Demoting a Samba Domain Controller

sign into the DC you want to become the new primary, DC2 in my case and execute fsmo transfer --role=all -U Administrator.

 1root@dc2:/var/log/samba# samba-tool fsmo transfer --role=all -U chris.kramins
 2This DC already has the 'rid' FSMO role
 3This DC already has the 'pdc' FSMO role
 4This DC already has the 'naming' FSMO role
 5This DC already has the 'infrastructure' FSMO role
 6This DC already has the 'schema' FSMO role
 7Password for [HOME\chris.kramins]:
 8FSMO transfer of 'domaindns' role successful
 9FSMO transfer of 'forestdns' role successful
10root@dc2:/var/log/samba#

Verifiy the fsmo records have been changed with samba-tool fsmo show and are pointing to your new Domain Controller CN=DC2 in my case.

1root@dc2:/var/log/samba# samba-tool fsmo show
2SchemaMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
3InfrastructureMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
4RidAllocationMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
5PdcEmulationMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
6DomainNamingMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
7DomainDnsZonesMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
8ForestDnsZonesMasterRole owner: CN=NTDS Settings,CN=DC2,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=home,DC=kramins,DC=ca
9root@dc2:/var/log/samba#

was getting error

1root@dc2:~# kinit [email protected] -V
2Using default cache: /tmp/krb5cc_0
3Using principal: [email protected]
4kinit: Cannot contact any KDC for realm 'HOME.KRAMINS.CA' while getting initial credentials

this was being caused by a TXT record _kerberos pointing to DC1. Updating this to DC2 fixed the issue.