One example method includes, in response to a crash event, obtaining data protection system credentials, accessing a target storage of the data protection system, obtaining, from the target storage, a configuration file including configuration information for a data protection cluster, and using, by the data protection cluster, the configuration information to self-configure. The method further includes creating a consistency group (CG) of a group of volume, and restoring a journal volume to append backup indexes.