search
HomeDatabaseOracleDetailed introduction to the setting process of foreign keys in Oracle

Oracle database is a very popular relational database management system (RDBMS) with powerful features, including support for foreign keys.

Foreign key refers to a field or a group of fields used in one table to relate to a row in another table. It can be used to ensure data integrity and enable query-based data access. Before adding foreign key constraints, the necessary tables and associations between tables must be established in Oracle. In this article, we will introduce in detail the setting process of foreign keys in Oracle.

1. Create tables and relationships
First, we need to create the table that needs to set foreign key constraints and the table pointing to the table. Suppose we want to relate the customers table to the orders table. We can create these two tables in Oracle using the following code:

CREATE TABLE customers (
  customer_id INT PRIMARY KEY,
  customer_name VARCHAR(50),
  customer_email VARCHAR(100)
);

CREATE TABLE orders (
  order_id INT PRIMARY KEY,
  order_date DATE,
  customer_id INT,
  FOREIGN KEY (customer_id)
  REFERENCES customers(customer_id)
);

In the above example, we have created two tables, customers and orders. The order table contains the customer_id field corresponding to the customer, which is the primary key field of the customers table.

2. Add foreign key constraints
After establishing the relationship, we can add foreign key constraints. Foreign key constraints in Oracle can be defined when the table is created or added after the table is created.

In the previous step, we have defined foreign key constraints and added them to the table through FOREIGN KEY and REFERENCES statements. Here, we will explain the meaning of each keyword in detail:

  1. FOREIGN KEY: Defines a foreign key field.
  2. REFERENCES: Defines a target table for foreign keys and specifies the primary key of the target table.
  3. ON DELETE CASCADE: Define the cascade operation when deleting parent table records. When a record in the parent table is deleted, the related records in the child table are also deleted. You can use ON DELETE SET NULL or ON DELETE NO ACTION to specify other operations, such as setting the foreign key to NULL or prohibiting deletion.

In Oracle, the syntax for adding foreign key constraints is as follows:

ALTER TABLE child_table 
ADD CONSTRAINT fk_name 
FOREIGN KEY (child_column) 
REFERENCES parent_table (parent_column);

Among them, child_table is the child table containing the foreign key field, child_column is the name of the foreign key column, and parent_table is The name of the target table, parent_column is the name of the primary key column in the target table. fk_name is the name of the foreign key constraint and must be unique.

For example, in our orders table, we can add the following foreign key constraint (note, this can be done at table creation time via the CREATE TABLE statement):

ALTER TABLE orders 
ADD CONSTRAINT fk_customer_id 
FOREIGN KEY (customer_id) 
REFERENCES customers(customer_id) 
ON DELETE CASCADE;

This will be in the orders table Add a foreign key constraint named fk_customer_id to orders, which refers to the primary key column customer_id in the customers table. When you delete a row in the customers table, the operation also deletes all orders associated with it.

3. Test foreign key constraints
Once the foreign key constraint is added to the table, we can test whether it is working properly. We can test this constraint by inserting a row in the orders table that does not match the customer_id value:

INSERT INTO orders (order_id, order_date, customer_id)
VALUES (1, '2021-01-01', 100);

-- ERROR: ORA-02291: integrity constraint (fk_customer_id) violated - parent key not found

This will cause an error because it references a customer_id value that does not exist in the customers table. We can use the integrity constraint-related error code ORA-02291 to verify that the foreign key is working.

4. Summary
In Oracle, foreign keys are an important tool to ensure data integrity and maintain relationships between tables. We can use the FOREIGN KEY and REFERENCES keywords to define foreign key constraints and define cascade operations using ON DELETE CASCADE, SET NULL or NO ACTION. After defining the foreign key constraint, we can test whether it is working properly and ensure that it functions in database operations.

The above is the detailed content of Detailed introduction to the setting process of foreign keys in Oracle. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How do I use cursors in PL/SQL to process multiple rows of data?How do I use cursors in PL/SQL to process multiple rows of data?Mar 13, 2025 pm 01:16 PM

This article explains PL/SQL cursors for row-by-row data processing. It details cursor declaration, opening, fetching, and closing, comparing implicit, explicit, and ref cursors. Techniques for efficient large dataset handling and using FOR loops

How do I create users and roles in Oracle?How do I create users and roles in Oracle?Mar 17, 2025 pm 06:41 PM

The article explains how to create users and roles in Oracle using SQL commands, and discusses best practices for managing user permissions, including using roles, following the principle of least privilege, and regular audits.

How do I use Oracle Data Masking and Subsetting to protect sensitive data?How do I use Oracle Data Masking and Subsetting to protect sensitive data?Mar 13, 2025 pm 01:19 PM

This article details Oracle Data Masking and Subsetting (DMS), a solution for protecting sensitive data. It covers identifying sensitive data, defining masking rules (shuffling, substitution, randomization), setting up jobs, monitoring, and deployme

How do I perform online backups in Oracle with minimal downtime?How do I perform online backups in Oracle with minimal downtime?Mar 17, 2025 pm 06:39 PM

The article discusses methods for performing online backups in Oracle with minimal downtime using RMAN, best practices for reducing downtime, ensuring data consistency, and monitoring backup progress.

How do I configure encryption in Oracle using Transparent Data Encryption (TDE)?How do I configure encryption in Oracle using Transparent Data Encryption (TDE)?Mar 17, 2025 pm 06:43 PM

The article outlines steps to configure Transparent Data Encryption (TDE) in Oracle, detailing wallet creation, enabling TDE, and data encryption at various levels. It also discusses TDE's benefits like data protection and compliance, and how to veri

How do I use Automatic Workload Repository (AWR) and Automatic Database Diagnostic Monitor (ADDM) in Oracle?How do I use Automatic Workload Repository (AWR) and Automatic Database Diagnostic Monitor (ADDM) in Oracle?Mar 17, 2025 pm 06:44 PM

The article explains how to use Oracle's AWR and ADDM for database performance optimization. It details generating and analyzing AWR reports, and using ADDM to identify and resolve performance bottlenecks.

How do I use flashback technology to recover from logical data corruption?How do I use flashback technology to recover from logical data corruption?Mar 14, 2025 pm 05:43 PM

Article discusses using Oracle's flashback technology to recover from logical data corruption, detailing steps for implementation and ensuring data integrity post-recovery.

How do I implement security policies in Oracle Database using Virtual Private Database (VPD)?How do I implement security policies in Oracle Database using Virtual Private Database (VPD)?Mar 13, 2025 pm 01:18 PM

This article details implementing Oracle database security policies using Virtual Private Databases (VPD). It explains creating and managing VPD policies via functions that filter data based on user context, highlighting best practices like least p

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Atom editor mac version download

Atom editor mac version download

The most popular open source editor