diff --git a/main.go b/main.go
index 69ad001412b49ebc1f8602d999f156fe31c22a8d..e52c1af35add5b282f20bf9ac3f881434ccc8e73 100644
--- a/main.go
+++ b/main.go
@@ -49,7 +49,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	certPEM, err := ioutil.ReadFile(certificate)
 	if err != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] %v\n", err)
+			fmt.Printf("[ERR] %v\n", err)
 			appExit(255)
 		} else {
 			return false
@@ -59,7 +59,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	certFullchainPEM, err := ioutil.ReadFile(fullchain)
 	if err != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] %v\n", err)
+			fmt.Printf("[ERR] %v\n", err)
 			appExit(255)
 		} else {
 			return false
@@ -69,7 +69,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	rootPEM, err := ioutil.ReadFile(ca)
 	if err != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] %v\n", err)
+			fmt.Printf("[ERR] %v\n", err)
 			appExit(255)
 		} else {
 			return false
@@ -80,7 +80,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	ok := roots.AppendCertsFromPEM([]byte(rootPEM))
 	if !ok {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse root certificate\n")
+			fmt.Printf("[ERR] failed to parse root certificate\n")
 			appExit(255)
 		} else {
 			return false
@@ -90,7 +90,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	block, _ := pem.Decode([]byte(certPEM))
 	if block == nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate PEM\n")
+			fmt.Printf("[ERR] failed to parse certificate PEM\n")
 			appExit(255)
 		} else {
 			return false
@@ -99,7 +99,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	cert, err := x509.ParseCertificate(block.Bytes)
 	if err != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate %v\n", err)
+			fmt.Printf("[ERR] failed to parse certificate %v\n", err)
 			appExit(255)
 		} else {
 			return false
@@ -109,7 +109,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	fullchainBlock, _ := pem.Decode([]byte(certFullchainPEM))
 	if fullchainBlock == nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate PEM\n")
+			fmt.Printf("[ERR] failed to parse certificate PEM\n")
 			appExit(255)
 		} else {
 			return false
@@ -118,7 +118,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	fullchainCert, fullchainErr := x509.ParseCertificate(fullchainBlock.Bytes)
 	if fullchainErr != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate %v\n", fullchainErr)
+			fmt.Printf("[ERR] failed to parse certificate %v\n", fullchainErr)
 			appExit(255)
 		} else {
 			return false
@@ -134,7 +134,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 
 	if _, err := cert.Verify(opts); err != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate %v\n", err.Error())
+			fmt.Printf("[ERR] failed to parse certificate %v\n", err.Error())
 			appExit(255)
 		} else {
 			return false
@@ -142,7 +142,7 @@ func checkCerificates(dnsname string, certificate string, fullchain string, ca s
 	}
 	if _, fullchainErr := fullchainCert.Verify(opts); fullchainErr != nil {
 		if fail == true {
-			fmt.Printf("[ERROR] failed to parse certificate %v\n", err.Error())
+			fmt.Printf("[ERR] failed to parse certificate %v\n", err.Error())
 		} else {
 			return false
 		}
@@ -156,19 +156,19 @@ func GetRedisKey(redisurl string, redistoken string) string {
 	client := &http.Client{}
 	req, err := http.NewRequest("GET", redisurl, nil)
 	if err != nil {
-		fmt.Printf("[ERROR] Fail to read %v: %v\n", redisurl, err)
+		fmt.Printf("[ERR] Fail to read %v: %v\n", redisurl, err)
 		appExit(255)
 	}
 	req.SetBasicAuth("redis", redistoken)
 	resp, err := client.Do(req)
 	body, err := ioutil.ReadAll(resp.Body)
 	if resp.StatusCode < 200 || resp.StatusCode > 299 {
-		fmt.Printf("[ERROR] Fail to fetch %v\n", redisurl)
+		fmt.Printf("[ERR] Fail to fetch %v\n", redisurl)
 		appExit(255)
 	}
 	defer resp.Body.Close()
 	if err != nil {
-		fmt.Printf("[ERROR] Fail to read %v: %v\n", redisurl, err)
+		fmt.Printf("[ERR] Fail to read %v: %v\n", redisurl, err)
 		appExit(255)
 	}
 	return fmt.Sprintf(string(body))
@@ -179,19 +179,19 @@ func GetVaultKey(vaulturl string, vaulttoken string) string {
 	vaultClient := &http.Client{}
 	req, err := http.NewRequest("GET", vaulturl, nil)
 	if err != nil {
-		fmt.Printf("[ERROR] Fail to read %v: %v\n", vaulturl, err)
+		fmt.Printf("[ERR] Fail to read %v: %v\n", vaulturl, err)
 		appExit(255)
 	}
 	req.Header.Add("X-vault-token", vaulttoken)
 	resp, err := vaultClient.Do(req)
 	body, err := ioutil.ReadAll(resp.Body)
 	if resp.StatusCode < 200 || resp.StatusCode > 299 {
-		fmt.Printf("[ERROR] Fail to fetch %v\n", vaulturl)
+		fmt.Printf("[ERR] Fail to fetch %v\n", vaulturl)
 		appExit(255)
 	}
 	defer resp.Body.Close()
 	if err != nil {
-		fmt.Printf("[ERROR] Fail to read %v: %v\n", vaulturl, err)
+		fmt.Printf("[ERR] Fail to read %v: %v\n", vaulturl, err)
 		appExit(255)
 	}
 	return gjson.Get(string(body), "data.value").String()
@@ -207,7 +207,7 @@ func WriteToFile(content string, destination string, groupname string, filemode
 
 	file, err := os.OpenFile(destination, os.O_WRONLY|os.O_CREATE, filemode)
 	if err != nil {
-		fmt.Printf("[ERROR] %v cannot be created\n", destination)
+		fmt.Printf("[ERR] %v cannot be created\n", destination)
 		appExit(255)
 	}
 
@@ -291,7 +291,7 @@ Options:
 	DayString := arguments["--days"].(string)
 	Days, daysErr := strconv.Atoi(DayString)
 	if daysErr != nil {
-		fmt.Printf("Days mut be an integer\n")
+		fmt.Printf("[ERR] Days mut be an integer\n")
 		appExit(255)
 	}
 	RedisBaseURL = "https://redis.geant.org/GET"
@@ -325,7 +325,7 @@ Options:
 	// check if there is a certificate installed and it is valid
 	existingCert := checkCerificates(CertName, certificateDestination, fullchainDestination, caDestination, keyDestination, Days, false)
 	if existingCert == true {
-		fmt.Printf("the certificates are still valid\n")
+		fmt.Printf("[INFO] the certificates are still valid\n")
 		appExit(0)
 	}
 	certificate := GetRedisKey(RedisCertURL, RedisToken)
@@ -350,10 +350,10 @@ Options:
 	WriteToFile(ca, caDestination, GroupName, 0644, 0755)
 	WriteToFile(privKey, keyDestination, GroupName, 0640, 0750)
 
-	fmt.Printf("installed: %v\n", certificateDestination)
-	fmt.Printf("installed: %v\n", caDestination)
-	fmt.Printf("installed: %v\n", fullchainDestination)
-	fmt.Printf("installed: %v\n", keyDestination)
+	fmt.Printf("[INFO] installed: %v\n", certificateDestination)
+	fmt.Printf("[INFO] installed: %v\n", caDestination)
+	fmt.Printf("[INFO] installed: %v\n", fullchainDestination)
+	fmt.Printf("[INFO] installed: %v\n", keyDestination)
 
 	// Exit 1 means application needs to be reloaded
 	appExit(1)