- SQL Server Reference Guide
- Introduction
- SQL Server Reference Guide Overview
- Table of Contents
- Microsoft SQL Server Defined
- SQL Server Editions
- SQL Server Access
- Informit Articles and Sample Chapters
- Online Resources
- Microsoft SQL Server Features
- SQL Server Books Online
- Clustering Services
- Data Transformation Services (DTS) Overview
- Replication Services
- Database Mirroring
- Natural Language Processing (NLP)
- Analysis Services
- Microsot SQL Server Reporting Services
- XML Overview
- Notification Services for the DBA
- Full-Text Search
- SQL Server 2005 - Service Broker
- Using SQL Server as a Web Service
- SQL Server Encryption Options Overview
- SQL Server 2008 Overview
- SQL Server 2008 R2 Overview
- SQL Azure
- The Utility Control Point and Data Application Component, Part 1
- The Utility Control Point and Data Application Component, Part 2
- Microsoft SQL Server Administration
- The DBA Survival Guide: The 10 Minute SQL Server Overview
- Preparing (or Tuning) a Windows System for SQL Server, Part 1
- Preparing (or Tuning) a Windows System for SQL Server, Part 2
- Installing SQL Server
- Upgrading SQL Server
- SQL Server 2000 Management Tools
- SQL Server 2005 Management Tools
- SQL Server 2008 Management Tools
- SQL Azure Tools
- Automating Tasks with SQL Server Agent
- Run Operating System Commands in SQL Agent using PowerShell
- Automating Tasks Without SQL Server Agent
- Storage – SQL Server I/O
- Service Packs, Hotfixes and Cumulative Upgrades
- Tracking SQL Server Information with Error and Event Logs
- Change Management
- SQL Server Metadata, Part One
- SQL Server Meta-Data, Part Two
- Monitoring - SQL Server 2005 Dynamic Views and Functions
- Monitoring - Performance Monitor
- Unattended Performance Monitoring for SQL Server
- Monitoring - User-Defined Performance Counters
- Monitoring: SQL Server Activity Monitor
- SQL Server Instances
- DBCC Commands
- SQL Server and Mail
- Database Maintenance Checklist
- The Maintenance Wizard: SQL Server 2000 and Earlier
- The Maintenance Wizard: SQL Server 2005 (SP2) and Later
- The Web Assistant Wizard
- Creating Web Pages from SQL Server
- SQL Server Security
- Securing the SQL Server Platform, Part 1
- Securing the SQL Server Platform, Part 2
- SQL Server Security: Users and other Principals
- SQL Server Security – Roles
- SQL Server Security: Objects (Securables)
- Security: Using the Command Line
- SQL Server Security - Encrypting Connections
- SQL Server Security: Encrypting Data
- SQL Server Security Audit
- High Availability - SQL Server Clustering
- SQL Server Configuration, Part 1
- SQL Server Configuration, Part 2
- Database Configuration Options
- 32- vs 64-bit Computing for SQL Server
- SQL Server and Memory
- Performance Tuning: Introduction to Indexes
- Statistical Indexes
- Backup and Recovery
- Backup and Recovery Examples, Part One
- Backup and Recovery Examples, Part Two: Transferring Databases to Another System (Even Without Backups)
- SQL Profiler - Reverse Engineering An Application
- SQL Trace
- SQL Server Alerts
- Files and Filegroups
- Partitioning
- Full-Text Indexes
- Read-Only Data
- SQL Server Locks
- Monitoring Locking and Deadlocking
- Controlling Locks in SQL Server
- SQL Server Policy-Based Management, Part One
- SQL Server Policy-Based Management, Part Two
- SQL Server Policy-Based Management, Part Three
- Microsoft SQL Server Programming
- An Outline for Development
- Database
- Database Services
- Database Objects: Databases
- Database Objects: Tables
- Database Objects: Table Relationships
- Database Objects: Keys
- Database Objects: Constraints
- Database Objects: Data Types
- Database Objects: Views
- Database Objects: Stored Procedures
- Database Objects: Indexes
- Database Objects: User Defined Functions
- Database Objects: Triggers
- Database Design: Requirements, Entities, and Attributes
- Business Process Model Notation (BPMN) and the Data Professional
- Business Questions for Database Design, Part One
- Business Questions for Database Design, Part Two
- Database Design: Finalizing Requirements and Defining Relationships
- Database Design: Creating an Entity Relationship Diagram
- Database Design: The Logical ERD
- Database Design: Adjusting The Model
- Database Design: Normalizing the Model
- Creating The Physical Model
- Database Design: Changing Attributes to Columns
- Database Design: Creating The Physical Database
- Database Design Example: Curriculum Vitae
- NULLs
- The SQL Server Sample Databases
- The SQL Server Sample Databases: pubs
- The SQL Server Sample Databases: NorthWind
- The SQL Server Sample Databases: AdventureWorks
- The SQL Server Sample Databases: Adventureworks Derivatives
- UniversalDB: The Demo and Testing Database, Part 1
- UniversalDB: The Demo and Testing Database, Part 2
- UniversalDB: The Demo and Testing Database, Part 3
- UniversalDB: The Demo and Testing Database, Part 4
- Getting Started with Transact-SQL
- Transact-SQL: Data Definition Language (DDL) Basics
- Transact-SQL: Limiting Results
- Transact-SQL: More Operators
- Transact-SQL: Ordering and Aggregating Data
- Transact-SQL: Subqueries
- Transact-SQL: Joins
- Transact-SQL: Complex Joins - Building a View with Multiple JOINs
- Transact-SQL: Inserts, Updates, and Deletes
- An Introduction to the CLR in SQL Server 2005
- Design Elements Part 1: Programming Flow Overview, Code Format and Commenting your Code
- Design Elements Part 2: Controlling SQL's Scope
- Design Elements Part 3: Error Handling
- Design Elements Part 4: Variables
- Design Elements Part 5: Where Does The Code Live?
- Design Elements Part 6: Math Operators and Functions
- Design Elements Part 7: Statistical Functions
- Design Elements Part 8: Summarization Statistical Algorithms
- Design Elements Part 9:Representing Data with Statistical Algorithms
- Design Elements Part 10: Interpreting the Data—Regression
- Design Elements Part 11: String Manipulation
- Design Elements Part 12: Loops
- Design Elements Part 13: Recursion
- Design Elements Part 14: Arrays
- Design Elements Part 15: Event-Driven Programming Vs. Scheduled Processes
- Design Elements Part 16: Event-Driven Programming
- Design Elements Part 17: Program Flow
- Forming Queries Part 1: Design
- Forming Queries Part 2: Query Basics
- Forming Queries Part 3: Query Optimization
- Forming Queries Part 4: SET Options
- Forming Queries Part 5: Table Optimization Hints
- Using SQL Server Templates
- Transact-SQL Unit Testing
- Index Tuning Wizard
- Unicode and SQL Server
- SQL Server Development Tools
- The SQL Server Transact-SQL Debugger
- The Transact-SQL Debugger, Part 2
- Basic Troubleshooting for Transact-SQL Code
- An Introduction to Spatial Data in SQL Server 2008
- Performance Tuning
- Performance Tuning SQL Server: Tools and Processes
- Performance Tuning SQL Server: Tools Overview
- Creating a Performance Tuning Audit - Defining Components
- Creating a Performance Tuning Audit - Evaluation Part One
- Creating a Performance Tuning Audit - Evaluation Part Two
- Creating a Performance Tuning Audit - Interpretation
- Creating a Performance Tuning Audit - Developing an Action Plan
- Understanding SQL Server Query Plans
- Performance Tuning: Implementing Indexes
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 1
- Performance Monitoring Tools: Windows 2008 (and Higher) Server Utilities, Part 2
- Performance Monitoring Tools: Windows System Monitor
- Performance Monitoring Tools: Logging with System Monitor
- Performance Monitoring Tools: User Defined Counters
- General Transact-SQL (T-SQL) Performance Tuning, Part 1
- General Transact-SQL (T-SQL) Performance Tuning, Part 2
- General Transact-SQL (T-SQL) Performance Tuning, Part 3
- Performance Monitoring Tools: An Introduction to SQL Profiler
- Performance Tuning: Introduction to Indexes
- Performance Monitoring Tools: SQL Server 2000 Index Tuning Wizard
- Performance Monitoring Tools: SQL Server 2005 Database Tuning Advisor
- Performance Monitoring Tools: SQL Server Management Studio Reports
- Performance Monitoring Tools: SQL Server 2008 Activity Monitor
- The SQL Server 2008 Management Data Warehouse and Data Collector
- Performance Monitoring Tools: Evaluating Wait States with PowerShell and Excel
- Practical Applications
- Choosing the Back End
- The DBA's Toolbox, Part 1
- The DBA's Toolbox, Part 2
- Scripting Solutions for SQL Server
- Building a SQL Server Lab
- Using Graphics Files with SQL Server
- Enterprise Resource Planning
- Customer Relationship Management (CRM)
- Building a Reporting Data Server
- Building a Database Documenter, Part 1
- Building a Database Documenter, Part 2
- Data Management Objects
- Data Management Objects: The Server Object
- Data Management Objects: Server Object Methods
- Data Management Objects: Collections and the Database Object
- Data Management Objects: Database Information
- Data Management Objects: Database Control
- Data Management Objects: Database Maintenance
- Data Management Objects: Logging the Process
- Data Management Objects: Running SQL Statements
- Data Management Objects: Multiple Row Returns
- Data Management Objects: Other Database Objects
- Data Management Objects: Security
- Data Management Objects: Scripting
- Powershell and SQL Server - Overview
- PowerShell and SQL Server - Objects and Providers
- Powershell and SQL Server - A Script Framework
- Powershell and SQL Server - Logging the Process
- Powershell and SQL Server - Reading a Control File
- Powershell and SQL Server - SQL Server Access
- Powershell and SQL Server - Web Pages from a SQL Query
- Powershell and SQL Server - Scrubbing the Event Logs
- SQL Server 2008 PowerShell Provider
- SQL Server I/O: Importing and Exporting Data
- SQL Server I/O: XML in Database Terms
- SQL Server I/O: Creating XML Output
- SQL Server I/O: Reading XML Documents
- SQL Server I/O: Using XML Control Mechanisms
- SQL Server I/O: Creating Hierarchies
- SQL Server I/O: Using HTTP with SQL Server XML
- SQL Server I/O: Using HTTP with SQL Server XML Templates
- SQL Server I/O: Remote Queries
- SQL Server I/O: Working with Text Files
- Using Microsoft SQL Server on Handheld Devices
- Front-Ends 101: Microsoft Access
- Comparing Two SQL Server Databases
- English Query - Part 1
- English Query - Part 2
- English Query - Part 3
- English Query - Part 4
- English Query - Part 5
- RSS Feeds from SQL Server
- Using SQL Server Agent to Monitor Backups
- Reporting Services - Creating a Maintenance Report
- SQL Server Chargeback Strategies, Part 1
- SQL Server Chargeback Strategies, Part 2
- SQL Server Replication Example
- Creating a Master Agent and Alert Server
- The SQL Server Central Management System: Definition
- The SQL Server Central Management System: Base Tables
- The SQL Server Central Management System: Execution of Server Information (Part 1)
- The SQL Server Central Management System: Execution of Server Information (Part 2)
- The SQL Server Central Management System: Collecting Performance Metrics
- The SQL Server Central Management System: Centralizing Agent Jobs, Events and Scripts
- The SQL Server Central Management System: Reporting the Data and Project Summary
- Time Tracking for SQL Server Operations
- Migrating Departmental Data Stores to SQL Server
- Migrating Departmental Data Stores to SQL Server: Model the System
- Migrating Departmental Data Stores to SQL Server: Model the System, Continued
- Migrating Departmental Data Stores to SQL Server: Decide on the Destination
- Migrating Departmental Data Stores to SQL Server: Design the ETL
- Migrating Departmental Data Stores to SQL Server: Design the ETL, Continued
