Chapter 5. WAN Slave Architectures
In the previous chapter, we learned how to play with slave replications. You now know how it works and want to know how we could grow and geographically extend them to several regions.
You will encounter several issues in the following areas:
- The architecture of replications
- The security
- The bandwidth
We'll cover all these topics to help you understand the pros and cons of setting a lot of replications. We will see different use cases and associated solutions.