Summary
The daydream-api (staging, eu-metrics-monitoring.livepeer.monster) is logging 6 recurring [AuthPlugin] Invalid access token errors over a 12-hour window on 2026-03-17. The regularity suggests an automated client making periodic requests with an expired or invalid token.
Error Details
Loki query used: {app="daydream-api"} | logfmt | level="error"
Environment: Staging
Hostname: d896435a6ee678
Log level: pino level=50 (ERROR)
Occurrences in the 12h window (06:09–18:09 UTC, 2026-03-17):
[2026-03-17 07:09:36 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 08:54:09 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 12:39:02 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 14:30:12 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 16:00:33 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 17:52:43 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
Intervals between occurrences: 1h45m → 3h45m → 1h51m → 1h30m → 1h52m — somewhat regular, consistent with an automated process.
Sample Log Line
level=50 time=1773769963362 pid=670 trace_id=ec52a5f5425e56c7e0c9f29de4e2f747 span_id=e7888e9e5392feae trace_flags=01 msg="[AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token"
Likely Cause
An automated client (monitoring script, health checker, or Scope app with a stale session token) is making periodic requests to staging daydream-api using a token that is expired or has been revoked. The server correctly rejects it, but this pollutes the error log and may indicate:
- A service account token needs rotation
- A client isn't properly refreshing/renewing tokens
- A test/monitoring script has a hardcoded expired token
Impact
- Inflates error count in staging dashboards (6 false alarms / 12h)
- Could mask real auth failures from legitimate users
Next Steps
- Identify which client/service account is making these requests (trace the
trace_id in the full daydream-api logs — each occurrence has a unique trace ID)
- If it's a monitoring script: rotate the token
- If it's a Scope client: investigate token refresh logic in the AuthPlugin
Automatically detected by Scope error monitor cron — 2026-03-17 18:09 UTC
Summary
The
daydream-api(staging,eu-metrics-monitoring.livepeer.monster) is logging 6 recurring[AuthPlugin] Invalid access tokenerrors over a 12-hour window on 2026-03-17. The regularity suggests an automated client making periodic requests with an expired or invalid token.Error Details
Loki query used:
{app="daydream-api"} | logfmt | level="error"Environment: Staging
Hostname:
d896435a6ee678Log level: pino
level=50(ERROR)Occurrences in the 12h window (06:09–18:09 UTC, 2026-03-17):
Intervals between occurrences: 1h45m → 3h45m → 1h51m → 1h30m → 1h52m — somewhat regular, consistent with an automated process.
Sample Log Line
Likely Cause
An automated client (monitoring script, health checker, or Scope app with a stale session token) is making periodic requests to staging daydream-api using a token that is expired or has been revoked. The server correctly rejects it, but this pollutes the error log and may indicate:
Impact
Next Steps
trace_idin the full daydream-api logs — each occurrence has a unique trace ID)Automatically detected by Scope error monitor cron — 2026-03-17 18:09 UTC