<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"
  xmlns:dc="http://purl.org/dc/elements/1.1/">
  <author>
    <name>CloudAMQP</name>
  </author>
  <id>https://docs.cloudamqp.com/changelog.rss</id>
  <title>CloudAMQP technical changelog</title>
  <updated>2026-04-27T13:37:00Z</updated>
  <entry>
    <content type="html">&lt;p&gt;The OAuth 2.0 configuration API (&lt;code&gt;/api/oauth2-configurations&lt;/code&gt;) accepts an &lt;code&gt;oauth_disable_basic_auth&lt;/code&gt; boolean field. When enabled, static username/password access to the management interface is disabled, leaving only OAuth 2.0 authentication. See the &lt;a href=&quot;https://docs.cloudamqp.com/instance-api.html#tag/oauth-20&quot;&gt;OAuth 2.0 configuration&lt;/a&gt; for details.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-04-27-configurable-oauth_disable_basic_auth-option-for-oauth-20-configuration</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-04-27-configurable-oauth_disable_basic_auth-option-for-oauth-20-configuration"/>
    <title>Configurable oauth_disable_basic_auth option for OAuth 2.0 configuration</title>
    <updated>2026-04-27T13:37:00Z</updated>
    <dc:date>2026-04-27T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The &lt;code&gt;ra.wal_max_size_bytes&lt;/code&gt; setting controls the maximum size of the Raft write-ahead log kept in memory before it is rolled over to disk. A RabbitMQ restart is required to apply changes. Defaults are plan-dependent. The setting is reset to the plan default on plan changes, unless the value is lower than the plan default.&lt;/p&gt;&lt;p&gt;The value is accepted and returned in &lt;strong&gt;MiB&lt;/strong&gt; via the &lt;code&gt;/api/config&lt;/code&gt; endpoint.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-04-27-configurable-rabbitmq-raft-write-ahead-log-size-rawal_max_size_bytes-now-available-in-cloudamqp-api-and-console</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-04-27-configurable-rabbitmq-raft-write-ahead-log-size-rawal_max_size_bytes-now-available-in-cloudamqp-api-and-console"/>
    <title>Configurable RabbitMQ Raft write-ahead log size (ra.wal_max_size_bytes) now available in CloudAMQP API and Console</title>
    <updated>2026-04-27T13:37:00Z</updated>
    <dc:date>2026-04-27T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The &lt;code&gt;otel_scope_info&lt;/code&gt; metric and the labels &lt;code&gt;otel_scope_name&lt;/code&gt;, &lt;code&gt;otel_scope_schema_url&lt;/code&gt; and &lt;code&gt;otel_scope_version&lt;/code&gt; labels have been removed from the &lt;code&gt;/metrics/node&lt;/code&gt; endpoint. These were recently introduced with empty values and carried no useful information.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-03-31-removed-opentelemetry-scope-info-from-the-prometheus-endpoint-metricsnode-serving-server-metrics</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-03-31-removed-opentelemetry-scope-info-from-the-prometheus-endpoint-metricsnode-serving-server-metrics"/>
    <title>Removed OpenTelemetry scope info from the Prometheus endpoint /metrics/node serving server metrics</title>
    <updated>2026-03-31T13:37:00Z</updated>
    <dc:date>2026-03-31T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The mqtt.max_session_expiry_interval_seconds setting controls how long the broker retains the state of an MQTT client after it disconnects.&lt;/p&gt;&lt;p&gt;The default value on CloudAMQP is &lt;code&gt;1800&lt;/code&gt; seconds (&lt;code&gt;30&lt;/code&gt; minutes). Setting it to &lt;code&gt;0&lt;/code&gt; ensures that the broker immediately removes the client’s state upon disconnection. Setting it to &lt;code&gt;infinity&lt;/code&gt; (the literal string &lt;code&gt;infinity&lt;/code&gt; in the API) means the broker will always retain the client’s state.&lt;/p&gt;&lt;p&gt;Be aware that using a high value can introduce risks: short-lived clients that do not use clean sessions may leave behind queues and messages. Over time, this can consume resources and may require manual cleanup.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-03-25-configurable-mqtt-session-expiry-mqttmax_session_expiry_interval_seconds-now-available-for-rabbitmq-clusters-in-cloudamqp-api-and-console</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-03-25-configurable-mqtt-session-expiry-mqttmax_session_expiry_interval_seconds-now-available-for-rabbitmq-clusters-in-cloudamqp-api-and-console"/>
