I've heard that there are attacks that can get passwords out of RAM while turned on.
If a server, CentOS 7.5 and LUKS enabled, it's tty1 locked, which is on a VMWare hypervisor that is locked with a password, is gained access by government agencies while functioning/turned on, can government agencies unlock this server's virtual hard drive and read contents out of it?