Skip to main content

Anatomy of Sitecore Business Rules

A powerful part of Sitecore is the business rules engine. Many say it is an underutilized part of the platform. I think part of this is because it is not very well documented. I agree it is a very powerful part of Sitecore so I wanted to spend some time digging in and documenting more about how it works and how to utilize it.

First, let's level set at a high level on what this is. I don't want to rehash the intro stuff as Sitecore documentation does a good job at explaining it at a high level. The documentation that is slim is breaking down how it is configured and how to extend it.

There are a few blogs out there that show quick and dirty examples of how to create custom rules. Before we go there though I want to break down the anatomy of a rule that currently exists. I think this helps level set how a rule comes together. Once we understand its parts it is easier to create our own, and then the power is really unleashed.

Using a rule

There are many places where a business rule can be created, I will take just one example to work through. 

Here we are first, clicking on the default device. Then clicking on the "edit rule" link. This then brings up the "create rule" dialogue with a list of rules (both conditions and actions) we can configure to run. Again, there are a number of places you can access the "create rule" dialogue, this is just one example. For this post, we will be focusing on the "When query string matches value" rule. 

In the "edit rule" area you will notice I have selected it and set a value of "my test". You will notice in the choose condition area the word "value" is underlined. This means that field will be replaced with a value (in this case a string) and the condition will execute based on that value. 

Where is the rule defined in Sitecore

To start understanding how this rule works we need to dig into how it is set up in Sitecore. To find the above rule we navigate to  /sitecore/system/Settings/Rules/Definitions.

In this section is where all the configuration for rules are. If we open "Elements" and then "Device Detection" you will see a conditional rule called "Query string".

In the "Text" field you can see the sentence we saw before when we set up the rule to use. This time though the "value" area has some special syntax around it.

Then in the "Type" field the assembly and class that process this rule is called out.

We know this rule is a conditional rule via two methods. 1) If you look at the "template" field in the top it says it is using the "condition" template. Also, all conditional rules have a diamond icon. Actions will have a rectangle icon.

How are they categorized

If you move up the tree just a little you will notice there is an "ElementGroup" node. Under this node is all the groups we can organize our rules into. You can, of course, create a new grouping. Below you will see the rule we have been working with was configured to be in the "Device" group (bottom image). This, in turn, means when you open up the "Create rule" dialogue the rule shows up grouped under "Device".


So now we have seen how these show up in the rules editor based on how they are grouped. But how do we get the grouping we want to show up? This comes down to what you specify in the item template. Below the field "Rule" has a source defined as the Rule Group you want to have show up in the editor. 

With the rule source now in place the editor will open up and contain any rules that are part of that rule group. So let's look at the rule groups a bit more now. 

This all comes down to what the rule group and the rule is tagged to. You point to the rule field to a rule group. The rule group is linked to certain tags. Those tags are used to find all the rule elements that also have the same tags. 

In the image below you can see the tags configured for the group on the top left. Then each rule elements configured tags. If you remember from the first screenshot the rules that show up there. Here is a quick list of them (I left devices off because there is a long list and it is muddy up a little because of secondary tag groups).

Predefined Rules
- where predefined rule is true

Context
- where the current database name compares to value
- where the current device compares to value
- where the current web site name compares to value

Hopefully that helps breakdown and explain some of the organizational and anatomy aspects of Sitecore Business Rules. 

Comments

Popular posts from this blog

Excel XIRR and C#

I have spend that last couple days trying to figure out how to run and Excel XIRR function in a C# application. This process has been more painful that I thought it would have been when started. To save others (or myself the pain in the future if I have to do it again) I thought I would right a post about this (as post about XIRR in C# have been hard to come by). Lets start with the easy part first. In order to make this call you need to use the Microsoft.Office.Interop.Excel dll. When you use this dll take note of what version of the dll you are using. If you are using a version less then 12 (at the time of this writing 12 was the highest version) you will not have an XIRR function call. This does not mean you cannot still do XIRR though. As of version 12 (a.k.a Office 2007) the XIRR function is a built in function to Excel. Prior version need an add-in to use this function. Even if you have version 12 of the interop though it does not mean you will be able to use the function. The

Experience Profile Anonymous, Unknown and Known contacts

When you first get started with Sitecore's experience profile the reporting for contacts can cause a little confusion. There are 3 terms that are thrown around, 1) Anonymous 2) Unknown 3) Known. When you read the docs they can bleed into each other a little. First, have a read through the Sitecore tracking documentation to get a feel for what Sitecore is trying to do. There are a couple key things here to first understand: Unless you call " IdentifyAs() " for request the contact is always anonymous.  Tracking of anonymous contacts is off by default.  Even if you call "IdentifyAs()" if you don't set facet values for the contact (like first name and email) the contact will still show up in your experience profile as "unknown" (because it has no facet data to display).  Enabled Anonymous contacts Notice in the picture I have two contacts marked in a red box. Those are my "known" contacts that I called "IdentifyAs"

Uniting Testing Expression Predicate with Moq

I recently was setting up a repository in a project with an interface on all repositories that took a predicate. As part of this I needed to mock out this call so I could unit test my code. The vast majority of samples out there for mocking an expression predicate just is It.IsAny<> which is not very helpful as it does not test anything other then verify it got a predicate. What if you actually want to test that you got a certain predicate though? It is actually pretty easy to do but not very straight forward. Here is what you do for the It.IsAny<> approach in case someone is looking for that. this .bindingRepository.Setup(c => c.Get(It.IsAny<Expression<Func<UserBinding, bool >>>())) .Returns( new List<UserBinding>() { defaultBinding }.AsQueryable()); This example just says to always return a collection of UserBindings that contain “defaultBinding” (which is an object I setup previously). Here is what it looks like when you want to pass in an exp

Password Management

The need to create, store and manage passwords is a huge responsibility in modern day life. So why is it that so many people do it so poorly? This is a loaded questions with answers ranging from people being uneducated, to lazy, to educated but not affective in their methods and many more. This blog is to help those (in some way even myself) around me strengthen their online security. Why does it matter? To answer this let's look at a few numbers. According to the US Department of Justice (DOJ)’s most recent study , 17.6 million people in the US experience some form of identity theft each year. Ok fine but that is identity theft that has nothing to do with password management. What is one way someone can start getting information about who you are? How do they get access to steal your money? From Cyber Security Ventures 2019 report : "Cybersecurity Ventures predicts that healthcare will suffer 2-3X more cyberattacks in 2019 than the average amount for other industries. W

Security Config in IIS Express

I have gotten tired of always having to look this up or remember where it is at. That means it is time to post to my blog so I can find it easier and hopefully others can too. If you are having issues with IIS Express authentication errors (like the Unauthorized 401.2 error I always get) here is some help. I can never remember what the last setting was I had IIS Express set to for authorization. To change IIS Express for windows auth or anonymous auth you want to work with the applicationhost.config file. It can be found here …Documents\IISExpress\config. You want to change the settings in the following area of the config file. < authentication > < anonymousAuthentication enabled ="true" userName ="" /> < basicAuthentication enabled ="false" /> < clientCertificateMappingAuthentication enabled ="false" /> < digestAuthentication enabled ="false" />