The logs show Unauthenticated and a note about password rotation. The deadline to fix it is now.
Password rotation policies can trigger gRPC errors when credentials expire mid-stream or between client calls. In many systems, passwords or API keys rotate automatically on a schedule or after a security event. If the client has cached the old secret, every request will fail until it fetches the new one.
The most common gRPC error is StatusCode.UNAUTHENTICATED. This happens when the server rejects the metadata in the request. In environments with strict rotation policies, this failure pattern repeats across services if secrets are shared. TLS handshakes can also break when rotation updates certificates tied to authentication.
To prevent these issues, align password rotation schedules with gRPC client authentication refresh. Use short-lived tokens instead of static passwords. Configure clients to load credentials from a secure store at runtime, not from memory or disk cache. For server-side rotation, ensure backward compatibility during the cutover window.