This section describes how to use transparent data encryption on cluster systems such as high-availability systems, streaming replication, C, and the Mirroring Controller option.