Updated April 23, 2025
**NOTE: This is a general guide to setup a Wasabi bucket for use with Remote Storage, please always consult with your security team and/or security policies before starting. In addition, please consult Wasabi if you need more details or explanations around the Wasabi environment.
Create a Wasabi Bucket for Call Recordings Remote Storage
1. Click on the “Buckets” option on the main menu:
2. Click on the Create bucket button:
3. Type in your bucket name into the Bucket name field:
4. Enable Bucket Versioning by selecting Enable:
5. Add Tags if you need, if not leave it as is:
6. After creating the bucket click on the settings option under the actions column:
7. Go to the Permissions tabs above and click on Edit on the bucket policy section:
8. You may now copy and paste the S3 policy into the Policy section with your bucket name and click Save changes:
Syntax: (replace <bucketName> with your new bucket name)
{
"Version": "2012-10-17",
"Id": "PolicyId2",
"Statement": [
{
"Sid": "AllowIPmix",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::<bucketName>",
"arn:aws:s3:::<bucketName>/*"
],
"Condition": {
"IpAddress": {
"aws:SourceIp": [
"192.92.8.0/24",
"64.52.82.0/24",
"64.52.83.0/24"
]
}
}
}
]
}
Example:
{
"Version": "2012-10-17",
"Id": "PolicyId2",
"Statement": [
{
"Sid": "AllowIPmix",
"Effect": "Allow",
"Principal": "*",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::mycallrecordingbucket1",
"arn:aws:s3:::mycallrecordingbucket1/*"
],
"Condition": {
"IpAddress": {
"aws:SourceIp": [
"192.92.8.0/24",
"64.52.82.0/24",
"64.52.83.0/24"
]
}
}
}
]
}
Create an S3 Policy and User to Access the Bucket
Here you are creating a Policy to limit the User to only access Wasabi and only certain actions
1. Click on the “Policies” option on the main menu
2. Next click on the Create policy button in the main content area
3. Now click the policy generator button
4. You will now see the Policy rules page, select the following actions to set the Access level: ListAllMyBuckets, ListBucket, GetObject, DeleteObject, and PutObject
5. Create a user with programmatic access, click on the “Buckets” option on the main menu:
6. Next click Add users:
7. Now enter the username in the User name field and click Next:
8. Next set the permissions by selecting Attach policies directly, searching for your custom policy in the search box, click on the plus sign next to your policy and then click Next
9. Review the details and then click on create user.
10. . Your access keys has now been created, copy them or save the csv file for use within the setup of Call Recordings Remote Storage.
16. You have now setup a bucket and access keys for use with call recordings remote storage. You will need the following details to continue with the setup of Call Recordings Remote Storage.
AWS Region
Bucket Name
Access Key
Access Secret