{"id":52877,"date":"2025-06-20T13:03:32","date_gmt":"2025-06-20T13:03:32","guid":{"rendered":"https:\/\/www.edgenexus.io\/sin-categoria\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/"},"modified":"2025-06-20T13:03:32","modified_gmt":"2025-06-20T13:03:32","slug":"hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux","status":"publish","type":"post","link":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/","title":{"rendered":"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux"},"content":{"rendered":"<p>            <span class=\"multiline-text\"><\/p>\n<p>Merece la pena conocerlo si ejecutas m\u00e1quinas virtuales invitadas Linux en Hyper-V&#8230;.\n<\/p>\n<\/p>\n<p><\/span><\/p>\n<blockquote><p>Si se descubriera que Hyper-V de Microsoft trata a los hu\u00e9spedes Linux como ciudadanos de segunda clase, la tormenta de controversia resultante probablemente generar\u00eda suficiente calor y luz como para hacer mella en algunos modelos de cambio clim\u00e1tico.<\/p>\n<p>As\u00ed que probablemente esta semana se est\u00e9n fregando las cejas en Redmond por este art\u00edculo de la base de conocimientos titulado \u201cDegraded integration services message for non-Windows guests\u201d (Mensaje de servicios de integraci\u00f3n degradados para hu\u00e9spedes no Windows) en el que se explica que, aunque Hyper-V se comporta realmente de forma que los hu\u00e9spedes Linux parecen ciudadanos de segunda clase, el software est\u00e1 mintiendo y todo va bien.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Merece la pena conocerlo si ejecutas m\u00e1quinas virtuales invitadas Linux en Hyper-V&#8230;. Si se descubriera que Hyper-V de Microsoft trata a los hu\u00e9spedes Linux como ciudadanos de segunda clase, la tormenta de controversia resultante probablemente generar\u00eda suficiente calor y luz como para hacer mella en algunos modelos de cambio clim\u00e1tico. As\u00ed que probablemente esta semana [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":52878,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[500],"tags":[],"class_list":["post-52877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux - Edgenexus load balancers and Application Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Toomey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\"},\"author\":{\"name\":\"Donna Toomey\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\"},\"headline\":\"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux\",\"datePublished\":\"2025-06-20T13:03:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\"},\"wordCount\":137,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\",\"url\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\",\"name\":\"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux - Edgenexus load balancers and Application Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png\",\"datePublished\":\"2025-06-20T13:03:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png\",\"width\":414,\"height\":80,\"caption\":\"logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.edgenexus.io\/es\/controlador-de-entrega-de-aplicaciones\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#website\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"name\":\"Edgenexus load balancers and Application Security\",\"description\":\"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)\",\"publisher\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\"},\"alternateName\":\"Load balancers and Web application firewall\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#organization\",\"name\":\"Edgenexus\",\"url\":\"https:\/\/www.edgenexus.io\/zh-hans\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"contentUrl\":\"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png\",\"width\":903,\"height\":921,\"caption\":\"Edgenexus\"},\"image\":{\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/edgenexusio\",\"https:\/\/x.com\/edgenexusio\",\"https:\/\/www.linkedin.com\/company\/edgenexus\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca\",\"name\":\"Donna Toomey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g\",\"caption\":\"Donna Toomey\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux - Edgenexus load balancers and Application Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/","twitter_misc":{"Escrito por":"Donna Toomey","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#article","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/"},"author":{"name":"Donna Toomey","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca"},"headline":"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux","datePublished":"2025-06-20T13:03:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/"},"wordCount":137,"commentCount":0,"publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"image":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png","articleSection":["Blog"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/","url":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/","name":"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux - Edgenexus load balancers and Application Security","isPartOf":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png","datePublished":"2025-06-20T13:03:32+00:00","breadcrumb":{"@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#primaryimage","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2017\/02\/2014-04-07-9-52-58-511-rlogo_5000x500.png","width":414,"height":80,"caption":"logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.edgenexus.io\/es\/blog-es\/hyper-v-dice-mentiras-sobre-las-maquinas-virtuales-invitadas-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.edgenexus.io\/es\/controlador-de-entrega-de-aplicaciones\/"},{"@type":"ListItem","position":2,"name":"Hyper-V dice mentiras sobre las m\u00e1quinas virtuales invitadas Linux"}]},{"@type":"WebSite","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#website","url":"https:\/\/www.edgenexus.io\/zh-hans\/","name":"Edgenexus load balancers and Application Security","description":"Edgenexus Load Balancers, ADC and Web application Firewalls (WAF)","publisher":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization"},"alternateName":"Load balancers and Web application firewall","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.edgenexus.io\/zh-hans\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#organization","name":"Edgenexus","url":"https:\/\/www.edgenexus.io\/zh-hans\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/","url":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","contentUrl":"https:\/\/www.edgenexus.io\/wp-content\/uploads\/2023\/09\/edgenexus-adc-sq-transparentAsset-7.png","width":903,"height":921,"caption":"Edgenexus"},"image":{"@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edgenexusio","https:\/\/x.com\/edgenexusio","https:\/\/www.linkedin.com\/company\/edgenexus\/"]},{"@type":"Person","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/dc553ff5b496630eb88bf2d9ee2b31ca","name":"Donna Toomey","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.edgenexus.io\/zh-hans\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d4a009f6c17add48ad6905e40aac5308c04c77cdcff0616649d6c31251d1955?s=96&d=identicon&r=g","caption":"Donna Toomey"}}]}},"_links":{"self":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts\/52877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/comments?post=52877"}],"version-history":[{"count":0,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/posts\/52877\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/media\/52878"}],"wp:attachment":[{"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/media?parent=52877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/categories?post=52877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.edgenexus.io\/es\/wp-json\/wp\/v2\/tags?post=52877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}