    <title>Configurable MQTT Session Expiry (mqtt.max_session_expiry_interval_seconds) Now Available for RabbitMQ clusters in CloudAMQP API and Console</title>
    <updated>2026-03-25T13:37:00Z</updated>
    <dc:date>2026-03-25T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Dedicated clusters connected via &lt;a href=&quot;https://www.cloudamqp.com/docs/cloudamqp-vpc-connect.html&quot;&gt;VPC Connect&lt;/a&gt; (AWS PrivateLink, Azure Private Link, or GCP Private Service Connect) now expose per-node Prometheus metrics endpoints. Because VPC Connect uses a single cluster-level DNS record, the standard &lt;code&gt;/metrics&lt;/code&gt; endpoint only reaches one node at a time via round-robin. The new endpoints let you target each node individually:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;&lt;code&gt;/node1/metrics&lt;/code&gt; — metrics from node 1&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/node2/metrics&lt;/code&gt; — metrics from node 2&lt;/li&gt;
&lt;li&gt;&lt;code&gt;/node3/metrics&lt;/code&gt; — metrics from node 3&lt;/li&gt;
&lt;li&gt;(up to &lt;code&gt;/node5/metrics&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;These endpoints are authenticated the same way as the regular &lt;code&gt;/metrics&lt;/code&gt; endpoint and are available on both RabbitMQ and LavinMQ clusters.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-03-10-per-node-prometheus-metrics-endpoints-for-privatelink-clusters</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-03-10-per-node-prometheus-metrics-endpoints-for-privatelink-clusters"/>
    <title>Per-node Prometheus metrics endpoints for PrivateLink clusters</title>
    <updated>2026-03-10T13:37:00Z</updated>
    <dc:date>2026-03-10T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;All RabbitMQ HTTP API 503 Errors were prior being overriden with our Maintenance Page. From now on, instance will forward the correct payload responses from &lt;a href=&quot;https://www.rabbitmq.com/docs/http-api-reference#health-checks&quot;&gt;/api/health/checks&lt;/a&gt; which expectedly respond with 503. Older instances can be switched on-demand by &lt;a href=&quot;https://www.cloudamqp.com/support.html&quot;&gt;contacting support&lt;/a&gt;.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-02-17-supports-apihealthchecks-api-calls-without-overriding-http-error-codes</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-02-17-supports-apihealthchecks-api-calls-without-overriding-http-error-codes"/>
    <title>Supports /api/health/checks API calls without overriding HTTP Error Codes</title>
    <updated>2026-02-17T13:37:00Z</updated>
    <dc:date>2026-02-17T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Two security vulnerabilities have been identified and patched in LavinMQ. These are relevant for deployments where non-admin users are granted management access:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/cloudamqp/lavinmq/security/advisories/GHSA-wh37-6vrr-r9wg&quot;&gt;CVE-2026-25767&lt;/a&gt; (High): Incomplete shovel configuration validation. Patched in 2.6.8.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://github.com/cloudamqp/lavinmq/security/advisories/GHSA-r2mh-8vq6-qf7m&quot;&gt;CVE-2026-25768&lt;/a&gt; (Moderate): Missing vhost access control. Patched in 2.6.6.&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;All CloudAMQP shared LavinMQ instances have been updated. Customers with dedicated LavinMQ instances are encouraged to enable &lt;a href=&quot;https://www.cloudamqp.com/docs/cloudamqp-maintenance.html&quot;&gt;automatic updates&lt;/a&gt; or update to the latest version via the Console or API.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-02-12-lavinmq-security-advisories</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-02-12-lavinmq-security-advisories"/>
    <title>LavinMQ security advisories</title>
    <updated>2026-02-12T13:37:00Z</updated>
    <dc:date>2026-02-12T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;A new &lt;code&gt;/api/trust-store-configuration&lt;/code&gt; endpoint allows you to configure the RabbitMQ trust store plugin for certificate validation on RabbitMQ instances on CloudAMQP. See the &lt;a href=&quot;https://docs.cloudamqp.com/instance-api.html&quot;&gt;API documentation&lt;/a&gt; for details.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-01-30-new-trust-store-configuration-api-endpoint</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-01-30-new-trust-store-configuration-api-endpoint"/>
    <title>New Trust Store Configuration API endpoint</title>
    <updated>2026-01-30T13:37:00Z</updated>
    <dc:date>2026-01-30T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Let&#39;s Encrypt &lt;a href=&quot;https://letsencrypt.org/2025/05/14/ending-tls-client-authentication&quot;&gt;announced&lt;/a&gt; that they will stop including the &quot;TLS Client Authentication&quot; Extended Key Usage (EKU) in their certificates.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Effective February 11, 2026&lt;/strong&gt;, Let&#39;s Encrypt certificates issued or renewed for your CloudAMQP clusters will no longer support client authentication. This date applies to all CloudAMQP users as the default ACME profile is used for issuance.&lt;/p&gt;&lt;p&gt;Impact:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Standard Connections&lt;/strong&gt;: This does not affect standard AMQPS connections (publishers/consumers) connecting to your cluster, as these rely on TLS Server Authentication, which remains supported.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Outgoing Connections (Federation/Shovel)&lt;/strong&gt;: If you rely on your cluster&#39;s Let&#39;s Encrypt certificate to authenticate itself as a client (e.g., usually in mutual TLS setups for Federation or Shovels connecting to external upstream servers that enforce strict EKU checks), these connections may fail after the cut-off date.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;We recommend reviewing any Federation or Shovel upstreams using mTLS to ensure they do not strictly require the Client Authentication EKU from the CloudAMQP server certificate.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-01-13-lets-encrypt-ending-tls-client-authentication-support</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-01-13-lets-encrypt-ending-tls-client-authentication-support"/>
    <title>Let&#39;s Encrypt Ending TLS Client Authentication Support</title>
    <updated>2026-01-13T13:37:00Z</updated>
    <dc:date>2026-01-13T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The default value for the &lt;code&gt;raft.wal_max_size_bytes&lt;/code&gt; configuration setting on new RabbitMQ instances with between 2 and 4 GiB of RAM has been adjusted from 512 MiB to 256 MiB. This change aims to improve stability for clusters using Raft-based features.&lt;/p&gt;&lt;p&gt;The full list is as follows:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;Instances up to 1 GiB of RAM: 64 MiB&lt;/li&gt;
&lt;li&gt;Instances up to 2 GiB of RAM: 128 MiB&lt;/li&gt;
&lt;li&gt;Instances up to 4 GiB of RAM: 256 MiB&lt;/li&gt;
&lt;li&gt;Instances with more than 4 GiB of RAM: 512 MiB&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;If you need to adjust these numbers for your cluster, feel free to &lt;a href=&quot;https://www.cloudamqp.com/support.html&quot;&gt;contact support&lt;/a&gt;.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2026-01-09-adjusted-default-raftwal_max_size_bytes-on-rabbitmq-clusters</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2026-01-09-adjusted-default-raftwal_max_size_bytes-on-rabbitmq-clusters"/>
    <title>Adjusted default raft.wal_max_size_bytes on RabbitMQ clusters</title>
    <updated>2026-01-09T13:37:00Z</updated>
    <dc:date>2026-01-09T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;You can now configure multiple signing secrets for webhooks, enabling zero-downtime key rotation. Enter multiple secrets separated by spaces, and the backend will generate signatures for all of them. This allows webhook consumers to verify with any key during the transition period.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Key rotation workflow:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;
&lt;li&gt;Add a new secret by appending it (space-separated) to the existing one: &lt;code&gt;new-secret old-secret&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Update your webhook consumers to use the new secret&lt;/li&gt;
&lt;li&gt;Remove the old secret, keeping only the new one&lt;/li&gt;
