JMeter knows nothing about this SSLKEYLOGFILE
environment variable, if you want to capture encrypted traffic originating from JMeter via Wireshark you will need to go for RSA key approach
First you need to get the private key from the website you're testing.
Once done you need to configure protocol dissector using the aforementioned private key in Wireshark - Preferences - Protocols - TLS

Once done you should be able to decrypt the outgoing requests using Wireshark.
If you cannot obtain the RSA private key from the website you're testing you can still attempt to obtain it using JMeter's HTTP(S) Test Script Recorder you need to first generate a MITM proxy keystore and make JMeter aware of this keystore by modifying the following JMeter Properties:
proxy.cert.file=proxyserver.jks
proxy.cert.type=JKS
proxy.cert.keystorepass=mc3VZAuZvgYzt6pIQq3w
proxy.cert.keypassword=BFsghQ0GBN7SxI0HWpkr
Then you need to convert JKS keystore to PKCS12 via i.e. keytool command
keytool -importkeystore -srckeystore proxyserver.jks -destkeystore proxyserver.p12 -srcstoretype JKS -deststoretype PKCS12 -srcstorepass mc3VZAuZvgYzt6pIQq3w -deststorepass mc3VZAuZvgYzt6pIQq3w
Next you can extract encrypted RSA private key from the .p12 keystore:
openssl pkcs12 -in proxyserver.p12 -nocerts -out encrypted.key -password pass:mc3VZAuZvgYzt6pIQq3w -passout pass:mc3VZAuZvgYzt6pIQq3w
And finally decrypt the private key for later use in Wireshark:
openssl rsa -in encrypted.key -out decrypted.key -passin pass:mc3VZAuZvgYzt6pIQq3w
The generated RSA key file can be used in Wireshark
