Author Image

Hi, I am Harsh

Harsh Kotak

Principal Engineer at Charter Communications

I am a passionate engineer with 9+ years of experience in the Telecom industry. I have a diverse background in the fields of datacenter networking, compute, storage, virtualization and containerization technologies. I pride myself in being current with industry trends and new methodologies to ensure my work is optimal. I approach my day with a positive attitude, perseverance and professionalism, all while being able to remain calm when faced with challenges.

Team Work
Problem Solving
Leadership
Communication
Fast Learner
Hard Working

Skills

Experiences

1
Charter Communications

June 2016 - Present

Denver, CO

Charter Communications is a leading broadband connectivity company and cable operator serving more than 32 million customers in 41 states through its Spectrum brand.

Principal Engineer

May 2022 - Present

Responsibilities:
  • Part of the Private Cloud Engineering team within the Enterprise Infrastructure Group, responsible for planning, designing, implementing, and operating virtualized and containerized telco cloud systems.
  • Led development and implementation of Red Hat OpenShift-based platforms supporting enterprise and VNF/CNF workloads across multiple distributed data centers, including edge locations.
  • Developed Ansible automation for bare-metal OpenShift cluster deployment, including node provisioning, day-0/day-1 configuration, operator installation, and cluster and platform upgrades.
  • Delivered KubeVirt-based virtualization, running KVM virtual machines natively on Kubernetes alongside containerized workloads for mixed legacy and cloud-native use cases.
  • Led certification and validation initiatives for packet acceleration, Kubernetes CNI, load balancing, and service exposure using BGP, MetalLB, Multus, SR-IOV, Ingress and service mesh solutions.
  • Designed and implemented GitOps workflows using ArgoCD, enabling declarative management of OpenShift clusters, operators, and application workloads across development, staging, and production environments.
  • Built and integrated GitLab CI pipelines to automate Kubernetes workflows, covering image builds, configuration validation, security checks, and manifest promotion.
  • Implemented full-stack monitoring and observability across Kubernetes, compute, network, storage, and virtualization layers to support troubleshooting, capacity planning, and reliability objectives.
  • Supported Kubernetes application onboarding and operations, including deployment standards, operator lifecycle management, performance tuning, and resolution of cluster and application-level issues.
  • Contributed to strategic architecture and roadmap development, while providing tiered platform support across multiple organizations.
Network Engineer

June 2016 - September 2021

Responsibilities:
  • Developed data center network architectures and application delivery solutions at Charter, including lab configuration, testing, and design of high-performance, multi-tenant networks with a focus on scalability, resiliency, and automation.
  • Defined and implemented network certification frameworks to validate hardware, firmware, and software interoperability across spine-leaf, overlay, and underlay domains.
  • Worked on development of containers as a service platform to deploy scalable Kubernetes clusters on vSphere and AWS.
  • Integrated test and build pipelines for full-stack deployment, covering infrastructure, Kubernetes, and application charts.
  • Evaluated, tested, and optimized NFV components, including NFVI, VIM, and NFVO, for edge and data center use cases.
  • Certified use of packet acceleration technologies and SmartNICs for OpenStack and NFV clouds.
  • Developed Ansible playbooks to automate provisioning and management of Red Hat OpenStack clouds.
  • Installed, configured, administered, and troubleshot OpenStack and Ceph for production environments.
  • Developed test cases and performed certification testing of data center switching platforms.
  • Redesigned, built, and managed a large-scale lab environment with 100+ racks of network, compute, storage, virtualization, and shared services.

Comcast

May 2015 - Aug 2015

Denver, CO

Comcast is the largest provider of cable television, internet, telephone, and wireless services in the United States.

Automation Engineer Intern

May 2015 - Aug 2015

Responsibilities:
  • Worked within the EPS Voice Engineering department of Comcast to automate tasks and support Big Data Analytics.
  • Developed stored procedures and ETL tools in Microsoft SQL Server to process CDR and other usage data from switches.
2

Education

Masters in Telecommunications Engineering
GPA: 3.7 out of 4
Bachelors in Electronics & Telecommunication Engineering
GPA: 3.6 out of 4

Accomplishments

Technology Leadership Certificate

Got the opportunity to analyze my own leadership attributes and decision-making styles as a technology leader; strengthen essential communication, motivation, and influencing skills; and ultimately prepare for future growth and success in the management of technical and project teams.

Certified Kubernetes Administrator (CKA)
Linux Foundation Dec 2022 - Dec 2025

CKAs have the skills, knowledge, and competency to perform the responsibilities of Kubernetes administrators.

Cisco Certified Network Professional (CCNP)
Cisco June 2024 - June 2027

Tests your skills in the ever-changing landscape of enterprise network technologies.

Recent Posts

Kubernetes Interview Questions

Kubernetes Interview Prep Guide This page serves as a comprehensive technical guide for Kubernetes interviews. Topics are grouped and answered in-depth to help with preparation for DevOps, SRE, and Platform Engineer roles. Each section includes detailed technical Q&A, YAML examples, comparisons, and real-world use cases. Linux and Container Fundamentals Q1: What are Linux namespaces? Namespaces provide process isolation in Linux. Types include: pid: process IDs net: networking mnt: mount points uts: hostname ipc: inter-process communication user: UID/GID Each container typically runs in its own set of namespaces to isolate processes from others. Q2: What are cgroups and how do they work? Control Groups (cgroups) limit and monitor resource usage per process or container. Manage CPU, memory, I/O, and network bandwidth. Kubernetes uses cgroups (via the container runtime) to enforce pod resource requests/limits. Q3: What does it mean when a container is a “tar of tar”? Container images are built in layers using a union filesystem. Each layer is a tarball of the diff from the previous layer. The final image is a “tar of tars” that gets extracted when the container is started. Tools like ctr, crictl, or docker handle pulling and extracting these tarballs. Q4: How do containers relate to Kubernetes? Kubernetes schedules and manages containers using Pods. It uses a container runtime (e.g., containerd) to start/stop containers. Kubernetes adds orchestration features (health checks, scaling, service discovery, etc.) on top of container runtimes. Core Kubernetes Concepts Q5: How does Kubernetes perform service discovery? Kubernetes provides two main methods for service discovery: