Recently, I configured File Integrity Monitoring (FIM) on the /data directory in our Linux environment. Following this, I have observed that approximately 90% of the generated events are related to file additions, deletions, and modifications.
Upon closer inspection, these events appear to be associated with files having various extensions, and they seem to belong to Elasticsearch indices (possibly related to Wazuh operations). For your reference, I have attached screenshots along with the exact path where these events are being generated.
Path: /data/elasticsearch/indices

Could you please help clarify whether this behavior is expected due to Elasticsearch’s internal processes (such as index management, segment merging, etc.), or if this requires further investigation?
Additionally, I would appreciate your guidance on whether we should exclude this path from FIM monitoring to reduce noise, or if there are recommended best practices for handling such cases.
Looking forward to your insights.
Thanks and Regards,
Chandra