Home Database Mysql Tutorial PLSQL Developer 不能连接 64位 Oracle 11g 的解决办法

PLSQL Developer 不能连接 64位 Oracle 11g 的解决办法

Jun 07, 2016 pm 04:08 PM
plsql

PLSQL Developer无法连接Oracle Server64bit分为两种情况。第一种情况是在Oracle Server 64bit的数据库服务器上安装PLSQL,第二种

前言:

PLSQL Developer无法连接Oracle Server64bit分为两种情况。第一种情况是在Oracle Server 64bit的数据库服务器上安装PLSQL,第二种情况是在另外的机器上安装PLSQL Developer连接Oracle Server 64bit数据库服务器。

错误症状:

Initialization error

SQL*Net not properly installed

OracleHomeKey:

OracleHomeDir:

原因:

  oracle client是64位的,而plsql是32位的,两者不兼容

第一种情况解决办法1:

  下载跟oracle服务器同版本的instantclient,然后配置PLSQL即可。在perference->Connection里面设置OCI Library和Oracle_Home,例如本机设置为:

Oracle Home : D:\app\oracle\product\11.2.0\instantclient_11_2

OCI Library :D:\app\oracle\product\11.2.0\instantclient_11_2\oci.dll

PLSQL Developer 不能连接 64位 Oracle 11g 的解决办法

像其他的navicat连接Oracle Server64bit也是需要现在这个instantclient,然后指定oci.dll。可以参考博客:Navicat Premium 连接 Oracle 数据库

注意:(2014-7-17)

如果使用上面的这种方法的话,那么PLSQL读取的配置文件也是instantclient_11_2目录下的配置文件,比如我的配置文件路径就是:

D:\app\oracle\product\11.2.0\instantclient_11_2\NETWORK\ADMIN

此时使用Oracle Server64bit自带的net configuration assistant以及net manager是没有用的。不过可以在net configuration assistant当中配置,然后将配置好的配置文件覆盖到\instantclient_11_2\目录下

比如我可以将D:\app\oracle\product\11.2.0\dbhome_1\NETWORK\ADMIN当中的三个配置文件(listener.ora、sqlnet.ora、tnsnames.ora)覆盖到D:\app\oracle\product\11.2.0\instantclient_11_2\NETWORK\ADMIN当中

第一种情况解决办法2:

  在安装Oracle Server64bit以后,再安装oracle_client_32bit,然后在配置上有一下注意点:

Oracle Server64bit配置监听器listener和数据库连接名testdb

oracle_client_32bit不要配置监听器,只配置数据库连接名testdb

然后安装plsql,连接testdb,正常连接。

第二种情况解决方法

  安装oracle_client_32bit,,创建数据库连接,安装plsql developer,这样就能够正常连接。

TNS_ADMIN的设定

这个环境变量是用来设定到底使用那个tns配置文件的。因为我们在一台机器上面安装Oracle Server64bit和oracle client 32bit,那么就会有两个tns的配置文件,两个配置文件放在一下目录:

D:\app\oracle\product\11.2.0\dbhome_1\NETWORK\ADMIN

D:\app\oracle\product\11.2.0\client_1\NETWORK\ADMIN

如果不设定TNS_ADMIN,那么默认使用client_1的tns

PLSQL Developer 不能连接 64位 Oracle 11g 的解决办法

如果设定环境TNS_ADMIN=D:\app\oracle\product\11.2.0\dbhome_1\NETWORK\ADMIN,那么上面的路径会发生改变。

Oracle 10g 安装后重启系统,用PLSQL连接报没有监听

ORA-03114 PLSQL过程编译断开连接错误

PLSQL 连接 Oracle简单配置

PLSQL批量Forall操作性能提升详解

使用Oracle SQLDeveloper连接数据库并创建用户

Oracle自带的PL/SQL Developer导入导出数据

在64位Win7系统下安装Oracle 11g和Oracle SQL Developer客户端

本文永久更新链接地址

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How do you alter a table in MySQL using the ALTER TABLE statement? How do you alter a table in MySQL using the ALTER TABLE statement? Mar 19, 2025 pm 03:51 PM

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

How do I configure SSL/TLS encryption for MySQL connections? How do I configure SSL/TLS encryption for MySQL connections? Mar 18, 2025 pm 12:01 PM

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

How do you handle large datasets in MySQL? How do you handle large datasets in MySQL? Mar 21, 2025 pm 12:15 PM

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? What are some popular MySQL GUI tools (e.g., MySQL Workbench, phpMyAdmin)? Mar 21, 2025 pm 06:28 PM

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

How do you drop a table in MySQL using the DROP TABLE statement? How do you drop a table in MySQL using the DROP TABLE statement? Mar 19, 2025 pm 03:52 PM

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

How do you represent relationships using foreign keys? How do you represent relationships using foreign keys? Mar 19, 2025 pm 03:48 PM

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

How do you create indexes on JSON columns? How do you create indexes on JSON columns? Mar 21, 2025 pm 12:13 PM

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? How do I secure MySQL against common vulnerabilities (SQL injection, brute-force attacks)? Mar 18, 2025 pm 12:00 PM

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)

See all articles