&lt;/ol&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-12-11-webhook-signing-secret-key-rotation</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-12-11-webhook-signing-secret-key-rotation"/>
    <title>Webhook signing secret key rotation</title>
    <updated>2025-12-11T13:37:00Z</updated>
    <dc:date>2025-12-11T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Webhooks now support optional signature verification via a &lt;code&gt;signing_secret&lt;/code&gt; parameter. When configured, webhook requests include the following headers:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;&lt;code&gt;webhook-id&lt;/code&gt;: Unique message identifier&lt;/li&gt;
&lt;li&gt;&lt;code&gt;webhook-timestamp&lt;/code&gt;: Unix timestamp (seconds)&lt;/li&gt;
&lt;li&gt;&lt;code&gt;webhook-signature&lt;/code&gt;: HMAC-SHA256 signature (format: &lt;code&gt;v1,&amp;lt;base64&amp;gt;&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;The signature is computed over &lt;code&gt;{webhook-id}.{webhook-timestamp}.{body}&lt;/code&gt;, allowing you to verify that webhook requests originate from CloudAMQP.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-12-09-webhook-signature-verification</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-12-09-webhook-signature-verification"/>
    <title>Webhook signature verification</title>
    <updated>2025-12-09T13:37:00Z</updated>
    <dc:date>2025-12-09T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;You can now configure the following settings on your RabbitMQ clusters, either via the API or the console:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;&lt;code&gt;rabbitmq_mqtt.vhost&lt;/code&gt; - Define the virtual host used by the MQTT plugin.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;rabbitmq_mqtt.ssl_cert_login&lt;/code&gt; - Enable or disable certificate-based login for MQTT connections.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;rabbit.ssl_options.fail_if_no_peer_cert&lt;/code&gt; - Control whether clients without a valid certificate are rejected.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;rabbit.ssl_options.verify&lt;/code&gt; - Set the TLS verification mode for client certificates.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;rabbit.ssl_cert_login_from&lt;/code&gt; - Select whether the username in certificate should be extracted from the certificate’s Common Name (common_name) or the full Distinguished Name (distinguished_name).&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;When enabling &lt;code&gt;rabbitmq_mqtt.ssl_cert_login&lt;/code&gt;, &lt;code&gt;rabbit.ssl_options.fail_if_no_peer_cert&lt;/code&gt; should be set to true and &lt;code&gt;rabbit.ssl_options.verify&lt;/code&gt; to &lt;code&gt;verify_peer&lt;/code&gt;.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-12-09-adding-more-configurable-mqtt-and-tls-configuration-settings-to-the-rabbitmq-configuration-on-cloudamqp</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-12-09-adding-more-configurable-mqtt-and-tls-configuration-settings-to-the-rabbitmq-configuration-on-cloudamqp"/>
    <title>Adding more configurable MQTT and TLS configuration settings to the RabbitMQ configuration on CloudAMQP</title>
    <updated>2025-12-09T13:37:00Z</updated>
    <dc:date>2025-12-09T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Coralogix is &lt;a href=&quot;https://coralogix.com/docs/user-guides/latest-updates/deprecations/endpoints/&quot;&gt;deprecating legacy regional domains&lt;/a&gt; on December 12, 2025. We are updating all Coralogix log integration endpoints to the new regional format. Existing integrations will be migrated automatically.&lt;/p&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Old endpoint&lt;/th&gt;
&lt;th&gt;New endpoint&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;syslog.coralogix.com:6514&lt;/td&gt;
&lt;td&gt;syslog.eu1.coralogix.com:6514&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;syslog.coralogix.in:6514&lt;/td&gt;
&lt;td&gt;syslog.ap1.coralogix.com:6514&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;syslog.coralogix.us:6514&lt;/td&gt;
&lt;td&gt;syslog.us1.coralogix.com:6514&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;syslog.cx498.coralogix.com:6514&lt;/td&gt;
&lt;td&gt;syslog.us2.coralogix.com:6514&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;syslog.coralogixsg.com:6514&lt;/td&gt;
