My Splunk server has two gigabit NICs (eth0 and eth1), both on the same subnet.
eth0 and its assigned IP address is where the main Splunk interface is accessed by other hosts on the subnet (both to access the interface via a web browser, and also to forward log data via syslog or forwarders).
I have connected a SPAN port on my switch to eth1 on my Splunk server. This SPAN port is a mirror of the switch port used by 'Server A' (which is also running the Splunk Universal Forwarder).
I've got the Splunk App for Stream installed and running, but cannot work out how get it to 'listen' on traffic arriving on eth1. In other words, I just want the the Stream app to collect network traffic pertaining to 'Server A' and nothing else. But at present, it seems to be collecting traffic related to the Splunk server itself, which suggests the Stream app is simply 'listening' on eth0.
Please can someone tell me how to configure multiple NICs within Splunk, and also if this is the correct approach to get the Stream App to collect Cisco SPAN port traffic?