Anyone with physical access to the computer that's unencrypted can see all of the data. If that's all right with your threat model then thats ok.
Having full disc encryption means the data is not available unless somebody has the password, usually guarded by a secure element in the computer itself that limits the number of unlock attempts to something reasonable. So if the device is stolen or copied, the data can't be used..
To take the opposite position for a second, even if your server has full disc encryption, if it's online and attached to a network and unencrypted, it's still unencrypted. Well the machine is on and doing useful work the full disc encryption only applies to data at rest, anything inside of the operating system sees things unencrypted (I'm talking about the general case here, obviously there's other things you could do to ensure data is encrypted while the computers on but that's not what full disc encryption usually means)