&lt;td&gt;syslog.ap2.coralogix.com:6514&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;p&gt;EU2 (syslog.eu2.coralogix.com:6514) remains unchanged. AP3 region has been added.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-12-03-coralogix-log-integration-endpoints-updated</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-12-03-coralogix-log-integration-endpoints-updated"/>
    <title>Coralogix log integration endpoints updated</title>
    <updated>2025-12-03T13:37:00Z</updated>
    <dc:date>2025-12-03T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The &lt;code&gt;rabbitmq_prometheus.return_per_object_metrics&lt;/code&gt; configuration setting has been removed. It is no longer possible to change it using the Console nor the API. If you need per-object broker metrics, see &lt;a href=&quot;https://www.cloudamqp.com/blog/scraping-prometheus-metrics.html&quot;&gt;Scraping Prometheus metrics&lt;/a&gt;. Please &lt;a href=&quot;https://www.cloudamqp.com/support.html&quot;&gt;contact support&lt;/a&gt; if you have any questions.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-11-24-removing-rabbitmq_prometheusreturn_per_object_metrics-config-setting</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-11-24-removing-rabbitmq_prometheusreturn_per_object_metrics-config-setting"/>
    <title>Removing rabbitmq_prometheus.return_per_object_metrics config setting</title>
    <updated>2025-11-24T13:37:00Z</updated>
    <dc:date>2025-11-24T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The &lt;code&gt;rabbitmq_trust_store&lt;/code&gt; plugin has been removed from the list of available plugins since it requires manual configuration. Please &lt;a href=&quot;https://www.cloudamqp.com/support.html&quot;&gt;contact support&lt;/a&gt; to enable and configure it.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-11-12-removing-rabbitmq_trust_store-from-list-of-available-plugins</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-11-12-removing-rabbitmq_trust_store-from-list-of-available-plugins"/>
    <title>Removing rabbitmq_trust_store from list of available plugins</title>
    <updated>2025-11-12T13:37:00Z</updated>
    <dc:date>2025-11-12T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;From &lt;strong&gt;October 8, 2025&lt;/strong&gt; all shared accounts created at CloudAMQP will be setup with a max length bytes policy. This is applied in order to stop abusive usage to our limits.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-10-08-max-length-bytes-on-shared-plans</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-10-08-max-length-bytes-on-shared-plans"/>
    <title>Max length bytes on shared plans</title>
    <updated>2025-10-08T13:37:00Z</updated>
    <dc:date>2025-10-08T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;It is now possible to stop and start all nodes (RabbitMQ) in multi node clusters from the CloudAMQP Console and API. This ensures that all nodes are stopped/started in the correct order.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-10-07-stopstart-multi-node-clusters</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-10-07-stopstart-multi-node-clusters"/>
    <title>Stop/Start multi node clusters</title>
    <updated>2025-10-07T13:37:00Z</updated>
    <dc:date>2025-10-07T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The default metrics set exported to the Datadog V3 metrics integration has been changed to use the standard Prometheus metrics format.&lt;/p&gt;&lt;p&gt;If metrics in the Datadog RabbitMQ dashboard format is desired, you can now set the &lt;code&gt;rabbitmq_dashboard_metrics_format&lt;/code&gt; parameter to &lt;code&gt;true&lt;/code&gt; when creating the integration via the API. This transforms RabbitMQ metric names to match Datadog&#39;s RabbitMQ dashboard format (e.g., &lt;code&gt;rabbitmq_channels&lt;/code&gt; becomes &lt;code&gt;rabbitmq.channels&lt;/code&gt;) to be compatible with Datadog&#39;s built-in RabbitMQ dashboards.&lt;/p&gt;&lt;p&gt;This transformation applies to 27 specific RabbitMQ metrics and only affects metrics that are included in your metrics filter. See the &lt;a href=&quot;/docs/monitoring-metrics-datadog-v3.html&quot;&gt;Datadog V3 documentation&lt;/a&gt; for the complete list of transformed metrics.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-09-30-datadog-v3-rabbitmq-dashboard-metrics-format</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-09-30-datadog-v3-rabbitmq-dashboard-metrics-format"/>
