Skip to content

[daydream-api] Recurring 'Invalid access token' errors in staging — ~6x/12h with hourly-ish pattern #710

@livepeer-tessa

Description

@livepeer-tessa

Summary

The daydream-api (staging, eu-metrics-monitoring.livepeer.monster) is logging 6 recurring [AuthPlugin] Invalid access token errors over a 12-hour window on 2026-03-17. The regularity suggests an automated client making periodic requests with an expired or invalid token.

Error Details

Loki query used: {app="daydream-api"} | logfmt | level="error"
Environment: Staging
Hostname: d896435a6ee678
Log level: pino level=50 (ERROR)

Occurrences in the 12h window (06:09–18:09 UTC, 2026-03-17):

[2026-03-17 07:09:36 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 08:54:09 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 12:39:02 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 14:30:12 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 16:00:33 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token
[2026-03-17 17:52:43 UTC] [AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token

Intervals between occurrences: 1h45m → 3h45m → 1h51m → 1h30m → 1h52m — somewhat regular, consistent with an automated process.

Sample Log Line

level=50 time=1773769963362 pid=670 trace_id=ec52a5f5425e56c7e0c9f29de4e2f747 span_id=e7888e9e5392feae trace_flags=01 msg="[AuthPlugin] Failed to verify auth token: HTTPError: Invalid access token"

Likely Cause

An automated client (monitoring script, health checker, or Scope app with a stale session token) is making periodic requests to staging daydream-api using a token that is expired or has been revoked. The server correctly rejects it, but this pollutes the error log and may indicate:

  1. A service account token needs rotation
  2. A client isn't properly refreshing/renewing tokens
  3. A test/monitoring script has a hardcoded expired token

Impact

  • Inflates error count in staging dashboards (6 false alarms / 12h)
  • Could mask real auth failures from legitimate users

Next Steps

  1. Identify which client/service account is making these requests (trace the trace_id in the full daydream-api logs — each occurrence has a unique trace ID)
  2. If it's a monitoring script: rotate the token
  3. If it's a Scope client: investigate token refresh logic in the AuthPlugin

Automatically detected by Scope error monitor cron — 2026-03-17 18:09 UTC

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions