I want splunk to start indexing my log file only after it encountered a specific string/regex.
Everything before that marker should be ignored as I have no use for it.
Is there any way to do that?
For Splunk 6, see:
Specifically the example on ignoring useless long headers.