    <title>Datadog V3 RabbitMQ dashboard metrics format</title>
    <updated>2025-09-30T13:37:00Z</updated>
    <dc:date>2025-09-30T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;All Prometheus-based metrics integrations now support custom metrics filtering via the &lt;code&gt;metrics_filter&lt;/code&gt; endpoint through the API. This allows you to specify exactly which metrics you want to export instead of using the default set.&lt;/p&gt;&lt;p&gt;See the &lt;a href=&quot;/api.html#update-metrics-filter&quot;&gt;API documentation&lt;/a&gt; for implementation details and the &lt;a href=&quot;/docs/monitoring.html&quot;&gt;metrics documentation&lt;/a&gt; for the complete list of available metrics.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-09-30-custom-metrics-filtering-for-prometheus-integrations</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-09-30-custom-metrics-filtering-for-prometheus-integrations"/>
    <title>Custom metrics filtering for Prometheus integrations</title>
    <updated>2025-09-30T13:37:00Z</updated>
    <dc:date>2025-09-30T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The Datadog service event attribute can now be set to a custom value for log integrations created after July 1, 2025. The service attribute will be overridden by the custom value of the service tag. If a service tag is not set the service attribute will be set to the cluster name.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-06-18-datadog-log-integration-improvement</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-06-18-datadog-log-integration-improvement"/>
    <title>Datadog log integration improvement</title>
    <updated>2025-06-18T13:37:00Z</updated>
    <dc:date>2025-06-18T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;From &lt;strong&gt;August 5, 2025&lt;/strong&gt; LavinMQ instances created via the API and Terraform will have &lt;a href=&quot;https://www.cloudamqp.com/blog/automatic-version-updates-for-lavinmq.html&quot;&gt;automatic version updates&lt;/a&gt; enabled by default.&lt;/p&gt;&lt;p&gt;To opt-out your instance from automatic version updates, you can change your maintenance settings either &lt;a href=&quot;/cloudamqp_api.html#update-maintenance-settings&quot;&gt;using the API&lt;/a&gt; or &lt;a href=&quot;https://www.cloudamqp.com/docs/cloudamqp-maintenance.html&quot;&gt;the Console&lt;/a&gt;.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-06-18-heads-up-automatic-updates-enabled-by-default-for-lavinmq</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-06-18-heads-up-automatic-updates-enabled-by-default-for-lavinmq"/>
    <title>Heads up</title>
    <updated>2025-06-18T13:37:00Z</updated>
    <dc:date>2025-06-18T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;When you add a VPC peering, CloudAMQP automatically adds firewall rules for the peered CIDR block. These rules now include the MQTT ports: 1883 and 8883&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-05-27-vpc-peering-ports-now-include-mqtt-ports</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-05-27-vpc-peering-ports-now-include-mqtt-ports"/>
    <title>VPC peering ports now include MQTT ports</title>
    <updated>2025-05-27T13:37:00Z</updated>
    <dc:date>2025-05-27T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;We had a mismatch of API metric naming that caused queue unacked and queue ready alarms to not trigger on LavinMQ clusters.&lt;/p&gt;&lt;p&gt;A fix was deployed to handle this on 2025-05-08 11:45 UTC, no change is needed for customers with these alarms.&lt;/p&gt;&lt;p&gt;LavinMQ issue related to queue metrics naming inconsistency: &lt;a href=&quot;https://github.com/cloudamqp/lavinmq/issues/1098&quot;&gt;https://github.com/cloudamqp/lavinmq/issues/1098&lt;/a&gt;&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-05-08-fix-queue-unacked-and-queue-ready-alarms-for-lavinmq-backends</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-05-08-fix-queue-unacked-and-queue-ready-alarms-for-lavinmq-backends"/>
    <title>Fix queue unacked and queue ready alarms for LavinMQ backends</title>
    <updated>2025-05-08T13:37:00Z</updated>
