I see that only the first suggestion is applied. Your Dockerfile still uses exec form of CMD, which doesn’t invoke a shell, hence no string interpolation to inject CERT_PW. (Whether you provide the executable as first CMD argument or not, it is still exec form)
Before you run it, you can generate an ssl cert using your script (don’t forget to provide a non-empty password), prepare your collector config, then the rest is a matter of attaching the cert and config as volumes, along with an env var JAVA_OPTS to define all JVM options.
Please let me know if there are further questions.
Unfortunately our endpoint remains unreachable and returns 502 when we send data to it. We are kind of in the situation that we had in the beginning (see above).
Is there another way to make it run? Can the options be added somewhere else. We need to update the collector in order to reduce the vulnerabilities on ECR. Our IT security is complaining about it.