- Migrating Departmental Data Stores to SQL Server: Attach the Front End, Test, and Monitor
- Tracking SQL Server Timed Events, Part 1
- Tracking SQL Server Timed Events, Part 2
- Patterns and Practices for the Data Professional
- Managing Vendor Databases
- Consolidation Options
- Connecting to a SQL Azure Database from Microsoft Access
- SharePoint 2007 and SQL Server, Part One
- SharePoint 2007 and SQL Server, Part Two
- SharePoint 2007 and SQL Server, Part Three
- Querying Multiple Data Sources from a Single Location (Distributed Queries)
- Importing and Exporting Data for SQL Azure
- Working on Distributed Teams
- Professional Development
- Becoming a DBA
- Certification
- DBA Levels
- Becoming a Data Professional
- SQL Server Professional Development Plan, Part 1
- SQL Server Professional Development Plan, Part 2
- SQL Server Professional Development Plan, Part 3
- Evaluating Technical Options
- System Sizing
- Creating a Disaster Recovery Plan
- Anatomy of a Disaster (Response Plan)
- Database Troubleshooting
- Conducting an Effective Code Review
- Developing an Exit Strategy
- Data Retention Strategy
- Keeping Your DBA/Developer Job in Troubled Times
- The SQL Server Runbook
- Creating and Maintaining a SQL Server Configuration History, Part 1
- Creating and Maintaining a SQL Server Configuration History, Part 2
- Creating an Application Profile, Part 1
- Creating an Application Profile, Part 2
- How to Attend a Technical Conference
- Tips for Maximizing Your IT Budget This Year
- The Importance of Blue-Sky Planning
- Application Architecture Assessments
- Transact-SQL Code Reviews, Part One
- Transact-SQL Code Reviews, Part Two
- Cloud Computing (Distributed Computing) Paradigms
- NoSQL for the SQL Server Professional, Part One
- NoSQL for the SQL Server Professional, Part Two
- Object-Role Modeling (ORM) for the Database Professional
- Business Intelligence
- BI Explained
- Developing a Data Dictionary
- BI Security
- Gathering BI Requirements
- Source System Extracts and Transforms
- ETL Mechanisms
- Business Intelligence Landscapes
- Business Intelligence Layouts and the Build or Buy Decision
- A Single Version of the Truth
- The Operational Data Store (ODS)
- Data Marts – Combining and Transforming Data
- Designing Data Elements
- The Enterprise Data Warehouse — Aggregations and the Star Schema
- On-Line Analytical Processing (OLAP)
- Data Mining
- Key Performance Indicators
- BI Presentation - Client Tools
- BI Presentation - Portals
- Implementing ETL - Introduction to SQL Server 2005 Integration Services
- Building a Business Intelligence Solution, Part 1
- Building a Business Intelligence Solution, Part 2
- Building a Business Intelligence Solution, Part 3
- Tips and Troubleshooting
- SQL Server and Microsoft Excel Integration
- Tips for the SQL Server Tools: SQL Server 2000
- Tips for the SQL Server Tools – SQL Server 2005
- Transaction Log Troubles
- SQL Server Connection Problems
- Orphaned Database Users
- Additional Resources
- Tools and Downloads
- Utilities (Free)
- Tool Review (Free): DBDesignerFork
- Aqua Data Studio
- Microsoft SQL Server Best Practices Analyzer
- Utilities (Cost)
- Quest Software's TOAD for SQL Server
- Quest Software's Spotlight on SQL Server
- SQL Server on Microsoft's Virtual PC
- Red Gate SQL Bundle
- Microsoft's Visio for Database Folks
- Quest Capacity Manager
- SQL Server Help
- Visual Studio Team Edition for Database Professionals
- Microsoft Assessment and Planning Solution Accelerator
- Aggregating Server Data from the MAPS Tool
We've been covering quite a bit of ground on database objects, so far, and we'll continue that discussion in this tutorial. We've learned about databases, tables, and table relationships. Along the way, I've briefly mentioned the concepts of keys, but I waited until now to discuss them in depth.
