This section describes how to use transparent data encryption on cluster systems, such as high-availability systems and systems that use streaming replication.