Documentation Index
Fetch the complete documentation index at: https://docs.linquid.io/llms.txt
Use this file to discover all available pages before exploring further.
Rules, Conditions, and Operators Reference
Rules are evaluated by priority and condition match. They route traffic before fallback behavior.Rule evaluation model
- Rules are checked in priority order.
- First matching rule applies.
- If no rule matches, fallback destination logic applies.
Rule types
Linquid supports rule types for:- geography
- device/platform
- time schedule
- referrer/source
- UTM values
- IP and network attributes
- language
- fraud/traffic quality
- ASN/ISP
- headers/cookies
- rate limits/caps
- weighted distribution / percentage tests
- query/path/method/hostname
- visitor state
- nested logic
Condition input design principles
- keep condition sets explicit and minimal.
- avoid overlapping broad include and exclude patterns.
- prefer deterministic values over regex when possible.
- document assumptions for high-volume routing rules.
Operator behavior
Rules support two operator layers:- logical operators for nested composition (
AND,OR,NOT) - comparison operators for value matching (
equals,contains, membership checks, and related comparisons)
Common operator pitfalls
| Pitfall | Impact | Fix |
|---|---|---|
Broad OR group high in priority | Captures traffic unexpectedly | Move to lower priority or tighten conditions |
| Conflicting include/exclude values | Non-deterministic routing expectations | Simplify and separate concerns |
| Overly broad regex | False positives and maintenance risk | Use exact match/set match where possible |
Major condition dimensions
Geo
- countries, regions, cities, continents
- include and exclude patterns
Device and client
- device class (mobile/tablet/desktop)
- OS and browser family
- language and locale signals
Traffic source
- referrer source rules
- UTM source/medium/campaign/term/content
- query parameter and path/hostname matching
Security and quality
- fraud score thresholds
- VPN/proxy/datacenter/Tor/bot/crawler controls
- visitor caps and cooldown behavior
Visitor state
- new vs returning visitor routing
- visit-count thresholds
- first-seen windows
Priority and conflict strategy
Recommended ordering:- Fraud/security exclusion rules.
- High-specificity targeting rules.
- Channel/experiment split rules.
- Broad fallback-like rules.
- Identify which existing rule it could overlap.
- Simulate expected match path.
- Place at explicit priority.
- Retest common traffic scenarios.
Nested logic patterns
Use nested logic when one flat rule is not enough. Recommended patterns:- Gate by geography first.
- Branch by device/platform second.
- Apply fraud quality controls before destination.
- Keep one explicit fallback branch.
Rule priority strategy
- low number = evaluated earlier
- specific rules should be above broad rules
- update priorities when adding new broad conditions
Safety constraints worth knowing
- regex-based conditions use guarded validation for stability
- reserved internal cookie names are blocked
- condition arrays/fields are size-limited for reliability
Operator examples (user perspective)
- Target mobile visitors in one country: device + country condition group.
- Exclude suspicious traffic: fraud thresholds + VPN/proxy/Tor checks.
- Run A/B traffic split: weighted/percentage rule set.
- Return visitors to retention offer: visitor-state rule path.
Rule QA matrix
| Scenario | Expected result |
|---|---|
| Country allowlist + mobile only | Only matching mobile traffic in allowed countries routed |
| VPN/proxy exclusion | Suspicious traffic diverted to safe destination |
| Time-window campaign | Traffic routes only during configured schedule |
| A/B split | Distribution approximates configured weights over sufficient volume |
| Returning visitor retention path | Repeat visitors routed to retention destination |
Troubleshooting guide
If a rule does not fire as expected:- Confirm priority order.
- Confirm condition field formats.
- Confirm include/exclude logic does not conflict.
- Confirm fallback is not catching traffic first.
- Validate date/time and timezone boundaries.
Change management best practices
- Version high-impact rule sets with change notes.
- Test in low-risk traffic segment before broad rollout.
- Monitor top links and conversion trends after deployment.
- Roll back quickly if anomaly thresholds are crossed.
/user-guides/manual/growth/campaigns-links-rules/user-guides/manual/data/analytics-and-reporting