There are two types of keys: Primary and foreign. Both of them can be created when you create the table or after the fact, as long as you don't violate any of the rules I'll show you as we go along.
Let's start at the beginning and talk about primary keys.
The concept of a primary key is pretty simple. It's a value or set of values that makes a particular row (or record) in a table unique. A primary key forces something called entity integrity in a table. That means that no duplicate entries are allowed in a database, something I'll cover again later when we talk about table normalization.
The primary key of a table has to be unique, and it also can't be null. Recall from my last tirade about the value null that many people think "null" contains a blank value, or zero. In fact, the null value is a placeholder; it means that the value isn't known yet. As such, you can see that a null value may or may not make a record unique, since the value isn't known.
A primary key can be made up of several columns. Sometimes one column alone doesn't make a row unique. Perhaps an order contains the same item as another, the same amount, and is even sold on the same date. What makes a particular record in that table unique is a sequence number, along with the other information. This type of primary key is called a composite key, because it's made up of several columns.
When you select your primary key, you look at all the information in a record and decide what makes each one unique. What we're talking about here are key candidates columns that are potentially useful as a primary key. Among the guidelines for picking the primary key: look for columns that contain a unique value and aren't null. They are called "highly selectable" and are primary key candidates.
Another important consideration regarding primary keys are that they should never change. We'll see why in a moment.
Using this information, let's return to the authors table from the pubs database in SQL Server. Here's a record from that table:
Authors
au_id |
au_lname |
au_fname |
phone |
address |
city |
state |
zip |
contract |
172-32-1176 |
White |
Johnson |
408 496-7223 |
10932 Bigge Rd. |
Menlo Park |
CA |
94025 |
1 |
Let's take these columns one at a time, and see which ones are candidates for the primary key.
The first column is au_id. You'll notice it looks suspiciously similar to a US Social Security number. At first blush, that seems a good choice, since Social Security numbers are supposed to be unique right? Wrong! Social Security numbers have been known to be re-used, and even worse, not everyone has a US Social Security number! In addition, what if you hire a writer from the UK, or from Africa? They certainly won't have a US Social Security number. This column would fall under the category of bad choice number 1.
The next columns are the first and last names; we all know those aren't always unique, regardless of the country. These columns are bad choice numbers 2 and 3.
How about Phone, Address, City, State or Zip? Again, these are bad choices, since they might be duplicated or non-existent.
There's an interesting column there at the end that looks promising it's the contract number. There should only be one contract per book, right? Perfect! But wait, it seems that the accounting department tells us that the contract is by work, not by person. Sometimes many people are signed to one effort.
By the way, Microsoft uses the au_id column, and gets away with it by saying that it's not a Social Security number, it's a generated number (right).
Sometimes there just aren't any columns that meet the requirements for a primary key. There are also some pretty good arguments that you shouldn't use a composite key, because the query optimizer engine has to work harder to track the keys. What you do in this situation is to make a new column, and use that for the key. This column can be auto-numbered (using the identity type) and is never shown to the users. This is sometimes called an artificial key, which has no meaning outside of identifying the record. The only thing to be careful about here is the design of the number, to allow for growth and uniqueness in the future.
Now that you've discovered how to select a primary key, how do you create one? That part is pretty simple. You can create the primary key when you create the table or even after, assuming that the data in the table doesn't violate the key. For instance, if you have an existing table, and it has a column you wish to use for the primary key, that column can't have null or duplicate values.
You can create the keys by using Enterprise Manager or with T-SQL code. To use Enterprise manager, open the database in question, navigate to the table object, then right-click the table name and select "Design Table" from the menu that appears. Once the design tool is open, just select the column(s) and click the key icon. Voila!
