This section describes how to use transparent data encryption on cluster systems such as streaming replication, and database multiplexing.