Skip to content

Commit 31e5c89

Browse files
Clare Zheng (Shanghai Wicresoft Co Ltd)Clare Zheng (Shanghai Wicresoft Co Ltd)
authored andcommitted
Update content
1 parent 06873a3 commit 31e5c89

File tree

2 files changed

+30
-30
lines changed

2 files changed

+30
-30
lines changed

articles/data-factory/connector-oracle.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -507,7 +507,7 @@ When you copy data from and to Oracle, the following interim data type mappings
507507
| LONG RAW |Byte[] |Byte[] |
508508
| NCHAR |String |String |
509509
| NCLOB |String |String |
510-
| NUMBER (p,s) |Int16, Int32, Int64, Single, Double, Decimal (the largest precision is 256 and the largest scale is 130) |Decimal, String (if p > 28) |
510+
| NUMBER (p,s) |Int16, Int32, Int64, Single, Double, Decimal (p <= 256,s <= 130) |Decimal, String (if p > 28) |
511511
| NUMBER without precision and scale | Decimal |Double |
512512
| NVARCHAR2 |String |String |
513513
| RAW |Byte[] |Byte[] |

articles/data-factory/connector-troubleshoot-oracle.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -88,51 +88,51 @@ There are three error messages associated with this error code. Check the cause
8888

8989
### Error message: ORA-12650: No common encryption or data integrity algorithm
9090

91-
**Symptoms**: You meet the following error message: `ORA-12650: No common encryption or data integrity algorithm`
91+
- **Symptoms**: You meet the following error message: `ORA-12650: No common encryption or data integrity algorithm`
9292

93-
**Cause**: The client and server failed to agree on a common encryption/data integrity behavior or algorithm during negotiation. The default client-side configurations are as follows:
93+
- **Cause**: The client and server failed to agree on a common encryption/data integrity behavior or algorithm during negotiation. The default client-side configurations are as follows:
9494

95-
- `encryptionClient`: `required`
96-
- `encryptionTypesClient`: `(AES256)`
97-
- `cryptoChecksumClient`: `required`
98-
- `cryptoChecksumTypesClient`: `(SHA512)`
95+
- `encryptionClient`: `required`
96+
- `encryptionTypesClient`: `(AES256)`
97+
- `cryptoChecksumClient`: `required`
98+
- `cryptoChecksumTypesClient`: `(SHA512)`
9999

100-
**Recommendation**:
100+
- **Recommendation**:
101101

102-
1. Check the server-side configurations, including SQLNET.ENCRYPTION_SERVER and SQLNET.CRYPTO_CHECKSUM_SERVER. Update the linked service additional properties `encryptionClient` and `cryptoChecksumClient` on the client side if needed. Note that the actual behavior is determined by the negotiation outcome between the client and server configuration, as shown below.
103-
104-
| Client\Server | rejected | accepted | requested | required |
105-
|---------------|----------|----------|-----------|----------|
106-
| rejected | OFF | OFF | OFF | Connection fails |
107-
| accepted | OFF | OFF | ON | ON |
108-
| requested | OFF | ON | ON | ON |
109-
| required | Connection fails | ON | ON | ON |
110-
111-
1. Check the server-side configurations, including SQLNET.ENCRYPTION_TYPES_SERVER and SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER. Update the linked service additional properties `encryptionTypesClient` and `cryptoChecksumTypesClient` on the client side to ensure that a common algorithm can be found between them. You can set `encryptionTypesClient` to `(AES128, AES192, AES256, 3DES112, 3DES168)` and `cryptoChecksumTypesClient` to `(SHA1, SHA256, SHA384, SHA512)` to include all supported client-side algorithms.
102+
1. Check the server-side configurations, including SQLNET.ENCRYPTION_SERVER and SQLNET.CRYPTO_CHECKSUM_SERVER. Update the linked service additional properties `encryptionClient` and `cryptoChecksumClient` on the client side if needed. Note that the actual behavior is determined by the negotiation outcome between the client and server configuration, as shown below.
103+
104+
| Client\Server | rejected | accepted | requested | required |
105+
|---------------|----------|----------|-----------|----------|
106+
| rejected | OFF | OFF | OFF | Connection fails |
107+
| accepted | OFF | OFF | ON | ON |
108+
| requested | OFF | ON | ON | ON |
109+
| required | Connection fails | ON | ON | ON |
110+
111+
1. Check the server-side configurations, including SQLNET.ENCRYPTION_TYPES_SERVER and SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER. Update the linked service additional properties `encryptionTypesClient` and `cryptoChecksumTypesClient` on the client side to ensure that a common algorithm can be found between them. You can set `encryptionTypesClient` to `(AES128, AES192, AES256, 3DES112, 3DES168)` and `cryptoChecksumTypesClient` to `(SHA1, SHA256, SHA384, SHA512)` to include all supported client-side algorithms.
112112

113113

114114
### Decimal precision too large error
115115

116-
**Symptoms**: When copying NUMBER type columns from Oracle, the copy may fail or the data written to the sink cannot be further consumed by other tools because the decimal precision is too large.
116+
- **Symptoms**: When copying NUMBER type columns from Oracle, the copy may fail or the data written to the sink cannot be further consumed by other tools because the decimal precision is too large.
117117

118-
**Cause**: To avoid data loss, the decimal precision used to represent the Oracle NUMBER type is 256, which exceeds the max precision supported by the sink connector or downstream consumer.
118+
- **Cause**: To avoid data loss, the decimal precision used to represent the Oracle NUMBER type is 256, which exceeds the max precision supported by the sink connector or downstream consumer.
119119

120-
**Recommendation**:
120+
- **Recommendation**:
121121

122-
Resolve this issue by using one of the two methods provided below:
123-
124-
- Use a query to explicitly cast the column to BINARY_DOUBLE. For example:
125-
`SELECT CAST(ColA AS BINARY_DOUBLE) AS ColB FROM TableA.`
126-
127-
- Set the linked service additional property `supportV1DataTypes` to `true`, which ensures that version 2.0 uses the same data type mappings as version 1.0.
122+
Resolve this issue by using one of the two methods provided below:
123+
124+
- Use a query to explicitly cast the column to BINARY_DOUBLE. For example:
125+
`SELECT CAST(ColA AS BINARY_DOUBLE) AS ColB FROM TableA.`
126+
127+
- Set the linked service additional property `supportV1DataTypes` to `true`, which ensures that version 2.0 uses the same data type mappings as version 1.0.
128128

129129
### Error message: ORA-00933: SQL command not properly ended
130130

131-
**Symptoms**: You meet the following error message: `ORA-00933: SQL command not properly ended`
131+
- **Symptoms**: You meet the following error message: `ORA-00933: SQL command not properly ended`
132132

133-
**Cause**: Currently Oracle version 2.0 doesn’t support the query ended with a semicolon.
133+
- **Cause**: Currently Oracle version 2.0 doesn’t support the query ended with a semicolon.
134134

135-
**Recommendation**: Remove the semicolon at the end of the query.
135+
- **Recommendation**: Remove the semicolon at the end of the query.
136136

137137

138138
## Related content

0 commit comments

Comments
 (0)