Configuration Reference
This page covers all configuration options for TealTiger v1.1.0. Configuration controls how TealTiger behaves at runtime - not what your policies mean.Quick start
Here’s a minimal configuration to get started:Configuration Principles
TealTiger configuration follows these principles:- Secure by default - Safe settings out of the box
- Explicit over implicit - No hidden behavior
- Deterministic - Same config = same behavior
- Backward compatible - No breaking changes within v1.1.x
- Policy-independent - Config doesn’t change policy logic
Configuration Scope (v1.1.0)
In v1.1.0, configuration controls:- Policy enforcement mode
- Logging behavior
- Audit emission
- Cost estimation and limits
- Redaction and data minimization
- Error handling behavior
- Policy logic
- Condition semantics
- Reason code meaning
- Risk score calculation
Policy Mode Configuration
Controls whether policies are enforced or just monitored.Global mode
Set a default mode for all policies:Policy-specific modes
Override the global mode for specific policies:Environment-based modes
Different modes for different environments:Available modes
| Mode | Behavior | Use when |
|---|---|---|
MONITOR | Evaluate policies, log violations, but don’t block | Testing new policies, collecting data |
ENFORCE | Evaluate policies and block violations | Production, after testing in MONITOR |
REPORT_ONLY | Evaluate policies, report metrics only | Compliance reporting without enforcement |
MONITOR (safe for testing)
Best practice: Start with MONITOR, graduate to ENFORCE after validation.
Logging Configuration
Controls structured logging output for debugging and monitoring.Basic logging setup
Log levels
| Level | Use when | Example |
|---|---|---|
DEBUG | Troubleshooting issues | ”Loaded 5 policies from config” |
INFO | Normal operations | ”Policy evaluated successfully” |
WARN | Suspicious activity | ”Budget at 85% in MONITOR mode” |
ERROR | Failures | ”Policy evaluation failed” |
INFO
Best practice: Use INFO in production, DEBUG only when troubleshooting.
File logging
Custom logger
Content logging (⚠️ Use with caution)
By default, TealTiger does NOT log prompts or completions for security. Enable only in isolated development:includeContent in production. It logs sensitive user data.
Audit Configuration
Controls emission of structured audit events for compliance and forensics.Basic audit setup
Audit outputs
Send audit events to multiple destinations:Redaction modes
Control how sensitive data is handled in audit events:| Mode | Behavior | Use when |
|---|---|---|
metadata-only | Only metadata, no content | Production (recommended) |
hash-only | Content replaced with hashes | Need to verify content without storing it |
partial | Some content with redaction | Development/debugging |
metadata-only (most secure)
Schema versioning
Audit events include schema version for compatibility:1.1.0
Best practice: Don’t change unless explicitly required for compatibility.
Cost Configuration
Controls cost estimation, tracking, and budget enforcement.Basic cost tracking
Cost estimation
Enable cost estimation before making API calls:enabled: true
Best practice: Keep estimation enabled for cost-based policies to work.
Budget enforcement
Control whether budget violations block requests:| Mode | Behavior | Use when |
|---|---|---|
monitor | Log violations, don’t block | Testing budget limits |
enforce | Block requests that exceed budget | Production |
monitor (safe for testing)
Currency
Set the currency for cost normalization:USD
Risk Configuration
Controls risk score calculation and threshold behavior.Basic risk setup
Risk scoring
Enable or disable risk score calculation:enabled: true- Calculate risk scores (0-100) for all decisionsenabled: false- Skip risk scoring (may reduce policy effectiveness)
enabled: true
Best practice: Keep enabled for security and cost policies.
Threshold behavior
Control how risk thresholds are enforced:| Mode | Behavior | Use when |
|---|---|---|
strict | Thresholds enforced exactly | Production (recommended) |
lenient | Allow small buffer zones | Testing/tuning |
strict
Redaction Configuration
Controls data minimization in logs and audit events.Basic redaction setup
Redaction strategies
| Strategy | What’s redacted | Use when |
|---|---|---|
metadata-only | All content, keep metadata | Production (most secure) |
hash-only | Content replaced with hashes | Need content verification |
partial | Sensitive fields only | Development/debugging |
enabled: true, strategy: 'metadata-only'
Best practice: Always keep redaction enabled in production.
Error Handling Configuration
Controls how enforcement errors are surfaced and handled.Basic error handling
Return reason codes
Include reason codes in error responses:true- Include reason codes (helps debugging)false- Suppress reason codes (more opaque)
true
Best practice: Keep enabled for better debugging.
Fail-open vs fail-closed
Control behavior when TealTiger encounters internal errors:| Mode | Behavior | Use when |
|---|---|---|
failOpen: false | Block request on internal error | Security-critical workloads (recommended) |
failOpen: true | Allow request on internal error | High availability requirements |
false (fail-closed)
Best practice: Use fail-closed for security workloads, fail-open only if availability is critical.
Environment-Specific Configuration
Configure TealTiger differently for each environment.Development environment
Production environment
Environment-based selection
Complete Production Example
Here’s a complete, production-ready configuration:Configuration Precedence
When multiple configurations apply, TealTiger uses this precedence order (highest to lowest):- Policy-specific configuration - Overrides for individual policies
- Environment-level configuration - Settings per environment (dev/staging/prod)
- Global configuration - Default settings for all policies
- Built-in defaults - TealTiger’s safe defaults
Example
Configuration Stability Guarantees
Within v1.1.x releases, TealTiger guarantees: ✅ No renamed keys - Configuration keys stay the same✅ No changed meanings - Behavior stays consistent
✅ No silent default changes - Defaults won’t change without notice
✅ Additive only - New options added, old ones never removed Breaking configuration changes require a major version bump (v2.0.0).
What Configuration Does NOT Do
Configuration controls execution behavior, not governance logic: ❌ Does NOT modify policy logic❌ Does NOT change reason code meanings
❌ Does NOT alter risk score calculations
❌ Does NOT introduce non-deterministic behavior Configuration affects how policies run, not what they decide.
Best Practices
- Start in MONITOR mode - Test policies before enforcing
- Keep content logging disabled - Never log prompts/completions in production
- Use fail-closed - Block on errors for security workloads
- Enable audit - Always emit audit events for compliance
- Treat config as code - Version control your configuration
- Test in staging - Validate config changes before production
- Use environment variables - Don’t hardcode secrets or URLs
- Monitor audit events - Set up alerts for policy violations
- Rotate logs - Prevent disk space issues
- Document overrides - Explain why you override defaults

