix(sshd:session): session closed for user rocky
Jan 29 14:34:27 ip-172-16-3-10 sshd[4608]: pam_unix(sshd:session): session closed for user rocky
Jan 29 14:34:37 ip-172-16-3-10 systemd[4571]: pam_unix(systemd-user:session): session closed for user rocky
Jan 29 14:35:33 ip-172-16-3-10 sshd[5613]: Accepted publickey for root from 172.16.3.5 port 52248 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:33 ip-172-16-3-10 systemd[5618]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 14:35:33 ip-172-16-3-10 sshd[5613]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:33 ip-172-16-3-10 sshd[5613]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:33 ip-172-16-3-10 sshd[5645]: Accepted publickey for root from 172.16.3.5 port 52262 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:33 ip-172-16-3-10 sshd[5645]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:33 ip-172-16-3-10 sshd[5645]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:33 ip-172-16-3-10 sshd[5666]: Accepted publickey for root from 172.16.3.5 port 52264 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:33 ip-172-16-3-10 sshd[5666]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:33 ip-172-16-3-10 sshd[5666]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:33 ip-172-16-3-10 sshd[5687]: Accepted publickey for root from 172.16.3.5 port 52276 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:33 ip-172-16-3-10 sshd[5687]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:33 ip-172-16-3-10 sshd[5687]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5708]: Accepted publickey for root from 172.16.3.5 port 52290 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5708]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:34 ip-172-16-3-10 sshd[5708]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5729]: Accepted publickey for root from 172.16.3.5 port 52294 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5729]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:34 ip-172-16-3-10 sshd[5729]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5750]: Accepted publickey for root from 172.16.3.5 port 52310 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5750]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:34 ip-172-16-3-10 sshd[5750]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5771]: Accepted publickey for root from 172.16.3.5 port 52322 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5771]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:34 ip-172-16-3-10 sshd[5771]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5796]: Accepted publickey for root from 172.16.3.5 port 52332 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5796]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:34 ip-172-16-3-10 sshd[5796]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:34 ip-172-16-3-10 sshd[5819]: Accepted publickey for root from 172.16.3.5 port 52336 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:34 ip-172-16-3-10 sshd[5819]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:35 ip-172-16-3-10 sshd[5819]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:35 ip-172-16-3-10 sshd[5843]: Accepted publickey for root from 172.16.3.5 port 52352 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:35 ip-172-16-3-10 sshd[5843]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:35 ip-172-16-3-10 sshd[5843]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:35 ip-172-16-3-10 sshd[5867]: Accepted publickey for root from 172.16.3.5 port 52360 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:35 ip-172-16-3-10 sshd[5867]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:35 ip-172-16-3-10 sshd[5867]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:36 ip-172-16-3-10 sshd[5889]: Accepted publickey for root from 172.16.3.5 port 52366 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:35:36 ip-172-16-3-10 sshd[5889]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:35:36 ip-172-16-3-10 sshd[5889]: pam_unix(sshd:session): session closed for user root
Jan 29 14:35:46 ip-172-16-3-10 systemd[5621]: pam_unix(systemd-user:session): session closed for user root
Jan 29 14:42:27 ip-172-16-3-10 sshd[5918]: Accepted publickey for root from 172.16.3.5 port 44228 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:27 ip-172-16-3-10 systemd[5923]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 14:42:27 ip-172-16-3-10 sshd[5918]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:27 ip-172-16-3-10 sshd[5918]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:27 ip-172-16-3-10 sshd[5952]: Accepted publickey for root from 172.16.3.5 port 44230 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:27 ip-172-16-3-10 sshd[5952]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:27 ip-172-16-3-10 sshd[5952]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[5973]: Accepted publickey for root from 172.16.3.5 port 44232 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[5973]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:28 ip-172-16-3-10 sshd[5973]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[5995]: Accepted publickey for root from 172.16.3.5 port 44238 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[5995]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:28 ip-172-16-3-10 sshd[5995]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[6016]: Accepted publickey for root from 172.16.3.5 port 44242 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[6016]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:28 ip-172-16-3-10 sshd[6016]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[6038]: Accepted publickey for root from 172.16.3.5 port 44258 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[6038]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:28 ip-172-16-3-10 sshd[6038]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[6059]: Accepted publickey for root from 172.16.3.5 port 44262 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[6059]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:28 ip-172-16-3-10 sshd[6059]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:28 ip-172-16-3-10 sshd[6080]: Accepted publickey for root from 172.16.3.5 port 44278 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:28 ip-172-16-3-10 sshd[6080]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:29 ip-172-16-3-10 sshd[6080]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:29 ip-172-16-3-10 sshd[6105]: Accepted publickey for root from 172.16.3.5 port 44292 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:42:29 ip-172-16-3-10 sshd[6105]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:42:29 ip-172-16-3-10 sshd[6105]: pam_unix(sshd:session): session closed for user root
Jan 29 14:42:39 ip-172-16-3-10 systemd[5927]: pam_unix(systemd-user:session): session closed for user root
Jan 29 14:43:28 ip-172-16-3-10 sshd[6135]: Accepted publickey for root from 172.16.3.5 port 44356 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:43:28 ip-172-16-3-10 systemd[6140]: pam_unix(systemd-user:session): session opened for user root by (uid=0)
Jan 29 14:43:28 ip-172-16-3-10 sshd[6135]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jan 29 14:43:28 ip-172-16-3-10 sshd[6135]: pam_unix(sshd:session): session closed for user root
Jan 29 14:43:28 ip-172-16-3-10 sshd[6167]: Accepted publickey for root from 172.16.3.5 port 44372 ssh2: ED25519 SHA256:6TsFBgFR2thOEHhtyc0UK3XB/EtCMtalKb5UoO8+Zus
Jan 29 14:43:28 ip-172-16-3-10 sshd[6167]: pam_unix(sshd:session): session opened for user root by (uid=0)
