100% support this. There should be no framework that does not support TLS1.2 now.
Could I encourage you to go a step further. api.meraki.com is using a certificate created with a 2048 bit key. I see no reason not to be using 4096 bit keys these days. I use them as standard, and have not run into any compatibility issues on anything.
Also, is there any reason to still offer RSA without ECDHE? For example, you could stop offering these [weaker] ciphers:
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
I think you would be hard pressed to find things that don't support ECDHE these days.