To disable this access, a NetworkPolicy should be added in all namespaces to block pod egress to the metadata endpoint.
apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: block-node-metadata spec: podSelector: matchLabels: {} policyTypes: - Egress egress: - to: - ipBlock: cidr: 0.0.0.0/0 # Preferably something smaller here except: - 169.254.169.254/32