might have a look into using the rpc might be some kind of program that lets you do it that way
No, it means that one node is doing verification and the other is just asking it to take certain actions. Might be useful, depending on OP use case.
As for the original attempt, it could be worse than simply encountering a lock, since locks are unreliable on network drives. Ignoring the worse search performance, there could be severe corruption if the protocol doesn't lock in a way that the DB layer recognizes, or doesn't lock to begin with.