    <dc:date>2025-05-08T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;All our metrics are scraped and forwarded every 60s, except CPU and memory, which were scraped every 30 seconds&lt;/p&gt;&lt;p&gt;Today we are deploying a fix to ensure these are scraped at a 60s interval as well.&lt;/p&gt;&lt;p&gt;This could affect some metrics integrations, i.e. getting fewer metric points for CPU and memory, but we do not expect this to cause any issues.&lt;/p&gt;&lt;p&gt;If you experience any issues please contact us.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-03-31-fix-metric-interval-for-cpu-and-memory</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-03-31-fix-metric-interval-for-cpu-and-memory"/>
    <title>Fix metric interval for CPU and memory</title>
    <updated>2025-03-31T13:37:00Z</updated>
    <dc:date>2025-03-31T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;We encountered an issue where we tried to send a string value on a field that is suppose to be a float. The bug resulted in an error for the integration that was &lt;code&gt;STRING_VALUE cannot be converted to Double&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;We have now identified the issue and a fix has been deployed.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The CloudWatch V2 integration supports batching values, which is done by collecting a number of metric values and from that calculate the minimum value, maximum value, sum of all of them and number of metrics and send that to CloudWatch. We do this to reduce the amount of metrics which reduces the cost for our customer but without loosing value insights into how the cluster is doing. When calculating these values, the Minimum and Maximum values sometimes was sent as strings which resulted in an error in the integration since only int and floats are allowed for these values.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-03-18-formatting-bug-in-cloudwatch-v2-metrics-integration</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-03-18-formatting-bug-in-cloudwatch-v2-metrics-integration"/>
    <title>Formatting bug in CloudWatch V2 Metrics integration</title>
    <updated>2025-03-18T13:37:00Z</updated>
    <dc:date>2025-03-18T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;CloudAMQP has upgraded to a higher-performance disk type on Azure. This provides consistent performance regardless of disk size.&lt;/p&gt;&lt;p&gt;Consequently, new Happy Hare (&lt;code&gt;hare&lt;/code&gt;) plan instances and above will now be provisioned with smaller default disk sizes.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-03-17-disk-size-adjustment-on-azure</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-03-17-disk-size-adjustment-on-azure"/>
    <title>Disk size adjustment on Azure</title>
    <updated>2025-03-17T13:37:00Z</updated>
    <dc:date>2025-03-17T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;Azure disk expansion can now be performed live on CloudAMQP clusters, eliminating downtime.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-02-04-seamless-azure-disk-expansion</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-02-04-seamless-azure-disk-expansion"/>
    <title>Seamless Azure Disk Expansion</title>
    <updated>2025-02-04T13:37:00Z</updated>
    <dc:date>2025-02-04T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The following issue has been remediated:&lt;/p&gt;&lt;ul&gt;
&lt;li&gt;if you removed a recipient that was the sole recipient on one or more alarms, all alarms set to notify all recipients, were disabled&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Going forward, only the specific alarm(s) where the sole recipient was removed, will be disabled.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2025-01-23-alarms-no-longer-incorrectly-disabled-when-removing-recipients</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2025-01-23-alarms-no-longer-incorrectly-disabled-when-removing-recipients"/>
    <title>Alarms no longer incorrectly disabled when removing recipients</title>
    <updated>2025-01-23T13:37:00Z</updated>
