In some situations it might be preferable to limit the job target type. To do this, administrators who have the Organization Policy Administrator role can configure a policy to control what kind of job targets (HTTP, Pub/Sub, and/or App Engine HTTP) can be created in their organization.
Console
- Visit the Organization policies page of the IAM & Admin section. 
- From the top left dropdown, select the resource (organization or project) to which you wish to apply the constraint. 
- Select Allowed target types for jobs from the list of Organization Policies. 
- On the policy page, click the Edit button. 
- Under Rules, open Add Rule - Select Custom for Policy values. 
- Select Allow for Policy type. 
- Add the type (PUBSUB, HTTP, or APPENGINE) to allowlist. 
- Click on New Policy Value to add multiple job types. 
- Save to enforce the policy. 
 
Gcloud
- To see the value of the constraint in an existing policy: - gcloud resource-manager org-policies describe cloudscheduler.allowedTargetTypes --RESOURCE_TYPE=RESOURCE_ID - Where RESOURCE_TYPE is either - project,- folder, or- organization, depending on where in the hierarchy the policy is attached.- Which should return something like this: - constraint: constraints/cloudscheduler.allowedTargetTypes etag: ETAG_VALUE listPolicy: allowedValues: - PUBSUB updateTime: '2021-09-04T15:30:45.313018Z' 
- To create a - policy.yamlfile with the constraint:- cat >policy.yaml constraint: constraints/cloudscheduler.allowedTargetTypes --RESOURCE_TYPE=RESOURCE_ID etag: ETAG_VALUE listPolicy: allowedValues: - PUBSUB 
- To set the policy: - gcloud resource-manager org-policies set-policy --RESOURCE_TYPE=RESOURCE_ID policy.yaml 
- To delete the constraint: - gcloud resource-manager org-policies delete --RESOURCE_TYPE=RESOURCE_ID constraints/cloudscheduler.allowedTargetTypes