Limited Time Deal – $99 Custom AMD Servers

Answered by the Webhosting Experts
Tags +

How to Setup Wasabi Cloud Storage

Setting Up Wasabi Cloud Storage

  1. First, go to and log in.
  2. When you log in to Wasabi the interface will look like the screenshot below. Although you have many options, the 1st thing you have to do is create a bucket to use the storage.
    Screenshot of the Wasabi control panel showing no buckets have been created yet
  3. During creation you have to name your Bucket and Select a Region.
    Screenshot of the Bucket Naming screen highlighting the available region choices

    1. The bucket has to be unique to avoid errors, so enter a unique name in the Bucket Name field shown above.
    2. Select the closest region to the server that will be using it or ask the client via ticket if you are unsure.
      • us-west-1 – Oregon
      • ap-northeast-1 – Toykyo
      • ap-northeast-2 – Osaka
      • eu-central-1 – Amsterdam
      • eu-west-1 – London
      • eu-west-2 – Paris
      • us-central-1 – Plano, Texas
      • us-east-1 – North Virginia
      • us-east-2 – North Virginia
  4. Next, in Step 2, Set Properties, leave all options off, and click Next.
    Screenshot of the Set Properties screen showing all options left off
  5. Step 3 is to Review your selections. If everything looks correct, click Create Bucket.
    Screenshot of the Review screen highlighting the Create Bucket icon
  6. After creating your new bucket it will look like this:
    Screenshot of the Wasabi interface showing the Bucket List and the newly created bucket
  7. Now, click the bucket name and go to Policies.
  8. You can look at Sample Policies on the left.
    Screenshot of the Policies screen
  9. Setup a policy for your bucket. This is Full Access:
    Screenshot of the Bucket policy editor showing an example of Full Access permissions

    1. Give permission to the bucket:
      “Version”: “2012-10-17”,
      “Statement”: [
      “Effect”: “Allow”,
      “Action”: “s3:“,
      “Resource”: “
  10. Once your permissions are set, you’ve successfully set up storage in Wasabi.

Disabling / Enabling Public Access

To ensure that your new bucket has public access disabled or to enable public access for buckets you want to have accessible to anyone:

  1. On your Bucket List, click on the 3 vertical dots to the right of your bucket under the Actions column, and select Settings.
    Screenshot of the Wasabi interface showing the Bucket List and the newly created bucket
  2. On the Properties panel, find the option for Public Access Override and open the drop-down menu.
  3. Click the switch labelled Turn on override. This will override the bucket’s policies to allow for the enabling/disabling of public access.
    *Note: To undo and return the bucket to its default policy, click the switch again to Turn off override.
  4. Once override is enabled, click the radial buttons below to either Enable Public Access or Disable Public Access depending on your desired outcome.
  5. Once you’ve finished, return to your Bucket List. You should now see the status under the Public Access column listed as either Enabled or Disabled, depending on your selection.

Now that your bucket is created and your policies are set, the next step is to set Wasabi up on your server.



Need More Personalized Help?

If you have any further issues, questions, or would like some assistance checking on this or anything else, please reach out to us from your account and provide your server credentials within the encrypted field for the best possible security and support.

If you are unable to reach your account or if you are on the go, please reach out from your valid account email to us here at: [email protected] We are also available to you through our phone and live chat system 24/7/365.

Rapid Restore

Backup your entire server’s data every night and have access to 5 days of rolling restore points.  Restore your server’s data, OS and configuration any time you need it.

Our Rapid Restore service saves the day during accidental data loss, hardware failures and virus contraction. Simply pick your recovery point and restore the data from that day. 

DDoS Protection

While our competitors may advertise DDoS protection, most often, they are merely implementing easily evaded router rules or simply black-holing targeted servers. They consider this “DDoS protecting their network.” However, neither of these solutions should give comfort to any online business. Should your site be attacked, chances are likely both of these options will end with your server being taken offline. At Hivelocity, we take the responsibility of keeping your servers online very seriously. For this reason, we offer two very serious forms of DDoS protection.


Every solution we provide includes our Filtering Edge of Network System (FENS). FENS is a series of proprietary systems that proactively monitors and protects the entire Hivelocity Network from most common Denial of Service (DOS) and Distributed Denial of Service (DDoS) attacks.


For an extra fee, you can enhance your server’s protection further with the addition of our Server Defense System. Our Server Defense System sits in front of your server, inspecting inbound data and looking for malicious traffic. The moment an attack is detected, it instantly begins scrubbing each data packet. Hivelocity’s Server Defense System delivers business continuity even in the face of massive and complex attacks.

Our Server Defense System is like adding an alarm and armed guard to your business, alerting you to and destroying anything attempting to jump that fence. Our Server Defense System utilizes internally developed proprietary systems in addition to Corero’s Threat Defense Smartwalls for data packet scrubbing. Each of our data centers is a scrubbing center with Corero Smartwalls on-premise, allowing us to provide on-prem zero-lag data scrubbing.

SSL Certificates

The security of your online commerce and protecting your customers’ data is as important to us as it is to you. When your customers see the green bar, they will know their connection to you is protected. We offer single domain, multi-domain, and wild-card certificates.

We offer industry leading 128-bit encryption certificates, allowing you to conduct e-commerce with complete security. Inspire confidence in your customers by displaying any number of seals and indicators certifying that your site is secure.

Load Balancing

Adding this service to two servers with identical content will allow you to distribute your load evenly across your hardware. Don’t lose business because you couldn’t handle the demand. Load balance and handle your biggest resource spikes with ease.


Stop attacks, prevent unauthorized access, and achieve regulatory compliance. Our Juniper hardware firewalls offload the work so your server never has to consume resources protecting itself from malicious traffic. A single firewall can be used to protect multiple servers.

Cloud Storage

Cloud storage offers users redundancy and easy accessibility, ensuring your data remains secure and readily available. Scale to as much as you need for only a 20¢/GB.

Cloud Storage is distributed and replicated across many servers, protecting your data from hardware failure. Highly scalable, it can handle thousands of client connections via TCP/IP. Connect to your virtual drive with SFTP, FTP, and SSHMount and in the future NFS and AFP. Cloud Storage is based on a stackable design which is upgradeable up to 2TB per instance.