This section describes how to use transparent data encryption on cluster systems such as high-availability systems, streaming replication, and database multiplexing.