Hello,
I would like to add redundancy to my AD at home by adding secondary fail-over Domain Controllers.
Right now, my setup looks like this.
- DC: Primary Node with “Active Directory compatible Domain Controller”
- DCB: Backup Node with nothing on it yet.
To my knowledge, the Primary Node “DC” is the only instance, that should modify the domain database (See here)
Also, Backup Nodes (and Replica Nodes) are considered read-only, according to the link above.
Now to the question: Is it considered safe, when I also add the “Active Directory compatible Domain Controller” app to my Backup Node DCB, so I can use ad/ldap & kerberos against it?
First test indicate, that adding the “Active Directory compatible Domain Controller” app works and samba and kerberos too.
But to my surprise, I was able to change AD entries on by Backup Node DCB, which replicates to the Primary Node DC.
Even further: When the Primary Node is powered off, I can still change AD entries on my Backup Node DCB (isn’t that node supposed to be read-only?) and when powering the Primary Node back up, the changes were now also reflected on the Primary Node. And this even happens, when I power down the Backup Node DCB after I made changes, then boot up the Primary Node first and then again the Backup Node. So the Backup Node clearly is not ready-only here.
For me, the behavior is exactly how I would like my domain to work.
But I have the suspicion that:
- Either this is considered bad practice: Shouldn`t Backup Nodes should stay read-only? Should one rather use a Replication Node for the “Active Directory compatible Domain Controller” app instead?
- Or am I getting this “Backup Node” role wrong and the sync of data in the AD is an expected feature of the “Active Directory compatible Domain Controller” app and does not mess with the “Backup Node” role?
Can anyone elaborate a bit?