Please fill out the fields below so we can help you better. Note:
you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. https://crt.sh/?q=example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.
Congratulations! Your certificate and chain have been saved at:
/home/y/0001_chain.pem
Your cert will expire on 2022-06-07. To obtain a new or tweaked
version of this certificate in the future, simply run certbot
owner : This website does not supply ownership information.
verified by : Not specified
technical Details : Connection not encrypted . the website does not support encryption
Yes certbot does not configure Tomcat automatically, you need to modify your Tomcat config to use the certificate files. Here is an example config: Mozilla SSL Configuration Generator
Ok, well if the JKS file is generated using your current Let's Encrypt certificate files then it should be ok. Currently though, your webserver is serving a self signed certificate (one that you or the software made up), if you think this JKS file is correct and was generated using the Let's Encrypt PEM files etc then make sure you have restarted Tomcat to use the latest version of the file.
Why do you need to analyse the JKS file- didn't you create it yourself? If not then that's your problem!
Your JKS file is a container (a key store) containing the private key generated during the certificate creation and the public certificate itself. If you are using this file then you need to create/update it from the latest certificate information. If you don't know how this file came to be then that's the part you need to look at - either replace it with an updated file or switch to just using the pem files as per the example configs above.