    <dc:date>2025-01-23T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The Erlang Ecosystem Foundation has published &lt;a href=&quot;https://erlef.org/blog/eef/epmd-public-exposure&quot;&gt;Exposed EPMD: A Hidden Security Risk for RabbitMQ and the BEAM Ecosystem&lt;/a&gt; to highlight the security risks with exposing epmd to the Internet.&lt;/p&gt;&lt;p&gt;At CloudAMQP we have strict firewalls on all instances, and a 24/7 security scanner to detect any faulty configuration. Thus port &lt;code&gt;4369&lt;/code&gt; is not accessable from to the Internet, nor is other cluster distribution ports like &lt;code&gt;25672&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;No change needed for CloudAMQP customers.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2024-12-19-epmd-security-risk---cloudamqp-secure-by-default</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2024-12-19-epmd-security-risk---cloudamqp-secure-by-default"/>
    <title>EPMD security risk - CloudAMQP Secure by default</title>
    <updated>2024-12-19T13:37:00Z</updated>
    <dc:date>2024-12-19T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;A small number (58) of accounts on shared LavinMQ plans reported having negative message counts. This was due a bug in our accounting system that tracked the number of published/delivered messages.&lt;/p&gt;&lt;p&gt;Fix has been deployed.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2024-12-09-fix-message-counting-on-shared-lavinmq-clusters</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2024-12-09-fix-message-counting-on-shared-lavinmq-clusters"/>
    <title>Fix message counting on shared LavinMQ clusters</title>
    <updated>2024-12-09T13:37:00Z</updated>
    <dc:date>2024-12-09T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The LavinMQ 2.0.2 rollout on shared servers enabled counting of get/delivered messages for shared accounts. We now count just as we do on the RabbitMQ shared clusters thanks to the introduction of &lt;code&gt;deliver_get&lt;/code&gt; metrics (&lt;a href=&quot;https://github.com/cloudamqp/lavinmq/pull/793&quot;&gt;LavinMQ pull request #793&lt;/a&gt;)&lt;/p&gt;&lt;p&gt;Note that both &lt;code&gt;basic.deliver&lt;/code&gt; and &lt;code&gt;basic.get&lt;/code&gt; counts, e.g. if you poll with &lt;code&gt;basic.get&lt;/code&gt; it will count even if there&#39;s no message in the queue. We recommend you subscribe to a queue and get the messages delivered as they become available. Read more about &lt;a href=&quot;https://www.cloudamqp.com/blog/rabbitmq-basic-consume-vs-rabbitmq-basic-get.html&quot;&gt;Consume vs. Get&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Message limit is counted as &lt;code&gt;published + deliver_get&lt;/code&gt; and checked against the monthly limit.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2024-11-28---2024-12-04-start-counting-getdelivered-messages-on-shared-lavinmq-clusters</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2024-11-28---2024-12-04-start-counting-getdelivered-messages-on-shared-lavinmq-clusters"/>
    <title>Start counting get/delivered messages on shared LavinMQ clusters</title>
    <updated>2024-11-28T13:37:00Z</updated>
    <dc:date>2024-11-28T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;In the CloudAMQP Console, for users with the &lt;code&gt;member&lt;/code&gt; role or the &lt;code&gt;monitor&lt;/code&gt; role (&quot;tagged roles&quot;), you can assign tags to the user, in order to grant access to instances. Before 2024-10-17, changing a user&#39;s role from a tagged role to another tagged role, did not keep the assigned tags. Now the tags are kept.&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2024-10-17-cloudamqp-tagged-roles-change</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2024-10-17-cloudamqp-tagged-roles-change"/>
    <title>CloudAMQP tagged roles change</title>
    <updated>2024-10-17T13:37:00Z</updated>
    <dc:date>2024-10-17T13:37:00Z</dc:date>
  </entry>
  <entry>
    <content type="html">&lt;p&gt;The following attributes was added to &lt;a href=&quot;cloudamqp_api.html#list-nodes&quot;&gt;Instance API: List nodes&lt;/a&gt;: &lt;code&gt;disk_size&lt;/code&gt;, &lt;code&gt;additional_disk_size&lt;/code&gt;&lt;/p&gt;</content>
    <id>https://docs.cloudamqp.com/changelog.html#2022-06-28-attributes-added-to-list-nodes-endpoint</id>
    <link href="https://docs.cloudamqp.com/changelog.html#2022-06-28-attributes-added-to-list-nodes-endpoint"/>
    <title>Attributes added to &quot;List nodes&quot; endpoint</title>
    <updated>2022-06-28T13:37:00Z</updated>
    <dc:date>2022-06-28T13:37:00Z</dc:date>
  </entry>
  <dc:date>2026-04-27T13:37:00Z</dc:date>
</feed>