diff --git a/src/content/docs/ruleset-engine/rules-language/actions.mdx b/src/content/docs/ruleset-engine/rules-language/actions.mdx index f6b0065812428d2..88e5aeb2670a0e5 100644 --- a/src/content/docs/ruleset-engine/rules-language/actions.mdx +++ b/src/content/docs/ruleset-engine/rules-language/actions.mdx @@ -287,5 +287,5 @@ The available actions depend on the [phase](/ruleset-engine/about/phases/) where :::note -Cloudflare Firewall Rules, now deprecated, supports a different set of actions, including the *Allow* and *Bypass* actions. Refer to [Firewall rules actions](/firewall/cf-firewall-rules/actions/) for more information. +Cloudflare Firewall Rules, now deprecated, supports a different set of actions, including the *Allow* and *Bypass* actions. Refer to [Firewall rules actions](/firewall/cf-firewall-rules/actions/) for more information. ::: diff --git a/src/content/docs/ruleset-engine/rules-language/values.mdx b/src/content/docs/ruleset-engine/rules-language/values.mdx index 0678421224e9068..c53f30fcdf329a4 100644 --- a/src/content/docs/ruleset-engine/rules-language/values.mdx +++ b/src/content/docs/ruleset-engine/rules-language/values.mdx @@ -101,7 +101,7 @@ Cloudflare Business and Enterprise customer plans have access to the `matches` [ ### Regular expression limits -Cloudflare has a few limits in place regarding regular expressions. One of those limits is that each rule supports a maximum of 64 regular expressions (regexes), regardless of your domain's plan. +Cloudflare has a few limits in place regarding regular expressions. One of those limits is that each rule supports a maximum of 64 regular expressions (regexes), regardless of your domain's plan. You can use the following strategies to reduce the number of regular expressions in a rule: - Use the [`contains`](/ruleset-engine/rules-language/operators/#comparison-operators) operator.