Starting Stunnel with configuration: pid = /tmp/stunnel.pid foreground = yes debug = notice sslVersion = TLSv1.2 [zookeeper-2181] client = yes CAfile = /tmp/cluster-ca.crt cert = /etc/eto-certs/entity-operator.crt key = /etc/eto-certs/entity-operator.key accept = 127.0.0.1:2181 connect = onap-strimzi-zookeeper-client:2181 delay = yes verify = 2 + exec /usr/bin/tini -w -e 143 -- /usr/bin/stunnel /tmp/stunnel.conf 2022.06.25 02:52:05 LOG5[ui]: stunnel 5.56 on x86_64-redhat-linux-gnu platform 2022.06.25 02:52:05 LOG5[ui]: Compiled with OpenSSL 1.1.1g FIPS 21 Apr 2020 2022.06.25 02:52:05 LOG5[ui]: Running with OpenSSL 1.1.1k FIPS 25 Mar 2021 2022.06.25 02:52:05 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI 2022.06.25 02:52:05 LOG5[ui]: Reading configuration from file /tmp/stunnel.conf 2022.06.25 02:52:05 LOG5[ui]: UTF-8 byte order mark not detected 2022.06.25 02:52:05 LOG5[ui]: FIPS mode disabled 2022.06.25 02:52:05 LOG4[ui]: Insecure file permissions on /etc/eto-certs/entity-operator.key 2022.06.25 02:52:05 LOG4[ui]: Service [zookeeper-2181] uses "verifyChain" without subject checks 2022.06.25 02:52:05 LOG4[ui]: Use "checkHost" or "checkIP" to restrict trusted certificates 2022.06.25 02:52:05 LOG5[ui]: Configuration successful 2022.06.25 02:52:05 LOG5[0]: Service [zookeeper-2181] accepted connection from 127.0.0.1:38542 2022.06.25 02:52:05 LOG5[0]: s_connect: connected 10.233.51.195:2181 2022.06.25 02:52:05 LOG5[0]: Service [zookeeper-2181] connected remote server from 10.233.69.148:33224 2022.06.25 02:52:05 LOG5[0]: Certificate accepted at depth=0: O=io.strimzi, CN=onap-strimzi-zookeeper