To create the key via code, just include the following syntax on the CREATE TABLE command:
CREATE TABLE test ( columnname smallint IDENTITY(1,1) PRIMARY KEY )
If the table already exists, you can use the ALTER TABLE command with the following syntax:
ALTER TABLE tablename ADD newkeycolmun IDENTITY(1,1) CONSTRAINT PRIMARY KEY
As you can see, primary keys are pretty simple to implement, and at first glance don't appear to be that big a deal right? Au-contraire! Primary keys are vital to entity integrity, by guaranteeing that no one can enter duplicate data into the table. They also serve as the reference anchor to the foreign keys, as we'll see.
Foreign keys are just as important and as simple to implement as primary keys. Foreign keys are simply a column you add in one table that points to the primary key column in another. It contains exactly the same value in that columns' field as the "parent" table. Here's a simple example:
Table Clients:
ClientID |
Fname |
Lname |
1 |
Buck |
Woody |
2 |
Eric |
Keenan |
Table Orders:
OrderID |
ClientID |
Amount |
100 |
2 |
25.00 |
101 |
1 |
10.00 |
102 |
2 |
15.00 |
103 |
2 |
10.00 |
In the example shown above, the Clients table has a primary key of ClientID. The Orders table has a primary key of OrderID. I want to make sure that all orders have a client associated with them.
To do that, I created a ClientID column in the Orders table and made it a foreign key to the ClientID in the Clients table. By making the foreign key on the "child" table, SQL Server will prevent anyone from entering an order unless there is a corresponding ClientID in the "parent" table.
While primary keys enforce entity integrity as I explained earlier, foreign keys are used to enforce referential integrity. Referential integrity guarantees that references from one table to another are enforced by the database, and not left up to the developer or user.
Foreign keys can point in many directions. They often point in stair-stepping fashion (one table pointing to another), circular (two tables with primary and foreign keys pointing at each other), and even self-referencing (a foreign key in a table point to its own primary key). We'll see many of these types in our database design discussions.
You'll notice that, unlike the primary key, the foreign key has repeating values and that's OK. If you think about it, you'll see that the foreign keys are the "many" side of those one-to-many relationships I mentioned in an earlier article.
One fact that's important to mention here is that you're not allowed to "orphan" entries that are defined as foreign keys. What that means is that in the example I mentioned earlier, you can't delete Buck or Eric's entries from the Clients table as long as there are foreign keys pointing to it in the Orders table. If those foreign key entries exist, SQL requires you to delete the child entries first. The same applies if you try to modify the ClientID values in the Clients.
Of course, primary keys aren't supposed to change, but it happens. If so, you'll need to alter the values of the children first and then change the values in the parent table.
To deal with all this, Microsoft SQL Server 2000 supports cascading referential integrity and we'll see more of that as we go along.
So how do you create foreign keys? Once again, you can use the Enterprise Manager tool or T-SQL commands.
To create the foreign keys using Enterprise Manager, open the database in question, navigate to the table object, then right-click the table name. Select Design Table from the menu that appears. Once the design tool is open, click the Relationships icon (it looks like three tables with lines between them). Once the properties appear, click the New button.
You'll get a selection for the tables you want to relate, and from there you can select the columns to relate.
If you want to make the changes using T-SQL code, here's the way I did it for the example above:
ALTER TABLE Orders ADD CONSTRAINT FK_Orders_Clients FOREIGN KEY ( ClientID ) REFERENCES Clients ( ClientID ) ON UPDATE CASCADE ON DELETE CASCADE
Did you catch that first line? What we've been discussing in this entire article are constraints and when you think of the meaning of that word, that makes sense. If you want to ensure that you only enter "good" data, you need to constrain your entries into a certain domain of data.
Primary and foreign keys are just the first set of constraints you'll have at your disposal to make your users behave. Well, during the data entry, anyway!
We've scratched the surface of keys but don't worry, we'll see them again in our database design tutorial.