Adding fault tolerance to LDAP connectives (User federation)


We have following setup running in AWS ECS Fargates (Docker containers): Frontend ECS (UI), Backend ECS and Keycloak ECS providing login functionality: authentication to Azure AD and LDAP for getting some customer details that is not provided by Azure AD. Frontend uses Keycloak as well as Backend. The environment contains multiple AD instances (Domain Controllers). One of the AD instance, which was configured in the Keycloak’s realm setup, went to down causing of course serious issue until the AD came back to service. My question is: Is it possible to define multiple AD (LDAP) connections to one Keycloak configuration in order to have better fault tolerance if one of the AD (LDAP) goes down ? Or do we need to have multiple Keycloak instances per one AD (LDAP) ? Any best practices for this.